WorldWideScience

Sample records for prevention information network

  1. Optimal information dissemination strategy to promote preventive behaviors in multilayer epidemic networks.

    Science.gov (United States)

    Shakeri, Heman; Sahneh, Faryad Darabi; Scoglio, Caterina; Poggi-Corradini, Pietro; Preciado, Victor M

    2015-06-01

    Launching a prevention campaign to contain the spread of infection requires substantial financial investments; therefore, a trade-off exists between suppressing the epidemic and containing costs. Information exchange among individuals can occur as physical contacts (e.g., word of mouth, gatherings), which provide inherent possibilities of disease transmission, and non-physical contacts (e.g., email, social networks), through which information can be transmitted but the infection cannot be transmitted. Contact network (CN) incorporates physical contacts, and the information dissemination network (IDN) represents non-physical contacts, thereby generating a multilayer network structure. Inherent differences between these two layers cause alerting through CN to be more effective but more expensive than IDN. The constraint for an epidemic to die out derived from a nonlinear Perron-Frobenius problem that was transformed into a semi-definite matrix inequality and served as a constraint for a convex optimization problem. This method guarantees a dying-out epidemic by choosing the best nodes for adopting preventive behaviors with minimum monetary resources. Various numerical simulations with network models and a real-world social network validate our method.

  2. The genomic applications in practice and prevention network.

    Science.gov (United States)

    Khoury, Muin J; Feero, W Gregory; Reyes, Michele; Citrin, Toby; Freedman, Andrew; Leonard, Debra; Burke, Wylie; Coates, Ralph; Croyle, Robert T; Edwards, Karen; Kardia, Sharon; McBride, Colleen; Manolio, Teri; Randhawa, Gurvaneet; Rasooly, Rebekah; St Pierre, Jeannette; Terry, Sharon

    2009-07-01

    The authors describe the rationale and initial development of a new collaborative initiative, the Genomic Applications in Practice and Prevention Network. The network convened by the Centers for Disease Control and Prevention and the National Institutes of Health includes multiple stakeholders from academia, government, health care, public health, industry and consumers. The premise of Genomic Applications in Practice and Prevention Network is that there is an unaddressed chasm between gene discoveries and demonstration of their clinical validity and utility. This chasm is due to the lack of readily accessible information about the utility of most genomic applications and the lack of necessary knowledge by consumers and providers to implement what is known. The mission of Genomic Applications in Practice and Prevention Network is to accelerate and streamline the effective integration of validated genomic knowledge into the practice of medicine and public health, by empowering and sponsoring research, evaluating research findings, and disseminating high quality information on candidate genomic applications in practice and prevention. Genomic Applications in Practice and Prevention Network will develop a process that links ongoing collection of information on candidate genomic applications to four crucial domains: (1) knowledge synthesis and dissemination for new and existing technologies, and the identification of knowledge gaps, (2) a robust evidence-based recommendation development process, (3) translation research to evaluate validity, utility and impact in the real world and how to disseminate and implement recommended genomic applications, and (4) programs to enhance practice, education, and surveillance.

  3. Acceptability of HIV Prevention Information Delivered Through Established Geosocial Networking Mobile Applications to Men Who Have Sex With Men.

    Science.gov (United States)

    Czarny, Heather N; Broaddus, Michelle R

    2017-11-01

    Geosocial networking (GSN) applications could disseminate HIV prevention information to thousands of men who have sex with men (MSM); however, acceptability of the type of information, methods, and frequency of information delivery are unknown. Acceptability of these constructs were assessed through a survey of 224 MSM at the Milwaukee Pridefest. All types of information were found acceptable. A sexual health section and self-seeking information were the most acceptable method and frequency of delivery. Demographics and differences in app usage did not correlate to acceptability. Continued research focusing on the feasibility of incorporating HIV prevention information into GSN applications is needed.

  4. General practice and the Internet revolution. Use of an Internet social network to communicate information on prevention in France.

    Science.gov (United States)

    Veuillotte, Isabelle; Morel, Gilles; Pitois, Stephane; Haler, Renaud; Mercier, Patricia; Aubry, Catherine; Cannet, Didier

    2015-03-01

    The popularity of social networks and the huge number of exchanges have made them immensely important for the communication of information. This French study explored prevention in hereditary breast cancer using a social Internet network to communicate information. The principal objective was to inform French women aged from 20 to 50 years, using the social network Facebook, about the warning signs of breast cancer in cases of a predisposition to the disease due to a genetic mutation. The secondary objectives were to inform people about screening. An information page entitled "hereditary breast cancer: and if I was concerned?" was distributed in 3 different ways: from friend to friend, via groups of persons, and by targeted advertising. Four articles and 11 messages were distributed over 27 days. The total number of visits for this period amounted to 1019. A total of 81 percent of the Internauts were women and 55 percent of the visitors were aged between 25 and 44 years. Other information campaigns concerning public health issues could be conducted using this tool. A legal framework is necessary to preserve the quality of the medical information provided. This new means of communication, used for prevention purposes, will add to other frequently used methods of communication. © The Author(s) 2013.

  5. Invasive species information networks: Collaboration at multiple scales for prevention, early detection, and rapid response to invasive alien species

    Science.gov (United States)

    Simpson, Annie; Jarnevich, Catherine S.; Madsen, John; Westbrooks, Randy G.; Fournier, Christine; Mehrhoff, Les; Browne, Michael; Graham, Jim; Sellers, Elizabeth A.

    2009-01-01

    Accurate analysis of present distributions and effective modeling of future distributions of invasive alien species (IAS) are both highly dependent on the availability and accessibility of occurrence data and natural history information about the species. Invasive alien species monitoring and detection networks (such as the Invasive Plant Atlas of New England and the Invasive Plant Atlas of the MidSouth) generate occurrence data at local and regional levels within the United States, which are shared through the US National Institute of Invasive Species Science. The Inter-American Biodiversity Information Network's Invasives Information Network (I3N), facilitates cooperation on sharing invasive species occurrence data throughout the Western Hemisphere. The I3N and other national and regional networks expose their data globally via the Global Invasive Species Information Network (GISIN). International and interdisciplinary cooperation on data sharing strengthens cooperation on strategies and responses to invasions. However, limitations to effective collaboration among invasive species networks leading to successful early detection and rapid response to invasive species include: lack of interoperability; data accessibility; funding; and technical expertise. This paper proposes various solutions to these obstacles at different geographic levels and briefly describes success stories from the invasive species information networks mentioned above. Using biological informatics to facilitate global information sharing is especially critical in invasive species science, as research has shown that one of the best indicators of the invasiveness of a species is whether it has been invasive elsewhere. Data must also be shared across disciplines because natural history information (e.g. diet, predators, habitat requirements, etc.) about a species in its native range is vital for effective prevention, detection, and rapid response to an invasion. Finally, it has been our

  6. Networks for prevention of violence: from utopia to action

    Directory of Open Access Journals (Sweden)

    Kathie Njaine

    2006-06-01

    Full Text Available This article aims to discuss the experience of networks for the protection of people exposed to situations of violence or prevention networks. It is based on the concept created by Castells, who defines the information age. This study is part of the investigation "Successful experiences in the prevention of violence", carried out by the Latin-American Center for Studies on Violence Jorge Careli/ENSP-IFF/Fiocruz, in cooperation with the Secretariat for Health Survey of the Ministry of Health. The article analyzes the possibilities and limitations in the construction of networks for the prevention of violence, seeking to understand the sense of actions and movements carried out in networks. The method we used is a case study of two network initiatives in the Southern region of the country. In terms of results, in face of the difficulties of working in networks, we found it to be necessary: to break with sectorial and vertical actions; to promote constant communication and interchange of information; to permanently train the professionals and persons involved in the network, incorporating them into the protective and preventive actions; and to promote the participation of wide social sectors. In conclusion, one can affirm that the construction of a protection network involves complex steps, looking to the same problem with new eyes and a new vision for planting solutions.

  7. Essential elements of online information networks on invasive alien species

    Science.gov (United States)

    Simpson, A.; Sellers, E.; Grosse, A.; Xie, Y.

    2006-01-01

    In order to be effective, information must be placed in the proper context and organized in a manner that is logical and (preferably) standardized. Recently, invasive alien species (IAS) scientists have begun to create online networks to share their information concerning IAS prevention and control. At a special networking session at the Beijing International Symposium on Biological Invasions, an online Eastern Asia-North American IAS Information Network (EA-NA Network) was proposed. To prepare for the development of this network, and to provide models for other regional collaborations, we compare four examples of global, regional, and national online IAS information networks: the Global Invasive Species Information Network, the Invasives Information Network of the Inter-American Biodiversity Information Network, the Chinese Species Information System, and the Invasive Species Information Node of the US National Biological Information Infrastructure. We conclude that IAS networks require a common goal, dedicated leaders, effective communication, and broad endorsement, in order to obtain sustainable, long-term funding and long-term stability. They need to start small, use the experience of other networks, partner with others, and showcase benefits. Global integration and synergy among invasive species networks will succeed with contributions from both the top-down and the bottom-up. ?? 2006 Springer.

  8. Canada-Africa Prevention Trials Network : Building African Capacity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  9. Prevention of Falls Network Europe: a thematic network aimed at introducing good practice in effective falls prevention across Europe.

    Science.gov (United States)

    Skelton, D A; Becker, C; Lamb, S E; Close, J C T; Zijlstra, W; Yardley, L; Todd, C J

    2004-12-01

    The Prevention of Falls Network Europe (ProFaNE) aims to improve quality of life of the ageing population by focussing on a major cause of disability and distress: falls. The thematic network is funded by the European Commission and brings together scientists, clinicians and other health professionals from around Europe to focus on four main themes: taxonomy and coordination of trials, clinical assessment and management of falls, assessment of balance function, and psychological aspects of falling. There are 24 members across Europe as well as network associates who contribute expertise at workshops and meetings. ProFaNE, a 4-year project which started in January 2003, aims to improve and standardise health care processes, introducing and promoting good practice widely across Europe. ProFaNE undertakes workshops that bring together experts and observers around specific topics to exchange knowledge, expertise and resources on interventions that reduce falls. A key document for policy makers around Europe, written by ProFaNE members, was published by the World Health Organisation in March 2004. ProFaNE's website has both public and private areas with resources (web links to falls prevention, useful documents for policy makers, researchers and practitioners) and a discussion board to encourage informal networking between members and the public. The ultimate aim of ProFaNE is to submit a collaborative bid to undertake a multi-centre, randomised controlled trial of a multi-factorial fall prevention intervention with peripheral fracture as the primary outcome. The success of the networking and relationship building in the first year and a half of ProFaNE's work makes this an achievable goal.

  10. Design of Detection and Prevention System of Unauthorized Data Sending from the Local Network

    Directory of Open Access Journals (Sweden)

    D. A. Moskvin

    2010-03-01

    Full Text Available Malware often aims at breaking confidentiality. A malicious program gets inside the local network, finds out necessary data and then illegally transfers this data to the intruder. Prevention of unauthorized data transfer requires development of a special software product, which will detect and prevent leak of information from the local network.

  11. A Network-Individual-Resource Model for HIV Prevention

    Science.gov (United States)

    Johnson, Blair T.; Redding, Colleen A.; DiClemente, Ralph J.; Mustanski, Brian S.; Dodge, Brian M.; Sheeran, Paschal; Warren, Michelle R.; Zimmerman, Rick S.; Fisher, William A.; Conner, Mark T.; Carey, Michael P.; Fisher, Jeffrey D.; Stall, Ronald D.; Fishbein, Martin

    2014-01-01

    HIV is transmitted through dyadic exchanges of individuals linked in transitory or permanent networks of varying sizes. To optimize prevention efficacy, a complementary theoretical perspective that bridges key individual level elements with important network elements can be a foundation for developing and implementing HIV interventions with outcomes that are more sustainable over time and have greater dissemination potential. Toward that end, we introduce a Network-Individual-Resource (NIR) model for HIV prevention that recognizes how exchanges of resources between individuals and their networks underlies and sustains HIV-risk behaviors. Individual behavior change for HIV prevention, then, may be dependent on increasing the supportiveness of that individual's relevant networks for such change. Among other implications, an NIR model predicts that the success of prevention efforts depends on whether the prevention efforts (1) prompt behavior changes that can be sustained by the resources the individual or their networks possess; (2) meet individual and network needs and are consistent with the individual's current situation/developmental stage; (3) are trusted and valued; and (4) target high HIV-prevalence networks. PMID:20862606

  12. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  13. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  14. HIV Clients as Agents for Prevention: A Social Network Solution

    Directory of Open Access Journals (Sweden)

    Sarah Ssali

    2012-01-01

    Full Text Available HIV prevention efforts to date have not explored the potential for persons living with HIV to act as change agents for prevention behaviour in their social networks. Using egocentric social network analysis, this study examined the prevalence and social network correlates of prevention advocacy behaviours (discussing HIV in general; encouraging abstinence or condom use, HIV testing, and seeking HIV care enacted by 39 HIV clients in Uganda. Participants engaged in each prevention advocacy behaviour with roughly 50–70% of the members in their network. The strongest determinant of engaging in prevention advocacy with more of one’s network members was having a greater proportion of network members who knew one’s HIV seropositive status, as this was associated with three of the four advocacy behaviours. These findings highlight the potential for PLHA to be key change agents for HIV prevention within their networks and the importance of HIV disclosure in facilitating prevention advocacy.

  15. Role of information and communication networks in malaria survival

    Directory of Open Access Journals (Sweden)

    Marathe Achla

    2007-10-01

    Full Text Available Abstract Background Quite often symptoms of malaria go unrecognized or untreated. According to the Multilateral Initiative on Malaria, 70% of the malaria cases that are treated at home are mismanaged. Up to 82% of all malaria episodes in sub-Saharan Africa are treated outside the formal health sector. Fast and appropriate diagnosis and treatment of malaria is extremely important in reducing morbidity and mortality. Method Data from 70 different countries is pooled together to construct a panel dataset of health and socio-economic variables for a time span of (1960–2004. The generalized two-stage least squares and panel data models are used to investigate the impact of information and communication network (ICN variables on malaria death probability. The intensity of ICN is represented by the number of telephone main lines per 1,000 people and the number of television sets per 1,000 people. Results The major finding is that the intensity of ICN is associated with reduced probability of deaths of people that are clinically identified as malaria infected. The results are robust for both indicators i.e. interpersonal and mass communication networks and for all model specifications examined. Conclusion The results suggest that information and communication networks can substantially scale up the effectiveness of the existing resources for malaria prevention. Resources spent in preventing malaria are far less than needed. Expanded information and communication networks will widen the avenues for community based "participatory development", that encourages the use of local information, knowledge and decision making. Timely information, immediate care and collective knowledge based treatment can be extremely important in reducing child mortality and achieving the millennium development goal.

  16. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  17. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  18. The prevention research centers' managing epilepsy well network.

    Science.gov (United States)

    DiIorio, Colleen K; Bamps, Yvan A; Edwards, Ariele L; Escoffery, Cam; Thompson, Nancy J; Begley, Charles E; Shegog, Ross; Clark, Noreen M; Selwa, Linda; Stoll, Shelley C; Fraser, Robert T; Ciechanowski, Paul; Johnson, Erica K; Kobau, Rosemarie; Price, Patricia H

    2010-11-01

    The Managing Epilepsy Well (MEW) Network was created in 2007 by the Centers for Disease Control and Prevention's (CDC) Prevention Research Centers and Epilepsy Program to promote epilepsy self-management research and to improve the quality of life for people with epilepsy. MEW Network membership comprises four collaborating centers (Emory University, University of Texas Health Science Center at Houston, University of Michigan, and University of Washington), representatives from CDC, affiliate members, and community stakeholders. This article describes the MEW Network's background, mission statement, research agenda, and structure. Exploratory and intervention studies conducted by individual collaborating centers are described, as are Network collaborative projects, including a multisite depression prevention intervention and the development of a standard measure of epilepsy self-management. Communication strategies and examples of research translation programs are discussed. The conclusion outlines the Network's role in the future development and dissemination of evidence-based epilepsy self-management programs. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Marina V. Tumbinskaya

    2017-01-01

    Full Text Available Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level. 

  20. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-01-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized. PMID:26960247

  1. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-03-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.

  2. Social influence and bullying behavior: intervention-based network dynamics of the fairplayer.manual bullying prevention program.

    Science.gov (United States)

    Wölfer, Ralf; Scheithauer, Herbert

    2014-01-01

    Bullying is a social phenomenon and although preventive interventions consequently address social mechanisms, evaluations hardly consider the complexity of peer processes. Therefore, the present study analyzes the efficacy of the fairplayer.manual bullying prevention program from a social network perspective. Within a pretest-posttest control group design, longitudinal data were available from 328 middle-school students (MAge  = 13.7 years; 51% girls), who provided information on bullying behavior and interaction patterns. The revealed network parameters were utilized to examine the network change (MANCOVA) and the network dynamics (SIENA). Across both forms of analyses, findings revealed the hypothesized intervention-based decrease of bullies' social influence. Hence the present bullying prevention program, as one example of programs that successfully addresses both individual skills and social mechanisms, demonstrates the desired effect of reducing contextual opportunities for the exhibition of bullying behavior. © 2014 Wiley Periodicals, Inc.

  3. Pollution Prevention Information Network (PPIN) Grant Summaries 2014

    Science.gov (United States)

    The Office of Pollution Prevention and Toxics is responsible for overseeing several grant programs for tribes and states which promote pollution prevention through source reduction and resource conservation.

  4. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  5. Vaccine Hesitancy and Online Information: The Influence of Digital Networks.

    Science.gov (United States)

    Getman, Rebekah; Helmi, Mohammad; Roberts, Hal; Yansane, Alfa; Cutler, David; Seymour, Brittany

    2017-12-01

    This article analyzes the digital childhood vaccination information network for vaccine-hesitant parents. The goal of this study was to explore the structure and influence of vaccine-hesitant content online by generating a database and network analysis of vaccine-relevant content. We used Media Cloud, a searchable big-data platform of over 550 million stories from 50,000 media sources, for quantitative and qualitative study of an online media sample based on keyword selection. We generated a hyperlink network map and measured indegree centrality of the sources and vaccine sentiment for a random sample of 450 stories. 28,122 publications from 4,817 sources met inclusion criteria. Clustered communities formed based on shared hyperlinks; communities tended to link within, not among, each other. The plurality of information was provaccine (46.44%, 95% confidence interval [39.86%, 53.20%]). The most influential sources were in the health community (National Institutes of Health, Centers for Disease Control and Prevention) or mainstream media ( New York Times); some user-generated sources also had strong influence and were provaccine (Wikipedia). The vaccine-hesitant community rarely interacted with provaccine content and simultaneously used primary provaccine content within vaccine-hesitant narratives. The sentiment of the overall conversation was consistent with scientific evidence. These findings demonstrate an online environment where scientific evidence online drives vaccine information outside of the vaccine-hesitant community but is also prominently used and misused within the robust vaccine-hesitant community. Future communication efforts should take current context into account; more information may not prevent vaccine hesitancy.

  6. National Network for Immunization Information

    Science.gov (United States)

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  7. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  8. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  9. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  10. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  11. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  12. Social network approaches to recruitment, HIV prevention, medical care, and medication adherence.

    Science.gov (United States)

    Latkin, Carl A; Davey-Rothwell, Melissa A; Knowlton, Amy R; Alexander, Kamila A; Williams, Chyvette T; Boodram, Basmattee

    2013-06-01

    This article reviews the current issues and advancements in social network approaches to HIV prevention and care. Social network analysis can provide a method to understand health disparities in HIV rates, treatment access, and outcomes. Social network analysis is a valuable tool to link social structural factors to individual behaviors. Social networks provide an avenue for low-cost and sustainable HIV prevention interventions that can be adapted and translated into diverse populations. Social networks can be utilized as a viable approach to recruitment for HIV testing and counseling, HIV prevention interventions, optimizing HIV medical care, and medication adherence. Social network interventions may be face-to-face or through social media. Key issues in designing social network interventions are contamination due to social diffusion, network stability, density, and the choice and training of network members. There are also ethical issues involved in the development and implementation of social network interventions. Social network analyses can also be used to understand HIV transmission dynamics.

  13. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    Science.gov (United States)

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  14. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  15. Information cascade on networks

    Science.gov (United States)

    Hisakado, Masato; Mori, Shintaro

    2016-05-01

    In this paper, we discuss a voting model by considering three different kinds of networks: a random graph, the Barabási-Albert (BA) model, and a fitness model. A voting model represents the way in which public perceptions are conveyed to voters. Our voting model is constructed by using two types of voters-herders and independents-and two candidates. Independents conduct voting based on their fundamental values; on the other hand, herders base their voting on the number of previous votes. Hence, herders vote for the majority candidates and obtain information relating to previous votes from their networks. We discuss the difference between the phases on which the networks depend. Two kinds of phase transitions, an information cascade transition and a super-normal transition, were identified. The first of these is a transition between a state in which most voters make the correct choices and a state in which most of them are wrong. The second is a transition of convergence speed. The information cascade transition prevails when herder effects are stronger than the super-normal transition. In the BA and fitness models, the critical point of the information cascade transition is the same as that of the random network model. However, the critical point of the super-normal transition disappears when these two models are used. In conclusion, the influence of networks is shown to only affect the convergence speed and not the information cascade transition. We are therefore able to conclude that the influence of hubs on voters' perceptions is limited.

  16. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  17. A unified plant information network

    International Nuclear Information System (INIS)

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  18. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  19. DOE's Pollution Prevention Information Clearinghouse (EPIC)

    International Nuclear Information System (INIS)

    Otis, P.T.

    1994-05-01

    The US Department of Energy's (DOE's) Pollution Prevention Information Clearinghouse (EPIC) is a computer system intended for the exchange of pollution prevention information DOE-wide. EPIC is being developed as a distributed system that will allow access to other databases and applications. The first prototype of EPIC (Prototype I) was put on-line in January 1994. Prototype I contains information on EM-funded pollution prevention projects; relevant laws, regulations, guidance, and policy; facility and DOE contacts; and meetings and conferences. Prototype I also gives users access to the INEL Hazardous Solvent Substitution Data System (HSSDS) and to information contained on the US Environmental Protection Agency's (EPNS) Pollution Prevention Infbrmation Exchange System (PIES) as a test of the distributed system concept. An initial user group of about 35 is testing and providing feedback on Prototype I. Prototype II, with a Graphical User Interface (GUI), is planned for the end of CY94. This paper describes the current state of EPIC in terms of architecture, user interface, and information content. Plans for Prototype II and the final system are then discussed. The EPIC development effort is being coordinated with EPA and US Department of Defense (DoD) efforts to develop or upgrade their pollution prevention information exchange systems

  20. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  1. A new information dimension of complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Daijun [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Science, Hubei University for Nationalities, Enshi 445000 (China); Wei, Bo [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Hu, Yong [Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006 (China); Zhang, Haixin [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Deng, Yong, E-mail: ydeng@swu.edu.cn [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Engineering, Vanderbilt University, TN 37235 (United States)

    2014-03-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  2. A new information dimension of complex networks

    International Nuclear Information System (INIS)

    Wei, Daijun; Wei, Bo; Hu, Yong; Zhang, Haixin; Deng, Yong

    2014-01-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  3. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  4. Network information provision to potential generators: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)

  5. Social network approaches to recruitment, HIV prevention, medical care, and medication adherence

    OpenAIRE

    Latkin, Carl A.; Davey-Rothwell, Melissa A.; Knowlton, Amy R.; Alexander, Kamila A.; Williams, Chyvette T.; Boodram, Basmattee

    2013-01-01

    This article reviews current issues and advancements in social network approaches to HIV prevention and care. Social network analysis can provide a method to understand health disparities in HIV rates and treatment access and outcomes. Social network analysis is a value tool to link social structural factors to individual behaviors. Social networks provide an avenue for low cost and sustainable HIV prevention interventions that can be adapted and translated into diverse populations. Social ne...

  6. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  7. Optimal Information Processing in Biochemical Networks

    Science.gov (United States)

    Wiggins, Chris

    2012-02-01

    A variety of experimental results over the past decades provide examples of near-optimal information processing in biological networks, including in biochemical and transcriptional regulatory networks. Computing information-theoretic quantities requires first choosing or computing the joint probability distribution describing multiple nodes in such a network --- for example, representing the probability distribution of finding an integer copy number of each of two interacting reactants or gene products while respecting the `intrinsic' small copy number noise constraining information transmission at the scale of the cell. I'll given an overview of some recent analytic and numerical work facilitating calculation of such joint distributions and the associated information, which in turn makes possible numerical optimization of information flow in models of noisy regulatory and biochemical networks. Illustrating cases include quantification of form-function relations, ideal design of regulatory cascades, and response to oscillatory driving.

  8. Subtle role of latency for information diffusion in online social networks

    International Nuclear Information System (INIS)

    Xiong Fei; Wang Xi-Meng; Cheng Jun-Jun

    2016-01-01

    Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks. (paper)

  9. Inter-American Biodiversity Information Network (IABIN)

    Science.gov (United States)

    site. IABIN Inter-American Biodiversity Information Network (IABIN) OAS » SEDI » DSD » IABIN IABIN GEF Logo inbio natserve usgs polpar wcm The Inter-American Biodiversity Information Network (IABIN , and use of biodiversity information relevant to policy and decision-making on natural resources

  10. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  11. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  12. Influence of breaking the symmetry between disease transmission and information propagation networks on stepwise decisions concerning vaccination

    International Nuclear Information System (INIS)

    Fukuda, Eriko; Tanimoto, Jun; Akimoto, Mitsuhiro

    2015-01-01

    Highlights: • We construct a model using epidemiological and vaccination dynamics. • We study effects of information propagation networks on disease propagation. • Information propagation networks affect the spatial structures of vaccinators. • Disease transmission network affects the information propagation network results. • Vaccination cost does not alter the effects of network-topology symmetry breaking. - Abstract: In previous epidemiological studies that address adaptive vaccination decisions, individuals generally act within a single network, which models the population structure. However, in reality, people are typically members of multiplex networks, which have various community structures. For example, a disease transmission network, which directly transmits infectious diseases, does not necessarily correspond with an information propagation network, in which individuals directly or indirectly exchange information concerning health conditions and vaccination strategies. The latter network may also be used for strategic interaction (strategy adaptation) concerning vaccination. Therefore, in order to reflect this feature, we consider the vaccination dynamics of structured populations whose members simultaneously belong to two types of networks: disease transmission and information propagation. Applying intensive numerical calculations, we determine that if the disease transmission network is modeled using a regular graph, such as a lattice population or random regular graph containing individuals of equivalent degrees, individuals should base their vaccination decisions on a different type of network. However, if the disease transmission network is a degree-heterogeneous graph, such as the Barabási–Albert scale-free network, which has a heterogeneous degree according to power low, then using the same network for information propagation more effectively prevents the spread of epidemics. Furthermore, our conclusions are unaffected by the relative

  13. The Global Invasive Species Information Network: contributing to GEO Task BI-07-01b

    Science.gov (United States)

    Graham, J.; Morisette, J. T.; Simpson, A.

    2009-12-01

    Invasive alien species (IAS) threaten biodiversity and exert a tremendous cost on society for IAS prevention and eradication. They endanger natural ecosystem functioning and seriously impact biodiversity and agricultural production. The task definition for the GEO task BI-07-01b: Invasive Species Monitoring System is to characterize, monitor, and predict changes in the distribution of invasive species. This includes characterizing the current requirements and capacity for invasive species monitoring and developing strategies for implementing cross-search functionality among existing online invasive species information systems from around the globe. The Task is being coordinated by members of the Global Invasive Species Information Network (GISIN) and their partners. Information on GISIN and a prototype of the network is available at www.gisin.org. This talk will report on the current status of GISIN and review how researchers can either contribute to or utilize data from this network.

  14. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  15. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  16. Status of DOE information network modifications

    International Nuclear Information System (INIS)

    Fuchs, R.

    1988-01-01

    This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support

  17. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  18. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  19. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  20. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  1. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  2. Support surfaces for pressure ulcer prevention: A network meta-analysis

    Science.gov (United States)

    Dumville, Jo C.; Cullum, Nicky

    2018-01-01

    Background Pressure ulcers are a prevalent and global issue and support surfaces are widely used for preventing ulceration. However, the diversity of available support surfaces and the lack of direct comparisons in RCTs make decision-making difficult. Objectives To determine, using network meta-analysis, the relative effects of different support surfaces in reducing pressure ulcer incidence and comfort and to rank these support surfaces in order of their effectiveness. Methods We conducted a systematic review, using a literature search up to November 2016, to identify randomised trials comparing support surfaces for pressure ulcer prevention. Two reviewers independently performed study selection, risk of bias assessment and data extraction. We grouped the support surfaces according to their characteristics and formed evidence networks using these groups. We used network meta-analysis to estimate the relative effects and effectiveness ranking of the groups for the outcomes of pressure ulcer incidence and participant comfort. GRADE was used to assess the certainty of evidence. Main results We included 65 studies in the review. The network for assessing pressure ulcer incidence comprised evidence of low or very low certainty for most network contrasts. There was moderate-certainty evidence that powered active air surfaces and powered hybrid air surfaces probably reduce pressure ulcer incidence compared with standard hospital surfaces (risk ratios (RR) 0.42, 95% confidence intervals (CI) 0.29 to 0.63; 0.22, 0.07 to 0.66, respectively). The network for comfort suggested that powered active air-surfaces are probably slightly less comfortable than standard hospital mattresses (RR 0.80, 95% CI 0.69 to 0.94; moderate-certainty evidence). Conclusions This is the first network meta-analysis of the effects of support surfaces for pressure ulcer prevention. Powered active air-surfaces probably reduce pressure ulcer incidence, but are probably less comfortable than standard

  3. Support surfaces for pressure ulcer prevention: A network meta-analysis.

    Science.gov (United States)

    Shi, Chunhu; Dumville, Jo C; Cullum, Nicky

    2018-01-01

    Pressure ulcers are a prevalent and global issue and support surfaces are widely used for preventing ulceration. However, the diversity of available support surfaces and the lack of direct comparisons in RCTs make decision-making difficult. To determine, using network meta-analysis, the relative effects of different support surfaces in reducing pressure ulcer incidence and comfort and to rank these support surfaces in order of their effectiveness. We conducted a systematic review, using a literature search up to November 2016, to identify randomised trials comparing support surfaces for pressure ulcer prevention. Two reviewers independently performed study selection, risk of bias assessment and data extraction. We grouped the support surfaces according to their characteristics and formed evidence networks using these groups. We used network meta-analysis to estimate the relative effects and effectiveness ranking of the groups for the outcomes of pressure ulcer incidence and participant comfort. GRADE was used to assess the certainty of evidence. We included 65 studies in the review. The network for assessing pressure ulcer incidence comprised evidence of low or very low certainty for most network contrasts. There was moderate-certainty evidence that powered active air surfaces and powered hybrid air surfaces probably reduce pressure ulcer incidence compared with standard hospital surfaces (risk ratios (RR) 0.42, 95% confidence intervals (CI) 0.29 to 0.63; 0.22, 0.07 to 0.66, respectively). The network for comfort suggested that powered active air-surfaces are probably slightly less comfortable than standard hospital mattresses (RR 0.80, 95% CI 0.69 to 0.94; moderate-certainty evidence). This is the first network meta-analysis of the effects of support surfaces for pressure ulcer prevention. Powered active air-surfaces probably reduce pressure ulcer incidence, but are probably less comfortable than standard hospital surfaces. Most prevention evidence was of low or

  4. Support surfaces for pressure ulcer prevention: A network meta-analysis.

    Directory of Open Access Journals (Sweden)

    Chunhu Shi

    Full Text Available Pressure ulcers are a prevalent and global issue and support surfaces are widely used for preventing ulceration. However, the diversity of available support surfaces and the lack of direct comparisons in RCTs make decision-making difficult.To determine, using network meta-analysis, the relative effects of different support surfaces in reducing pressure ulcer incidence and comfort and to rank these support surfaces in order of their effectiveness.We conducted a systematic review, using a literature search up to November 2016, to identify randomised trials comparing support surfaces for pressure ulcer prevention. Two reviewers independently performed study selection, risk of bias assessment and data extraction. We grouped the support surfaces according to their characteristics and formed evidence networks using these groups. We used network meta-analysis to estimate the relative effects and effectiveness ranking of the groups for the outcomes of pressure ulcer incidence and participant comfort. GRADE was used to assess the certainty of evidence.We included 65 studies in the review. The network for assessing pressure ulcer incidence comprised evidence of low or very low certainty for most network contrasts. There was moderate-certainty evidence that powered active air surfaces and powered hybrid air surfaces probably reduce pressure ulcer incidence compared with standard hospital surfaces (risk ratios (RR 0.42, 95% confidence intervals (CI 0.29 to 0.63; 0.22, 0.07 to 0.66, respectively. The network for comfort suggested that powered active air-surfaces are probably slightly less comfortable than standard hospital mattresses (RR 0.80, 95% CI 0.69 to 0.94; moderate-certainty evidence.This is the first network meta-analysis of the effects of support surfaces for pressure ulcer prevention. Powered active air-surfaces probably reduce pressure ulcer incidence, but are probably less comfortable than standard hospital surfaces. Most prevention evidence was

  5. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  6. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  7. Sex Venue-Based Network Analysis to Identify HIV Prevention Dissemination Targets for Men Who Have Sex with Men.

    Science.gov (United States)

    Patel, Rupa R; Luke, Douglas A; Proctor, Enola K; Powderly, William G; Chan, Philip A; Mayer, Kenneth H; Harrison, Laura C; Dhand, Amar

    2018-01-01

    The aim of this study was to identify sex venue-based networks among men who have sex with men (MSM) to inform HIV preexposure prophylaxis (PrEP) dissemination efforts. Using a cross-sectional design, we interviewed MSM about the venues where their recent sexual partners were found. Venues were organized into network matrices grouped by condom use and race. We examined network structure, central venues, and network subgroups. Among 49 participants, the median age was 27 years, 49% were Black and 86% reported condomless anal sex (ncAS). Analysis revealed a map of 54 virtual and physical venues with an overlap in the ncAS and with condom anal sex (cAS) venues. In the ncAS network, virtual and physical locations were more interconnected. The ncAS venues reported by Blacks were more diffusely organized than those reported by Whites. The network structures of sex venues for at-risk MSM differed by race. Network information can enhance HIV prevention dissemination efforts among subpopulations, including PrEP implementation.

  8. Information communication on complex networks

    International Nuclear Information System (INIS)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  9. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  10. Market analyses of livestock trade networks to inform the prevention of joint economic and epidemiological risks.

    Science.gov (United States)

    Moslonka-Lefebvre, Mathieu; Gilligan, Christopher A; Monod, Hervé; Belloc, Catherine; Ezanno, Pauline; Filipe, João A N; Vergu, Elisabeta

    2016-03-01

    Conventional epidemiological studies of infections spreading through trade networks, e.g., via livestock movements, generally show that central large-size holdings (hubs) should be preferentially surveyed and controlled in order to reduce epidemic spread. However, epidemiological strategies alone may not be economically optimal when costs of control are factored in together with risks of market disruption from targeting core holdings in a supply chain. Using extensive data on animal movements in supply chains for cattle and swine in France, we introduce a method to identify effective strategies for preventing outbreaks with limited budgets while minimizing the risk of market disruptions. Our method involves the categorization of holdings based on position along the supply chain and degree of market share. Our analyses suggest that trade has a higher risk of propagating epidemics through cattle networks, which are dominated by exchanges involving wholesalers, than for swine. We assess the effectiveness of contrasting interventions from the perspectives of regulators and the market, using percolation analysis. We show that preferentially targeting minor, non-central agents can outperform targeting of hubs when the costs to stakeholders and the risks of market disturbance are considered. Our study highlights the importance of assessing joint economic-epidemiological risks in networks underlying pathogen propagation and trade. © 2016 The Authors.

  11. Market analyses of livestock trade networks to inform the prevention of joint economic and epidemiological risks

    Science.gov (United States)

    Gilligan, Christopher A.; Belloc, Catherine; Filipe, João A. N.; Vergu, Elisabeta

    2016-01-01

    Conventional epidemiological studies of infections spreading through trade networks, e.g. via livestock movements, generally show that central large-size holdings (hubs) should be preferentially surveyed and controlled in order to reduce epidemic spread. However, epidemiological strategies alone may not be economically optimal when costs of control are factored in together with risks of market disruption from targeting core holdings in a supply chain. Using extensive data on animal movements in supply chains for cattle and swine in France, we introduce a method to identify effective strategies for preventing outbreaks with limited budgets while minimizing the risk of market disruptions. Our method involves the categorization of holdings based on position along the supply chain and degree of market share. Our analyses suggest that trade has a higher risk of propagating epidemics through cattle networks, which are dominated by exchanges involving wholesalers, than for swine. We assess the effectiveness of contrasting interventions from the perspectives of regulators and the market, using percolation analysis. We show that preferentially targeting minor, non-central agents can outperform targeting of hubs when the costs to stakeholders and the risks of market disturbance are considered. Our study highlights the importance of assessing joint economic–epidemiological risks in networks underlying pathogen propagation and trade. PMID:26984191

  12. Assessing the efficiency of Mediterranean ditch networks in preventing vineyards soil erosion within landscape

    Science.gov (United States)

    Levavasseur, Florent; Bailly, Jean-Stéphane; Lagacherie, Philippe

    2013-04-01

    Water erosion of cultivated soils is a threat to the sustainability of agriculture, especially in Mediterranean areas. For a long time, Mediterranean farmers have thus adopted some soil conservation practices. Actual ditch networks, which are generally associated with terraces, result from historical successive farmer settlements and are one of these soil conservation practices. By intercepting surface run-off, ditches decrease slope length and prevent soil erosion on downstream plots. However, since water erosion hazard and ditch network geometries are highly variable in vineyards landscape and since ditch building and maintaining are costly, the objective of this study was to identify and map the resulting efficiency of ditch networks in preventing soil erosion. For a given area, a ditch network efficiency is defined here as the balance between the network density, i.e. network cumulated length for a given area unit, and the erosion sensitivity over an area which measures the performance of the ditch network in limiting soil erosion. The erosion efficiency of ditch networks was thus identified using both i) computer generated ditch networks with various spatial configurations and ii) the stream power index as an erosion sensitivity indicator, computed from a DTM in which each ditch network was burned. The stream power index of the actual networks were compared with a set of generated networks whose density and topology were selected to maximize the performance in preventing soil erosion thanks to the use of a self-developed optimized stochastic network generator. For four 1 km² hillslopes, we showed that the performances of actual networks to prevent soil erosion was among the best that were obtained by simulated networks with even greater densities. Furthermore, we showed that the stream power index values that accounted for the actual ditch networks to prevent soil erosion hazard was both minimal and weakly variable in the whole study area (30 km²) at

  13. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Science.gov (United States)

    Wu, Jibing; Meng, Qinggang; Deng, Su; Huang, Hongbin; Wu, Yahui; Badii, Atta

    2017-01-01

    Heterogeneous information networks (e.g. bibliographic networks and social media networks) that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS) algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  14. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  15. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  16. Nationwide SIP Telephony Network Design to Prevent Congestion Caused by Disaster

    Science.gov (United States)

    Satoh, Daisuke; Ashitagawa, Kyoko

    We present a session initiation protocol (SIP) network design for a voice-over-IP network to prevent congestion caused by people calling friends and family after a disaster. The design increases the capacity of SIP servers in a network by using all of the SIP servers equally. It takes advantage of the fact that equipment for voice data packets is different from equipment for signaling packets in SIP networks. Furthermore, the design achieves simple routing on the basis of telephone numbers. We evaluated the performance of our design in preventing congestion through simulation. We showed that the proposed design has roughly 20 times more capacity, which is 57 times the normal load, than the conventional design if a disaster were to occur in Niigata Prefecture struck by the Chuetsu earthquake in 2004.

  17. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  18. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  19. Students' Informal Peer Feedback Networks

    Science.gov (United States)

    Headington, Rita

    2018-01-01

    The nature and significance of students' informal peer feedback networks is an under-explored area. This paper offers the findings of a longitudinal investigation of the informal peer feedback networks of a cohort of student teachers [n = 105] across the three years of a UK primary education degree programme. It tracked the dynamic nature of these…

  20. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  1. Optimal control of epidemic information dissemination over networks.

    Science.gov (United States)

    Chen, Pin-Yu; Cheng, Shin-Ming; Chen, Kwang-Cheng

    2014-12-01

    Information dissemination control is of crucial importance to facilitate reliable and efficient data delivery, especially in networks consisting of time-varying links or heterogeneous links. Since the abstraction of information dissemination much resembles the spread of epidemics, epidemic models are utilized to characterize the collective dynamics of information dissemination over networks. From a systematic point of view, we aim to explore the optimal control policy for information dissemination given that the control capability is a function of its distribution time, which is a more realistic model in many applications. The main contributions of this paper are to provide an analytically tractable model for information dissemination over networks, to solve the optimal control signal distribution time for minimizing the accumulated network cost via dynamic programming, and to establish a parametric plug-in model for information dissemination control. In particular, we evaluate its performance in mobile and generalized social networks as typical examples.

  2. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  3. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  4. Informal networks: the company behind the chart.

    Science.gov (United States)

    Krackhardt, D; Hanson, J R

    1993-01-01

    A glance at an organizational chart can show who's the boss and who reports to whom. But this formal chart won't reveal which people confer on technical matters or discuss office politics over lunch. Much of the real work in any company gets done through this informal organization with its complex networks of relationships that cross functions and divisions. According to consultants David Krackhardt and Jeffrey Hanson, managers can harness the true power in their companies by diagramming three types of networks: the advice network, which reveals the people to whom others turn to get work done; the trust network, which uncovers who shares delicate information; and the communication network, which shows who talks about work-related matters. Using employee questionnaires, managers can generate network maps that will get to the root of many organizational problems. When a task force in a computer company, for example, was not achieving its goals, the CEO turned to network maps to find out why. He discovered that the task force leader was central in the advice network but marginal in the trust network. Task force members did not believe he would look out for their interests, so the CEO used the trust map to find someone to share responsibility for the group. And when a bank manager saw in the network map that there was little communication between tellers and supervisors, he looked for ways to foster interaction among employees of all levels. As companies continue to flatten and rely on teams, managers must rely less on their authority and more on understanding these informal networks. Managers who can use maps to identify, leverage, and revamp informal networks will have the key to success.

  5. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  6. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  7. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  8. Identifying diabetes knowledge network nodes as sites for a diabetes prevention program.

    Science.gov (United States)

    Gesler, Wilbert M; Arcury, Thomas A; Skelly, Anne H; Nash, Sally; Soward, April; Dougherty, Molly

    2006-12-01

    This paper reports on the methods used and results of a study that identified specific places within a community that have the potential to be sites for a diabetes prevention program. These sites, termed diabetes knowledge network nodes (DKNNs), are based on the concept of socio-spatial knowledge networks (SSKNs), the web of social relationships within which people obtain knowledge about type 2 diabetes. The target population for the study was working poor African Americans, Latinos, and European Americans of both sexes in a small rural southern town who had not been diagnosed with diabetes. Information was collected from a sample of 121 respondents on the places they visited in carrying out their daily activities. Data on number of visits to specific sites, degree of familiarity with these sites, and ratings of sites as places to receive diabetes information were used to develop three categories of DKNNs for six subgroups based on ethnicity and sex. Primary potential sites of importance to one or more subgroups included churches, grocery stores, drugstores, the local library, a beauty salon, laundromats, a community service agency, and a branch of the County Health Department. Secondary potential sites included gas stations, restaurants, banks, and post offices. Latent potential sites included three medical facilities. Most of the DKNNs were located either in the downtown area or in one of two shopping areas along the most used highway that passed through the town. The procedures used in this study can be generalized to other communities and prevention programs for other chronic diseases.

  9. Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Lan Liu

    2017-01-01

    Full Text Available As the adoption of Software Defined Networks (SDNs grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the nodes between subnets. We also find that there exists a mobility rate threshold qc. The network malware will spread in the SDN when the mobility rate q>qc. The malware will survive when q>qc and perish when qnetwork malware and provide a theoretical basis to reduce and prevent network security incidents.

  10. AEGIS: a wildfire prevention and management information system

    Science.gov (United States)

    Kalabokidis, Kostas; Ager, Alan; Finney, Mark; Athanasis, Nikos; Palaiologou, Palaiologos; Vasilakos, Christos

    2016-03-01

    We describe a Web-GIS wildfire prevention and management platform (AEGIS) developed as an integrated and easy-to-use decision support tool to manage wildland fire hazards in Greece (http://aegis.aegean.gr). The AEGIS platform assists with early fire warning, fire planning, fire control and coordination of firefighting forces by providing online access to information that is essential for wildfire management. The system uses a number of spatial and non-spatial data sources to support key system functionalities. Land use/land cover maps were produced by combining field inventory data with high-resolution multispectral satellite images (RapidEye). These data support wildfire simulation tools that allow the users to examine potential fire behavior and hazard with the Minimum Travel Time fire spread algorithm. End-users provide a minimum number of inputs such as fire duration, ignition point and weather information to conduct a fire simulation. AEGIS offers three types of simulations, i.e., single-fire propagation, point-scale calculation of potential fire behavior, and burn probability analysis, similar to the FlamMap fire behavior modeling software. Artificial neural networks (ANNs) were utilized for wildfire ignition risk assessment based on various parameters, training methods, activation functions, pre-processing methods and network structures. The combination of ANNs and expected burned area maps are used to generate integrated output map of fire hazard prediction. The system also incorporates weather information obtained from remote automatic weather stations and weather forecast maps. The system and associated computation algorithms leverage parallel processing techniques (i.e., High Performance Computing and Cloud Computing) that ensure computational power required for real-time application. All AEGIS functionalities are accessible to authorized end-users through a web-based graphical user interface. An innovative smartphone application, AEGIS App, also

  11. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  12. [Introduction of computerized anesthesia-recording systems and construction of comprehensive medical information network for patients undergoing surgery in the University of Tokyo Hospital].

    Science.gov (United States)

    Kitamura, Takayuki; Hoshimoto, Hiroyuki; Yamada, Yoshitsugu

    2009-10-01

    The computerized anesthesia-recording systems are expensive and the introduction of the systems takes time and requires huge effort. Generally speaking, the efficacy of the computerized anesthesia-recording systems on the anesthetic managements is focused on the ability to automatically input data from the monitors to the anesthetic records, and tends to be underestimated. However, once the computerized anesthesia-recording systems are integrated into the medical information network, several features, which definitely contribute to improve the quality of the anesthetic management, can be developed; for example, to prevent misidentification of patients, to prevent mistakes related to blood transfusion, and to protect patients' personal information. Here we describe our experiences of the introduction of the computerized anesthesia-recording systems and the construction of the comprehensive medical information network for patients undergoing surgery in The University of Tokyo Hospital. We also discuss possible efficacy of the comprehensive medical information network for patients during surgery under anesthetic managements.

  13. VA Suicide Prevention Applications Network

    Science.gov (United States)

    Stephens, Brady; Morley, Sybil; Thompson, Caitlin; Kemp, Janet; Bossarte, Robert M.

    2016-01-01

    Objectives: The US Department of Veterans Affairs’ Suicide Prevention Applications Network (SPAN) is a national system for suicide event tracking and case management. The objective of this study was to assess data on suicide attempts among people using Veterans Health Administration (VHA) services. Methods: We assessed the degree of data overlap on suicide attempters reported in SPAN and the VHA’s medical records from October 1, 2010, to September 30, 2014—overall, by year, and by region. Data on suicide attempters in the VHA’s medical records consisted of diagnoses documented with E95 codes from the International Classification of Diseases, Ninth Revision. Results: Of 50 518 VHA patients who attempted suicide during the 4-year study period, data on fewer than half (41%) were reported in both SPAN and the medical records; nearly 65% of patients whose suicide attempt was recorded in SPAN had no data on attempted suicide in the VHA’s medical records. Conclusion: Evaluation of administrative data suggests that use of SPAN substantially increases the collection of data on suicide attempters as compared with the use of medical records alone, but neither SPAN nor the VHA’s medical records identify all suicide attempters. Further research is needed to better understand the strengths and limitations of both systems and how to best combine information across systems. PMID:28123228

  14. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  15. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  16. Information Network on Rural Development (INRD), Bangladesh.

    Science.gov (United States)

    Wanasundra, Leelangi

    1994-01-01

    Discusses information networking in Bangladesh and describes the formation of the Information Network on Rural Development (INRD) which was initiated by the Center on Integrated Rural Development for Asia and the Pacific (CIRDAP). Organization, membership, activities, participation, and finance are examined. (four references) (LRW)

  17. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  18. Perception of adult men on their preventive practices and health support networks

    Directory of Open Access Journals (Sweden)

    Guilherme Oliveira de Arruda

    2015-07-01

    Full Text Available Objectives: to know the preventive practices adopted by adult men in daily life and to identify health support networks. Methods: a descriptive qualitative study, made during the months of November and December 2012, at two emergency units, along with 32 men aged between 20 and 59 years. Data were collected through semi-structured interviews and subjected to content analysis with thematic modality. Results: men highlighted different preventive practices such as sanitizing hands, eating properly, having screening tests, avoiding psychoactive substance abuse, using personal protective equipment at work and condoms during sex. Most of the participants had nuclear family and its members were their primary support network regarding the health-disease process. Conclusion: it is for health team members to try to leverage the adoption of preventive practices by adult men from the support networks they consider significant.

  19. Information resources for US Department of Energy pollution prevention programs

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, K.L.; Snowden-Swan, L.J.; Butner, R.S.

    1994-01-01

    In support of the US Department of Energy`s (DOE`s) pollution prevention efforts being conducted under the aegis of DOE`s Office of Environmental Restoration and Waste Management (EM) program, Pacific Northwest Laboratory was tasked with evaluating pollution prevention information resources. The goal of this activity was to improve the effectiveness of DOE`s pollution prevention activities through improved information flow, both within the complex, and more specifically, between DOE and other organizations that share similar pollution prevention challenges. This report presents our findings with respect to the role of information collection and dissemination within the complex, opportunities for teaming from successes of the private sector, and specific information needs of the DOE pollution prevention community. These findings were derived from a series of interviews with pollution prevention coordinators from across the DOE complex, review of DOE site and facility pollution prevention plans, and workshops with DOE information users as well as an information resources workshop that brought together information specialists from private industry, non-profit organizations, as well as state and regional pollution prevention assistance programs.

  20. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  1. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  2. Pollution Prevention Information Network (PPIN) Grant Summaries for 2011 and 2013

    Science.gov (United States)

    The Office of Pollution Prevention and Toxics is responsible for overseeing several grant programs for tribes and states which promote pollution prevention through source reduction and resource conservation.

  3. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  4. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  5. THE INTEREST OF GEOGRAPHICAL INFORMATION, ARTIFICIAL INTELLIGENCE AND VIRTUAL REALITY FOR THE UNDERGROUND NETWORK REPRESENTATION

    Directory of Open Access Journals (Sweden)

    M. Lacroix

    2016-01-01

    Full Text Available Two years ago, 63 people died and more than 150 were seriously injured in Beijing (China because of damage to a hydrocarbon pipeline. Urban networks are invisible because usually buried between 1 and 1,5 meters underground. They should be identified to prevent such accidents which involve workers as well as the public. Rural and urban districts, network concessionaries and contractors: everyone could benefit from their networks becoming safer. To prevent such accidents and protect workers and the public as well, some new regulations propose to identify and secure the buried networks. That’s why it is important to develop a software which deals with the risk management process and also about the risk visualization. This work is structured around three major sections:– the utility of the Geographical Information to determine the minimal distances and the topological relations between the networks themselves, and also with the other element in their vicinity;– the use of some Artificial Intelligence tools, and more particularly of Expert System, to take the current regulation into account and determine the accident risk probability;– the contribution of virtual reality to perceive the underground world.

  6. IMNN: Information Maximizing Neural Networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  7. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  8. The Hardware and Software Implementation of Low-Frequency Active Channel Signals in an Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-12-01

    Full Text Available This article discusses a new way of developing a special channel for the alarms, through computer’s power supply network, to solve the problem of protection from removal of the temporary control over the victim’s machine, using information leakage detection and prevention systems.

  9. Hodge Decomposition of Information Flow on Small-World Networks.

    Science.gov (United States)

    Haruna, Taichi; Fujiki, Yuuya

    2016-01-01

    We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  10. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  11. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  12. Information spread in networks: Games, optimal control, and stabilization

    Science.gov (United States)

    Khanafer, Ali

    This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack

  13. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  14. [Information system of the national network of public health laboratories in Peru (Netlab)].

    Science.gov (United States)

    Vargas-Herrera, Javier; Segovia-Juarez, José; Garro Nuñez, Gladys María

    2015-01-01

    Clinical laboratory information systems produce improvements in the quality of information, reduce service costs, and diminish wait times for results, among other things. In the construction process of this information system, the National Institute of Health (NIH) of Peru has developed and implemented a web-based application to communicate to health personnel (laboratory workers, epidemiologists, health strategy managers, physicians, etc.) the results of laboratory tests performed at the Peruvian NIH or in the laboratories of the National Network of Public Health Laboratories which is called NETLAB. This article presents the experience of implementing NETLAB, its current situation, perspectives of its use, and its contribution to the prevention and control of diseases in Peru.

  15. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  16. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  17. Teleradiology network system using the web medical image conference system with a new information security solution

    Science.gov (United States)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiro; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2012-02-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme and the tokenization as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of automatic backup. With automatic backup technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged due to the large area disaster like the great earthquake of Japan, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. Moreover, by using tokenization, the history information of dividing the confidential medical information into two or more tallies is prevented from lying scattered by replacing the history information with another character string (Make it to powerlessness). As a result, information is available only to those who have rightful access it and the sender of a message and the message itself are verified at the receiving point. We propose a new information transmission method and a new information storage method with a new information security solution.

  18. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  19. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  20. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  1. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  2. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  3. Informal sector shops and AIDS prevention An exploratory social ...

    African Journals Online (AJOL)

    Informal sector shops and AIDS prevention An exploratory social marketing ... The existence of a variety of media and interpersonal information sources on the ... shops should be further investigated as avenues for AIDS prevention efforts.

  4. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  5. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  6. Research Award: Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    ... of networked technologies has created new opportunities for advancing human ... The I&N Research Awardee will ideally explore research questions centred ... Examples of questions include: ... engineering or computer/information science;.

  7. Celebrating 25 Years. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 3

    Science.gov (United States)

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Leading the Way in Dropout Prevention; (2) The 15 Effective Strategies in Action; (3) Technology Changes 1986-2011 (Marty Duckenfield); (4) 25 Years of Research and Support…

  8. Simulating drinking in social networks to inform alcohol prevention and treatment efforts.

    Science.gov (United States)

    Hallgren, Kevin A; McCrady, Barbara S; Caudell, Thomas P; Witkiewitz, Katie; Tonigan, J Scott

    2017-11-01

    Adolescent drinking influences, and is influenced by, peer alcohol use. Several efficacious adolescent alcohol interventions include elements aimed at reducing susceptibility to peer influence. Modeling these interventions within dynamically changing social networks may improve our understanding of how such interventions work and for whom they work best. We used stochastic actor-based models to simulate longitudinal drinking and friendship formation within social networks using parameters obtained from a meta-analysis of real-world 10th grade adolescent social networks. Levels of social influence (i.e., friends affecting changes in one's drinking) and social selection (i.e., drinking affecting changes in one's friendships) were manipulated at several levels, which directly impacted the degree of clustering in friendships based on similarity in drinking behavior. Midway through each simulation, one randomly selected heavy-drinking actor from each network received an "intervention" that either (a) reduced their susceptibility to social influence, (b) reduced their susceptibility to social selection, (c) eliminated a friendship with a heavy drinker, or (d) initiated a friendship with a nondrinker. Only the intervention that eliminated targeted actors' susceptibility to social influence consistently reduced that actor's drinking. Moreover, this was only effective in networks with social influence and social selection that were at higher levels than what was found in the real-world reference study. Social influence and social selection are dynamic processes that can lead to complex systems that may moderate the effectiveness of network-based interventions. Interventions that reduce susceptibility to social influence may be most effective among adolescents with high susceptibility to social influence and heavier-drinking friends. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Qualia could arise from information processing in local cortical networks.

    Science.gov (United States)

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  10. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  11. Preventing Informal Urban Development

    DEFF Research Database (Denmark)

    Enemark, Stig; McLaren, Robin

    2008-01-01

    . This is directly linked to citizen participation in the process of land use control. Decentralisation should aim to combine responsibility for decision making with accountability for financial, social, and environmental consequences. Decentralisation requires access to appropriate quality of land information......, addresses the main issue of how to prevent informal urban development, especially through the use of adequate and sustainable means of land use control and good governance. Three key means are addressed: Decentralisation: There is a need to separate central policy/regulation making and local decision making...... in the decision making process? Legislation in itself is not enough. A cultural change within society may need to be encouraged. Again, access to participation requires access to land information. Comprehensive planning at local level supported by citizen participation should also enable establishment proper...

  12. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  13. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  14. Service-Learning. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 4

    Science.gov (United States)

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Dropouts and Democracy (Robert Shumer); (2) 2011 NDPN Crystal Star Winners; (3) Service-Learning as Dropout Intervention and More (Michael VanKeulen); and (4) Teacher…

  15. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  16. Using Social Network Theory to Influence the Development of State and Local Primary Prevention Capacity-Building Teams

    Science.gov (United States)

    Cook-Craig, Patricia G.

    2010-01-01

    This article examines the role that social network theory and social network analysis has played in assessing and developing effective primary prevention networks across a southeastern state. In 2004 the state began an effort to develop a strategic plan for the primary prevention of violence working with local communities across the state. The…

  17. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  18. MRSA Prevention Information and Advice for Athletes

    Science.gov (United States)

    ... and Team Healthcare Providers Prevention Information and Advice Posters for the Athletic Community General MRSA Information and ... site? Adobe PDF file Microsoft PowerPoint file Microsoft Word file Microsoft Excel file Audio/Video file Apple ...

  19. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  20. [Social network analysis of interdisciplinary cooperation and networking in early prevention and intervention. A pilot study].

    Science.gov (United States)

    Künster, A K; Knorr, C; Fegert, J M; Ziegenhain, U

    2010-11-01

    Child protection can only be successfully solved by interdisciplinary cooperation and networking. The individual, heterogeneous, and complex needs of families cannot be met sufficiently by one profession alone. To guarantee efficient interdisciplinary cooperation, there should not be any gaps in the network. In addition, each actor in the network should be placed at an optimal position regarding function, responsibilities, and skills. Actors that serve as allocators, such as pediatricians or youth welfare officers, should be in key player positions within the network. Furthermore, successful child protection is preventive and starts early. Social network analysis is an adequate technique to assess network structures and to plan interventions to improve networking. In addition, it is very useful to evaluate the effectiveness of interventions like round tables. We present data from our pilot project which was part of "Guter Start ins Kinderleben" ("a good start into a child's life"). Exemplary network data from one community show that networking is already quite effective with a satisfactory mean density throughout the network. There is potential for improvement in cooperation, especially at the interface between the child welfare and health systems.

  1. Towards software-based signature detection for intrusion prevention on the network card

    NARCIS (Netherlands)

    Bos, H.; Huang, Kaiming

    2006-01-01

    CardGuard is a signature detection system for intrusion detection and prevention that scans the entire payload of packets for suspicious patterns and is implemented in software on a network card equiped with an Intel IXP1200 network processor. One card can be used to protect either a single host, or

  2. OEM Emergency Prevention and Mitigation Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Office of Emergency Management maintains information relevant to preventing emergencies before they occur, and/or mitigating the effects of emergency when they...

  3. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  4. Vulnerability Assessment Tools for Complex Information Networks

    National Research Council Canada - National Science Library

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  5. Mutual information-based LPI optimisation for radar network

    Science.gov (United States)

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  6. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  7. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  8. UPGRADE FOR HARDWARE/SOFTWARE SERVER AND NETWORK TOPOLOGY IN INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Oleksii O. Kaplun

    2011-02-01

    Full Text Available The network modernization, educational information systems software and hardware updates problem is actual in modern term of information technologies prompt development. There are server applications and network topology of Institute of Information Technology and Learning Tools of National Academy of Pedagogical Sciences of Ukraine analysis and their improvement methods expound in the article. The article materials represent modernization results implemented to increase network efficiency and reliability, decrease response time in Institute’s network information systems. The article gives diagrams of network topology before upgrading and after finish of optimization and upgrading processes.

  9. Military Parents' Personal Technology Usage and Interest in e-Health Information for Obesity Prevention.

    Science.gov (United States)

    Jai, Tun-Min; McCool, Barent N; Reed, Debra B

    2016-03-01

    U.S. military families are experiencing high obesity rates similar to the civilian population. The Department of Defense's Military Health System (MHS) is one of the largest healthcare providers in the United States, serving approximately 9.2 million active duty service members, retirees, spouses, and children. The annual cost to the MHS for morbidities associated with being overweight exceeds $1 billion. The preschool age has been suggested as an opportune time to intervene for the prevention of obesity. Thus, this study investigated the current level of technology usage by military service member families and assessed their needs and interests in health/nutrition information. This needs assessment is crucial for researchers/educators to design further studies and intervention programs for obesity prevention in military families with young children. In total, 288 military parents (233 Army and 55 Air Force) at two military bases whose children were enrolled in military childcare centers in the southwestern United States participated in a Technology Usage in Military Family (TUMF) survey in 2013. Overall, both bases presented similar technology usage patterns in terms of computer and mobile device usage on the Internet. Air Force base parents had a slightly higher knowledge level of nutrition/health information than Army base parents. The TUMF survey suggested practical ways such as mobile applications/Web sites, social networks, games, etc., that health educators can use to disseminate nutrition/health information for obesity prevention among military families with young children.

  10. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  11. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  12. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  13. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  14. Understanding the poultry trade network in Kenya: Implications for regional disease prevention and control.

    Science.gov (United States)

    McCarron, Margaret; Munyua, Peninah; Cheng, Po-Yung; Manga, Thomas; Wanjohi, Cathryn; Moen, Ann; Mounts, Anthony; Katz, Mark A

    2015-07-01

    Infectious diseases in poultry can spread quickly and lead to huge economic losses. In the past decade, on multiple continents, the accelerated spread of highly pathogenic avian Influenza A (H5N1) virus, often through informal trade networks, has led to the death and culling of hundreds of millions of poultry. Endemic poultry diseases like Newcastle disease and fowl typhoid can also be devastating in many parts of the world. Understanding trade networks in unregulated systems can inform policy decisions concerning disease prevention and containment. From June to December 2008 we conducted a cross-sectional survey of backyard farmers, market traders, and middlemen in 5/8 provinces in Kenya. We administered a standardized questionnaire to each type of actor using convenience, random, snowball, and systematic sampling. Questionnaires addressed frequency, volume, and geography of trade, as well as biosecurity practices. We created a network diagram identifying the most important locations for trade. Of 380 respondents, 51% were backyard farmers, 24% were middlemen and 25% were market traders. Half (50%) of backyard farmers said they raised poultry both for household consumption and for sale. Compared to market traders, middlemen bought their poultry from a greater number of villages (median 4.2 villages for middlemen vs. 1.9 for market traders). Traders were most likely to purchase poultry from backyard farmers. Of the backyard farmers who sold poultry, 51% [CI 40-63] reported selling poultry to market traders, and 54% [CI 44-63] sold to middlemen. Middlemen moved the largest volume of poultry on a weekly basis (median purchases: 187 birds/week [IQR 206]; median sales: 188 birds/week [IQR 412.5]). The highest numbers of birds were traded in Nairobi - Kenya's capital city. Nairobi was the most prominent trading node in the network (61 degrees of centrality). Many smaller sub-networks existed as a result of clustered local trade. Market traders were also integral to the

  15. Factors Enabling Information Propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    A relevant feature of Social Network Sites is their ability to propagate units of information and create large distributed conversations. This phenomenon is particularly relevant because of the speed of information propagation, which is known to be much faster than within traditional media......, and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...... at measuring specific socio-technical factors enabling information spreading in Social Network Sites....

  16. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  17. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  18. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  19. Scatter networks: a new approach for analysing information scatter

    International Nuclear Information System (INIS)

    Adamic, Lada A; Suresh, K; Shi Xiaolin

    2007-01-01

    Information on any given topic is often scattered across the Web. Previously this scatter has been characterized through the inequality of distribution of facts (i.e. pieces of information) across webpages. Such an approach conceals how specific facts (e.g. rare facts) occur in specific types of pages (e.g. fact-rich pages). To reveal such regularities, we construct bipartite networks, consisting of two types of vertices: the facts contained in webpages and the webpages themselves. Such a representation enables the application of a series of network analysis techniques, revealing structural features such as connectivity, robustness and clustering. Not only does network analysis yield new insights into information scatter, but we also illustrate the benefit of applying new and existing analysis techniques directly to a bipartite network as opposed to its one-mode projection. We discuss the implications of each network feature to the users' ability to find comprehensive information online. Finally, we compare the bipartite graph structure of webpages and facts with the hyperlink structure between the webpages

  20. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  1. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  2. A Dynamic Microblog Network and Information Dissemination in “@” Mode

    Directory of Open Access Journals (Sweden)

    Mingsheng Tang

    2014-01-01

    Full Text Available Social media, especially the microblogs, emerge as a part of our daily life and become a key way to information spread. Thus, information dissemination in the microblog became a research hotspot. Based on some principles that are summarized from the microblog users’ behaviors, this paper proposes a dynamic microblog network model. Through simulations this network has the features of periodicity of average degree, high clustering coefficient, high degree of modularity, and community. Besides, an information dissemination model through “@” in the microblog has been presented. With the microblog network model and the zombie-city model, this paper has modelled an artificial microblog and has simulated the information dissemination in the artificial microblog with different scenes. Therefore, some interesting findings have been presented. (1 Due to a better connectivity, information could spread widely in a random network; (2 information spreads more quickly in a stable microblog network; (3 the decay rate of the relationships will have an effect on information dissemination; that is, with a lower decay rate, information spreads more quickly and widely; (4 the higher active level of users in microblog could promote information spread widely and quickly; (5 the “@” mode of information dissemination makes a high modularity of the information diffusion network.

  3. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Information and Networks in Asia and Sub-Saharan Africa: Strengthening Research Capacity ... credible, high-quality evidence on the influence of digital initiatives in the areas of ... use of digital information networks and economic growth, democratic reform, and increased educational opportunities in developing countries.

  4. Network information provision to potential generators

    Energy Technology Data Exchange (ETDEWEB)

    Nicholson, G.

    2001-07-01

    At the time of finalising this report, an Ofgem consultation is underway on the form of Distribution Licence Condition 25, which will state the requirements for Distribution Network Operators to provide and publish data. This report is also relevant to the DTI Ofgem Embedded Generation Working Group (EGWG), which has recently completed its report and recommendations. It is hoped that this document will provide an overview of the status, importance, role and benefits of network information, which can be utilised by Generators, Network Operators and other industry players in framing their responses to this and future consultations. (Authors)

  5. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  6. Lack of evidence to favor specific preventive interventions in psychosis: a network meta‐analysis

    Science.gov (United States)

    Davies, Cathy; Cipriani, Andrea; Ioannidis, John P.A.; Radua, Joaquim; Stahl, Daniel; Provenzani, Umberto; McGuire, Philip; Fusar‐Poli, Paolo

    2018-01-01

    Preventing psychosis in patients at clinical high risk may be a promising avenue for pre‐emptively ameliorating outcomes of the most severe psychiatric disorder. However, information on how each preventive intervention fares against other currently available treatment options remains unavailable. The aim of the current study was to quantify the consistency and magnitude of effects of specific preventive interventions for psychosis, comparing different treatments in a network meta‐analysis. PsycINFO, Web of Science, Cochrane Central Register of Controlled Trials, and unpublished/grey literature were searched up to July 18, 2017, to identify randomized controlled trials conducted in individuals at clinical high risk for psychosis, comparing different types of intervention and reporting transition to psychosis. Two reviewers independently extracted data. Data were synthesized using network meta‐analyses. The primary outcome was transition to psychosis at different time points and the secondary outcome was treatment acceptability (dropout due to any cause). Effect sizes were reported as odds ratios and 95% confidence intervals (CIs). Sixteen studies (2,035 patients, 57% male, mean age 20.1 years) reported on risk of transition. The treatments tested were needs‐based interventions (NBI); omega‐3 + NBI; ziprasidone + NBI; olanzapine + NBI; aripiprazole + NBI; integrated psychological interventions; family therapy + NBI; D‐serine + NBI; cognitive behavioural therapy, French & Morrison protocol (CBT‐F) + NBI; CBT‐F + risperidone + NBI; and cognitive behavioural therapy, van der Gaag protocol (CBT‐V) + CBT‐F + NBI. The network meta‐analysis showed no evidence of significantly superior efficacy of any one intervention over the others at 6 and 12 months (insufficient data were available after 12 months). Similarly, there was no evidence for intervention differences in acceptability at either time point. Tests

  7. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  8. [Network Prevention of Accidents at Work: a strategy for distance education].

    Science.gov (United States)

    Marziale, Maria Helena; Zapparoli, Amanda dos Santos; Felli, Vanda Elisa; Anabuki, Marina Hideko

    2010-01-01

    Quasi-experimental study that aimed at evaluating the proposed interactive training, as a strategy for change in the behavior of workers, seeking the appropriate use of gloves in the administration of intravenous drugs. The interactive training was structured in the Model of Health Promotion of Pender, conducted through access to the web site of the Network Prevention of Accidents at Work (REPAT) available from: http://repat.eerp.usp.br/estrategia/index.php and applied in 60 workers nursing from two hospitals in the state of Sao Paulo. On the week before the training 58.3% of the workers were wearing gloves to administrate intravenous drugs and 83.3% of the workers informed the intention of wearing gloves after the training. the use of interactive tool facilitated the implementation of educational strategy in work and showed that training can help in changing behavior.

  9. TanZamBo Capacity Building for HIV Prevention Research Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will support the development of HIV/AIDS prevention trial expertise in Botswana, Tanzania and Zambia using existing collaborations between Africa, Canada and the United States. The Botswana-Tanzania-Zambia Capacity Building Network (TanZamBo) is composed of two African institutions with fairly well ...

  10. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  11. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  12. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...

  13. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  14. Information jet: Handling noisy big data from weakly disconnected network

    Science.gov (United States)

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  15. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  16. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  17. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  18. Proactive Traffic Information Control in Emergency Evacuation Network

    Directory of Open Access Journals (Sweden)

    Zhengfeng Huang

    2015-01-01

    Full Text Available Traffic demand in emergency evacuation is usually too large to be effectively managed with reactive traffic information control methods. These methods adapt to the road traffic passively by publishing real-time information without consideration of the routing behavior feedback produced by evacuees. Other remedy measures have to be prepared in case of nonrecurring congestion under these methods. To use the network capacity fully to mitigate near-future evacuation traffic congestion, we propose proactive traffic information control (PTIC model. Based on the mechanism between information and routing behavior feedback, this model can change the route choice of evacuees in advance by dissipating strategic traffic information. Generally, the near-future traffic condition is difficult to accurately predict because it is uncertain in evacuation. Assume that the value of traffic information obeys certain distribution within a range, and then real-time traffic information may reflect the most-likely near-future traffic condition. Unlike the real-time information, the proactive traffic information is a selection within the range to achieve a desired level of the road network performance index (total system travel time. In the aspect of the solution algorithm, differential equilibrium decomposed optimization (D-EDO is proposed to compare with other heuristic methods. A field study on a road network around a large stadium is used to validate the PTIC.

  19. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  20. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  1. Geosciences Information Network (GIN): A modular, distributed, interoperable data network for the geosciences

    Science.gov (United States)

    Allison, M.; Gundersen, L. C.; Richard, S. M.; Dickinson, T. L.

    2008-12-01

    A coalition of the state geological surveys (AASG), the U.S. Geological Survey (USGS), and partners will receive NSF funding over 3 years under the INTEROP solicitation to start building the Geoscience Information Network (www.geoinformatics.info/gin) a distributed, interoperable data network. The GIN project will develop standardized services to link existing and in-progress components using a few standards and protocols, and work with data providers to implement these services. The key components of this network are 1) catalog system(s) for data discovery; 2) service definitions for interfaces for searching catalogs and accessing resources; 3) shared interchange formats to encode information for transmission (e.g. various XML markup languages); 4) data providers that publish information using standardized services defined by the network; and 5) client applications adapted to use information resources provided by the network. The GIN will integrate and use catalog resources that currently exist or are in development. We are working with the USGS National Geologic Map Database's existing map catalog, with the USGS National Geological and Geophysical Data Preservation Program, which is developing a metadata catalog (National Digital Catalog) for geoscience information resource discovery, and with the GEON catalog. Existing interchange formats will be used, such as GeoSciML, ChemML, and Open Geospatial Consortium sensor, observation and measurement MLs. Client application development will be fostered by collaboration with industry and academic partners. The GIN project will focus on the remaining aspects of the system -- service definitions and assistance to data providers to implement the services and bring content online - and on system integration of the modules. Initial formal collaborators include the OneGeology-Europe consortium of 27 nations that is building a comparable network under the EU INSPIRE initiative, GEON, Earthchem, and GIS software company ESRI

  2. Information filtering on coupled social networks.

    Science.gov (United States)

    Nie, Da-Cheng; Zhang, Zi-Ke; Zhou, Jun-Lin; Fu, Yan; Zhang, Kui

    2014-01-01

    In this paper, based on the coupled social networks (CSN), we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  3. Research on the Architecture of a Basic Reconfigurable Information Communication Network

    Directory of Open Access Journals (Sweden)

    Ruimin Wang

    2013-01-01

    Full Text Available The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. This paper provides the theory system for the basic reconfigurable information communication network based on the analysis of present problems on the Internet and summarizes the root of these problems. It also provides an in-depth discussion about the related technologies and the prime components of the architecture.

  4. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  5. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  6. Information Systems at Enterprise. Design of Secure Network of Enterprise

    Science.gov (United States)

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  7. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  8. Graph Regularized Meta-path Based Transductive Regression in Heterogeneous Information Network.

    Science.gov (United States)

    Wan, Mengting; Ouyang, Yunbo; Kaplan, Lance; Han, Jiawei

    2015-01-01

    A number of real-world networks are heterogeneous information networks, which are composed of different types of nodes and links. Numerical prediction in heterogeneous information networks is a challenging but significant area because network based information for unlabeled objects is usually limited to make precise estimations. In this paper, we consider a graph regularized meta-path based transductive regression model ( Grempt ), which combines the principal philosophies of typical graph-based transductive classification methods and transductive regression models designed for homogeneous networks. The computation of our method is time and space efficient and the precision of our model can be verified by numerical experiments.

  9. Data linkage between the National Birth Defects Prevention Study and the Occupational Information Network (O*NET) to assess workplace physical activity, sedentary behaviors, and emotional stressors during pregnancy.

    Science.gov (United States)

    Lee, Laura J; Symanski, Elaine; Lupo, Philip J; Tinker, Sarah C; Razzaghi, Hilda; Pompeii, Lisa A; Hoyt, Adrienne T; Canfield, Mark A; Chan, Wenyaw

    2016-02-01

    Knowledge of the prevalence of work-related physical activities, sedentary behaviors, and emotional stressors among pregnant women is limited, and the extent to which these exposures vary by maternal characteristics remains unclear. Data on mothers of 6,817 infants without major birth defects, with estimated delivery during 1997 through 2009 who worked during pregnancy were obtained from the National Birth Defects Prevention Study. Information on multiple domains of occupational exposures was gathered by linking mother's primary job to the Occupational Information Network Version 9.0. The most frequent estimated physical activity associated with jobs during pregnancy was standing. Of 6,337 mothers, 31.0% reported jobs associated with standing for ≥75% of their time. There was significant variability in estimated occupational exposures by maternal age, race/ethnicity, and educational level. Our findings augment existing literature on occupational physical activities, sedentary behaviors, emotional stressors, and occupational health disparities during pregnancy. © 2015 Wiley Periodicals, Inc.

  10. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  11. Integration of genomic information with biological networks using Cytoscape.

    Science.gov (United States)

    Bauer-Mehren, Anna

    2013-01-01

    Cytoscape is an open-source software for visualizing, analyzing, and modeling biological networks. This chapter explains how to use Cytoscape to analyze the functional effect of sequence variations in the context of biological networks such as protein-protein interaction networks and signaling pathways. The chapter is divided into five parts: (1) obtaining information about the functional effect of sequence variation in a Cytoscape readable format, (2) loading and displaying different types of biological networks in Cytoscape, (3) integrating the genomic information (SNPs and mutations) with the biological networks, and (4) analyzing the effect of the genomic perturbation onto the network structure using Cytoscape built-in functions. Finally, we briefly outline how the integrated data can help in building mathematical network models for analyzing the effect of the sequence variation onto the dynamics of the biological system. Each part is illustrated by step-by-step instructions on an example use case and visualized by many screenshots and figures.

  12. Information sources, awareness and preventive health behaviors in a population at risk of Arsenic exposure: The role of gender and social networks.

    Directory of Open Access Journals (Sweden)

    Frédéric Mertens

    Full Text Available The population of Paracatu is at risk of Arsenic (As exposure associated with long-term exploration of the largest open pit gold mine in Brazil. As part of the interdisciplinary research "The Paracatu project: Arsenic environmental contamination and human health risks assessment in Paracatu-MG", carried out between 2011 and 2013, we used data disaggregated by gender to identify the sources of As-related information being accessed by inhabitants of Paracatu and to examine if access to these sources was correlated to awareness of As health effects and adoption of behaviors to reduce risk of As exposure. Semi-structured, face-to-face interviews were carried out with 460 participants (294 women and 166 men to collect data on respondent's socio-demographic characteristics, use of mass media and social communication networks as sources of information on As issues, the trustworthiness of these information sources, awareness of As health effects, and adoption of behaviors to reduce As exposure. For both men and women, interpersonal communication was used and trusted more frequently than mass media to obtain information on As. Discussion of As issues occurred preferentially among individuals of the same gender and was associated with awareness of As health risks. There are marked differences in variables correlated with the adoption of behaviors to reduce the risk of As exposure between men and women. Discussing As issues with women was associated with adoption of risk-reduction practices for both genders. In contrast, men who discuss As issues with other men were less likely to adopt As exposure prevention behaviors. Finally, adoption was associated with awareness of As health effects for women, but this was not the case for men. Policy implications for decision makers, practitioners and researchers are discussed, based on concrete examples of how gender-specific approaches can effectively guide the formulation and implementation of health promotion

  13. Brain networks underlying mental imagery of auditory and visual information.

    Science.gov (United States)

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  14. Effectiveness of school network for childhood obesity prevention (SNOCOP) in primary schools of Saraburi Province, Thailand.

    Science.gov (United States)

    Banchonhattakit, Pannee; Tanasugarn, Chanuantong; Pradipasen, Mandhana; Miner, Kathleen R; Nityasuddhi, Dechavudh

    2009-07-01

    This research was designed to test the effectiveness of a school network for childhood obesity prevention (SNOCOP) in primary schools; a program that aimed to improve student behavior in terms of knowledge, attitude, intention towards obesity prevention, and their food consumption behavior. A quasi-experimental pretest-posttest time series study was conducted. By 2-stage stratified sampling selection 180 students from 6 schools were assigned to the intervention group and 195 students from 6 schools to the control group at Saraburi Province, Thailand in 2006- 2007. In addition, thirty-one participants being school administrators, teachers, parents, and community members from six schools formed the social network initiating the intervention. The schoolchildren in the intervention group improved their eating behavior, knowledge, attitude, intention towards obesity preventive behavior. The six schools of the intervention group changed school policies and school activities aiming to reduce the proportion of obesity among their student. No such activities could be observed in the control group. These findings suggest that the School-Social Network of Childhood Obesity Prevention program is an effective means to prevent childhood obesity.

  15. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  16. Understanding the Social Networks That Form within the Context of an Obesity Prevention Intervention

    Directory of Open Access Journals (Sweden)

    Sabina B. Gesell

    2012-01-01

    Full Text Available Background. Antiobesity interventions have generally failed. Research now suggests that interventions must be informed by an understanding of the social environment. Objective. To examine if new social networks form between families participating in a group-level pediatric obesity prevention trial. Methods. Latino parent-preschool child dyads (N=79 completed the 3-month trial. The intervention met weekly in consistent groups to practice healthy lifestyles. The control met monthly in inconsistent groups to learn about school readiness. UCINET and SIENA were used to examine network dynamics. Results. Children’s mean age was 4.2 years (SD=0.9, and 44% were overweight/obese (BMI≥85th percentile. Parents were predominantly mothers (97%, with a mean age of 31.4 years (SD=5.4, and 81% were overweight/obese (BMI≥25. Over the study, a new social network evolved among participating families. Parents selectively formed friendship ties based on child BMI z-score, (t=2.08; P<.05. This reveals the tendency for mothers to form new friendships with mothers whose children have similar body types. Discussion. Participating in a group-level intervention resulted in new social network formation. New ties were greatest with mothers who had children of similar body types. This finding might contribute to the known inability of parents to recognize child overweight.

  17. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  18. Information Retrieval on social network: An Adaptive Proof

    Science.gov (United States)

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  19. Tackling Information Asymmetry in Networks: A New Entropy-Based Ranking Index

    Science.gov (United States)

    Barucca, Paolo; Caldarelli, Guido; Squartini, Tiziano

    2018-06-01

    Information is a valuable asset in socio-economic systems, a significant part of which is entailed into the network of connections between agents. The different interlinkages patterns that agents establish may, in fact, lead to asymmetries in the knowledge of the network structure; since this entails a different ability of quantifying relevant, systemic properties (e.g. the risk of contagion in a network of liabilities), agents capable of providing a better estimation of (otherwise) inaccessible network properties, ultimately have a competitive advantage. In this paper, we address the issue of quantifying the information asymmetry of nodes: to this aim, we define a novel index—InfoRank—intended to rank nodes according to their information content. In order to do so, each node ego-network is enforced as a constraint of an entropy-maximization problem and the subsequent uncertainty reduction is used to quantify the node-specific accessible information. We, then, test the performance of our ranking procedure in terms of reconstruction accuracy and show that it outperforms other centrality measures in identifying the "most informative" nodes. Finally, we discuss the socio-economic implications of network information asymmetry.

  20. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  1. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  2. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  3. Effective network inference through multivariate information transfer estimation

    Science.gov (United States)

    Dahlqvist, Carl-Henrik; Gnabo, Jean-Yves

    2018-06-01

    Network representation has steadily gained in popularity over the past decades. In many disciplines such as finance, genetics, neuroscience or human travel to cite a few, the network may not directly be observable and needs to be inferred from time-series data, leading to the issue of separating direct interactions between two entities forming the network from indirect interactions coming through its remaining part. Drawing on recent contributions proposing strategies to deal with this problem such as the so-called "global silencing" approach of Barzel and Barabasi or "network deconvolution" of Feizi et al. (2013), we propose a novel methodology to infer an effective network structure from multivariate conditional information transfers. Its core principal is to test the information transfer between two nodes through a step-wise approach by conditioning the transfer for each pair on a specific set of relevant nodes as identified by our algorithm from the rest of the network. The methodology is model free and can be applied to high-dimensional networks with both inter-lag and intra-lag relationships. It outperforms state-of-the-art approaches for eliminating the redundancies and more generally retrieving simulated artificial networks in our Monte-Carlo experiments. We apply the method to stock market data at different frequencies (15 min, 1 h, 1 day) to retrieve the network of US largest financial institutions and then document how bank's centrality measurements relate to bank's systemic vulnerability.

  4. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  5. Towards the understanding of network information processing in biology

    Science.gov (United States)

    Singh, Vijay

    Living organisms perform incredibly well in detecting a signal present in the environment. This information processing is achieved near optimally and quite reliably, even though the sources of signals are highly variable and complex. The work in the last few decades has given us a fair understanding of how individual signal processing units like neurons and cell receptors process signals, but the principles of collective information processing on biological networks are far from clear. Information processing in biological networks, like the brain, metabolic circuits, cellular-signaling circuits, etc., involves complex interactions among a large number of units (neurons, receptors). The combinatorially large number of states such a system can exist in makes it impossible to study these systems from the first principles, starting from the interactions between the basic units. The principles of collective information processing on such complex networks can be identified using coarse graining approaches. This could provide insights into the organization and function of complex biological networks. Here I study models of biological networks using continuum dynamics, renormalization, maximum likelihood estimation and information theory. Such coarse graining approaches identify features that are essential for certain processes performed by underlying biological networks. We find that long-range connections in the brain allow for global scale feature detection in a signal. These also suppress the noise and remove any gaps present in the signal. Hierarchical organization with long-range connections leads to large-scale connectivity at low synapse numbers. Time delays can be utilized to separate a mixture of signals with temporal scales. Our observations indicate that the rules in multivariate signal processing are quite different from traditional single unit signal processing.

  6. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  7. A quantitative approach to measure road network information based on edge diversity

    Science.gov (United States)

    Wu, Xun; Zhang, Hong; Lan, Tian; Cao, Weiwei; He, Jing

    2015-12-01

    The measure of map information has been one of the key issues in assessing cartographic quality and map generalization algorithms. It is also important for developing efficient approaches to transfer geospatial information. Road network is the most common linear object in real world. Approximately describe road network information will benefit road map generalization, navigation map production and urban planning. Most of current approaches focused on node diversities and supposed that all the edges are the same, which is inconsistent to real-life condition, and thus show limitations in measuring network information. As real-life traffic flow are directed and of different quantities, the original undirected vector road map was first converted to a directed topographic connectivity map. Then in consideration of preferential attachment in complex network study and rich-club phenomenon in social network, the from and to weights of each edge are assigned. The from weight of a given edge is defined as the connectivity of its end node to the sum of the connectivities of all the neighbors of the from nodes of the edge. After getting the from and to weights of each edge, edge information, node information and the whole network structure information entropies could be obtained based on information theory. The approach has been applied to several 1 square mile road network samples. Results show that information entropies based on edge diversities could successfully describe the structural differences of road networks. This approach is a complementarity to current map information measurements, and can be extended to measure other kinds of geographical objects.

  8. [Factors regarding awareness of preventive care exercises: Distance to exercise facilities and their social networks].

    Science.gov (United States)

    Soma, Yuki; Tsunoda, Kenji; Kitano, Naruki; Jindo, Takashi; Okura, Tomohiro

    2015-01-01

    The present study examines factors affecting individuals' awareness of certain types of preventive care exercises, particularly the distance from their home to an exercise facility and their social networks. Participants were 3206 men (age, 73.0±6.2 years) and 3395 women (age, 73.2±6.4 years) aged ≥65 years who had not been certified as persons with care needs and who had responded to an inventory survey conducted in Kasama City, Japan, in 2013. We performed multiple logistic regression analysis to assess the characteristics associated with participants' awareness of two types of exercises for preventive care: "silver rehabili taisou" (SRT) and "square-stepping exercise" (SSE). Independent variables were distance from home to the exercise facility, social networks, transportation availability, physical function, cognitive function, and neighborhood population density. Older adults who were aware of the exercises lived significantly closer to an exercise facility (SRT, aware: 1,148.5±961.3 m vs. unaware: 1,284.2±1,027.4 m; SSE, aware: 1,415.9±1104.1 m vs. unaware: 1,615.7±1,172.2 m). Multiple logistic regression analysis showed that participation in community activities (men, SRT-odds ratio [OR]=2.54 and SSE-OR=2.19; women, SRT-OR=4.14 and SSE-OR=3.34] and visiting friends (men, SRT-OR=1.45 and SSE-OR=1.49; women SRT-OR=1.44 and SSE-OR=1.73) were promoting factors for awareness of both types of exercises. In men and women, low physical function (SRT-OR=0.73 and SSE-OR=0.56) and dependence on another person to drive them to the destination (SRT-OR=0.79 and SSE-OR=0.78) were inhibiting factors, respectively. A distance of >500 m between their home and the facility tended to be an inhibiting factor. A shorter distance from home to an exercise facility and better social networks increased awareness of preventive care exercises in both sexes and for both types of exercise. Establishing exercise centers and devising effective methods of imparting information to

  9. The development of a network for community-based obesity prevention: the CO-OPS Collaboration

    Science.gov (United States)

    2011-01-01

    Background Community-based interventions are a promising approach and an important component of a comprehensive response to obesity. In this paper we describe the Collaboration of COmmunity-based Obesity Prevention Sites (CO-OPS Collaboration) in Australia as an example of a collaborative network to enhance the quality and quantity of obesity prevention action at the community level. The core aims of the CO-OPS Collaboration are to: identify and analyse the lessons learned from a range of community-based initiatives aimed at tackling obesity, and; to identify the elements that make community-based obesity prevention initiatives successful and share the knowledge gained with other communities. Methods Key activities of the collaboration to date have included the development of a set of Best Practice Principles and knowledge translation and exchange activities to promote the application (or use) of evidence, evaluation and analysis in practice. Results The establishment of the CO-OPS Collaboration is a significant step toward strengthening action in this area, by bringing together research, practice and policy expertise to promote best practice, high quality evaluation and knowledge translation and exchange. Future development of the network should include facilitation of further evidence generation and translation drawing from process, impact and outcome evaluation of existing community-based interventions. Conclusions The lessons presented in this paper may help other networks like CO-OPS as they emerge around the globe. It is important that networks integrate with each other and share the experience of creating these networks. PMID:21349185

  10. Actor-network Theory and cartography of controversies in Information Science

    OpenAIRE

    LOURENÇO, Ramon Fernandes; TOMAÉL, Maria Inês

    2018-01-01

    Abstract The present study aims to discuss the interactions between the Actor-network Theory and the Cartography of Controversies method in Information Science research. A literature review was conducted on books, scholarly articles, and any other sources addressing the Theory-Actor Network and Cartography of Controversies. The understanding of the theoretical assumptions that guide the Network-Actor Theory allows examining important aspects to Information Science research, seeking to identif...

  11. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  12. E-learning objects and actor-networks as configuring information literacy teaching

    DEFF Research Database (Denmark)

    Schreiber, Trine Louise

    2017-01-01

    Introduction. With actor-network theory (ANT) as the theoretical lens the aim of the paper is to examine attempts to build network for shaping information literacy teaching. Method. The paper is based on a study of a project in 2014-2016 where information professionals representing ten educational...... libraries produced and implemented e-learning objects in information literacy teaching. The material was collected through interviews, observations, documents and feedback sessions. Analysis. Latour´s concept of translation and Callon´s four translation moments are used to analyze the network building...... that a network configuring information literacy teaching based on new interactive roles has not been stabilized. Conclusion. The paper concludes that the strength of ANT is first of all the mediation of an overview of different kinds of actors involved in network building. Further, the paper proposes to combine...

  13. Expanding the informational chemistries of life: peptide/RNA networks

    Science.gov (United States)

    Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.

    2017-11-01

    The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.

  14. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  15. A multivariate extension of mutual information for growing neural networks.

    Science.gov (United States)

    Ball, Kenneth R; Grant, Christopher; Mundy, William R; Shafer, Timothy J

    2017-11-01

    Recordings of neural network activity in vitro are increasingly being used to assess the development of neural network activity and the effects of drugs, chemicals and disease states on neural network function. The high-content nature of the data derived from such recordings can be used to infer effects of compounds or disease states on a variety of important neural functions, including network synchrony. Historically, synchrony of networks in vitro has been assessed either by determination of correlation coefficients (e.g. Pearson's correlation), by statistics estimated from cross-correlation histograms between pairs of active electrodes, and/or by pairwise mutual information and related measures. The present study examines the application of Normalized Multiinformation (NMI) as a scalar measure of shared information content in a multivariate network that is robust with respect to changes in network size. Theoretical simulations are designed to investigate NMI as a measure of complexity and synchrony in a developing network relative to several alternative approaches. The NMI approach is applied to these simulations and also to data collected during exposure of in vitro neural networks to neuroactive compounds during the first 12 days in vitro, and compared to other common measures, including correlation coefficients and mean firing rates of neurons. NMI is shown to be more sensitive to developmental effects than first order synchronous and nonsynchronous measures of network complexity. Finally, NMI is a scalar measure of global (rather than pairwise) mutual information in a multivariate network, and hence relies on less assumptions for cross-network comparisons than historical approaches. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. The Value of Information in Distributed Decision Networks

    Science.gov (United States)

    2016-03-04

    formulation, and then we describe the various results at- tained. 1 Mathematical description of Distributed Decision Network un- der Information...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...to any linear, combinatorial problem like shortest path optimization, and, further, so long as the original combinatorial problem can be solved in

  17. Exploring Social Networking Technologies as Tools for HIV Prevention for Men Who Have Sex With Men.

    Science.gov (United States)

    Ramallo, Jorge; Kidder, Thomas; Albritton, Tashuna; Blick, Gary; Pachankis, John; Grandelski, Valen; Grandeleski, Valen; Kershaw, Trace

    2015-08-01

    Social networking technologies are influential among men who have sex with men (MSM) and may be an important strategy for HIV prevention. We conducted focus groups with HIV positive and negative participants. Almost all participants used social networking sites to meet new friends and sexual partners. The main obstacle to effective HIV prevention campaigns in social networking platforms was stigmatization based on homosexuality as well as HIV status. Persistent stigma associated with HIV status and disclosure was cited as a top reason for avoiding HIV-related conversations while meeting new partners using social technologies. Further, social networking sites have different social etiquettes and rules that may increase HIV risk by discouraging HIV status disclosure. Overall, successful interventions for MSM using social networking technologies must consider aspects of privacy, stigma, and social norms in order to enact HIV reduction among MSM.

  18. Grower Communication Networks: Information Sources for Organic Farmers

    Science.gov (United States)

    Crawford, Chelsi; Grossman, Julie; Warren, Sarah T.; Cubbage, Fred

    2015-01-01

    This article reports on a study to determine which information sources organic growers use to inform farming practices by conducting in-depth semi-structured interviews with 23 organic farmers across 17 North Carolina counties. Effective information sources included: networking, agricultural organizations, universities, conferences, Extension, Web…

  19. Research on the method of measuring space information network capacity in communication service

    Directory of Open Access Journals (Sweden)

    Zhu Shichao

    2017-02-01

    Full Text Available Because of the large scale characteristic of space information network in terms of space and time and the increasing of its complexity,existing measuring methods of information transmission capacity have been unable to measure the existing and future space information networkeffectively.In this study,we firstly established a complex model of space information network,and measured the whole space information network capacity by means of analyzing data access capability to the network and data transmission capability within the network.At last,we verified the rationality of the proposed measuring method by using STK and Matlab simulation software for collaborative simulation.

  20. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  1. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  2. Exploiting global information in complex network repair processes

    Institute of Scientific and Technical Information of China (English)

    Tianyu WANG; Jun ZHANG; Sebastian WANDELT

    2017-01-01

    Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger compo nents at a low cost only with local information.In this paper,we discuss the effectiveness and effi ciency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair.

  3. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  4. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  5. Creating an African HIV clinical research and prevention trials network: HIV prevalence, incidence and transmission.

    Directory of Open Access Journals (Sweden)

    Anatoli Kamali

    Full Text Available HIV epidemiology informs prevention trial design and program planning. Nine clinical research centers (CRC in sub-Saharan Africa conducted HIV observational epidemiology studies in populations at risk for HIV infection as part of an HIV prevention and vaccine trial network. Annual HIV incidence ranged from below 2% to above 10% and varied by CRC and risk group, with rates above 5% observed in Zambian men in an HIV-discordant relationship, Ugandan men from Lake Victoria fishing communities, men who have sex with men, and several cohorts of women. HIV incidence tended to fall after the first three months in the study and over calendar time. Among suspected transmission pairs, 28% of HIV infections were not from the reported partner. Volunteers with high incidence were successfully identified and enrolled into large scale cohort studies. Over a quarter of new cases in couples acquired infection from persons other than the suspected transmitting partner.

  6. Creating an African HIV Clinical Research and Prevention Trials Network: HIV Prevalence, Incidence and Transmission

    Science.gov (United States)

    Kamali, Anatoli; Price, Matt A.; Lakhi, Shabir; Karita, Etienne; Inambao, Mubiana; Sanders, Eduard J.; Anzala, Omu; Latka, Mary H.; Bekker, Linda-Gail; Kaleebu, Pontiano; Asiki, Gershim; Ssetaala, Ali; Ruzagira, Eugene; Allen, Susan; Farmer, Paul; Hunter, Eric; Mutua, Gaudensia; Makkan, Heeran; Tichacek, Amanda; Brill, Ilene K.; Fast, Pat; Stevens, Gwynn; Chetty, Paramesh; Amornkul, Pauli N.; Gilmour, Jill

    2015-01-01

    HIV epidemiology informs prevention trial design and program planning. Nine clinical research centers (CRC) in sub-Saharan Africa conducted HIV observational epidemiology studies in populations at risk for HIV infection as part of an HIV prevention and vaccine trial network. Annual HIV incidence ranged from below 2% to above 10% and varied by CRC and risk group, with rates above 5% observed in Zambian men in an HIV-discordant relationship, Ugandan men from Lake Victoria fishing communities, men who have sex with men, and several cohorts of women. HIV incidence tended to fall after the first three months in the study and over calendar time. Among suspected transmission pairs, 28% of HIV infections were not from the reported partner. Volunteers with high incidence were successfully identified and enrolled into large scale cohort studies. Over a quarter of new cases in couples acquired infection from persons other than the suspected transmitting partner. PMID:25602351

  7. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  8. National information network and database system of hazardous waste management in China

    Energy Technology Data Exchange (ETDEWEB)

    Ma Hongchang [National Environmental Protection Agency, Beijing (China)

    1996-12-31

    Industries in China generate large volumes of hazardous waste, which makes it essential for the nation to pay more attention to hazardous waste management. National laws and regulations, waste surveys, and manifest tracking and permission systems have been initiated. Some centralized hazardous waste disposal facilities are under construction. China`s National Environmental Protection Agency (NEPA) has also obtained valuable information on hazardous waste management from developed countries. To effectively share this information with local environmental protection bureaus, NEPA developed a national information network and database system for hazardous waste management. This information network will have such functions as information collection, inquiry, and connection. The long-term objective is to establish and develop a national and local hazardous waste management information network. This network will significantly help decision makers and researchers because it will be easy to obtain information (e.g., experiences of developed countries in hazardous waste management) to enhance hazardous waste management in China. The information network consists of five parts: technology consulting, import-export management, regulation inquiry, waste survey, and literature inquiry.

  9. Management of information supporting Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  10. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  11. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  12. An information search model for online social Networks - MOBIRSE

    Directory of Open Access Journals (Sweden)

    Miguel Angel Niño Zambrano

    2015-09-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years.  These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  13. Information dynamics of brain–heart physiological networks during sleep

    International Nuclear Information System (INIS)

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  14. Information dynamics of brain-heart physiological networks during sleep

    Science.gov (United States)

    Faes, L.; Nollo, G.; Jurysta, F.; Marinazzo, D.

    2014-10-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain-heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain-brain and brain-heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep.

  15. Information loss method to measure node similarity in networks

    Science.gov (United States)

    Li, Yongli; Luo, Peng; Wu, Chong

    2014-09-01

    Similarity measurement for the network node has been paid increasing attention in the field of statistical physics. In this paper, we propose an entropy-based information loss method to measure the node similarity. The whole model is established based on this idea that less information loss is caused by seeing two more similar nodes as the same. The proposed new method has relatively low algorithm complexity, making it less time-consuming and more efficient to deal with the large scale real-world network. In order to clarify its availability and accuracy, this new approach was compared with some other selected approaches on two artificial examples and synthetic networks. Furthermore, the proposed method is also successfully applied to predict the network evolution and predict the unknown nodes' attributions in the two application examples.

  16. 48 CFR 52.223-5 - Pollution Prevention and Right-to-Know Information.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Pollution Prevention and... Provisions and Clauses 52.223-5 Pollution Prevention and Right-to-Know Information. As prescribed in 23.1005, insert the following clause: Pollution Prevention and Right-to-Know Information (AUG 2003) (a...

  17. Next-generation science information network for leading-edge applications

    International Nuclear Information System (INIS)

    Urushidani, S.; Matsukata, J.

    2008-01-01

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines

  18. Next-generation science information network for leading-edge applications

    Energy Technology Data Exchange (ETDEWEB)

    Urushidani, S. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)], E-mail: urushi@nii.ac.jp; Matsukata, J. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)

    2008-04-15

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines.

  19. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  20. The interaction of social networks and child obesity prevention program effects: the pathways trial.

    Science.gov (United States)

    Shin, Hee-Sung; Valente, Thomas W; Riggs, Nathaniel R; Huh, Jimi; Spruijt-Metz, Donna; Chou, Chih-Ping; Ann Pentz, Mary

    2014-06-01

    Social network analysis was used to examine whether peer influence from one's social networks moderates obesity prevention program effects on obesity-related behaviors: healthful and unhealthful. Participants included 557 children residing in Southern California. The survey assessed health-promoting behaviors (i.e., physical activity at school, physical activity outside of school, and fruit and vegetable intake), as well as unhealthful behaviors (high-calorie, low-nutrient intake and sedentary activity), and peer exposure calculated from social network nominations as indicators of peer influence. Multilevel models were conducted separately on outcomes predicted by program participation, peer exposure, and program participation by peer exposure. Results indicated that peer exposure was positively associated with one's own healthful and unhealthful behaviors. Program participation effects were moderated by peer influence, but only when unhealthful peer influence was present. Results suggest that peer influence can diminish or amplify prevention programs Future interventions should consider peer-led components to promote healthful influence of peers on healthful and unhealthful behaviors, and programs should be mindful that their effects are moderated by social networks. Copyright © 2014 The Obesity Society.

  1. Modeling the live-pig trade network in Georgia: Implications for disease prevention and control.

    Directory of Open Access Journals (Sweden)

    Esther Andrea Kukielka

    Full Text Available Live pig trade patterns, drivers and characteristics, particularly in backyard predominant systems, remain largely unexplored despite their important contribution to the spread of infectious diseases in the swine industry. A better understanding of the pig trade dynamics can inform the implementation of risk-based and more cost-effective prevention and control programs for swine diseases. In this study, a semi-structured questionnaire elaborated by FAO and implemented to 487 farmers was used to collect data regarding basic characteristics about pig demographics and live-pig trade among villages in the country of Georgia, where very scarce information is available. Social network analysis and exponential random graph models were used to better understand the structure, contact patterns and main drivers for pig trade in the country. Results indicate relatively infrequent (a total of 599 shipments in one year and geographically localized (median Euclidean distance between shipments = 6.08 km; IQR = 0-13.88 km pig movements in the studied regions. The main factors contributing to live-pig trade movements among villages were being from the same region (i.e., local trade, usage of a middleman or a live animal market to trade live pigs by at least one farmer in the village, and having a large number of pig farmers in the village. The identified villages' characteristics and structural network properties could be used to inform the design of more cost-effective surveillance systems in a country which pig industry was recently devastated by African swine fever epidemics and where backyard production systems are predominant.

  2. 77 FR 63803 - Federal Acquisition Regulation; Information Collection; Pollution Prevention and Right-to-Know...

    Science.gov (United States)

    2012-10-17

    ...; Information Collection; Pollution Prevention and Right-to-Know Information (FAR 52.223-5) AGENCY: Department... previously approved information collection requirement concerning pollution prevention and right-to-know..., Pollution Prevention and Right-to-Know Information'' on your attached document. Fax: 202-501-4067. Mail...

  3. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  4. Information flow in layered networks of non-monotonic units

    International Nuclear Information System (INIS)

    Neves, Fabio Schittler; Schubert, Benno Martim; Erichsen, Rubem Jr

    2015-01-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information. (paper)

  5. Information flow in layered networks of non-monotonic units

    Science.gov (United States)

    Schittler Neves, Fabio; Martim Schubert, Benno; Erichsen, Rubem, Jr.

    2015-07-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information.

  6. Construction and discussion of the science and technology information network of SWIP

    International Nuclear Information System (INIS)

    Wang Li; Zhang Yiming

    2010-01-01

    The digital library needs to be developed with the advancement of digitalisation and network, and the construction of digital information resource is more indispensable. This paper introduces the exploration and the work performed by the Research Office of Science and Technology Information of the Southwestern Institute of Physics with respect to preliminary construction of science and technology (S and T) information network resources and the magnitude alteration of S and T information service platform subsequently and the building of a dynamical network information service mode of its own characteristics. (authors)

  7. Social Networks: Rational Learning and Information Aggregation

    Science.gov (United States)

    2009-09-01

    predecessor, Gale and Kariv (2003) who generalize the payoff equalization result of Bala and Goyal (1998) in connected social networks (discussed below...requires more notation. Using Bayes’ Rule and the assumption of equal priors on the state θ, we have that the social belief given by observing... Social Networks: Rational Learning and Information Aggregation by Ilan Lobel B.Sc., Pontif́ıcia Universidade Católica do Rio de Janeiro (2004

  8. Effects of rewiring strategies on information spreading in complex dynamic networks

    Science.gov (United States)

    Ally, Abdulla F.; Zhang, Ning

    2018-04-01

    Recent advances in networks and communication services have attracted much interest to understand information spreading in social networks. Consequently, numerous studies have been devoted to provide effective and accurate models for mimicking information spreading. However, knowledge on how to spread information faster and more widely remains a contentious issue. Yet, most existing works are based on static networks which limit the reality of dynamism of entities that participate in information spreading. Using the SIR epidemic model, this study explores and compares effects of two rewiring models (Fermi-Dirac and Linear functions) on information spreading in scale free and small world networks. Our results show that for all the rewiring strategies, the spreading influence replenishes with time but stabilizes in a steady state at later time-steps. This means that information spreading takes-off during the initial spreading steps, after which the spreading prevalence settles toward its equilibrium, with majority of the population having recovered and thus, no longer affecting the spreading. Meanwhile, rewiring strategy based on Fermi-Dirac distribution function in one way or another impedes the spreading process, however, the structure of the networks mimic the spreading, even with a low spreading rate. The worst case can be when the spreading rate is extremely small. The results emphasize that despite a big role of such networks in mimicking the spreading, the role of the parameters cannot be simply ignored. Apparently, the probability of giant degree neighbors being informed grows much faster with the rewiring strategy of linear function compared to that of Fermi-Dirac distribution function. Clearly, rewiring model based on linear function generates the fastest spreading across the networks. Therefore, if we are interested in speeding up the spreading process in stochastic modeling, linear function may play a pivotal role.

  9. Environmental Public Health Tracking: Health and Environment Linked for Information Exchange-Atlanta (HEXIX-Atlanta: A cooperative Program Between CDC and NASA for Development of an Environmental Public Health Tracking Network in the Atlanta Metropolitan Area

    Science.gov (United States)

    Quattrochi, Dale A.; Niskar, Amanda Sue

    2005-01-01

    The Centers for Disease Control and Prevention (CDC) is coordinating HELIX- Atlanta to provide information regarding the five-county Metropolitan Atlanta Area (Clayton, Cobb, DeKalb, Fulton, and Gwinett) via a network of integrated environmental monitoring and public health data systems so that all sectors can take action to prevent and control environmentally related health effects. The HELIX-Atlanta Network is a tool to access interoperable information systems with optional information technology linkage functionality driven by scientific rationale. HELIX-Atlanta is a collaborative effort with local, state, federal, and academic partners, including the NASA Marshall Space Flight Center. The HELIX-Atlanta Partners identified the following HELIX-Atlanta initial focus areas: childhood lead poisoning, short-latency cancers, developmental disabilities, birth defects, vital records, respiratory health, age of housing, remote sensing data, and environmental monitoring, HELIX-Atlanta Partners identified and evaluated information systems containing information on the above focus areas. The information system evaluations resulted in recommendations for what resources would be needed to interoperate selected information systems in compliance with the CDC Public Health Information Network (PHIN). This presentation will discuss the collaborative process of building a network that links health and environment data for information exchange, including NASA remote sensing data, for use in HELIX-Atlanta.

  10. Analysis of Online Social Networks to Understand Information Sharing Behaviors Through Social Cognitive Theory.

    Science.gov (United States)

    Yoon, Hong-Jun; Tourassi, Georgia

    2014-05-01

    Analyzing the contents of online social networks is an effective process for monitoring and understanding peoples' behaviors. Since the nature of conversation and information propagation is similar to traditional conversation and learning, one of the popular socio-cognitive methods, social cognitive theory was applied to online social networks to. Two major news topics about colon cancer were chosen to monitor traffic of Twitter messages. The activity of "leaders" on the issue (i.e., news companies or people will prior Twitter activity on topics related to colon cancer) was monitored. In addition, the activity of "followers", people who never discussed the topics before, but replied to the discussions was also monitored. Topics that produce tangible benefits such as positive outcomes from appropriate preventive actions received dramatically more attention and online social media traffic. Such characteristics can be explained with social cognitive theory and thus present opportunities for effective health campaigns.

  11. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  12. Prevention of dependence on the internet and social networks among children aged 10 to 12 years.

    OpenAIRE

    ZEDNÍKOVÁ, Denisa

    2017-01-01

    This bachelor thesis deals with addiction on the internet and social networks of 10-12 years old children and subsequent prevention and treatment of this addiction. My goal was to determine whether there are children in this age addicted to the Internet and social networks and if so, are there any prevention programs and in worse cases, follow-up treatments. The first chapter is a theoretical part about the definition of addiction, particularly non-substance addiction to the internet and soci...

  13. The relevance of the social networking media in Ebola virus disease prevention and control in Southwestern Nigeria.

    Science.gov (United States)

    Adebimpe, Wasiu Olalekan; Adeyemi, Damilare Hakeem; Faremi, Ayodeji; Ojo, John Olujide; Efuntoye, Adeola Ebun

    2015-01-01

    The Social Media (SM) is fast becoming a huge avenue to create and spread health awareness amongst youths. Meanwhile news surrounding the on-going Ebola Virus Disease (EVD) outbreak in West Africa are frightening. This study assessed the relevance of the social networking media in spreading awareness about EVD prevention and control in Southwestern Nigeria. Descriptive cross sectional study among 400 youths selected using multistage sampling method. Research instruments used were semi structured self administered questionnaires that were analyzed using the SPSS software version 17.0. Three hundred and eighty (95.0%) of respondents were members of a social network. Several misconceptions trailed the spread of information about EVD. Though only 21(7.3%) bothered to ascertain the reliability of such information before use, 332 (83.0%) believed that SM can also be used to dispel rumours on health information, 337(84.3%) said they would like the use of SM regulated, while 206 (51.6%) still believed that SM is effective in disseminating health information among youths. Only 79.4% had good knowledge of EVD, and 30.7% of respondents had misinformation about EVD. Determinants of good level of knowledge about EVD through SM contacts include being a male, having SM as the first source of information on EVD and believing that SM could assist to disseminate and improve health information. Misconceptions spread through the SM fuelled the ongoing EVD outbreak in West Africa. There is a need for the concerned authority to create awareness through SM contacts as well as regulate its use.

  14. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  15. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... criminal investigation or national security, such agency may direct the carrier not to so disclose or...

  16. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  17. The effects of redundancy and information manipulation on traffic networks

    OpenAIRE

    Özel, Berk; Ozel, Berk

    2014-01-01

    Traffic congestion is one of the most frequently encountered problems in real life. It is not only a scientific concern of scholars, but also an inevitable issue for most of the individuals living in urban areas. Since every driver in traffic networks tries to minimize own journey length, and volume of the traffic prevents coordination between individuals, a cooperative behavior will not be provided spontaneously in order to decrease the total cost of the network and the time spent on traffic...

  18. Analyzing complex networks evolution through Information Theory quantifiers

    International Nuclear Information System (INIS)

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  19. Quantum demultiplexer of quantum parameter-estimation information in quantum networks

    Science.gov (United States)

    Xie, Yanqing; Huang, Yumeng; Wu, Yinzhong; Hao, Xiang

    2018-05-01

    The quantum demultiplexer is constructed by a series of unitary operators and multipartite entangled states. It is used to realize information broadcasting from an input node to multiple output nodes in quantum networks. The scheme of quantum network communication with respect to phase estimation is put forward through the demultiplexer subjected to amplitude damping noises. The generalized partial measurements can be applied to protect the transferring efficiency from environmental noises in the protocol. It is found out that there are some optimal coherent states which can be prepared to enhance the transmission of phase estimation. The dynamics of state fidelity and quantum Fisher information are investigated to evaluate the feasibility of the network communication. While the state fidelity deteriorates rapidly, the quantum Fisher information can be enhanced to a maximum value and then decreases slowly. The memory effect of the environment induces the oscillations of fidelity and quantum Fisher information. The adjustment of the strength of partial measurements is helpful to increase quantum Fisher information.

  20. Actor Network Theory Approach and its Application in Investigating Agricultural Climate Information System

    Directory of Open Access Journals (Sweden)

    Maryam Sharifzadeh

    2013-03-01

    Full Text Available Actor network theory as a qualitative approach to study complex social factors and process of socio-technical interaction provides new concepts and ideas to understand socio-technical nature of information systems. From the actor network theory viewpoint, agricultural climate information system is a network consisting of actors, actions and information related processes (production, transformation, storage, retrieval, integration, diffusion and utilization, control and management, and system mechanisms (interfaces and networks. Analysis of such systemsembody the identification of basic components and structure of the system (nodes –thedifferent sources of information production, extension, and users, and the understanding of how successfully the system works (interaction and links – in order to promote climate knowledge content and improve system performance to reach agricultural development. The present research attempted to introduce actor network theory as research framework based on network view of agricultural climate information system.

  1. An experimental study of the Online Information Paradox: Does en-route information improve road network performance?

    Science.gov (United States)

    Wijayaratna, Kasun P; Dixit, Vinayak V; Denant-Boemont, Laurent; Waller, S Travis

    2017-01-01

    This study investigates the empirical presence of a theoretical transportation paradox, defined as the "Online Information Paradox" (OIP). The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE) solution (no information scenario) and the other being the User Equilibrium with Recourse (UER) solution (with information scenario). An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC) were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network.

  2. A Red-Light Running Prevention System Based on Artificial Neural Network and Vehicle Trajectory Data

    Directory of Open Access Journals (Sweden)

    Pengfei Li

    2014-01-01

    Full Text Available The high frequency of red-light running and complex driving behaviors at the yellow onset at intersections cannot be explained solely by the dilemma zone and vehicle kinematics. In this paper, the author presented a red-light running prevention system which was based on artificial neural networks (ANNs to approximate the complex driver behaviors during yellow and all-red clearance and serve as the basis of an innovative red-light running prevention system. The artificial neural network and vehicle trajectory are applied to identify the potential red-light runners. The ANN training time was also acceptable and its predicting accurate rate was over 80%. Lastly, a prototype red-light running prevention system with the trained ANN model was described. This new system can be directly retrofitted into the existing traffic signal systems.

  3. A red-light running prevention system based on artificial neural network and vehicle trajectory data.

    Science.gov (United States)

    Li, Pengfei; Li, Yan; Guo, Xiucheng

    2014-01-01

    The high frequency of red-light running and complex driving behaviors at the yellow onset at intersections cannot be explained solely by the dilemma zone and vehicle kinematics. In this paper, the author presented a red-light running prevention system which was based on artificial neural networks (ANNs) to approximate the complex driver behaviors during yellow and all-red clearance and serve as the basis of an innovative red-light running prevention system. The artificial neural network and vehicle trajectory are applied to identify the potential red-light runners. The ANN training time was also acceptable and its predicting accurate rate was over 80%. Lastly, a prototype red-light running prevention system with the trained ANN model was described. This new system can be directly retrofitted into the existing traffic signal systems.

  4. A Red-Light Running Prevention System Based on Artificial Neural Network and Vehicle Trajectory Data

    Science.gov (United States)

    Li, Pengfei; Li, Yan; Guo, Xiucheng

    2014-01-01

    The high frequency of red-light running and complex driving behaviors at the yellow onset at intersections cannot be explained solely by the dilemma zone and vehicle kinematics. In this paper, the author presented a red-light running prevention system which was based on artificial neural networks (ANNs) to approximate the complex driver behaviors during yellow and all-red clearance and serve as the basis of an innovative red-light running prevention system. The artificial neural network and vehicle trajectory are applied to identify the potential red-light runners. The ANN training time was also acceptable and its predicting accurate rate was over 80%. Lastly, a prototype red-light running prevention system with the trained ANN model was described. This new system can be directly retrofitted into the existing traffic signal systems. PMID:25435870

  5. Directedness of information flow in mobile phone communication networks.

    Directory of Open Access Journals (Sweden)

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  6. Endogenous information, adverse selection, and prevention: Implications for genetic testing policy.

    Science.gov (United States)

    Peter, Richard; Richter, Andreas; Thistle, Paul

    2017-09-01

    We examine public policy toward the use of genetic information by insurers. Individuals engage in unobservable primary prevention and have access to different prevention technologies. Thus, insurance markets are affected by moral hazard and adverse selection. Individuals can choose to take a genetic test to acquire information about their prevention technology. Information has positive decision-making value, that is, individuals may adjust their behavior based on the result of the test. However, testing also exposes individuals to uncertainty over the available insurance contract, so-called classification risk, which lowers the value of information. In our analysis we distinguish between four different policy regimes, determine the value of information under each regime and associated equilibrium outcomes on the insurance market. We show that the policy regimes can be Pareto ranked, with a duty to disclose being the preferred regime and an information ban the least preferred one. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Polarity-specific high-level information propagation in neural networks.

    Science.gov (United States)

    Lin, Yen-Nan; Chang, Po-Yen; Hsiao, Pao-Yueh; Lo, Chung-Chuan

    2014-01-01

    Analyzing the connectome of a nervous system provides valuable information about the functions of its subsystems. Although much has been learned about the architectures of neural networks in various organisms by applying analytical tools developed for general networks, two distinct and functionally important properties of neural networks are often overlooked. First, neural networks are endowed with polarity at the circuit level: Information enters a neural network at input neurons, propagates through interneurons, and leaves via output neurons. Second, many functions of nervous systems are implemented by signal propagation through high-level pathways involving multiple and often recurrent connections rather than by the shortest paths between nodes. In the present study, we analyzed two neural networks: the somatic nervous system of Caenorhabditis elegans (C. elegans) and the partial central complex network of Drosophila, in light of these properties. Specifically, we quantified high-level propagation in the vertical and horizontal directions: the former characterizes how signals propagate from specific input nodes to specific output nodes and the latter characterizes how a signal from a specific input node is shared by all output nodes. We found that the two neural networks are characterized by very efficient vertical and horizontal propagation. In comparison, classic small-world networks show a trade-off between vertical and horizontal propagation; increasing the rewiring probability improves the efficiency of horizontal propagation but worsens the efficiency of vertical propagation. Our result provides insights into how the complex functions of natural neural networks may arise from a design that allows them to efficiently transform and combine input signals.

  8. Building a Portuguese Food Microbiological Information Network

    OpenAIRE

    Viegas, Silvia; Machado, Claudia; Dantas, Maria; Oliveira, Luísa

    2011-01-01

    Introduction: The integration of food data from research, microbiological monitoring, epidemiological investigation and disease surveillance is crucial to manage foodborne risk. Consequently, INSA launched the Portuguese Food Information Resource Programme (PortFIR) in a partnership with GS1 Portugal to create national food chain expert networks and sustainable databases on food composition, consumption and chemical and microbiological contamination. Presently, the Food Microbiological Inform...

  9. Reaching adolescent girls through social networking: a new avenue for smoking prevention messages.

    Science.gov (United States)

    Struik, Laura Louise; Bottorff, Joan L; Jung, Mary; Budgen, Claire

    2012-09-01

    Because adolescent girls are being targeted on social networking sites by the tobacco industry, new online tobacco control (TC) initiatives are needed. The purpose of this interpretive descriptive study was to explore adolescent girls' perspectives on the use of social networking sites to deliver TC messages targeting young women. Focus groups were conducted with 17 girls aged 16 to 19. Seven TC messages were provided for evaluation and as context for discussion about the delivery of TC messages on social networking sites. Data were analyzed for themes, which included concerns about the effectiveness of current TC messages and the stereotypical representations of gender, factors perceived to influence the effectiveness of TC messages on social networking sites, and suggestions for enhancing the effectiveness of TC messages placed on social networking sites. Endorsement of TC messaging on social networking sites suggests that this medium is an untapped resource for smoking prevention.

  10. A network integration approach for drug-target interaction prediction and computational drug repositioning from heterogeneous information.

    Science.gov (United States)

    Luo, Yunan; Zhao, Xinbin; Zhou, Jingtian; Yang, Jinglin; Zhang, Yanqing; Kuang, Wenhua; Peng, Jian; Chen, Ligong; Zeng, Jianyang

    2017-09-18

    The emergence of large-scale genomic, chemical and pharmacological data provides new opportunities for drug discovery and repositioning. In this work, we develop a computational pipeline, called DTINet, to predict novel drug-target interactions from a constructed heterogeneous network, which integrates diverse drug-related information. DTINet focuses on learning a low-dimensional vector representation of features, which accurately explains the topological properties of individual nodes in the heterogeneous network, and then makes prediction based on these representations via a vector space projection scheme. DTINet achieves substantial performance improvement over other state-of-the-art methods for drug-target interaction prediction. Moreover, we experimentally validate the novel interactions between three drugs and the cyclooxygenase proteins predicted by DTINet, and demonstrate the new potential applications of these identified cyclooxygenase inhibitors in preventing inflammatory diseases. These results indicate that DTINet can provide a practically useful tool for integrating heterogeneous information to predict new drug-target interactions and repurpose existing drugs.Network-based data integration for drug-target prediction is a promising avenue for drug repositioning, but performance is wanting. Here, the authors introduce DTINet, whose performance is enhanced in the face of noisy, incomplete and high-dimensional biological data by learning low-dimensional vector representations.

  11. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  12. Identification of Functional Information Subgraphs in Complex Networks

    International Nuclear Information System (INIS)

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  13. 77 FR 52341 - Information Collection Activity: Subpart C, Pollution Prevention and Control; Submitted for...

    Science.gov (United States)

    2012-08-29

    ...-0001; OMB Number 1014-NEW] Information Collection Activity: Subpart C, Pollution Prevention and Control... the regulations under Subpart C, Pollution Prevention and Control. This notice also provides the... information. SUPPLEMENTARY INFORMATION: Title: 30 CFR 250, Subpart C, Pollution Prevention and Control. OMB...

  14. Mobile Virtual Network Operator Information Systems for Increased Sustainability in Utilities

    DEFF Research Database (Denmark)

    Joensen, Hallur Leivsgard; Tambo, Torben

    2011-01-01

    sales from efficiency of business processes, underlying information systems, and the ability to make the link from consumption to cost visual and transparent to consumers. The conclusion is that the energy sector should look into other sectors and learn from information systems which ease up business......, sales and buying processes are separated from physical networks and energy production. This study aims to characterise and evaluate information systems supporting the transformation of the free market-orientation of energy and provision of utilities in a cross-sectorial proposition known as Mobile...... Virtual Network Operator (MVNO). Emphasis is particularly on standardised information systems for automatically linking consumers, sellers and integration of network infrastructure actors. The method used is a feasibility study assessing business and information processes of a forthcoming utilities market...

  15. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  16. Networked Information: Finding What's Out There.

    Science.gov (United States)

    Lynch, Clifford A.

    1997-01-01

    Clifford A. Lynch, developer of MELVYL and former director of library automation at the University of California, is now executive director for the Coalition for Networked Information (CNI). This interview discusses Lynch's background, MELVYL, the Web and the role of libraries and librarians, community and collaborative filtering, the library of…

  17. Smart social adaptation prevents catastrophic ecological regime shifts in networks of myopic harvesters

    Science.gov (United States)

    Donges, Jonathan; Lucht, Wolfgang; Wiedermann, Marc; Heitzig, Jobst; Kurths, Jürgen

    2015-04-01

    In the anthropocene, the rise of global social and economic networks with ever increasing connectivity and speed of interactions, e.g., the internet or global financial markets, is a key challenge for sustainable development. The spread of opinions, values or technologies on these networks, in conjunction with the coevolution of the network structures themselves, underlies nexuses of current concern such as anthropogenic climate change, biodiversity loss or global land use change. To isolate and quantitatively study the effects and implications of network dynamics for sustainable development, we propose an agent-based model of information flow on adaptive networks between myopic harvesters that exploit private renewable resources. In this conceptual model of a network of socio-ecological systems, information on management practices flows between agents via boundedly rational imitation depending on the state of the resource stocks involved in an interaction. Agents can also adapt the structure of their social network locally by preferentially connecting to culturally similar agents with identical management practices and, at the same time, disconnecting from culturally dissimilar agents. Investigating in detail the statistical mechanics of this model, we find that an increasing rate of information flow through faster imitation dynamics or growing density of network connectivity leads to a marked increase in the likelihood of environmental resource collapse. However, we show that an optimal rate of social network adaptation can mitigate this negative effect without loss of social cohesion through network fragmentation. Our results highlight that seemingly immaterial network dynamics of spreading opinions or values can be of large relevance for the sustainable management of socio-ecological systems and suggest smartly conservative network adaptation as a strategy for mitigating environmental collapse. Hence, facing the great acceleration, these network dynamics should

  18. Information Extraction with Character-level Neural Networks and Free Noisy Supervision

    OpenAIRE

    Meerkamp, Philipp; Zhou, Zhengyi

    2016-01-01

    We present an architecture for information extraction from text that augments an existing parser with a character-level neural network. The network is trained using a measure of consistency of extracted data with existing databases as a form of noisy supervision. Our architecture combines the ability of constraint-based information extraction systems to easily incorporate domain knowledge and constraints with the ability of deep neural networks to leverage large amounts of data to learn compl...

  19. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  20. Establishing HIV treatment as prevention in the HIV Prevention Trials Network 052 randomized trial: an ethical odyssey.

    Science.gov (United States)

    Cohen, Myron S; McCauley, Marybeth; Sugarman, Jeremy

    2012-06-01

    Obtaining the definitive data necessary to determine the safety and efficacy of using antiretroviral treatment (ART) to reduce the sexual transmission of HIV in heterosexual couples encountered an array of ethical challenges that threatened to compromise HIV Prevention Trials Network (HPTN) 052, the multinational clinical trial addressing this issue that has profound public health implications. To describe and analyze the major ethical challenges faced in HPTN 052. The ethical issues and modifications of HPTN 052 in response to these issues were cataloged by the principal investigator, the lead coordinator, and the ethicist working on the trial. The major ethical issues that were unique to the trial were then described and analyzed in light of the published literature as well as guidances and policies. The ethical challenges that must be addressed in many clinical trials, such as those related to obtaining informed consent and making provisions for ancillary care, are not described. When HPTN 052 was being designed, ethical questions emerged related to the relevance of the research question itself given data from observational research and a range of beliefs about the appropriate means of preventing and treating HIV infection and AIDS. Furthermore, ethical challenges were faced regarding site selection since there was a scientific need to conduct the research in settings where HIV incidence was high, but alternatives to study participation should be available. As in most HIV-prevention research, ethical questions surrounded the determination of the appropriate prevention package for all of those enrolled. During the course of the trial, guidance documents and policies emerged that were of direct relevance to the research questions, calling for a balancing of concerns for the research subjects and trial integrity. When the study results were made public, there was a need to ensure access to the treatment shown to be effective that in some cases differed from the

  1. Social Circles Detection from Ego Network and Profile Information

    Science.gov (United States)

    2014-12-19

    way of organizing contacts in personal networks . They are therefore currently implemented in the major social net- working systems, such as Facebook ...0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network ...structural network information but also the contents of social interactions, with the aim to detect copying communities. The views, opinions and/or findings

  2. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  3. Uranium mining and metallurgy library information service under the network environment

    International Nuclear Information System (INIS)

    Tang Lilei

    2012-01-01

    This paper analyzes the effect of the network environment on the uranium mining and metallurgy of the information service. Introduces some measures such as strengthening professional characteristic literature resources construction, changing the service mode, building up information navigation, deepening service, meet the individual needs of users, raising librarian's quality, promoting the co-construction and sharing of library information resources, and puts forward the development idea of uranium mining and metallurgy library information service under the network environment. (author)

  4. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  5. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  6. An experimental study of the Online Information Paradox: Does en-route information improve road network performance?

    Directory of Open Access Journals (Sweden)

    Kasun P Wijayaratna

    Full Text Available This study investigates the empirical presence of a theoretical transportation paradox, defined as the "Online Information Paradox" (OIP. The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE solution (no information scenario and the other being the User Equilibrium with Recourse (UER solution (with information scenario. An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network.

  7. The enhancement of security in healthcare information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  8. Asia Pacific Mangrove Information Network (APMIN): A conceptual model

    Digital Repository Service at National Institute of Oceanography (India)

    Chavan, V.S.; Jagtap, T.G.; Untawale, A.G.

    Asia Pacific Mangrove Information Network (APMIN), its structure and scope, is discussed in this paper. Establishment of National Mangrove Information Centers (NMIC) in 20 Asia-Pacific countries, would contribute towards development of databases...

  9. Experiences with using information and communication technology to build a multi-municipal support network for informal carers.

    Science.gov (United States)

    Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth

    2013-09-01

    This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.

  10. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  11. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  12. SDN-enabled dynamic WDM networks to address routing information inaccuracy

    CSIR Research Space (South Africa)

    Ravhuanzwo, Lusani

    2016-11-01

    Full Text Available Large dynamic wavelength-division multiplexed (WDM) networks based on the distributed control mechanism are susceptible to routing information inaccuracies. Factors such as non-negligible propagation delays, infrequent network state updates...

  13. Dynamical interplay between awareness and epidemic spreading in multiplex networks

    OpenAIRE

    Granell, Clara; Gomez, Sergio; Arenas, Alex

    2013-01-01

    We present the analysis of the interrelation between two processes accounting for the spreading of an epidemics, and the information awareness to prevent its infection, on top of multiplex networks. This scenario is representative of an epidemic process spreading on a network of persistent real contacts, and a cyclic information awareness process diffusing in the network of virtual social contacts between the same individuals. The topology corresponds to a multiplex network where two diffusiv...

  14. Information processing in the transcriptional regulatory network of yeast: Functional robustness

    Directory of Open Access Journals (Sweden)

    Dehmer Matthias

    2009-03-01

    Full Text Available Abstract Background Gene networks are considered to represent various aspects of molecular biological systems meaningfully because they naturally provide a systems perspective of molecular interactions. In this respect, the functional understanding of the transcriptional regulatory network is considered as key to elucidate the functional organization of an organism. Results In this paper we study the functional robustness of the transcriptional regulatory network of S. cerevisiae. We model the information processing in the network as a first order Markov chain and study the influence of single gene perturbations on the global, asymptotic communication among genes. Modification in the communication is measured by an information theoretic measure allowing to predict genes that are 'fragile' with respect to single gene knockouts. Our results demonstrate that the predicted set of fragile genes contains a statistically significant enrichment of so called essential genes that are experimentally found to be necessary to ensure vital yeast. Further, a structural analysis of the transcriptional regulatory network reveals that there are significant differences between fragile genes, hub genes and genes with a high betweenness centrality value. Conclusion Our study does not only demonstrate that a combination of graph theoretical, information theoretical and statistical methods leads to meaningful biological results but also that such methods allow to study information processing in gene networks instead of just their structural properties.

  15. Improved Vehicular Information Network Architecture Using Fuzzy Based Named Data NetworkingNDN

    Directory of Open Access Journals (Sweden)

    Kanwalpreet Kaur

    2015-08-01

    Full Text Available Vehicular Ad-hoc System VANETs is really a component with smart transport systems. It has ability to prevent accidents and the road congestion issues on highways but it suffers from the accomplishment and scalability issues. To handle these difficulties from the Inter Vehicular Communication IVC we apply Name Data Networking NDN. All though in NDN the users are only concerned about necessary data and give no attention on the number of locations from where the data is coming. The NDN layout is usually much more worthy for IVC circumstance getting the ordered material labeling design as well as amp64258exible material retrieval. In this report we propose vehicular network dependent on fuzzy membership function which offers the fundamental NDN style to improve support location dependent forwarding content aggregation and distributed mobility management. This paper finally winds up the several boundaries regarding earlier approaches.

  16. Chaotic, informational and synchronous behaviour of multiplex networks

    Science.gov (United States)

    Baptista, M. S.; Szmoski, R. M.; Pereira, R. F.; Pinto, S. E. De Souza

    2016-03-01

    The understanding of the relationship between topology and behaviour in interconnected networks would allow to charac- terise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives complex behaviour: chaos, information, and weak or strong synchronisation; in multiplex net- works with constant Jacobian. We also study this relationship numerically in multiplex networks of Hindmarsh-Rose neurons. Whereas behaviour in the analytically tractable network is a direct but not trivial consequence of the spectra of eigenvalues of the Laplacian matrix, where behaviour may strongly depend on the break of symmetry in the topology of interconnections, in Hindmarsh-Rose neural networks the nonlinear nature of the chemical synapses breaks the elegant mathematical connec- tion between the spectra of eigenvalues of the Laplacian matrix and the behaviour of the network, creating networks whose behaviour strongly depends on the nature (chemical or electrical) of the inter synapses.

  17. On the Use of Information Quality in Stochastic Networked Control Systems

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Madsen, Jacob Theilgaard; Rasmussen, Jakob Gulddahl

    2017-01-01

    Networked control is challenged by stochastic delays that are caused by the communication networks as well as by the approach taken to exchange information about system state and set-points. Combined with stochastic changing information, there is a probability that information at the controller....... This is first analyzed in simulation models for the example system of a wind-farm controller. As simulation analysis is subject to stochastic variability and requires large computational effort, the paper develops a Markov model of a simplified networked control system and uses numerical results from the Markov...... is not matching the true system observation, which we call mismatch probability (mmPr). The hypothesis is that the optimization of certain parameters of networked control systems targeting mmPr is equivalent to the optimization targeting control performance, while the former is practically much easier to conduct...

  18. Can social networking be used to promote engagement in child maltreatment prevention programs? Two pilot studies.

    Science.gov (United States)

    Edwards-Gaura, Anna; Whitaker, Daniel; Self-Brown, Shannon

    2014-08-01

    Child maltreatment is one of the United States' most significant public health problems. In efforts to prevent maltreatment experts recommend use of Behavioral Parent Training Programs (BPTs), which focus on teaching skills that will replace and prevent maltreating behavior. While there is research to support the effectiveness of BPTs in maltreatment prevention, the reach of such programs is still limited by several barriers, including poor retention of families in services. Recently, new technologies have emerged that offer innovative opportunities to improve family engagement. These technologies include smartphones and social networking; however, very little is known about the potential of these to aid in maltreatment prevention. The primary goal of this study was to conduct 2 pilot exploratory projects. The first project administered a survey to parents and providers to gather data about at-risk parents' use of smartphones and online social networking technologies. The second project tested a social networking-enhanced brief parenting program with 3 intervention participants and evaluated parental responses. Seventy-five percent of parents surveyed reported owning a computer that worked. Eighty-nine percent of parents reported that they had reliable Internet access at home, and 67% said they used the Internet daily. Three parents participated in the intervention with all reporting improvement in parent-child interaction skills and a positive experience participating in the social networking-enhanced SafeCare components. In general, findings suggest that smartphones, social networking, and Facebook, in particular, are now being used by individuals who show risk factors for maltreatment. Further, the majority of parents surveyed in this study said that they like Facebook, and all parents surveyed said that they use Facebook and have a Facebook account. As well, all saw it as a potentially beneficial supplement for future parents enrolling in parenting programs.

  19. Can Social Networking Be Used to Promote Engagement in Child Maltreatment Prevention Programs? Two Pilot Studies

    Directory of Open Access Journals (Sweden)

    Anna Edwards-Gaura

    2014-08-01

    Full Text Available Introduction: Child maltreatment is one of the United States’ most significant public health problems. In efforts to prevent maltreatment experts recommend use of Behavioral Parent Training Programs (BPTs, which focus on teaching skills that will replace and prevent maltreating behavior. While there is research to support the effectiveness of BPTs in maltreatment prevention, the reach of such programs is still limited by several barriers, including poor retention of families in services. Recently, new technologies have emerged that offer innovative opportunities to improve family engagement. These technologies include smartphones and social networking; however, very little is known about the potential of these to aid in maltreatment prevention. The primary goal of this study was to conduct 2 pilot exploratory projects. Methods: The first project administered a survey to parents and providers to gather data about at-risk parents’ use of smartphones and online social networking technologies. The second project tested a social networking-enhanced brief parenting program with 3 intervention participants and evaluated parental responses. Results: Seventy-five percent of parents surveyed reported owning a computer that worked. Eighty-nine percent of parents reported that they had reliable Internet access at home, and 67% said they used the Internet daily. Three parents participated in the intervention with all reporting improvement in parent-child interaction skills and a positive experience participating in the social networking-enhanced SafeCare components. Conclusion: In general, findings suggest that smartphones, social networking, and Facebook, in particular, are now being used by individuals who show risk factors formal treatment. Further, the majority of parents surveyed in this study said that they like Facebook, and all parents surveyed said that they use Facebook and have a Facebook account. As well, all saw it as a potentially

  20. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  1. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  2. Social adaptation in multi-agent model of linguistic categorization is affected by network information flow.

    Science.gov (United States)

    Zubek, Julian; Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz

    2017-01-01

    This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.

  3. [Co-author and keyword networks and their clustering appearance in preventive medicine fields in Korea: analysis of papers in the Journal of Preventive Medicine and Public Health, 1991~2006].

    Science.gov (United States)

    Jung, Minsoo; Chung, Dongjun

    2008-01-01

    This study evaluated knowledge structure and its effect factor by analysis of co-author and keyword networks in Korea's preventive medicine sector. The data was extracted from 873 papers listed in the Journal of Preventive Medicine and Public Health, and was transformed into a co-author and keyword matrix where the existence of a 'link' was judged by impact factors calculated by the weight value of the role and rate of author participation. Research achievement was dependent upon the author's status and networking index, as analyzed by neighborhood degree, multidimensional scaling, correspondence analysis, and multiple regression. Co-author networks developed as randomness network in the center of a few high-productivity researchers. In particular, closeness centrality was more developed than degree centrality. Also, power law distribution was discovered in impact factor and research productivity by college affiliation. In multiple regression, the effect of the author's role was significant in both the impact factor calculated by the participatory rate and the number of listed articles. However, the number of listed articles varied by sex. This study shows that the small world phenomenon exists in co-author and keyword networks in a journal, as in citation networks. However, the differentiation of knowledge structure in the field of preventive medicine was relatively restricted by specialization.

  4. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation.

    Science.gov (United States)

    Hu, Hongzhi; Mao, Huajuan; Hu, Xiaohua; Hu, Feng; Sun, Xuemin; Jing, Zaiping; Duan, Yunsuo

    2015-01-01

    Due to the extensive social influence, public health emergency has attracted great attention in today's society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event's social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution) provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback) based on ACP simulation system which was successfully applied to the analysis of A (H1N1) Flu emergency.

  5. Iterative Neighbour-Information Gathering for Ranking Nodes in Complex Networks

    Science.gov (United States)

    Xu, Shuang; Wang, Pei; Lü, Jinhu

    2017-01-01

    Designing node influence ranking algorithms can provide insights into network dynamics, functions and structures. Increasingly evidences reveal that node’s spreading ability largely depends on its neighbours. We introduce an iterative neighbourinformation gathering (Ing) process with three parameters, including a transformation matrix, a priori information and an iteration time. The Ing process iteratively combines priori information from neighbours via the transformation matrix, and iteratively assigns an Ing score to each node to evaluate its influence. The algorithm appropriates for any types of networks, and includes some traditional centralities as special cases, such as degree, semi-local, LeaderRank. The Ing process converges in strongly connected networks with speed relying on the first two largest eigenvalues of the transformation matrix. Interestingly, the eigenvector centrality corresponds to a limit case of the algorithm. By comparing with eight renowned centralities, simulations of susceptible-infected-removed (SIR) model on real-world networks reveal that the Ing can offer more exact rankings, even without a priori information. We also observe that an optimal iteration time is always in existence to realize best characterizing of node influence. The proposed algorithms bridge the gaps among some existing measures, and may have potential applications in infectious disease control, designing of optimal information spreading strategies.

  6. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  7. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  8. Oceanographic data and information network in the Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  9. Modeling information diffusion in time-varying community networks

    Science.gov (United States)

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  10. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  11. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  12. The Role of Globe Innovation Networks in Development of Information Society

    Directory of Open Access Journals (Sweden)

    Anna T. Girenko

    2016-12-01

    Full Text Available The author explores the evolution of the concept of the information society. There is identified the role of the formation of global innovation networks. The formation of global innovation networks is carried out through coordination and cooperation of scientific and technological activities on the basis of bilateral and multilateral relations, information exchange, scientific and technical services areas of development, implementation of scientific-technical activities in the framework of the international organizations, as well as through the development of national and regional innovation networks.

  13. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa

    2012-01-01

    This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...

  14. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-01-01

    This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...

  15. Instrumentation for Scientific Computing in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics.

    Science.gov (United States)

    1987-10-01

    include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen

  16. Information Decomposition in Multivariate Systems: Definitions, Implementation and Application to Cardiovascular Networks

    Directory of Open Access Journals (Sweden)

    Luca Faes

    2016-12-01

    Full Text Available The continuously growing framework of information dynamics encompasses a set of tools, rooted in information theory and statistical physics, which allow to quantify different aspects of the statistical structure of multivariate processes reflecting the temporal dynamics of complex networks. Building on the most recent developments in this field, this work designs a complete approach to dissect the information carried by the target of a network of multiple interacting systems into the new information produced by the system, the information stored in the system, and the information transferred to it from the other systems; information storage and transfer are then further decomposed into amounts eliciting the specific contribution of assigned source systems to the target dynamics, and amounts reflecting information modification through the balance between redundant and synergetic interaction between systems. These decompositions are formulated quantifying information either as the variance or as the entropy of the investigated processes, and their exact computation for the case of linear Gaussian processes is presented. The theoretical properties of the resulting measures are first investigated in simulations of vector autoregressive processes. Then, the measures are applied to assess information dynamics in cardiovascular networks from the variability series of heart period, systolic arterial pressure and respiratory activity measured in healthy subjects during supine rest, orthostatic stress, and mental stress. Our results document the importance of combining the assessment of information storage, transfer and modification to investigate common and complementary aspects of network dynamics; suggest the higher specificity to alterations in the network properties of the measures derived from the decompositions; and indicate that measures of information transfer and information modification are better assessed, respectively, through entropy

  17. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  18. Preventing Out-of-Sequence for Multicast Input-Queued Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This paper proposes an out-of-sequence (OOS) preventative cell dispatching algorithm, the multicast flow-based round robin (MFRR), for multicast input-queued space-memory-memory (IQ-SMM) Clos-network architecture. Independently treating each incoming cell, such as the desynchronized static round...

  19. Gene regulatory network inference by point-based Gaussian approximation filters incorporating the prior information.

    Science.gov (United States)

    Jia, Bin; Wang, Xiaodong

    2013-12-17

    : The extended Kalman filter (EKF) has been applied to inferring gene regulatory networks. However, it is well known that the EKF becomes less accurate when the system exhibits high nonlinearity. In addition, certain prior information about the gene regulatory network exists in practice, and no systematic approach has been developed to incorporate such prior information into the Kalman-type filter for inferring the structure of the gene regulatory network. In this paper, an inference framework based on point-based Gaussian approximation filters that can exploit the prior information is developed to solve the gene regulatory network inference problem. Different point-based Gaussian approximation filters, including the unscented Kalman filter (UKF), the third-degree cubature Kalman filter (CKF3), and the fifth-degree cubature Kalman filter (CKF5) are employed. Several types of network prior information, including the existing network structure information, sparsity assumption, and the range constraint of parameters, are considered, and the corresponding filters incorporating the prior information are developed. Experiments on a synthetic network of eight genes and the yeast protein synthesis network of five genes are carried out to demonstrate the performance of the proposed framework. The results show that the proposed methods provide more accurate inference results than existing methods, such as the EKF and the traditional UKF.

  20. Information processing and routing in wireless sensor networks

    CERN Document Server

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  1. Introduction to spiking neural networks: Information processing, learning and applications.

    Science.gov (United States)

    Ponulak, Filip; Kasinski, Andrzej

    2011-01-01

    The concept that neural information is encoded in the firing rate of neurons has been the dominant paradigm in neurobiology for many years. This paradigm has also been adopted by the theory of artificial neural networks. Recent physiological experiments demonstrate, however, that in many parts of the nervous system, neural code is founded on the timing of individual action potentials. This finding has given rise to the emergence of a new class of neural models, called spiking neural networks. In this paper we summarize basic properties of spiking neurons and spiking networks. Our focus is, specifically, on models of spike-based information coding, synaptic plasticity and learning. We also survey real-life applications of spiking models. The paper is meant to be an introduction to spiking neural networks for scientists from various disciplines interested in spike-based neural processing.

  2. Network security: a survey of modern approaches

    International Nuclear Information System (INIS)

    Zafar, M.F.; Naheed, F.; Ahmad, Z.; Anwar, M.M.

    2008-01-01

    Security is an essential element of information technology (IT) infrastructure and applications. Concerns about security of networks and information systems have been growing along with the rapid increase in the number of network users and the value of their transactions. The hasty security threats have driven the development of security products known as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and protect the network, server and desktop infrastructure ahead of the threat. Authentication and signing techniques are used to prevent integrity threats. Users, devices, and applications should always be authenticated and authorized before they are allowed to access networking resources. Though a lot of information is available on the internet about IDS and IPS but it all is spread on so many sites and one has to spend a considerable part of his precious time to search it. In this regard a thorough survey has been conducted to facilitate and assist the researchers. The issues and defend challenges in fighting with cyber attacks have been discussed. A comparison of the categories of network security technologies has been presented. In this paper an effort has been made to gather the scattered information and present it at one place. This survey will provide best available up-to-date advancement in the area. A brief description of open source IPS has also been presented. (author)

  3. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  4. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  5. 76 FR 81959 - Notice of Proposed Information Collection: Comment Request; Homelessness Prevention Study Site...

    Science.gov (United States)

    2011-12-29

    ... Information Collection: Comment Request; Homelessness Prevention Study Site Visits AGENCY: Office of the Chief.... This Notice also lists the following information: Title of Proposal: Homelessness Prevention Study Site... of the Paperwork Reduction Act requirements associated with HUD's Homelessness Prevention Study Site...

  6. The informal networks in food procurement by older people - A cross European comparison

    DEFF Research Database (Denmark)

    Turrini, Aida; D'Addezio, Laura; Maccati, Fabrizia

    2010-01-01

    .e., alone vs. with others) in FSW was revealed. Informal social networks may play an important role in public health and welfare policies, particularly given the increase in this demographic group. Assistance with grocery shopping and the availability of trained personnel could widen informal networks......, and effective informal networks may be an important supportive service for older adults. The comparison across countries highlighted relationships between food procurement capabilities and social networks. These findings may be used to develop resources to better meet the nutritional needs of older adults.......Healthy dietary profiles contribute to successful aging, and dietary intake is dependent upon food procurement capabilities. Both formal and informal social networks can contribute to grocery shopping capabilities and methods of food procurement. This investigation explores the role of informal...

  7. Generation of a superposition of odd photon number states for quantum information networks

    DEFF Research Database (Denmark)

    Neergaard-Nielsen, Jonas Schou; Nielsen, B.; Hettich, C.

    2006-01-01

    Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August......Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August...

  8. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Directory of Open Access Journals (Sweden)

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  9. Future view of electric power information processing techniques. Architecture techniques for power supply communication network

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Keisuke

    1988-06-20

    Present situations of a power supply communication are described, and the future trend of a power supply information network is reviewed. For the improvement of a transmission efficiency and quality and a cost benefit for the power supply communication, the introduction of digital networks has been promoted. As for a protection information network, since there is the difference between a required communication quality of system protection information and that of power supply operation information, the individual digital network configuration is expected, in addition, the increasing of image information transmission for monitoring is also estimated. As for a business information network, the construction of a broad-band switched network is expected with increasing of image transmission needs such as a television meeting. Furthermore, the expansion to a power supply ISDN which is possible to connect between a telephone, facsimile and data terminal, to exchange various media and to connect between networks is expected with higher communication services in the protection and business network. However, for its practical use, the standardization of various interfaces will become essential. (3 figs, 1 tab)

  10. The use of network theory to model disparate ship design information

    Science.gov (United States)

    Rigterink, Douglas; Piks, Rebecca; Singer, David J.

    2014-06-01

    This paper introduces the use of network theory to model and analyze disparate ship design information. This work will focus on a ship's distributed systems and their intra- and intersystem structures and interactions. The three system to be analyzed are: a passageway system, an electrical system, and a fire fighting system. These systems will be analyzed individually using common network metrics to glean information regarding their structures and attributes. The systems will also be subjected to community detection algorithms both separately and as a multiplex network to compare their similarities, differences, and interactions. Network theory will be shown to be useful in the early design stage due to its simplicity and ability to model any shipboard system.

  11. Phenotypic assortment in wild primate networks: implications for the dissemination of information.

    Science.gov (United States)

    Carter, Alecia J; Lee, Alexander E G; Marshall, Harry H; Ticó, Miquel Torrents; Cowlishaw, Guy

    2015-05-01

    Individuals' access to social information can depend on their social network. Homophily-a preference to associate with similar phenotypes-may cause assortment within social networks that could preclude information transfer from individuals who generate information to those who would benefit from acquiring it. Thus, understanding phenotypic assortment may lead to a greater understanding of the factors that could limit the transfer of information between individuals. We tested whether there was assortment in wild baboon (Papio ursinus) networks, using data collected from two troops over 6 years for six phenotypic traits-boldness, age, dominance rank, sex and the propensity to generate/exploit information-using two methods for defining a connection between individuals-time spent in proximity and grooming. Our analysis indicated that assortment was more common in grooming than proximity networks. In general, there was homophily for boldness, age, rank and the propensity to both generate and exploit information, but heterophily for sex. However, there was considerable variability both between troops and years. The patterns of homophily we observed for these phenotypes may impede information transfer between them. However, the inconsistency in the strength of assortment between troops and years suggests that the limitations to information flow may be quite variable.

  12. Structural Network Position and Performance of Health Leaders Within an HIV Prevention Trial.

    Science.gov (United States)

    Mulawa, Marta I; Yamanis, Thespina J; Kajula, Lusajo J; Balvanz, Peter; Maman, Suzanne

    2018-04-28

    The effectiveness of peer leaders in promoting health may depend on the position they occupy within their social networks. Using sociocentric (whole network) and behavioral data from the intervention arm of a cluster-randomized HIV prevention trial in Dar es Salaam, Tanzania, we used generalized linear models with standardized predictors to examine the association between heath leaders' baseline structural network position (i.e., in-degree and betweenness centrality) and their 12-month self-reported (1) confidence in educating network members about HIV and gender-based violence (GBV) and (2) number of past-week conversations about HIV and GBV. As in-degree centrality increased, leaders reported fewer HIV-related conversations. As betweenness centrality increased, leaders reported greater number of conversations about GBV. Network position was not significantly associated with confidence in discussing either topic. Our results suggest that peer leaders who occupy spaces between sub-groups of network members may be more effective in engaging their peers in sensitive or controversial topics like GBV than more popular peer leaders.

  13. Information theory and signal transduction systems: from molecular information processing to network inference.

    Science.gov (United States)

    Mc Mahon, Siobhan S; Sim, Aaron; Filippi, Sarah; Johnson, Robert; Liepe, Juliane; Smith, Dominic; Stumpf, Michael P H

    2014-11-01

    Sensing and responding to the environment are two essential functions that all biological organisms need to master for survival and successful reproduction. Developmental processes are marshalled by a diverse set of signalling and control systems, ranging from systems with simple chemical inputs and outputs to complex molecular and cellular networks with non-linear dynamics. Information theory provides a powerful and convenient framework in which such systems can be studied; but it also provides the means to reconstruct the structure and dynamics of molecular interaction networks underlying physiological and developmental processes. Here we supply a brief description of its basic concepts and introduce some useful tools for systems and developmental biologists. Along with a brief but thorough theoretical primer, we demonstrate the wide applicability and biological application-specific nuances by way of different illustrative vignettes. In particular, we focus on the characterisation of biological information processing efficiency, examining cell-fate decision making processes, gene regulatory network reconstruction, and efficient signal transduction experimental design. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Differences among college women for breast cancer prevention acquired information-seeking, desired apps and texts, and daughter-initiated information to mothers.

    Science.gov (United States)

    Kratzke, Cynthia; Amatya, Anup; Vilchis, Hugo

    2014-04-01

    The purpose of this study was to examine among college women acquired breast cancer prevention information-seeking, desired apps and texts, and information given to mothers. Using a cross-sectional study, a survey was administered to college women at a southwestern university. College women (n = 546) used the Internet (44 %) for active breast cancer prevention information-seeking and used the Internet (74 %), magazines (69 %), and television (59 %) for passive information receipt. Over half of the participants desired breast cancer prevention apps (54 %) and texts (51 %). Logistic regression analyses revealed predictors for interest to receive apps were ethnicity (Hispanic), lower self-efficacy, actively seeking online information, and older age and predictors for interest to receive texts were lower self-efficacy and higher university level. Eighteen percent of college women (n = 99) reported giving information to mothers and reported in an open-ended item the types of information given to mothers. Predictors for giving information to mothers were actively and passively seeking online information, breast self-exam practice, and higher university level. Screenings were the most frequent types of information given to mothers. Breast cancer prevention information using apps, texts, or Internet and daughter-initiated information for mothers should be considered in health promotion targeting college students or young women in communities. Future research is needed to examine the quality of apps, texts, and online information and cultural differences for breast cancer prevention sources.

  15. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  16. Information-Theoretic Performance Analysis of Sensor Networks via Markov Modeling of Time Series Data.

    Science.gov (United States)

    Li, Yue; Jha, Devesh K; Ray, Asok; Wettergren, Thomas A; Yue Li; Jha, Devesh K; Ray, Asok; Wettergren, Thomas A; Wettergren, Thomas A; Li, Yue; Ray, Asok; Jha, Devesh K

    2018-06-01

    This paper presents information-theoretic performance analysis of passive sensor networks for detection of moving targets. The proposed method falls largely under the category of data-level information fusion in sensor networks. To this end, a measure of information contribution for sensors is formulated in a symbolic dynamics framework. The network information state is approximately represented as the largest principal component of the time series collected across the network. To quantify each sensor's contribution for generation of the information content, Markov machine models as well as x-Markov (pronounced as cross-Markov) machine models, conditioned on the network information state, are constructed; the difference between the conditional entropies of these machines is then treated as an approximate measure of information contribution by the respective sensors. The x-Markov models represent the conditional temporal statistics given the network information state. The proposed method has been validated on experimental data collected from a local area network of passive sensors for target detection, where the statistical characteristics of environmental disturbances are similar to those of the target signal in the sense of time scale and texture. A distinctive feature of the proposed algorithm is that the network decisions are independent of the behavior and identity of the individual sensors, which is desirable from computational perspectives. Results are presented to demonstrate the proposed method's efficacy to correctly identify the presence of a target with very low false-alarm rates. The performance of the underlying algorithm is compared with that of a recent data-driven, feature-level information fusion algorithm. It is shown that the proposed algorithm outperforms the other algorithm.

  17. The integration of weighted gene association networks based on information entropy.

    Science.gov (United States)

    Yang, Fan; Wu, Duzhi; Lin, Limei; Yang, Jian; Yang, Tinghong; Zhao, Jing

    2017-01-01

    Constructing genome scale weighted gene association networks (WGAN) from multiple data sources is one of research hot spots in systems biology. In this paper, we employ information entropy to describe the uncertain degree of gene-gene links and propose a strategy for data integration of weighted networks. We use this method to integrate four existing human weighted gene association networks and construct a much larger WGAN, which includes richer biology information while still keeps high functional relevance between linked gene pairs. The new WGAN shows satisfactory performance in disease gene prediction, which suggests the reliability of our integration strategy. Compared with existing integration methods, our method takes the advantage of the inherent characteristics of the component networks and pays less attention to the biology background of the data. It can make full use of existing biological networks with low computational effort.

  18. Why common carrier and network neutrality principles apply to the Nationwide Health Information Network (NWHIN).

    Science.gov (United States)

    Gaynor, Mark; Lenert, Leslie; Wilson, Kristin D; Bradner, Scott

    2014-01-01

    The Office of the National Coordinator will be defining the architecture of the Nationwide Health Information Network (NWHIN) together with the proposed HealtheWay public/private partnership as a development and funding strategy. There are a number of open questions--for example, what is the best way to realize the benefits of health information exchange? How valuable are regional health information organizations in comparison with a more direct approach? What is the role of the carriers in delivering this service? The NWHIN is to exist for the public good, and thus shares many traits of the common law notion of 'common carriage' or 'public calling,' the modern term for which is network neutrality. Recent policy debates in Congress and resulting potential regulation have implications for key stakeholders within healthcare that use or provide services, and for those who exchange information. To date, there has been little policy debate or discussion about the implications of a neutral NWHIN. This paper frames the discussion for future policy debate in healthcare by providing a brief education and summary of the modern version of common carriage, of the key stakeholder positions in healthcare, and of the potential implications of the network neutrality debate within healthcare.

  19. Pollution-Prevention Information Campaigns for Small Businesses: An Audience Analysis.

    Science.gov (United States)

    Boiarsky, Greg; Long, Marilee; Zimmerman, Donald E.

    1999-01-01

    Explores the results of a random phone survey of 300 small businesses in order to develop a pollution-prevention campaign. Results indicate that respondents understood the concept of pollution prevention and were taking steps to reduce their part in it. Businesses preferred to obtain their information from suppliers, publications, and other…

  20. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation

    Directory of Open Access Journals (Sweden)

    Hongzhi Hu

    2015-01-01

    Full Text Available Due to the extensive social influence, public health emergency has attracted great attention in today’s society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event’s social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback based on ACP simulation system which was successfully applied to the analysis of A (H1N1 Flu emergency.

  1. Social networks and environmental outcomes.

    Science.gov (United States)

    Barnes, Michele L; Lynham, John; Kalberg, Kolter; Leung, PingSun

    2016-06-07

    Social networks can profoundly affect human behavior, which is the primary force driving environmental change. However, empirical evidence linking microlevel social interactions to large-scale environmental outcomes has remained scarce. Here, we leverage comprehensive data on information-sharing networks among large-scale commercial tuna fishers to examine how social networks relate to shark bycatch, a global environmental issue. We demonstrate that the tendency for fishers to primarily share information within their ethnic group creates segregated networks that are strongly correlated with shark bycatch. However, some fishers share information across ethnic lines, and examinations of their bycatch rates show that network contacts are more strongly related to fishing behaviors than ethnicity. Our findings indicate that social networks are tied to actions that can directly impact marine ecosystems, and that biases toward within-group ties may impede the diffusion of sustainable behaviors. Importantly, our analysis suggests that enhanced communication channels across segregated fisher groups could have prevented the incidental catch of over 46,000 sharks between 2008 and 2012 in a single commercial fishery.

  2. In-House Communication Support System Based on the Information Propagation Model Utilizes Social Network

    Science.gov (United States)

    Takeuchi, Susumu; Teranishi, Yuuichi; Harumoto, Kaname; Shimojo, Shinji

    Almost all companies are now utilizing computer networks to support speedier and more effective in-house information-sharing and communication. However, existing systems are designed to support communications only within the same department. Therefore, in our research, we propose an in-house communication support system which is based on the “Information Propagation Model (IPM).” The IPM is proposed to realize word-of-mouth communication in a social network, and to support information-sharing on the network. By applying the system in a real company, we found that information could be exchanged between different and unrelated departments, and such exchanges of information could help to build new relationships between the users who are apart on the social network.

  3. Optimization of rainfall networks using information entropy and temporal variability analysis

    Science.gov (United States)

    Wang, Wenqi; Wang, Dong; Singh, Vijay P.; Wang, Yuankun; Wu, Jichun; Wang, Lachun; Zou, Xinqing; Liu, Jiufu; Zou, Ying; He, Ruimin

    2018-04-01

    Rainfall networks are the most direct sources of precipitation data and their optimization and evaluation are essential and important. Information entropy can not only represent the uncertainty of rainfall distribution but can also reflect the correlation and information transmission between rainfall stations. Using entropy this study performs optimization of rainfall networks that are of similar size located in two big cities in China, Shanghai (in Yangtze River basin) and Xi'an (in Yellow River basin), with respect to temporal variability analysis. Through an easy-to-implement greedy ranking algorithm based on the criterion called, Maximum Information Minimum Redundancy (MIMR), stations of the networks in the two areas (each area is further divided into two subareas) are ranked during sliding inter-annual series and under different meteorological conditions. It is found that observation series with different starting days affect the ranking, alluding to the temporal variability during network evaluation. We propose a dynamic network evaluation framework for considering temporal variability, which ranks stations under different starting days with a fixed time window (1-year, 2-year, and 5-year). Therefore, we can identify rainfall stations which are temporarily of importance or redundancy and provide some useful suggestions for decision makers. The proposed framework can serve as a supplement for the primary MIMR optimization approach. In addition, during different periods (wet season or dry season) the optimal network from MIMR exhibits differences in entropy values and the optimal network from wet season tended to produce higher entropy values. Differences in spatial distribution of the optimal networks suggest that optimizing the rainfall network for changing meteorological conditions may be more recommended.

  4. Temporal Information Partitioning Networks (TIPNets): Characterizing emergent behavior in complex ecohydrologic systems

    Science.gov (United States)

    Goodwell, Allison; Kumar, Praveen

    2017-04-01

    Within an ecosystem, components of the atmosphere, vegetation, and the root-soil system participate in forcing and feedback reactions at varying time scales and intensities. These interactions constitute a complex network that exhibits behavioral shifts due to perturbations ranging from weather events to long-term drought or land use change. However, it is challenging to characterize this shifting network due to multiple drivers, non-linear interactions, and synchronization due to feedback. To overcome these issues, we implement a process network approach where eco-hydrologic time-series variables are nodes and information measures are links. We introduce a Temporal Information Partition Network (TIPNet) framework in which multivariate lagged mutual information between source and target nodes is decomposed into synergistic, redundant, and unique components, each of which reveals different aspects of interactions within the network. We use methods to compute information measures given as few as 200 data points to construct TIPNets based on 1-minute weather station data (radiation Rg, air temperature Ta, wind speed WS, relative humidity RH, precipitation PPT, and leaf wetness LWet) from Central Illinois during the growing season of 2015. We assess temporal shifts in network behavior for various weather conditions and over the growing season. We find that wet time periods are associated with complex and synergistic network structures compared to dry conditions, and that seasonal network patterns reveal responses to vegetation growth and rainfall trends. This framework is applicable to study a broad range of complex systems composed of multiple interacting components, and may aid process understanding, model improvement, and resilience and vulnerability assessments.

  5. Comparison of pharmacological and non-pharmacological interventions to prevent delirium in critically ill patients: a protocol for a systematic review incorporating network meta-analyses.

    Science.gov (United States)

    Burry, L D; Hutton, B; Guenette, M; Williamson, D; Mehta, S; Egerod, I; Kanji, S; Adhikari, N K; Moher, D; Martin, C M; Rose, L

    2016-09-08

    Delirium is characterized by acute changes in mental status including inattention, disorganized thinking, and altered level of consciousness, and is highly prevalent in critically ill adults. Delirium has adverse consequences for both patients and the healthcare system; however, at this time, no effective treatment exists. The identification of effective prevention strategies is therefore a clinical and research imperative. An important limitation of previous reviews of delirium prevention is that interventions were considered in isolation and only direct evidence was used. Our systematic review will synthesize all existing data using network meta-analysis, a powerful statistical approach that enables synthesis of both direct and indirect evidence. We will search Ovid MEDLINE, CINAHL, Embase, PsycINFO, and Web of Science from 1980 to March 2016. We will search the PROSPERO registry for protocols and the Cochrane Library for published systematic reviews. We will examine reference lists of pertinent reviews and search grey literature and the International Clinical Trials Registry Platform for unpublished studies and ongoing trials. We will include randomized and quasi-randomized trials of critically ill adults evaluating any pharmacological, non-pharmacological, or multi-component intervention for delirium prevention, administered in or prior to (i.e., peri-operatively) transfer to the ICU. Two authors will independently screen search results and extract data from eligible studies. Risk of bias assessments will be completed on all included studies. To inform our network meta-analysis, we will first conduct conventional pair-wise meta-analyses for primary and secondary outcomes using random-effects models. We will generate our network meta-analysis using a Bayesian framework, assuming a common heterogeneity parameter across all comparisons, and accounting for correlations in multi-arm studies. We will perform analyses using WinBUGS software. This systematic review

  6. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  7. Environmental engineering and pollution prevention. European network of excellence and partnership

    International Nuclear Information System (INIS)

    Wotte, J.; Halang, W.A.; Kraemer, B.J.

    1996-01-01

    The primary purpose of the workshop was to present and discuss the main goals, contents, projects, partners, and implications of a proposed non-profit European Research Network, which aims at establishing research nodes at key locations in European NATO and CP countries. All projects are directed to solutions for the heavily polluted 'Black Triangle' Bohemia, Saxony, and Silesia, which was selected as a nucleus for the network because of its geographical location and cross-border environmental problems. Papers are presented under the following subject headings: disarmament; environment; human resources; high technology; and health. They include papers on soil remediation at manufactured gas plants, and power generation in the Czech Republic and its contribution to air pollution prevention in Central Europe

  8. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  9. The use of network theory to model disparate ship design information

    Directory of Open Access Journals (Sweden)

    Douglas Rigterink

    2014-06-01

    Full Text Available This paper introduces the use of network theory to model and analyze disparate ship design information. This work will focus on a ship's distributed systems and their intra- and intersystem structures and interactions. The three system to be analyzed are: a passageway system, an electrical system, and a fire fighting system. These systems will be analyzed individually using common network metrics to glean information regarding their structures and attributes. The systems will also be subjected to community detection algorithms both separately and as a multiplex network to compare their similarities, differences, and interactions. Network theory will be shown to be useful in the early design stage due to its simplicity and ability to model any shipboard system.

  10. The use of network theory to model disparate ship design information

    Directory of Open Access Journals (Sweden)

    Rigterink Douglas

    2014-06-01

    Full Text Available This paper introduces the use of network theory to model and analyze disparate ship design information. This work will focus on a ship’s distributed systems and their intra- and intersystem structures and interactions. The three system to be analyzed are: a passageway system, an electrical system, and a fire fighting system. These systems will be analyzed individually using common network metrics to glean information regarding their structures and attributes. The systems will also be subjected to community detection algorithms both separately and as a multiplex network to compare their similarities, differences, and interactions. Network theory will be shown to be useful in the early design stage due to its simplicity and ability to model any shipboard system.

  11. A comparative study of information diffusion in weblogs and microblogs based on social network analysis

    Institute of Scientific and Technical Information of China (English)

    Yang ZHANG; Wanyang LING

    2012-01-01

    Purpose:This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach:Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science (LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings:Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect.Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks.Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism.Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations:The sample size needs to be increased so that samples are more representative.Errors may exist during the data collection.Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications:This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through

  12. A comparative study of information diffusion in weblogs and microblogs based on social network analysis

    Institute of Scientific and Technical Information of China (English)

    Yang; ZHANG; Wanyang; LING

    2012-01-01

    Purpose:This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach:Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS)as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings:Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect.Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks.Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism.Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations:The sample size needs to be increased so that samples are more representative.Errors may exist during the data collection.Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications:This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social

  13. Social Support Networks: An Underutilized Resource for the Prevention of HIV and other Sexually Transmitted Diseases among Hispanic/Latino Migrants and Immigrants.

    Science.gov (United States)

    Painter, Thomas M

    2018-01-01

    Hispanic/Latino migrants and immigrants are vulnerable to infection by HIV and other sexually transmitted diseases (STDs). Participation in social support networks helps them cope with circumstances in the U.S. Studies of Hispanic/Latino migrants suggest that participation may also be protective against HIV/STD infection. However the studies do not satisfactorily explain how participation leads to protective actions, and recommend externally-induced interventions for HIV/STD prevention rather than incorporating the spontaneously occurring forms of social support they describe. Given the potential protective effects of support networks, a database search was conducted to ascertain the extent to which published HIV/STD prevention interventions for these populations incorporate their support networks. Very few interventions were identified and fewer still incorporate support networks. This commentary calls for research to understand more fully how support networks affect HIV/STD risks among Hispanic/Latino migrants and immigrants and identifies potential benefits of incorporating these networks in HIV/STD prevention for these vulnerable populations.

  14. Advancing Strategies for Agenda Setting by Health Policy Coalitions: A Network Analysis of the Canadian Chronic Disease Prevention Survey.

    Science.gov (United States)

    McGetrick, Jennifer Ann; Raine, Kim D; Wild, T Cameron; Nykiforuk, Candace I J

    2018-06-11

    Health in all policies can address chronic disease morbidity and mortality by increasing population-level physical activity and healthy eating, and reducing tobacco and alcohol use. Both governmental and nongovernmental policy influencers are instrumental for health policy that modifies political, economic, and social environments. Policy influencers are informed and persuaded by coalitions that support or oppose changing the status quo. Empirical research examining policy influencers' contact with coalitions, as a social psychological exposure with health policy outcomes, can benefit from application of health communication theories. Accordingly, we analyzed responses to the 2014 Chronic Disease Prevention Survey for 184 Canadian policy influencers employed in provincial governments, municipalities, large workplaces, school boards, and the media. In addition to contact levels with coalitions, respondents' jurisdiction, organization, and ideology were analyzed as potential moderators. Calculating authority score centrality using network analysis, we determined health policy supporters to be more central in policy influencer networks, and theorized their potential to impact health policy public agenda setting via priming and framing processes. We discuss the implications of our results as presenting opportunities to more effectively promote health policy through priming and framing by coordinating coalitions across risk behaviors to advance a societal imperative for chronic disease prevention.

  15. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  16. A distributed name resolution system in information centric networks

    Science.gov (United States)

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  17. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Science.gov (United States)

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  18. Incorporating prior information into differential network analysis using non-paranormal graphical models.

    Science.gov (United States)

    Zhang, Xiao-Fei; Ou-Yang, Le; Yan, Hong

    2017-08-15

    Understanding how gene regulatory networks change under different cellular states is important for revealing insights into network dynamics. Gaussian graphical models, which assume that the data follow a joint normal distribution, have been used recently to infer differential networks. However, the distributions of the omics data are non-normal in general. Furthermore, although much biological knowledge (or prior information) has been accumulated, most existing methods ignore the valuable prior information. Therefore, new statistical methods are needed to relax the normality assumption and make full use of prior information. We propose a new differential network analysis method to address the above challenges. Instead of using Gaussian graphical models, we employ a non-paranormal graphical model that can relax the normality assumption. We develop a principled model to take into account the following prior information: (i) a differential edge less likely exists between two genes that do not participate together in the same pathway; (ii) changes in the networks are driven by certain regulator genes that are perturbed across different cellular states and (iii) the differential networks estimated from multi-view gene expression data likely share common structures. Simulation studies demonstrate that our method outperforms other graphical model-based algorithms. We apply our method to identify the differential networks between platinum-sensitive and platinum-resistant ovarian tumors, and the differential networks between the proneural and mesenchymal subtypes of glioblastoma. Hub nodes in the estimated differential networks rediscover known cancer-related regulator genes and contain interesting predictions. The source code is at https://github.com/Zhangxf-ccnu/pDNA. szuouyl@gmail.com. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  19. A Network Diffusion Model of Food Safety Scare Behavior considering Information Transparency

    Directory of Open Access Journals (Sweden)

    Tingqiang Chen

    2017-01-01

    Full Text Available This study constructs the network diffusion model of food safety scare behavior under the effect of information transparency and examines the network topology and evolution characteristics of food safety scare behavior in a numerical simulation. The main conclusions of this study are as follows. (1 Under the effect of information transparency, the network degree distribution of food safety scare behavior diffusion demonstrates the decreasing characteristics of diminishing margins. (2 Food safety scare behavior diffusion increases with the information dissemination rate and consumer concern about food safety incidents and shows the characteristics of monotone increasing. And with the increasing of the government food safety supervision information transparency and media food safety supervision information transparency, the whole is declining characteristic of diminishing marginal. In addition, the extinction of food safety scare behavior cannot be achieved gradually given a single regulation of government food safety supervision information transparency and media food safety supervision information transparency. (3 The interaction effects between improving government food safety supervision information transparency or media food safety supervision information transparency and declining consumer concerns about food safety incidents or information transmission rate can engender the suppression of food safety scare behavior diffusion.

  20. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  1. Architectural Design for the Global Legal Information Network

    Science.gov (United States)

    Kalpakis, Konstantinos

    1999-01-01

    In this report, we provide a summary of our activities regarding the goals, requirements analysis, design, and prototype implementation for the Global Legal Information Network, a joint effort between the Law Library of Congress and NASA.

  2. Research information network survey of innovative technology for the earth. 2; Chikyu kankyo taisaku gijutsu no kenkyu joho network chosa. 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    In order to construct the information network system for a research of innovative technology for the earth, a prototype has been made. To draw necessary functions for the information network system, an information flow in a general research work is analyzed to classify it based on the functions. The information collecting function, information accumulating and sharing function, special information system for research, information providing function, and communication function of the net work correspond to the collecting information, accumulating information, being engaged in research, providing information, and communication of researcher`s actions, respectively. The services on network system supposed from these functions are the homepage search mailing list, intranet service, special information system for research, WWW Internet broadcasting, and BBS/news/conference tool, respectively. It was found that latest Internet technology enabled to construct easily controlled system environment for users and WWW would develop as a standard communication tool. 2 refs., 26 figs., 27 tabs.

  3. [Linking: relationships between health professionals in the informal health networks].

    Science.gov (United States)

    Sarradon-Eck, A; Vega, A; Faure, M; Humbert-Gaudart, A; Lustman, M

    2008-07-01

    During the last years, the french health system has been developing formal health networks. So, it was necessary to study informal health networks as networks. More precisely, we studied the nature of relationships between various stakeholders around general practionners wich are commonly considering as the stakeholder of the health system private sector. Fieldwork (ethnography based on direct observations and interviews) was conducted between October 2002 and april 2004, in the South-East of France. Ten monographs of general practioner's offices were achieved in a rural area; then, we achieved fieldwork of the informal health networks identified. There is a cultural frame wich is common to all private professionals. This frame includes a triple ideal (teamwork built up the hospital model, independance, and an relational approach with patients). This frame does not square with the real practices. In fact, regulation mechanisms preserve the balance of relashionships between professionnal groups, by restricting/promoting exchanges and complex alliance strategies. These mecanisms include: (1) a few professionnal's rule as disponibility (to the patients and to the professionnals), as communication about patient, as patient's reference, as obligation to communicate between professionals; (2) some constraints such as territory superposition and competition with other professional groups; (3) some needs for: rileiving (of emotions and worries connected to work), sharing (decisions, responsabilities), of delegation (medical treatment, practices), protection against social and legal risk through the creation of trust relationships. These trust relationships are based on several logics (affinity, solidarity, similarity). The study shows the major place of the patient who is often the main organizer of his network, and even though he makes an important structuring work between medical staff, and an information transfer (on his diagnosis, on his treatment, and professionals

  4. Short paper: Experimental analysis of misbehavior detection and prevention in VANETs

    NARCIS (Netherlands)

    Bissmeyer, N.; Schroder, K.; Petit, Jonathan; Mauthofer, S.; Bayarou, K.

    2013-01-01

    Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of

  5. Methods of Certification tests PLC-Networks in Compliance Safety Information

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2011-12-01

    Full Text Available The aim of this research was description of the methodology of the audit plc-network to meet the requirements of information security. The technique is based on the provisions of the guidance documents and model FSTEC Russia test object methods of information on safety information.

  6. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  7. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  8. Information processing in echo state networks at the edge of chaos.

    Science.gov (United States)

    Boedecker, Joschka; Obst, Oliver; Lizier, Joseph T; Mayer, N Michael; Asada, Minoru

    2012-09-01

    We investigate information processing in randomly connected recurrent neural networks. It has been shown previously that the computational capabilities of these networks are maximized when the recurrent layer is close to the border between a stable and an unstable dynamics regime, the so called edge of chaos. The reasons, however, for this maximized performance are not completely understood. We adopt an information-theoretical framework and are for the first time able to quantify the computational capabilities between elements of these networks directly as they undergo the phase transition to chaos. Specifically, we present evidence that both information transfer and storage in the recurrent layer are maximized close to this phase transition, providing an explanation for why guiding the recurrent layer toward the edge of chaos is computationally useful. As a consequence, our study suggests self-organized ways of improving performance in recurrent neural networks, driven by input data. Moreover, the networks we study share important features with biological systems such as feedback connections and online computation on input streams. A key example is the cerebral cortex, which was shown to also operate close to the edge of chaos. Consequently, the behavior of model systems as studied here is likely to shed light on reasons why biological systems are tuned into this specific regime.

  9. Spreading dynamics of an e-commerce preferential information model on scale-free networks

    Science.gov (United States)

    Wan, Chen; Li, Tao; Guan, Zhi-Hong; Wang, Yuanmei; Liu, Xiongding

    2017-02-01

    In order to study the influence of the preferential degree and the heterogeneity of underlying networks on the spread of preferential e-commerce information, we propose a novel susceptible-infected-beneficial model based on scale-free networks. The spreading dynamics of the preferential information are analyzed in detail using the mean-field theory. We determine the basic reproductive number and equilibria. The theoretical analysis indicates that the basic reproductive number depends mainly on the preferential degree and the topology of the underlying networks. We prove the global stability of the information-elimination equilibrium. The permanence of preferential information and the global attractivity of the information-prevailing equilibrium are also studied in detail. Some numerical simulations are presented to verify the theoretical results.

  10. Modelling of information diffusion on social networks with applications to WeChat

    Science.gov (United States)

    Liu, Liang; Qu, Bo; Chen, Bin; Hanjalic, Alan; Wang, Huijuan

    2018-04-01

    Traces of user activities recorded in online social networks open new possibilities to systematically understand the information diffusion process on social networks. From the online social network WeChat, we collected a large number of information cascade trees, each of which tells the spreading trajectory of a message/information such as which user creates the information and which users view or forward the information shared by which neighbours. In this work, we propose two heterogeneous non-linear models, one for the topologies of the information cascade trees and the other for the stochastic process of information diffusion on a social network. Both models are validated by the WeChat data in reproducing and explaining key features of cascade trees. Specifically, we apply the Random Recursive Tree (RRT) to model the growth of cascade trees. The RRT model could capture key features, i.e. the average path length and degree variance of a cascade tree in relation to the number of nodes (size) of the tree. Its single identified parameter quantifies the relative depth or broadness of the cascade trees and indicates that information propagates via a star-like broadcasting or viral-like hop by hop spreading. The RRT model explains the appearance of hubs, thus a possibly smaller average path length as the cascade size increases, as observed in WeChat. We further propose the stochastic Susceptible View Forward Removed (SVFR) model to depict the dynamic user behaviour including creating, viewing, forwarding and ignoring a message on a given social network. Beside the average path length and degree variance of the cascade trees in relation to their sizes, the SVFR model could further explain the power-law cascade size distribution in WeChat and unravel that a user with a large number of friends may actually have a smaller probability to read a message (s)he receives due to limited attention.

  11. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  12. American Association for the Surgery of Trauma Prevention Committee topical overview: National Trauma Data Bank, geographic information systems, and teaching injury prevention.

    Science.gov (United States)

    Crandall, Marie; Zarzaur, Ben; Tinkoff, Glen

    2013-11-01

    Injury is the leading cause of death for all Americans aged 1 to 35 years, and injury-related costs exceed $100 billion per year in the United States. Trauma centers can be important resources for risk identification and prevention strategies. The authors review 3 important resources for injury prevention education and research: the National Trauma Data Bank, geographic information systems, and an overview of injury prevention education. The National Trauma Data Bank and the Trauma Quality Improvement Program are available through the Web site of the American College of Surgeons. Links to research examples using geographic information systems software and the National Trauma Data Bank are provided in the text. Finally, resources for surgical educators in the area of injury prevention are summarized and examples provided. Database research, geographic information systems, and injury prevention education are important tools in the field of injury prevention. This article provides an overview of current research and education strategies and resources. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  14. Health information multitype library reference referral networking: panacea for the '90s.

    Science.gov (United States)

    Teplitskaia, H

    1998-07-01

    Librarians are exploring new approaches to information sharing to cope with a rapidly changing environment dominated by budget cuts, information explosion, and globalization of the economy, science, and culture. In 1990, the University of Illinois at Chicago Library of the Health Sciences (UIC LHS) initiated a pilot project aimed at establishing an effective balance between state-of-the-art information technology and traditional library methods and promoting cooperation among health information professionals by establishing the Health Information Referral Network (HIRN) in the state of Illinois. HIRN's background and development, Internet home page, and networking techniques reviewed in this paper are applicable to multitype libraries and information centers interested in improving information use and the referral process.

  15. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  16. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  17. Report on the survey in fiscal 1998. Survey on an environment technology transfer information network; 1998 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This paper describes a survey on an environment technology transfer information network. Based on the achievements obtained by the surveys in fiscal 1995 and 1996, the ICETT has participated as one organization constituting the APEC environment technology exchange virtual center, and begun providing information since April 1997. As the environment technology information, those items actually employed by factories and operation sites in Japan are put into a data base, and into a home page including training information centering around those contained in the data base, and examples of works done by local governments for prevention of pollution. Furthermore in fiscal 1997, a simulation software for a model process has been developed. Fiscal 1998 strengthened the data base for environment preservation technology information, investigated environment preserving model companies and summarized them including even their management aspect. Investigations were carried out in developing countries on application of cleaner technologies. Gaps far exceeding anticipation exist in every field between these developing countries and Japan. Environment protection measures applied and succeeded in the developing countries as the means to narrow the gaps were collected, and compiled as the specific examples. (NEDO)

  18. Information processing by networks of quantum decision makers

    Science.gov (United States)

    Yukalov, V. I.; Yukalova, E. P.; Sornette, D.

    2018-02-01

    We suggest a model of a multi-agent society of decision makers taking decisions being based on two criteria, one is the utility of the prospects and the other is the attractiveness of the considered prospects. The model is the generalization of quantum decision theory, developed earlier for single decision makers realizing one-step decisions, in two principal aspects. First, several decision makers are considered simultaneously, who interact with each other through information exchange. Second, a multistep procedure is treated, when the agents exchange information many times. Several decision makers exchanging information and forming their judgment, using quantum rules, form a kind of a quantum information network, where collective decisions develop in time as a result of information exchange. In addition to characterizing collective decisions that arise in human societies, such networks can describe dynamical processes occurring in artificial quantum intelligence composed of several parts or in a cluster of quantum computers. The practical usage of the theory is illustrated on the dynamic disjunction effect for which three quantitative predictions are made: (i) the probabilistic behavior of decision makers at the initial stage of the process is described; (ii) the decrease of the difference between the initial prospect probabilities and the related utility factors is proved; (iii) the existence of a common consensus after multiple exchange of information is predicted. The predicted numerical values are in very good agreement with empirical data.

  19. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  20. Maximizing information exchange between complex networks

    International Nuclear Information System (INIS)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching

  1. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  2. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  3. Information spread of emergency events: path searching on social networks.

    Science.gov (United States)

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  4. Information Spread of Emergency Events: Path Searching on Social Networks

    Directory of Open Access Journals (Sweden)

    Weihui Dai

    2014-01-01

    Full Text Available Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  5. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui; Zhao, Junzhou; Ribeiro, Bruno; Lui, John C. S.; Towsley, Don; Guan, Xiaohong

    2018-01-01

    querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling

  6. Content-based organization of the information space in multi-database networks

    NARCIS (Netherlands)

    Papazoglou, M.; Milliner, S.

    1998-01-01

    Abstract. Rapid growth in the volume of network-available data, complexity, diversity and terminological fluctuations, at different data sources, render network-accessible information increasingly difficult to achieve. The situation is particularly cumbersome for users of multi-database systems who

  7. Shifts in the architecture of the Nationwide Health Information Network.

    Science.gov (United States)

    Lenert, Leslie; Sundwall, David; Lenert, Michael Edward

    2012-01-01

    In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internet-like architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood of their success, while making the NwHIN dependent on nascent technologies for community level functions such as record locator services. These changes may impact the health of patients and communities. Independent, scientifically focused debate is needed on the wisdom of ONC's proposed changes in its strategy for the NwHIN.

  8. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  9. Modeling and management of information supporting functional dimension of Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Ermilova, E.; Msanjila, S.S.; Camarinha-Matos, L.M.; Hameurlain, A.; Küng, J.; Wagner, R.

    2009-01-01

    Fluent creation of opportunity-based short-term Collaborative Networks (CNs) among organizations or individuals requires the availability of a variety of up-to-date information. A pre-established properly administrated strategic-alliance Collaborative Network (CN) can act as the breeding environment

  10. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  11. Value of digital information networks : A holonic framework

    NARCIS (Netherlands)

    Madureira, A.J.P.S.

    2011-01-01

    The extraordinary level of interest worldwide in Digital Information Networks (DINs)’ deployment is due to the strong perception that they bring economic, social and environmental value. However, scientific attempts to evidence this perception lead to speculative, elusive or limited conclusions. In

  12. 75 FR 17956 - Office of Juvenile Justice and Delinquency Prevention; Agency Information Collection Activities...

    Science.gov (United States)

    2010-04-08

    ... and Delinquency Prevention; Agency Information Collection Activities: Proposed Collection; Comments... of Justice Programs, Office of Juvenile Justice and Delinquency Prevention, will be submitting the... information, please contact Janet Chiancone, (202) 353-9258, Office of Juvenile Justice and Delinquency...

  13. Information seeking for making evidence-informed decisions: a social network analysis on the staff of a public health department in Canada

    Directory of Open Access Journals (Sweden)

    Yousefi-Nooraie Reza

    2012-05-01

    Full Text Available Abstract Background Social network analysis is an approach to study the interactions and exchange of resources among people. It can help understanding the underlying structural and behavioral complexities that influence the process of capacity building towards evidence-informed decision making. A social network analysis was conducted to understand if and how the staff of a public health department in Ontario turn to peers to get help incorporating research evidence into practice. Methods The staff were invited to respond to an online questionnaire inquiring about information seeking behavior, identification of colleague expertise, and friendship status. Three networks were developed based on the 170 participants. Overall shape, key indices, the most central people and brokers, and their characteristics were identified. Results The network analysis showed a low density and localized information-seeking network. Inter-personal connections were mainly clustered by organizational divisions; and people tended to limit information-seeking connections to a handful of peers in their division. However, recognition of expertise and friendship networks showed more cross-divisional connections. Members of the office of the Medical Officer of Health were located at the heart of the department, bridging across divisions. A small group of professional consultants and middle managers were the most-central staff in the network, also connecting their divisions to the center of the information-seeking network. In each division, there were some locally central staff, mainly practitioners, who connected their neighboring peers; but they were not necessarily connected to other experts or managers. Conclusions The methods of social network analysis were useful in providing a systems approach to understand how knowledge might flow in an organization. The findings of this study can be used to identify early adopters of knowledge translation interventions, forming

  14. Information seeking for making evidence-informed decisions: a social network analysis on the staff of a public health department in Canada

    Science.gov (United States)

    2012-01-01

    Background Social network analysis is an approach to study the interactions and exchange of resources among people. It can help understanding the underlying structural and behavioral complexities that influence the process of capacity building towards evidence-informed decision making. A social network analysis was conducted to understand if and how the staff of a public health department in Ontario turn to peers to get help incorporating research evidence into practice. Methods The staff were invited to respond to an online questionnaire inquiring about information seeking behavior, identification of colleague expertise, and friendship status. Three networks were developed based on the 170 participants. Overall shape, key indices, the most central people and brokers, and their characteristics were identified. Results The network analysis showed a low density and localized information-seeking network. Inter-personal connections were mainly clustered by organizational divisions; and people tended to limit information-seeking connections to a handful of peers in their division. However, recognition of expertise and friendship networks showed more cross-divisional connections. Members of the office of the Medical Officer of Health were located at the heart of the department, bridging across divisions. A small group of professional consultants and middle managers were the most-central staff in the network, also connecting their divisions to the center of the information-seeking network. In each division, there were some locally central staff, mainly practitioners, who connected their neighboring peers; but they were not necessarily connected to other experts or managers. Conclusions The methods of social network analysis were useful in providing a systems approach to understand how knowledge might flow in an organization. The findings of this study can be used to identify early adopters of knowledge translation interventions, forming Communities of Practice, and

  15. 76 FR 64368 - Notice of Submission of Proposed Information Collection to OMB Homelessness Prevention Study

    Science.gov (United States)

    2011-10-18

    ... Proposed Information Collection to OMB Homelessness Prevention Study AGENCY: Office of Policy Development... Homelessness Prevention Study. The proposed information collection was approved under emergency review (OMB...) has submitted to OMB a request to extend approval for information collection for the Homelessness...

  16. Management of Information Supporting Collaborative Networks

    Science.gov (United States)

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  17. Construction of the NIFS campus information network, NIFS-LAN

    Energy Technology Data Exchange (ETDEWEB)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  18. Targeted ethnography as a critical step to inform cultural adaptations of HIV prevention interventions for adults with severe mental illness.

    Science.gov (United States)

    Wainberg, Milton L; Alfredo González, M; McKinnon, Karen; Elkington, Katherine S; Pinto, Diana; Gruber Mann, Claudio; Mattos, Paulo E

    2007-07-01

    As in other countries worldwide, adults with severe mental illness (SMI) in Brazil are disproportionately infected with HIV relative to the general population. Brazilian psychiatric facilities lack tested HIV prevention interventions. To adapt existing interventions, developed only in the US, we conducted targeted ethnography with adults with SMI and staff from two psychiatric institutions in Brazil. We sought to characterize individual, institutional, and interpersonal factors that may affect HIV risk behavior in this population. We conducted 350 hours of ethnographic field observations in two mental health service settings in Rio de Janeiro, and 9 focus groups (n=72) and 16 key-informant interviews with patients and staff in these settings. Data comprised field notes and audiotapes of all exchanges, which were transcribed, coded, and systematically analyzed. The ethnography identified and/or characterized the institutional culture: (1) patients' risk behaviors; (2) the institutional setting; (3) intervention content; and (4) intervention format and delivery strategies. Targeted ethnography also illuminated broader contextual issues for development and implementation of HIV prevention interventions for adults with SMI in Brazil, including an institutional culture that did not systematically address patients' sexual behavior, sexual health, or HIV sexual risk, yet strongly impacted the structure of patients' sexual networks. Further, ethnography identified the Brazilian concept of "social responsibility" as important to prevention work with psychiatric patients. Targeted ethnography with adults with SMI and institutional staff provided information critical to the adaptation of tested US HIV prevention interventions for Brazilians with SMI.

  19. Comparative effectiveness of long term drug treatment strategies to prevent asthma exacerbations: network meta-analysis

    NARCIS (Netherlands)

    Loymans, Rik J. B.; Gemperli, Armin; Cohen, Judith; Rubinstein, Sidney M.; Sterk, Peter J.; Reddel, Helen K.; Jüni, Peter; ter Riet, Gerben

    2014-01-01

    To determine the comparative effectiveness and safety of current maintenance strategies in preventing exacerbations of asthma. Systematic review and network meta-analysis using Bayesian statistics. Cochrane systematic reviews on chronic asthma, complemented by an updated search when appropriate.

  20. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  1. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  2. Using risk-informed asset management for feedwater system preventative maintenance optimization

    International Nuclear Information System (INIS)

    Kee, Ernest; Sun, Alice; Richards, Andrew; Grantom, Rick; Liming, James; Salter, James

    2004-01-01

    The initial development of a South Texas Project Nuclear Operating Company process for supporting preventative maintenance optimization by applying the Balance-Of-Plant model and Risk-Informed Asset Management alpha-level software applications is presented. Preventative maintenance activities are evaluated in the South Texas Project Risk-Informed Asset Management software while the plant maintains or improves upon high levels of nuclear safety. In the Balance-Of-Plant availability application, the level of detail in the feedwater system is enhanced to support plant decision-making at the component failure mode and human error mode level of indenture by elaborating on the current model at the super-component level of indenture. The enhanced model and modeling techniques are presented. Results of case studies in feedwater system preventative maintenance optimization sing plant-specific data are also presented. (author)

  3. Development of stock correlation networks using mutual information and financial big data.

    Science.gov (United States)

    Guo, Xue; Zhang, Hu; Tian, Tianhai

    2018-01-01

    Stock correlation networks use stock price data to explore the relationship between different stocks listed in the stock market. Currently this relationship is dominantly measured by the Pearson correlation coefficient. However, financial data suggest that nonlinear relationships may exist in the stock prices of different shares. To address this issue, this work uses mutual information to characterize the nonlinear relationship between stocks. Using 280 stocks traded at the Shanghai Stocks Exchange in China during the period of 2014-2016, we first compare the effectiveness of the correlation coefficient and mutual information for measuring stock relationships. Based on these two measures, we then develop two stock networks using the Minimum Spanning Tree method and study the topological properties of these networks, including degree, path length and the power-law distribution. The relationship network based on mutual information has a better distribution of the degree and larger value of the power-law distribution than those using the correlation coefficient. Numerical results show that mutual information is a more effective approach than the correlation coefficient to measure the stock relationship in a stock market that may undergo large fluctuations of stock prices.

  4. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-10

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD... Information Technology Research and Development (NITRD). ACTION: Notice, request for public comment. FOR..., the National Coordination Office for Networking and Information Technology Research and Development...

  5. Bandwidth Optimization On Design Of Visual Display Information System Based Networking At Politeknik Negeri Bali

    Science.gov (United States)

    Sudiartha, IKG; Catur Bawa, IGNB

    2018-01-01

    Information can not be separated from the social life of the community, especially in the world of education. One of the information fields is academic calendar information, activity agenda, announcement and campus activity news. In line with technological developments, text-based information is becoming obsolete. For that need creativity to present information more quickly, accurately and interesting by exploiting the development of digital technology and internet. In this paper will be developed applications for the provision of information in the form of visual display, applied to computer network system with multimedia applications. Network-based applications provide ease in updating data through internet services, attractive presentations with multimedia support. The application “Networking Visual Display Information Unit” can be used as a medium that provides information services for students and academic employee more interesting and ease in updating information than the bulletin board. The information presented in the form of Running Text, Latest Information, Agenda, Academic Calendar and Video provide an interesting presentation and in line with technological developments at the Politeknik Negeri Bali. Through this research is expected to create software “Networking Visual Display Information Unit” with optimal bandwidth usage by combining local data sources and data through the network. This research produces visual display design with optimal bandwidth usage and application in the form of supporting software.

  6. Information system design for demand-driven supply networks

    OpenAIRE

    Selk, Bernhard

    2004-01-01

    Information system design for demand-driven supply networks : integrating CRM & SCM / B. Selk, K. Turowski, C. Winnewisser. - In: EIS : Fourth International ICSC Symposium on Engineering of Intelligent Systems, EIS 2004. [Elektronische Ressource]. - Millet, Alberta : ICSC Interdisciplinary Research Canada, 2004. - 8 S. auf CD-ROM

  7. Determinants of informal coordination in networked supply chains

    NARCIS (Netherlands)

    Ashayeri, J.; Ogulin, R.; Selen, W.

    2012-01-01

    Purpose – The purpose of this paper is to empirically examine capability connectivity, relationship alignment and the ability to informally network in the supply chain as determinants for better utilizing capabilities amongst supply chain partners. In particular, the paper focuses on how the above

  8. Nature-Inspired Dissemination of Information in P2P Networks

    Science.gov (United States)

    Guéret, Christophe

    After having first been used as a means to publish content, the Web is now widely used as a social tool for sharing information. It is an easy task to subscribe to a social network, join one of the Web-based communities according to some personal interests and start to share content with all the people who do the same. It is easy once you solve two basic problems: select the network to join (go to hi5, facebook, myspace,…? join all of them?) and find/pick up the right communities (i.e., find a strict label to match non-strict centers of interest). An error of appreciation would result in getting too much of useless/non-relevant information. This chapter provides a study on the dissemination of information within groups of people and aim at answering one question: can we find an effortless way of sharing information on the Web? Ideally, such a solution would require neither the definition of a profile nor the selection of communities to join. Publishing information should also not be the result of an active decision but be performed in an automatic way. A nature-inspired framework is introduced as an answer to this question. This framework features artificial ants taking care of the dissemination of information items within the network. Centers of interest of the users are reflected by artificial pheromones laid down on connections between peers. Another part of the framework uses those pheromone trails to detect shared interests and creates communities.

  9. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  10. Anatomy and histology as socially networked learning environments: some preliminary findings.

    Science.gov (United States)

    Hafferty, Frederic W; Castellani, Brian; Hafferty, Philip K; Pawlina, Wojciech

    2013-09-01

    An exploratory study to better understand the "networked" life of the medical school as a learning environment. In a recent academic year, the authors gathered data during two six-week blocks of a sequential histology and anatomy course at a U.S. medical college. An eight-item questionnaire captured different dimensions of student interactions. The student cohort/network was 48 first-year medical students. Using social network analysis (SNA), the authors focused on (1) the initial structure and the evolution of informal class networks over time, (2) how informal class networks compare to formal in-class small-group assignments in influencing student information gathering, and (3) how peer assignment of professionalism role model status is shaped more by informal than formal ties. In examining these latter two issues, the authors explored not only how formal group assignment persisted over time but also how it functioned to prevent the tendency for groupings based on gender or ethnicity. The study revealed an evolving dynamic between the formal small-group learning structure of the course blocks and the emergence of informal student networks. For example, whereas formal group membership did influence in-class questions and did prevent formation of groups of like gender and ethnicity, outside-class questions and professionalism were influenced more by informal group ties where gender and, to a much lesser extent, ethnicity influence student information gathering. The richness of these preliminary findings suggests that SNA may be a useful tool in examining an array of medical student learning encounters.

  11. Spatially dynamic recurrent information flow across long-range dorsal motor network encodes selective motor goals.

    Science.gov (United States)

    Yoo, Peter E; Hagan, Maureen A; John, Sam E; Opie, Nicholas L; Ordidge, Roger J; O'Brien, Terence J; Oxley, Thomas J; Moffat, Bradford A; Wong, Yan T

    2018-03-08

    Performing voluntary movements involves many regions of the brain, but it is unknown how they work together to plan and execute specific movements. We recorded high-resolution ultra-high-field blood-oxygen-level-dependent signal during a cued ankle-dorsiflexion task. The spatiotemporal dynamics and the patterns of task-relevant information flow across the dorsal motor network were investigated. We show that task-relevant information appears and decays earlier in the higher order areas of the dorsal motor network then in the primary motor cortex. Furthermore, the results show that task-relevant information is encoded in general initially, and then selective goals are subsequently encoded in specifics subregions across the network. Importantly, the patterns of recurrent information flow across the network vary across different subregions depending on the goal. Recurrent information flow was observed across all higher order areas of the dorsal motor network in the subregions encoding for the current goal. In contrast, only the top-down information flow from the supplementary motor cortex to the frontoparietal regions, with weakened recurrent information flow between the frontoparietal regions and bottom-up information flow from the frontoparietal regions to the supplementary cortex were observed in the subregions encoding for the opposing goal. We conclude that selective motor goal encoding and execution rely on goal-dependent differences in subregional recurrent information flow patterns across the long-range dorsal motor network areas that exhibit graded functional specialization. © 2018 Wiley Periodicals, Inc.

  12. Modelling Altitude Information in Two-Dimensional Traffic Networks for Electric Mobility Simulation

    Directory of Open Access Journals (Sweden)

    Diogo Santos

    2016-06-01

    Full Text Available Elevation data is important for electric vehicle simulation. However, traffic simulators are often two-dimensional and do not offer the capability of modelling urban networks taking elevation into account. Specifically, SUMO - Simulation of Urban Mobility, a popular microscopic traffic simulator, relies on networks previously modelled with elevation data as to provide this information during simulations. This work tackles the problem of adding elevation data to urban network models - particularly for the case of the Porto urban network, in Portugal. With this goal in mind, a comparison between different altitude information retrieval approaches is made and a simple tool to annotate network models with altitude data is proposed. The work starts by describing the methodological approach followed during research and development, then describing and analysing its main findings. This description includes an in-depth explanation of the proposed tool. Lastly, this work reviews some related work to the subject.

  13. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  14. Disaster prevention surveillance system

    International Nuclear Information System (INIS)

    Nara, Satoru; Kamiya, Eisei

    2001-01-01

    Fuji Electric Co., Ltd. has supplied many management systems to nuclear reactor institution. 'The nuclear countermeasures-against-calamities special-measures' was enforced. A nuclear entrepreneur has devised the measure about expansion prevention and restoration of a calamity while it endeavors after prevention of generating of a nuclear calamity. Our company have supplied the 'disaster prevention surveillance system' to the Japan Atomic Energy Research Institute Tokai Research Establishment aiming at strengthening of the monitoring function at the time (after the accident) of the accident used as one of the above-mentioned measures. A 'disaster prevention surveillance system' can share the information on the accident spot in an on-site command place, an activity headquarters, and support organizations, when the serious accident happens. This system is composed of various sensors (temperature, pressure and radiation), cameras, computers and network. (author)

  15. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode.......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  16. Benchmarking of Percutaneous Injuries at the Ministry of Health Hospitals of Saudi Arabia in Comparison with the United States Hospitals Participating in Exposure Prevention Information Network (EPINet™

    Directory of Open Access Journals (Sweden)

    ZA Memish

    2015-01-01

    Full Text Available Background: Exposure to blood-borne pathogens from needle-stick and sharp injuries continues to pose a significant risk to health care workers. These events are of concern because of the risk to transmit blood-borne diseases such as hepatitis B virus, hepatitis C virus, and the human immunodeficiency virus. Objective: To benchmark different risk factors associated with needle-stick incidents among health care workers in the Ministry of Health hospitals in the Kingdom of Saudi Arabia compared to the US hospitals participating in Exposure Prevention Information Network (EPINet ™. Methods: Prospective surveillance of needle-stick and sharp incidents carried out during the year 2012 using EPINet™ ver 1.5 that provides uniform needle stick and sharp injury report form. Results: The annual percutaneous incidents (PIs rate per 100 occupied beds was 3.2 at the studied MOH hospitals. Nurses were the most affected job category by PIs (59.4%. Most PIs happened in patients' wards in the Ministry of Health hospitals (34.6%. Disposable syringes were the most common cause of PIs (47.20%. Most PIs occurred during use of the syringes (36.4%. Conclusion: Among health care workers, nurses and physicians appear especially at risk of exposure to PIs. Important risk factors of injuries include working in patient room, using disposable syringes, devices without safety features. Preventive strategies such as continuous training of health care workers with special emphasis on nurses and physicians, encouragement of reporting of such incidents, observation of sharp handling, their use and implementation of safety devices are warranted.

  17. Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Qi

    2011-05-01

    Full Text Available As wireless sensor networks (WSNs are increasingly being deployed in some important applications, it becomes imperative that we consider application requirements in in-network processes. We intend to use a WSN to aid information querying and navigation within a dynamic and real-time environment. We propose a novel method that relies on the heat diffusion equation to finish the navigation process conveniently and easily. From the perspective of theoretical analysis, our proposed work holds the lower constraint condition. We use multiple scales to reach the goal of accurate navigation. We present a multi-scale gradient descent method to satisfy users’ requirements in WSNs. Formula derivations and simulations show that the method is accurately and efficiently able to solve typical sensor network configuration information navigation problems. Simultaneously, the structure of heat diffusion equation allows more flexibility and adaptability in searching algorithm designs.

  18. The impact of multiple information on coupled awareness-epidemic dynamics in multiplex networks

    Science.gov (United States)

    Pan, Yaohui; Yan, Zhijun

    2018-02-01

    Growing interest has emerged in the study of the interplay between awareness and epidemics in multiplex networks. However, previous studies on this issue usually assume that all aware individuals take the same level of precautions, ignoring individual heterogeneity. In this paper, we investigate the coupled awareness-epidemic dynamics in multiplex networks considering individual heterogeneity. Here, the precaution levels are heterogeneous and depend on three types of information: contact information and local and global prevalence information. The results show that contact-based precautions can decrease the epidemic prevalence and augment the epidemic threshold, but prevalence-based precautions, regardless of local or global information, can only decrease the epidemic prevalence. Moreover, unlike previous studies in single-layer networks, we do not find a greater impact of local prevalence information on the epidemic prevalence compared to global prevalence information. In addition, we find that the altruistic behaviors of infected individuals can effectively suppress epidemic spreading, especially when the level of contact-based precaution is high.

  19. A cyber-anima-based model of material conscious information network

    Directory of Open Access Journals (Sweden)

    Jianping Shen

    2017-03-01

    Full Text Available Purpose – This paper aims to study the node modeling, multi-agent architecture and addressing method for the material conscious information network (MCIN, which is a large-scaled, open-styled, self-organized and ecological intelligent network of supply–demand relationships. Design/methodology/approach – This study models the MCIN by node model definition, multi-agent architecture design and addressing method presentation. Findings – The prototype of novel E-commerce platform based on the MCIN shows the effectiveness and soundness of the MCIN modeling. By comparing to current internet, the authors also find that the MCIN has the advantages of socialization, information integration, collective intelligence, traceability, high robustness, unification of producing and consuming, high scalability and decentralization. Research limitations/implications – Leveraging the dimensions of structure, character, knowledge and experience, a modeling approach of the basic information can fit all kinds of the MCIN nodes. With the double chain structure for both basic and supply–demand information, the MCIN nodes can be modeled comprehensively. The anima-desire-intention-based multi-agent architecture makes the federated agents of the MCIN nodes self-organized and intelligent. The MCIN nodes can be efficiently addressed by the supply–demand-oriented method. However, the implementation of the MCIN is still in process. Practical implications – This paper lays the theoretical foundation for the future networked system of supply–demand relationship and the novel E-commerce platform. Originality/value – The authors believe that the MCIN, first proposed in this paper, is a transformational innovation which facilitates the infrastructure of the future networked system of supply–demand relationship.

  20. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    Information systems, mainly aided by computers, are becoming increasingly important, contributing to development of wide areas of societies and economics, to begin with. However, few developing countries have established sufficient information systems, in spite of their strong desires to do so, which will further widen the gap between them and advanced countries, where these systems are acceleratedly advancing. Given these situations, Center of International Cooperation for Computerization (CICC) has been implementing various projects for providing assistance to and cooperation with oversea countries which are trying to develop information systems. This report summarizes the project, which CICC has been commissioned by Optoelectronic Industry and Technology Development Association as part of the cooperation programs, for establishing the Asian environmental information networks. It outlines the research cooperation project for the environmental networks, results of the 4 on-the-spot surveys, 2 occasions for inviting researchers to Japan, and construction of the internet and Asian environmental information network systems. (NEDO)

  1. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    OpenAIRE

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  2. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), an international nongovernmental organization, has demonstrated the effectiveness of its open source electronic medical record system (OpenMRS) in eight clinics in Rwanda. As a result, the Ministry of Health has decided to roll ...

  3. Research Award: Information and Networks (I&N) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... The growth of networked technologies has created new opportunities for advancing human ... The I&N research awardee will ideally explore research questions centred ... such as engineering or computer/information science.

  4. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  5. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  6. Networks for prevention of violence: from utopia to action Redes de prevenção à violência: da utopia à ação

    Directory of Open Access Journals (Sweden)

    Kathie Njaine

    2006-06-01

    Full Text Available This article aims to discuss the experience of networks for the protection of people exposed to situations of violence or prevention networks. It is based on the concept created by Castells, who defines the information age. This study is part of the investigation "Successful experiences in the prevention of violence", carried out by the Latin-American Center for Studies on Violence Jorge Careli/ENSP-IFF/Fiocruz, in cooperation with the Secretariat for Health Survey of the Ministry of Health. The article analyzes the possibilities and limitations in the construction of networks for the prevention of violence, seeking to understand the sense of actions and movements carried out in networks. The method we used is a case study of two network initiatives in the Southern region of the country. In terms of results, in face of the difficulties of working in networks, we found it to be necessary: to break with sectorial and vertical actions; to promote constant communication and interchange of information; to permanently train the professionals and persons involved in the network, incorporating them into the protective and preventive actions; and to promote the participation of wide social sectors. In conclusion, one can affirm that the construction of a protection network involves complex steps, looking to the same problem with new eyes and a new vision for planting solutions.Este artigo objetiva discutir a experiência de redes de proteção a pessoas em situação de violência ou redes de prevenção. Baseia-se no conceito de rede de Castells, que define a sociedade da informação. O estudo é parte da pesquisa "Experiências exitosas em prevenção da violência", realizada pelo Centro Latino-Americano de Estudos de Violência e Saúde Jorge Careli/ENSP-IFF/ Fiocruz, em convênio com a Secretaria de Vigilância à Saúde do Ministério da Saúde. O presente artigo analisa as potencialidades e os limites para a construção de redes de prevenção

  7. Dynamic logics of networks: Information flow and the spread of opinion

    NARCIS (Netherlands)

    Christoff, Z.L.

    2016-01-01

    This thesis uses logical tools to investigate a number of basic features of social networks and their evolution over time, including flow of information and spread of opinions. Part I contains the preliminaries, including an introduction to the basic phenomena in social networks that call for a

  8. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  9. Automated analysis of information processing, kinetic independence and modular architecture in biochemical networks using MIDIA.

    Science.gov (United States)

    Bowsher, Clive G

    2011-02-15

    Understanding the encoding and propagation of information by biochemical reaction networks and the relationship of such information processing properties to modular network structure is of fundamental importance in the study of cell signalling and regulation. However, a rigorous, automated approach for general biochemical networks has not been available, and high-throughput analysis has therefore been out of reach. Modularization Identification by Dynamic Independence Algorithms (MIDIA) is a user-friendly, extensible R package that performs automated analysis of how information is processed by biochemical networks. An important component is the algorithm's ability to identify exact network decompositions based on both the mass action kinetics and informational properties of the network. These modularizations are visualized using a tree structure from which important dynamic conditional independence properties can be directly read. Only partial stoichiometric information needs to be used as input to MIDIA, and neither simulations nor knowledge of rate parameters are required. When applied to a signalling network, for example, the method identifies the routes and species involved in the sequential propagation of information between its multiple inputs and outputs. These routes correspond to the relevant paths in the tree structure and may be further visualized using the Input-Output Path Matrix tool. MIDIA remains computationally feasible for the largest network reconstructions currently available and is straightforward to use with models written in Systems Biology Markup Language (SBML). The package is distributed under the GNU General Public License and is available, together with a link to browsable Supplementary Material, at http://code.google.com/p/midia. Further information is at www.maths.bris.ac.uk/~macgb/Software.html.

  10. DOE waste information network: Data management and communications

    International Nuclear Information System (INIS)

    Fore, C.S.

    1986-01-01

    The U.S. Department of Energy's Waste Information Network (WIN) is an integral part of DOE's Hazardous Waste Remedial Actions Program. WIN has played an active role in the national program's mission to identify the magnitude and nature of existing DOE hazardous chemical and mixed radioactive waste streams and inventories and to provide a mechanism for disseminating pertinent information on technology activities. The information systems activity is structured into three key areas: data base development, data analysis, and data dissemination. As a result of this effort, several key data bases have been developed. Data dissemination is important to the use and management of the diversity of information and communication features developed by the program

  11. Automatic physical inference with information maximizing neural networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    Compressing large data sets to a manageable number of summaries that are informative about the underlying parameters vastly simplifies both frequentist and Bayesian inference. When only simulations are available, these summaries are typically chosen heuristically, so they may inadvertently miss important information. We introduce a simulation-based machine learning technique that trains artificial neural networks to find nonlinear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). In test cases where the posterior can be derived exactly, likelihood-free inference based on automatically derived IMNN summaries produces nearly exact posteriors, showing that these summaries are good approximations to sufficient statistics. In a series of numerical examples of increasing complexity and astrophysical relevance we show that IMNNs are robustly capable of automatically finding optimal, nonlinear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima. We anticipate that the automatic physical inference method described in this paper will be essential to obtain both accurate and precise cosmological parameter estimates from complex and large astronomical data sets, including those from LSST and Euclid.

  12. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  13. Lewis Information Network (LINK): Background and overview

    Science.gov (United States)

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  14. Developing a network: the PMM process.

    Science.gov (United States)

    Kamara, A

    1997-11-01

    Since 1988, the Prevention of Maternal Mortality (PMM) Network has developed, implemented and evaluated projects that focus directly on prevention of maternal deaths. The Network, which consists of 11 multidisciplinary teams in West Africa and one at Columbia University, grew from discussions between the Carnegie Corporation of New York and researchers at Columbia School of Public Health. Its goals are: to strengthen capacities in developing countries; to provide program models for preventing maternal deaths; and to inform policymakers about the importance of maternal mortality. This paper describes the development and functioning of the Network. The initial steps included identifying interested partners in Africa and encouraging them to form multidisciplinary teams. Each African team received two grants: one to perform a needs assessment and then another to develop and implement projects based on the results. The Columbia team provided technical assistance in a variety of ways, including site visits, workshops and correspondence. Teams tested program models and reported findings both to local policymakers and in international fora. Collaboration with government and community leaders helped facilitate progress at all stages. At the PMM Network Results Conference in 1996, the teams decided to continue their work by forming the Regional PMM (RPMM) Network, an entirely African entity.

  15. Disclosure and rationality: comparative risk information and decision-making about prevention.

    Science.gov (United States)

    Schwartz, Peter H

    2009-01-01

    With the growing focus on prevention in medicine, studies of how to describe risk have become increasing important. Recently, some researchers have argued against giving patients "comparative risk information," such as data about whether their baseline risk of developing a particular disease is above or below average. The concern is that giving patients this information will interfere with their consideration of more relevant data, such as the specific chance of getting the disease (the "personal risk"), the risk reduction the treatment provides, and any possible side effects. I explore this view and the theories of rationality that ground it, and I argue instead that comparative risk information can play a positive role in decision-making. The criticism of disclosing this sort of information to patients, I conclude, rests on a mistakenly narrow account of the goals of prevention and the nature of rational choice in medicine.

  16. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-03-01

    This project is implemented to survey the current statuses and future trends of the Asian district environment-related information networks, for the (research cooperation project for development of environmental condition measuring laser radar systems), being promoted by NEDO. First, current statuses of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, major domestic nodes and internationally connected conditions are surveyed mainly for internet-connected networks, for surveying the current statuses and future trends of the research networks in Asian countries. Second, current statuses in Indonesia of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, domestic node sites and managing organizations, charge systems and institutions, types/reliability/ stability of the circuits, and conditions of restriction of use, if any, for surveying the current statuses and future trends in Indonesia. Third, conditions of and needs for network utilization by researchers for Asian district environments. (NEDO)

  17. Understanding small business engagement in workplace violence prevention programs.

    Science.gov (United States)

    Bruening, Rebecca A; Strazza, Karen; Nocera, Maryalice; Peek-Asa, Corinne; Casteel, Carri

    2015-01-01

    Worksite wellness, safety, and violence prevention programs have low penetration among small, independent businesses. This study examined barriers and strategies influencing small business participation in workplace violence prevention programs (WVPPs). A semistructured interview guide was used in 32 telephone interviews. The study took place at the University of North Carolina Injury Prevention Research Center. Participating were a purposive sample of 32 representatives of small business-serving organizations (e.g., business membership organizations, regulatory agencies, and economic development organizations) selected for their experience with small businesses. This study was designed to inform improved dissemination of Crime Free Business (CFB), a WVPP for small, independent retail businesses. Thematic qualitative data analysis was used to identify key barriers and strategies for promoting programs and services to small businesses. Three key factors that influence small business engagement emerged from the analysis: (1) small businesses' limited time and resources, (2) low salience of workplace violence, (3) influence of informal networks and source credibility. Identified strategies include designing low-cost and convenient programs, crafting effective messages, partnering with influential organizations and individuals, and conducting outreach through informal networks. Workplace violence prevention and public health practitioners may increase small business participation in programs by reducing time and resource demands, addressing small business concerns, enlisting support from influential individuals and groups, and emphasizing business benefits of participating in the program.

  18. A constructive logic for services and information flow in computer networks

    NARCIS (Netherlands)

    Borghuis, V.A.J.; Feijs, L.M.G.

    2000-01-01

    In this paper we introduce a typed -calculus in which computer networks can be formalized and directed at situations where the services available on the network are stationary, while the information can flow freely. For this calculus, an analogue of the ‘propositions-as-types ’interpretation of

  19. Understanding social and sexual networks of sexual minority men and transgender women in Guatemala city to improve HIV prevention efforts.

    Science.gov (United States)

    Tucker, C; Arandi, C Galindo; Bolaños, J Herbert; Paz-Bailey, G; Barrington, C

    2014-11-01

    Sexual minority men and transgender women are disproportionately affected by HIV in Guatemala. Innovative prevention strategies are urgently needed to address these disparities. While social network approaches are frequently used to reach sexual minorities, little is known about the unique network characteristics among sub-groups. We conducted in-depth qualitative interviews with 13 gay-identifying men, eight non-gay-identifying men who have sex with men (MSM) and eight transgender women in Guatemala City. Using narrative and thematic coding procedures, we identified distinct patterns in the size, composition, and overlap between social and sexual networks across groups. Gay-identifying men had the largest, most supportive social networks, predominantly comprising family. For both non-gay-identifying MSM and transgender women, friends and sex clients provided more support. Transgender women reported the smallest social networks, least social support, and the most discrimination. HIV prevention efforts should be tailored to the specific sexual minority population and engage with strong ties.

  20. Understanding Social and Sexual Networks of Sexual Minority Men and Transgender Women in Guatemala City to Improve HIV Prevention Efforts

    Science.gov (United States)

    Tucker, C.; Arandi, C. Galindo; Bolaños, J. Herbert; Paz-Bailey, G.; Barrington, C.

    2015-01-01

    Sexual minority men and transgender women are disproportionately affected by HIV in Guatemala. Innovative prevention strategies are urgently needed to address these disparities. While social network approaches are frequently used to reach sexual minorities, little is known about the unique network characteristics among sub-groups. We conducted in-depth qualitative interviews with 13 gay-identifying men, eight non-gay-identifying men who have sex with men (MSM) and eight transgender women in Guatemala City. Using narrative and thematic coding procedures, we identified distinct patterns in the size, composition, and overlap between social and sexual networks across groups. Gay-identifying men had the largest, most supportive social networks, predominantly comprising family. For both non-gay-identifying MSM and transgender women, friends and sex clients provided more support. Transgender women reported the smallest social networks, least social support, and the most discrimination. HIV prevention efforts should be tailored to the specific sexual minority population and engage with strong ties. PMID:25418236

  1. Detection of information security violations with the aid of information and telecommunication networks monitoring

    International Nuclear Information System (INIS)

    Kovalev, D.O.

    2011-01-01

    Author has studied the methods and algorithms used in the monitoring of information security (IS), the distribution law of the number of IS messages, has developed a method and an algorithm for detecting IS violations in the message flow, a technique for generating the consolidated evaluation of results of monitoring the data and telecommunications network information security. Practical recommendations for improving the IS monitoring have been elaborated [ru

  2. Information and preventive measures can reduce absenteeism during pregnancy

    NARCIS (Netherlands)

    Hooftman, W.; Houtman, I.L.D.

    2007-01-01

    Working during pregnancy may expose women to several risk factors. According to recent findings of the National Survey on Working Conditions, information at an early stage on the consequences of the pregnancy for the working capacity of pregnant women, as well as implementing preventive measures,

  3. [Prevention and Treatment of Eating Disorders: The Health Care Network Anorexia and Bulimia nervosa].

    Science.gov (United States)

    Weigel, Angelika; Gumz, Antje; Kästner, Denise; Romer, Georg; Wegscheider, Karl; Löwe, Bernd

    2015-07-01

    The "Health care network anorexia and bulimia nervosa", a subproject of psychenet - the Hamburg network for mental health - aims to decrease the incidence of eating disorders as well as the risk for chronic illness courses. One focal project, therefore, evaluates a school-based prevention manual in a randomized controlled trial. The other one examines the impact of a systemic public health intervention on early treatment initiation in anorexia nervosa. The present article provides an overview about study design and interventions in both focal projects as well as preliminary results. © Georg Thieme Verlag KG Stuttgart · New York.

  4. The Role of Informal Support Networks in Teaching the Nature of Science

    Science.gov (United States)

    Herman, Benjamin C.; Olson, Joanne K.; Clough, Michael P.

    2017-06-01

    This study reports the participation of 13 secondary science teachers in informal support networks and how that participation was associated with their nature of science (NOS) teaching practices 2 to 5 years after having graduated from the same science teacher education program. The nine teachers who participated in informal support networks taught the NOS at high/medium levels, while the four non-participating teachers taught the NOS at low levels. The nine high/medium NOS implementation teachers credited the informal support networks for maintaining/heightening their sense of responsibility for teaching NOS and for helping them navigate institutional constraints that impede effective NOS instruction. Several high/medium NOS instruction implementers initially struggled to autonomously frame and resolve the complexities experienced in schools and thus drew from the support networks to engage in more sophisticated forms of teacher decision-making. In contrast, the NOS pedagogical decisions of the four teachers not participating in support networks were governed primarily by the expectations and constraints experienced in their schools. Implications of this study include the need for reconsidering the structure of teacher mentorship programs to ensure they do not promote archaic science teaching practices that are at odds with reform efforts in science education.

  5. Online Particle Detection by Neural Networks Based on Topologic Calorimetry Information

    CERN Document Server

    Ciodaro, T; The ATLAS collaboration; Damazio, D; de Seixas, JM

    2011-01-01

    This paper presents the last results from the Ringer algorithm, which is based on artificial neural networks for the electron identification at the online filtering system of the ATLAS particle detector, in the context of the LHC experiment at CERN. The algorithm performs topological feature extraction over the ATLAS calorimetry information (energy measurements). Later, the extracted information is presented to a neural network classifier. Studies showed that the Ringer algorithm achieves high detection efficiency, while keeping the false alarm rate low. Optimizations, guided by detailed analysis, reduced the algorithm execution time in 59%. Also, the payload necessary to store the Ringer algorithm information represents less than 6.2 percent of the total filtering system amount

  6. Fisher information at the edge of chaos in random Boolean networks.

    Science.gov (United States)

    Wang, X Rosalind; Lizier, Joseph T; Prokopenko, Mikhail

    2011-01-01

    We study the order-chaos phase transition in random Boolean networks (RBNs), which have been used as models of gene regulatory networks. In particular we seek to characterize the phase diagram in information-theoretic terms, focusing on the effect of the control parameters (activity level and connectivity). Fisher information, which measures how much system dynamics can reveal about the control parameters, offers a natural interpretation of the phase diagram in RBNs. We report that this measure is maximized near the order-chaos phase transitions in RBNs, since this is the region where the system is most sensitive to its parameters. Furthermore, we use this study of RBNs to clarify the relationship between Shannon and Fisher information measures.

  7. Research on the Application of Wireless Network in Collecting Road Traffic Information

    Institute of Scientific and Technical Information of China (English)

    DU Hui-jiang

    2015-01-01

    Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. However, with the development of wireless network technology and mobile Internet, the mobile phones are rapidly developed and more popular, so it is possible to get road traffic information by locating the mobile phones in vehicles. The system structure for the road traffic information collection is designed based on wireless network and mobile phones in vehicles, and the vehicle recognition and its information computation methods are given and discussed. Also the simulation is done for vehicle recognition and computation based on fuzzy cluster analysis method and the results are obtained and analyzed.

  8. Social insect colony as a biological regulatory system: modelling information flow in dominance networks.

    Science.gov (United States)

    Nandi, Anjan K; Sumana, Annagiri; Bhattacharya, Kunal

    2014-12-06

    Social insects provide an excellent platform to investigate flow of information in regulatory systems since their successful social organization is essentially achieved by effective information transfer through complex connectivity patterns among the colony members. Network representation of such behavioural interactions offers a powerful tool for structural as well as dynamical analysis of the underlying regulatory systems. In this paper, we focus on the dominance interaction networks in the tropical social wasp Ropalidia marginata-a species where behavioural observations indicate that such interactions are principally responsible for the transfer of information between individuals about their colony needs, resulting in a regulation of their own activities. Our research reveals that the dominance networks of R. marginata are structurally similar to a class of naturally evolved information processing networks, a fact confirmed also by the predominance of a specific substructure-the 'feed-forward loop'-a key functional component in many other information transfer networks. The dynamical analysis through Boolean modelling confirms that the networks are sufficiently stable under small fluctuations and yet capable of more efficient information transfer compared to their randomized counterparts. Our results suggest the involvement of a common structural design principle in different biological regulatory systems and a possible similarity with respect to the effect of selection on the organization levels of such systems. The findings are also consistent with the hypothesis that dominance behaviour has been shaped by natural selection to co-opt the information transfer process in such social insect species, in addition to its primal function of mediation of reproductive competition in the colony. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  9. Access to information and decision making on teenage pregnancy prevention by females in Tshwane

    Directory of Open Access Journals (Sweden)

    J.P.F. Masemola-Yende

    2015-11-01

    Full Text Available Background: The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. Objective: To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. Method: In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Results: Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Conclusion: Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  10. Access to information and decision making on teenage pregnancy prevention by females in Tshwane.

    Science.gov (United States)

    Masemola-Yende, J P F; Mataboge, Sanah M

    2015-11-05

    The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  11. Improving information dissemination in sparse vehicular networks by adding satellite communication

    NARCIS (Netherlands)

    Kloiber, Bernhard; Strang, Thomas; Spijker, Hanno; Heijenk, Geert

    Information dissemination in pure Vehicular Ad Hoc NETworks (VANETs) such as ITS-G5 becomes problematic when the network is sparse. In situations where the number of vehicles, that can act as a communication node, is insufficiently low, e.g. in rural areas, during night-time or because of a low

  12. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  13. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  14. A novel Bayesian learning method for information aggregation in modular neural networks

    DEFF Research Database (Denmark)

    Wang, Pan; Xu, Lida; Zhou, Shang-Ming

    2010-01-01

    Modular neural network is a popular neural network model which has many successful applications. In this paper, a sequential Bayesian learning (SBL) is proposed for modular neural networks aiming at efficiently aggregating the outputs of members of the ensemble. The experimental results on eight...... benchmark problems have demonstrated that the proposed method can perform information aggregation efficiently in data modeling....

  15. Harnessing and blending the power of two research networks to improve prevention science and public health practice

    Science.gov (United States)

    Vanderpool, Robin C.; Brownson, Ross C.; Mays, Glen P.; Crosby, Richard A.; Wyatt, Stephen W.

    2015-01-01

    Strategic collaborations are essential in moving public health research and practice forward1, particularly in light of escalating fiscal and environmental challenges facing the public health community. This commentary provides background and context for an emerging partnership between two national networks, Prevention Research Centers (PRCs) and Public Health Practice-Based Research Networks (PBRNs), to impact public health practice. Supported by CDC, PRCs are celebrating over 25 years of transdisciplinary applied prevention research grounded in community and stakeholder engagement. Public Health PBRNs, funded by the Robert Wood Johnson Foundation, conduct innovative public health services and systems research with public health agencies and community partners to improve public health decision-making. By utilizing each of the networks’ respective strengths and resources, collaborative ventures between PRCs and Public Health PBRNs can enhance the translation of applied prevention research to evidence-based practice and empirically investigate novel public health practices developed in the field. Three current PRC-Public Health PBRNs projects are highlighted and future research directions are discussed. Improving the interconnectedness of prevention research and public health practice is essential to improve the health of the Nation. PMID:24237918

  16. Peer led HIV/AIDS prevention for women in South African informal settlements.

    Science.gov (United States)

    O'Hara Murdock, Peggy; Garbharran, Hari; Edwards, Mary Jo; Smith, Maria A; Lutchmiah, Johnny; Mkhize, Makhosi

    2003-07-01

    South African women who live in informal settlement communities are at high risk of HIV/AIDS infection due to their poor economic and social status. Prevention programs must include methods for improving their social conditions as well as their sexual risk behaviors. Members of Partners trained 24 women from informal settlements to lead HIV/AIDS education workshops for 480 residents. When these participants reached out to their neighbors, this participatory community-based approach resulted in providing HIV/AIDS prevention messages to more than 1,440 residents. Program leaders from three settlements said in focus group discussions that results from this social influences peer led approach demonstrated that women residents are a valuable resource in providing effective HIV/AIDS prevention programs to South Africa's most vulnerable residents.

  17. Key management schemes using routing information frames in secure wireless sensor networks

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  18. 14 CFR 1213.106 - Preventing release of classified information to the media.

    Science.gov (United States)

    2010-01-01

    ... ADMINISTRATION RELEASE OF INFORMATION TO NEWS AND INFORMATION MEDIA § 1213.106 Preventing release of classified... interviews, audio/visual) to the news media is prohibited. The disclosure of classified information to unauthorized individuals may be cause for prosecution and/or disciplinary action against the NASA employee...

  19. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 4.259, year: 2016

  20. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  1. Risk-based optimization of pipe inspections in large underground networks with imprecise information

    International Nuclear Information System (INIS)

    Mancuso, A.; Compare, M.; Salo, A.; Zio, E.; Laakso, T.

    2016-01-01

    In this paper, we present a novel risk-based methodology for optimizing the inspections of large underground infrastructure networks in the presence of incomplete information about the network features and parameters. The methodology employs Multi Attribute Value Theory to assess the risk of each pipe in the network, whereafter the optimal inspection campaign is built with Portfolio Decision Analysis (PDA). Specifically, Robust Portfolio Modeling (RPM) is employed to identify Pareto-optimal portfolios of pipe inspections. The proposed methodology is illustrated by reporting a real case study on the large-scale maintenance optimization of the sewerage network in Espoo, Finland. - Highlights: • Risk-based approach to optimize pipe inspections on large underground networks. • Reasonable computational effort to select efficient inspection portfolios. • Possibility to accommodate imprecise expert information. • Feasibility of the approach shown by Espoo water system case study.

  2. Depleted UF6 Management Information Network - A resource for the public,

    Science.gov (United States)

    Depleted UF6 Management Information Network Web Site is an online repository of information about the U.S ) and DUF6, research and development efforts for beneficial uses of DU, DOE's program for management of line DUF6 Guide DUF6 Guide line Introductory information about depleted uranium: how it is created

  3. Out-of-Sequence Preventative Cell Dispatching for Multicast Input-Queued Space-Memory-Memory Clos-Network

    DEFF Research Database (Denmark)

    Yu, Hao; Ruepp, Sarah Renée; Berger, Michael Stübert

    2011-01-01

    This paper proposes two out-of-sequence (OOS) preventative cell dispatching algorithms for the multicast input-queued space-memory-memory (IQ-SMM) Clos-network switch architecture, i.e. the multicast flow-based DSRR (MF-DSRR) and the multicast flow-based round-robin (MFRR). Treating each cell...

  4. Applying information network analysis to fire-prone landscapes: implications for community resilience

    Directory of Open Access Journals (Sweden)

    Derric B. Jacobs

    2017-03-01

    Full Text Available Resilient communities promote trust, have well-developed networks, and can adapt to change. For rural communities in fire-prone landscapes, current resilience strategies may prove insufficient in light of increasing wildfire risks due to climate change. It is argued that, given the complexity of climate change, adaptations are best addressed at local levels where specific social, cultural, political, and economic conditions are matched with local risks and opportunities. Despite the importance of social networks as key attributes of community resilience, research using social network analysis on coupled human and natural systems is scarce. Furthermore, the extent to which local communities in fire-prone areas understand climate change risks, accept the likelihood of potential changes, and have the capacity to develop collaborative mitigation strategies is underexamined, yet these factors are imperative to community resiliency. We apply a social network framework to examine information networks that affect perceptions of wildfire and climate change in Central Oregon. Data were collected using a mailed questionnaire. Analysis focused on the residents' information networks that are used to gain awareness of governmental activities and measures of community social capital. A two-mode network analysis was used to uncover information exchanges. Results suggest that the general public develops perceptions about climate change based on complex social and cultural systems rather than as patrons of scientific inquiry and understanding. It appears that perceptions about climate change itself may not be the limiting factor in these communities' adaptive capacity, but rather how they perceive local risks. We provide a novel methodological approach in understanding rural community adaptation and resilience in fire-prone landscapes and offer a framework for future studies.

  5. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  6. Optimization of hydrometric monitoring network in urban drainage systems using information theory.

    Science.gov (United States)

    Yazdi, J

    2017-10-01

    Regular and continuous monitoring of urban runoff in both quality and quantity aspects is of great importance for controlling and managing surface runoff. Due to the considerable costs of establishing new gauges, optimization of the monitoring network is essential. This research proposes an approach for site selection of new discharge stations in urban areas, based on entropy theory in conjunction with multi-objective optimization tools and numerical models. The modeling framework provides an optimal trade-off between the maximum possible information content and the minimum shared information among stations. This approach was applied to the main surface-water collection system in Tehran to determine new optimal monitoring points under the cost considerations. Experimental results on this drainage network show that the obtained cost-effective designs noticeably outperform the consulting engineers' proposal in terms of both information contents and shared information. The research also determined the highly frequent sites at the Pareto front which might be important for decision makers to give a priority for gauge installation on those locations of the network.

  7. Psychology and social networks: a dynamic network theory perspective.

    Science.gov (United States)

    Westaby, James D; Pfaff, Danielle L; Redding, Nicholas

    2014-04-01

    Research on social networks has grown exponentially in recent years. However, despite its relevance, the field of psychology has been relatively slow to explain the underlying goal pursuit and resistance processes influencing social networks in the first place. In this vein, this article aims to demonstrate how a dynamic network theory perspective explains the way in which social networks influence these processes and related outcomes, such as goal achievement, performance, learning, and emotional contagion at the interpersonal level of analysis. The theory integrates goal pursuit, motivation, and conflict conceptualizations from psychology with social network concepts from sociology and organizational science to provide a taxonomy of social network role behaviors, such as goal striving, system supporting, goal preventing, system negating, and observing. This theoretical perspective provides psychologists with new tools to map social networks (e.g., dynamic network charts), which can help inform the development of change interventions. Implications for social, industrial-organizational, and counseling psychology as well as conflict resolution are discussed, and new opportunities for research are highlighted, such as those related to dynamic network intelligence (also known as cognitive accuracy), levels of analysis, methodological/ethical issues, and the need to theoretically broaden the study of social networking and social media behavior. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  8. Development and Implementation of the DHAPP Military eHealth Information Network System.

    Science.gov (United States)

    Kratz, Mary; Thomas, Anne; Hora, Ricardo; Vera, Delphis; Lutz, Mickey; Johnson, Mark D

    2017-01-01

    As the Joint United Nations Programme on HIV/AIDS, the Global Fund, and the US President's Emergency Plan for AIDS Relief focus on reaching 90-90-90 goals, military health systems are scaling up to meet the data demands of these ambitious objectives. Since 2008, the US Department of Defense HIV/AIDS Prevention Program (DHAPP) has been working with military partners in 14 countries on implementation and adoption of a Military eHealth Information Network (MeHIN). Each country implementation plan followed a structured process using international eHealth standards. DHAPP worked with the private sector to develop a commercial-off-the-shelf (COTS) electronic medical record (EMR) for the collection of data, including patient demographic information, clinical notes for general medical care, HIV encounters, voluntary medical male circumcision, and tuberculosis screening information. The COTS software approach provided a zero-dollar software license and focused on sharing a single version of the EMR across countries, so that all countries could benefit from software enhancements and new features over time. DHAPP also worked with the public sector to modify open source disease surveillance tools and open access of HIV training materials. Important lessons highlight challenges to eHealth implementation, including a paucity of technology infrastructure, military leadership rotations, and the need for basic computer skills building. While not simple, eHealth systems can be built and maintained with requisite security, flexibility, and reporting capabilities that provide critical information to improve the health of individuals and organizations. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  9. DATA MAYHEM VERSUS NIMBLE INFORMATION: TRANSFORMING HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS

    Science.gov (United States)

    2017-10-01

    organized intelligence with a comprehensive account of the information derived, validated by intelligence requirements tasking. Third Phase...AU/ACSC/MORALES/AY17 AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY DATA MAYHEM VERSUS NIMBLE INFORMATION : TRANSFORMING...HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS by Luis A. Morales, Major, USAF A Research

  10. 75 FR 30409 - Centers for Disease Control and Prevention

    Science.gov (United States)

    2010-06-01

    ... applications received in response to ``Workplace Health Research Network (WHRN)--Coordinating Center, SIP 10-031 and WHRN--Collaborating Centers, SIP 10-032, initial review.'' Contact Person for More Information..., Disability, and Injury Prevention and Control Special Interest Projects (SIPs): Workplace Health Research...

  11. Disease Containment Strategies based on Mobility and Information Dissemination.

    Science.gov (United States)

    Lima, A; De Domenico, M; Pejovic, V; Musolesi, M

    2015-06-02

    Human mobility and social structure are at the basis of disease spreading. Disease containment strategies are usually devised from coarse-grained assumptions about human mobility. Cellular networks data, however, provides finer-grained information, not only about how people move, but also about how they communicate. In this paper we analyze the behavior of a large number of individuals in Ivory Coast using cellular network data. We model mobility and communication between individuals by means of an interconnected multiplex structure where each node represents the population in a geographic area (i.e., a sous-préfecture, a third-level administrative region). We present a model that describes how diseases circulate around the country as people move between regions. We extend the model with a concurrent process of relevant information spreading. This process corresponds to people disseminating disease prevention information, e.g., hygiene practices, vaccination campaign notices and other, within their social network. Thus, this process interferes with the epidemic. We then evaluate how restricting the mobility or using preventive information spreading process affects the epidemic. We find that restricting mobility does not delay the occurrence of an endemic state and that an information campaign might be an effective countermeasure.

  12. Processing of chromatic information in a deep convolutional neural network.

    Science.gov (United States)

    Flachot, Alban; Gegenfurtner, Karl R

    2018-04-01

    Deep convolutional neural networks are a class of machine-learning algorithms capable of solving non-trivial tasks, such as object recognition, with human-like performance. Little is known about the exact computations that deep neural networks learn, and to what extent these computations are similar to the ones performed by the primate brain. Here, we investigate how color information is processed in the different layers of the AlexNet deep neural network, originally trained on object classification of over 1.2M images of objects in their natural contexts. We found that the color-responsive units in the first layer of AlexNet learned linear features and were broadly tuned to two directions in color space, analogously to what is known of color responsive cells in the primate thalamus. Moreover, these directions are decorrelated and lead to statistically efficient representations, similar to the cardinal directions of the second-stage color mechanisms in primates. We also found, in analogy to the early stages of the primate visual system, that chromatic and achromatic information were segregated in the early layers of the network. Units in the higher layers of AlexNet exhibit on average a lower responsivity for color than units at earlier stages.

  13. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  14. Information dynamics algorithm for detecting communities in networks

    Science.gov (United States)

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  15. Effect of local information within network layers on the evolution of cooperation in duplex public goods games

    International Nuclear Information System (INIS)

    Zhou, Yifeng; Zheng, Xiaoming; Wu, Weiwei

    2015-01-01

    Traditional works of public goods game (PGG) are often studied in simplex networks where agents play games through the same type of social interactions. In order to promote cooperation against the defection in PGGs in simplex network environment, many mechanisms have been proposed from different perspectives, such as the volunteering mechanisms, and the punishment and reward approaches. However, due to diverse types of interactions between agents in reality, the study of PGG should also consider the characteristic of multiplexity of networks. Hence, we firstly model the public goods game in the duplex network (for simplification of analysis, the duplex network is considered), in which agents have two types of social interactions, and thus the network is modeled as two network layers. This type of PGG is naturally named as duplex public goods game (D-PGG), in which agents can select one of the network layers to allocate their limited resources. Then for the new game environment (D-PGG), we propose a novel perspective to promote cooperation: degrading the information integrity, i.e., agents get information just from one network layer (local information) rather than from the whole duplex network (global information) in the evolution process. Finally, through theoretical analyses and simulations, we find that if agents imitate based on the local information of the payoff in the evolution, cooperation can be generally promoted; and the extent of promotion depends on both the network structure and the similarity of the network layers

  16. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  17. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  18. An online database for informing ecological network models: http://kelpforest.ucsc.edu.

    Science.gov (United States)

    Beas-Luna, Rodrigo; Novak, Mark; Carr, Mark H; Tinker, Martin T; Black, August; Caselle, Jennifer E; Hoban, Michael; Malone, Dan; Iles, Alison

    2014-01-01

    Ecological network models and analyses are recognized as valuable tools for understanding the dynamics and resiliency of ecosystems, and for informing ecosystem-based approaches to management. However, few databases exist that can provide the life history, demographic and species interaction information necessary to parameterize ecological network models. Faced with the difficulty of synthesizing the information required to construct models for kelp forest ecosystems along the West Coast of North America, we developed an online database (http://kelpforest.ucsc.edu/) to facilitate the collation and dissemination of such information. Many of the database's attributes are novel yet the structure is applicable and adaptable to other ecosystem modeling efforts. Information for each taxonomic unit includes stage-specific life history, demography, and body-size allometries. Species interactions include trophic, competitive, facilitative, and parasitic forms. Each data entry is temporally and spatially explicit. The online data entry interface allows researchers anywhere to contribute and access information. Quality control is facilitated by attributing each entry to unique contributor identities and source citations. The database has proven useful as an archive of species and ecosystem-specific information in the development of several ecological network models, for informing management actions, and for education purposes (e.g., undergraduate and graduate training). To facilitate adaptation of the database by other researches for other ecosystems, the code and technical details on how to customize this database and apply it to other ecosystems are freely available and located at the following link (https://github.com/kelpforest-cameo/databaseui).

  19. Making sense of information in noisy networks: human communication, gossip, and distortion.

    Science.gov (United States)

    Laidre, Mark E; Lamb, Alex; Shultz, Susanne; Olsen, Megan

    2013-01-21

    Information from others can be unreliable. Humans nevertheless act on such information, including gossip, to make various social calculations, thus raising the question of whether individuals can sort through social information to identify what is, in fact, true. Inspired by empirical literature on people's decision-making when considering gossip, we built an agent-based simulation model to examine how well simple decision rules could make sense of information as it propagated through a network. Our simulations revealed that a minimalistic decision-rule 'Bit-wise mode' - which compared information from multiple sources and then sought a consensus majority for each component bit within the message - was consistently the most successful at converging upon the truth. This decision rule attained high relative fitness even in maximally noisy networks, composed entirely of nodes that distorted the message. The rule was also superior to other decision rules regardless of its frequency in the population. Simulations carried out with variable agent memory constraints, different numbers of observers who initiated information propagation, and a variety of network types suggested that the single most important factor in making sense of information was the number of independent sources that agents could consult. Broadly, our model suggests that despite the distortion information is subject to in the real world, it is nevertheless possible to make sense of it based on simple Darwinian computations that integrate multiple sources. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Improving access to health information for older migrants by using grounded theory and social network analysis to understand their information behaviour and digital technology use.

    Science.gov (United States)

    Goodall, K T; Newman, L A; Ward, P R

    2014-11-01

    Migrant well-being can be strongly influenced by the migration experience and subsequent degree of mainstream language acquisition. There is little research on how older Culturally And Linguistically Diverse (CALD) migrants who have 'aged in place' find health information, and the role which digital technology plays in this. Although the research for this paper was not focused on cancer, we draw out implications for providing cancer-related information to this group. We interviewed 54 participants (14 men and 40 women) aged 63-94 years, who were born in Italy or Greece, and who migrated to Australia mostly as young adults after World War II. Constructivist grounded theory and social network analysis were used for data analysis. Participants identified doctors, adult children, local television, spouse, local newspaper and radio as the most important information sources. They did not generally use computers, the Internet or mobile phones to access information. Literacy in their birth language, and the degree of proficiency in understanding and using English, influenced the range of information sources accessed and the means used. The ways in which older CALD migrants seek and access information has important implications for how professionals and policymakers deliver relevant information to them about cancer prevention, screening, support and treatment, particularly as information and resources are moved online as part of e-health. © 2014 John Wiley & Sons Ltd.

  1. Information Estimation with Node Placement Strategy in 3D Wireless Sensor Networks

    OpenAIRE

    Karjee, Jyotirmoy; Jamadagni, H. S

    2017-01-01

    The cluster formation in Three Dimensional Wireless Sensor Networks (3D-WSN) give rise to overlapping of signals due to spherical sensing range which leads to information redundancy in the network. To address this problem, we develop a sensing algorithm for 3D-WSN based on dodecahedron topology which we call Three Dimensional Distributed Clustering (3D-DC) algorithm. Using 3D-DC algorithm in 3D-WSN, accurate information extraction appears to be a major challenge due to the environmental noise...

  2. Controllable quantum information network with a superconducting system

    International Nuclear Information System (INIS)

    Zhang, Feng-yang; Liu, Bao; Chen, Zi-hong; Wu, Song-lin; Song, He-shan

    2014-01-01

    We propose a controllable and scalable architecture for quantum information processing using a superconducting system network, which is composed of current-biased Josephson junctions (CBJJs) as tunable couplers between the two superconducting transmission line resonators (TLRs), each coupling to multiple superconducting qubits (SQs). We explicitly demonstrate that the entangled state, the phase gate, and the information transfer between any two selected SQs can be implemented, respectively. Lastly, numerical simulation shows that our scheme is robust against the decoherence of the system. -- Highlights: •An architecture for quantum information processing is proposed. •The quantum information transfer between any two selected SQs is implemented. •This proposal is robust against the decoherence of the system. •This architecture can be fabricated on a chip down to the micrometer scale

  3. Application of Network Analysis to Identify and Map Relationships between Information Systems in the context of Arctic Sustainability

    Science.gov (United States)

    Kontar, Y. Y.

    2017-12-01

    The Arctic Council is an intergovernmental forum promoting cooperation, coordination and interaction among the Arctic States and indigenous communities on issues of sustainable development and environmental protection in the North. The work of the Council is primarily carried out by six Working Groups: Arctic Contaminants Action Program, Arctic Monitoring and Assessment Programme, Conservation of Arctic Flora and Fauna, Emergency Prevention, Preparedness and Response, Protection of the Arctic Marine Environment, and Sustainable Development Working Group. The Working Groups are composed of researchers and representatives from government agencies. Each Working Group issues numerous scientific assessments and reports on a broad field of subjects, from climate change to emergency response in the Arctic. A key goal of these publications is to contribute to policy-making in the Arctic. Complex networks of information systems and the connections between the diverse elements within the systems have been identified via network analysis. This allowed to distinguish data sources that were used in the composition of the primary publications of the Working Groups. Next step is to implement network analysis to identify and map the relationships between the Working Groups and policy makers in the Arctic.

  4. Outcomes of Interorganizational Networks in Canada for Chronic Disease Prevention: Insights From a Concept Mapping Study, 2015.

    Science.gov (United States)

    Willis, Cameron; Kernoghan, Alison; Riley, Barbara; Popp, Janice; Best, Allan; Milward, H Brinton

    2015-11-19

    We conducted a mixed methods study from June 2014 to March 2015 to assess the perspectives of stakeholders in networks that adopt a population approach for chronic disease prevention (CDP). The purpose of the study was to identify important and feasible outcome measures for monitoring network performance. Participants from CDP networks in Canada completed an online concept mapping exercise, which was followed by interviews with network stakeholders to further understand the findings. Nine concepts were considered important outcomes of CDP networks: enhanced learning, improved use of resources, enhanced or increased relationships, improved collaborative action, network cohesion, improved system outcomes, improved population health outcomes, improved practice and policy planning, and improved intersectoral engagement. Three themes emerged from participant interviews related to measurement of the identified concepts: the methodological difficulties in measuring network outcomes, the dynamic nature of network evolution and function and implications for outcome assessment, and the challenge of measuring multisectoral engagement in CDP networks. Results from this study provide initial insights into concepts that can be used to describe the outcomes of networks for CDP and may offer foundations for strengthening network outcome-monitoring strategies and methodologies.

  5. Social network characteristics and HIV vulnerability among transgender persons in San Salvador: identifying opportunities for HIV prevention strategies.

    Science.gov (United States)

    Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz

    2012-01-01

    The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.

  6. Facilitators on networks reveal optimal interplay between information exchange and reciprocity.

    Science.gov (United States)

    Szolnoki, Attila; Perc, Matjaž; Mobilia, Mauro

    2014-04-01

    Reciprocity is firmly established as an important mechanism that promotes cooperation. An efficient information exchange is likewise important, especially on structured populations, where interactions between players are limited. Motivated by these two facts, we explore the role of facilitators in social dilemmas on networks. Facilitators are here mirrors to their neighbors-they cooperate with cooperators and defect with defectors-but they do not participate in the exchange of strategies. As such, in addition to introducing direct reciprocity, they also obstruct information exchange. In well-mixed populations, facilitators favor the replacement and invasion of defection by cooperation as long as their number exceeds a critical value. In structured populations, on the other hand, there exists a delicate balance between the benefits of reciprocity and the deterioration of information exchange. Extensive Monte Carlo simulations of social dilemmas on various interaction networks reveal that there exists an optimal interplay between reciprocity and information exchange, which sets in only when a small number of facilitators occupy the main hubs of the scale-free network. The drawbacks of missing cooperative hubs are more than compensated for by reciprocity and, at the same time, the compromised information exchange is routed via the auxiliary hubs with only marginal losses in effectivity. These results indicate that it is not always optimal for the main hubs to become leaders of the masses, but rather to exploit their highly connected state to promote tit-for-tat-like behavior.

  7. A large scale analysis of information-theoretic network complexity measures using chemical structures.

    Directory of Open Access Journals (Sweden)

    Matthias Dehmer

    Full Text Available This paper aims to investigate information-theoretic network complexity measures which have already been intensely used in mathematical- and medicinal chemistry including drug design. Numerous such measures have been developed so far but many of them lack a meaningful interpretation, e.g., we want to examine which kind of structural information they detect. Therefore, our main contribution is to shed light on the relatedness between some selected information measures for graphs by performing a large scale analysis using chemical networks. Starting from several sets containing real and synthetic chemical structures represented by graphs, we study the relatedness between a classical (partition-based complexity measure called the topological information content of a graph and some others inferred by a different paradigm leading to partition-independent measures. Moreover, we evaluate the uniqueness of network complexity measures numerically. Generally, a high uniqueness is an important and desirable property when designing novel topological descriptors having the potential to be applied to large chemical databases.

  8. Building African Capacity for HIV/AIDS Prevention Trials

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  9. METHODS OF TEXT INFORMATION CLASSIFICATION ON THE BASIS OF ARTIFICIAL NEURAL AND SEMANTIC NETWORKS

    Directory of Open Access Journals (Sweden)

    L. V. Serebryanaya

    2016-01-01

    Full Text Available The article covers the use of perseptron, Hopfild artificial neural network and semantic network for classification of text information. Network training algorithms are studied. An algorithm of inverse mistake spreading for perceptron network and convergence algorithm for Hopfild network are implemented. On the basis of the offered models and algorithms automatic text classification software is developed and its operation results are evaluated.

  10. The EUVAC-NET project: creation and operation of a surveillance community network for vaccine preventable infectious diseases.

    Science.gov (United States)

    Glismann, S; Rønne, T; Tozzi, A

    2001-06-01

    The EUVAC-NET network is in charge of the epidemiological surveillance and control of vaccine preventable diseases. It is coordinated by the SSI in Denmark, in collaboration with the ISS in Italy. The two main diseases targeted by the network are measles and pertussis. A collaboration is planned with the PHLS for the monitoring of Haemophilus influenzae b. EUVAC-NET includes the Member States of the European Union, and Iceland, Norway and Switzerland.

  11. A general framework for a collaborative water quality knowledge and information network.

    Science.gov (United States)

    Dalcanale, Fernanda; Fontane, Darrell; Csapo, Jorge

    2011-03-01

    Increasing knowledge about the environment has brought about a better understanding of the complexity of the issues, and more information publicly available has resulted into a steady shift from centralized decision making to increasing levels of participatory processes. The management of that information, in turn, is becoming more complex. One of the ways to deal with the complexity is the development of tools that would allow all players, including managers, researchers, educators, stakeholders and the civil society, to be able to contribute to the information system, in any level they are inclined to do so. In this project, a search for the available technology for collaboration, methods of community filtering, and community-based review was performed and the possible implementation of these tools to create a general framework for a collaborative "Water Quality Knowledge and Information Network" was evaluated. The main goals of the network are to advance water quality education and knowledge; encourage distribution and access to data; provide networking opportunities; allow public perceptions and concerns to be collected; promote exchange of ideas; and, give general, open, and free access to information. A reference implementation was made available online and received positive feedback from the community, which also suggested some possible improvements.

  12. The data-driven null models for information dissemination tree in social networks

    Science.gov (United States)

    Zhang, Zhiwei; Wang, Zhenyu

    2017-10-01

    For the purpose of detecting relatedness and co-occurrence between users, as well as the distribution features of nodes in spreading path of a social network, this paper explores topological characteristics of information dissemination trees (IDT) that can be employed indirectly to probe the information dissemination laws within social networks. Hence, three different null models of IDT are presented in this article, including the statistical-constrained 0-order IDT null model, the random-rewire-broken-edge 0-order IDT null model and the random-rewire-broken-edge 2-order IDT null model. These null models firstly generate the corresponding randomized copy of an actual IDT; then the extended significance profile, which is developed by adding the cascade ratio of information dissemination path, is exploited not only to evaluate degree correlation of two nodes associated with an edge, but also to assess the cascade ratio of different length of information dissemination paths. The experimental correspondences of the empirical analysis for several SinaWeibo IDTs and Twitter IDTs indicate that the IDT null models presented in this paper perform well in terms of degree correlation of nodes and dissemination path cascade ratio, which can be better to reveal the features of information dissemination and to fit the situation of real social networks.

  13. Information Networks and Social Inclusion in Latin America | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rapid changes in information networks throughout Latin America may provide new opportunities to address inequalities in the region. ... government and open education, with specific attention paid to women and youth in urban settings; ... optimizes household expenditures : a case study from rural communities in Mexico.

  14. Information content of neural networks with self-control and variable activity

    International Nuclear Information System (INIS)

    Bolle, D.; Amari, S.I.; Dominguez Carreta, D.R.C.; Massolo, G.

    2001-01-01

    A self-control mechanism for the dynamics of neural networks with variable activity is discussed using a recursive scheme for the time evolution of the local field. It is based upon the introduction of a self-adapting time-dependent threshold as a function of both the neural and pattern activity in the network. This mechanism leads to an improvement of the information content of the network as well as an increase of the storage capacity and the basins of attraction. Different architectures are considered and the results are compared with numerical simulations

  15. Neuronal avalanches in complex networks

    Directory of Open Access Journals (Sweden)

    Victor Hernandez-Urbina

    2016-12-01

    Full Text Available Brain networks are neither regular nor random. Their structure allows for optimal information processing and transmission across the entire neural substrate of an organism. However, for topological features to be appropriately harnessed, brain networks should implement a dynamical regime which prevents phase-locked and chaotic behaviour. Critical neural dynamics refer to a dynamical regime in which the system is poised at the boundary between regularity and randomness. It has been reported that neural systems poised at this boundary achieve maximum computational power. In this paper, we review recent results regarding critical neural dynamics that emerge from systems whose underlying structure exhibits complex network properties.

  16. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  17. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  18. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  19. Strengthening Chronic Disease Prevention Programming: the Toward Evidence-Informed Practice (TEIP) Program Assessment Tool

    Science.gov (United States)

    Albert, Dayna; Fortin, Rebecca; Lessio, Anne; Herrera, Christine; Hanning, Rhona; Rush, Brian

    2013-01-01

    Best practices identified solely on the strength of research evidence may not be entirely relevant or practical for use in community-based public health and the practice of chronic disease prevention. Aiming to bridge the gap between best practices literature and local knowledge and expertise, the Ontario Public Health Association, through the Toward Evidence-Informed Practice initiative, developed a set of resources to strengthen evidence-informed decision making in chronic disease prevention programs. A Program Assessment Tool, described in this article, emphasizes better processes by incorporating review criteria into the program planning and implementation process. In a companion paper, “Strengthening Chronic Disease Prevention Programming: The Toward Evidence-Informed Practice (TEIP) Program Evidence Tool,” we describe another tool, which emphasizes better evidence by providing guidelines and worksheets to identify, synthesize, and incorporate evidence from a range of sources (eg, peer-reviewed literature, gray literature, local expertise) to strengthen local programs. The Program Assessment Tool uses 19 criteria derived from literature on best and promising practices to assess and strengthen program planning and implementation. We describe the benefits, strengths, and challenges in implementing the tool in 22 community-based chronic disease prevention projects in Ontario, Canada. The Program Assessment Tool helps put best processes into operation to complement adoption and adaptation of evidence-informed practices for chronic disease prevention. PMID:23721789

  20. Dentists’ practice patterns regarding caries prevention: results from a dental practice-based research network

    Science.gov (United States)

    Yokoyama, Yoko; Kakudate, Naoki; Sumida, Futoshi; Matsumoto, Yuki; Gilbert, Gregg H; Gordan, Valeria V

    2013-01-01

    Objective The purposes of this study were to (1) quantify dentists' practice patterns regarding caries prevention and (2) test the hypothesis that certain dentists' characteristics are associated with these practice patterns. Design The study used a cross-sectional study design consisting of a questionnaire survey. Participants The study queried dentists who worked in outpatient dental practices who were affiliated with the Dental Practice-Based Research Network Japan, which seeks to engage dentists in investigating research questions and sharing experiences and expertise (n=282). Measurement Dentists were asked about their practice patterns regarding caries preventive dentistry. Background data on patients, practice and dentist were also collected. Results 38% of dentists (n=72) provided individualised caries prevention to more than 50% of their patients. Overall, 10% of the time in daily practice was spent on caries preventive dentistry. Dentists who provided individualised caries prevention to more than 50% of their patients spent significantly more time on preventive care and less time on removable prosthetics treatment, compared to dentists who did not provide individualised caries prevention. Additionally, they provided oral hygiene instruction, patient education, fluoride recommendations, intraoral photographs taken and diet counselling to their patients significantly more often than dentists who did not provide individualised caries prevention. Multiple logistic regression analysis suggested that the percentage of patients interested in caries prevention and the percentage of patients who received hygiene instruction, were both associated with the percentage of patients who receive individualised caries prevention. Conclusions We identified substantial variation in dentists' practice patterns regarding preventive dentistry. Individualised caries prevention was significantly related to provision of other preventive services and to having a higher percentage