WorldWideScience

Sample records for safety information network

  1. A Network Diffusion Model of Food Safety Scare Behavior considering Information Transparency

    Tingqiang Chen

    2017-01-01

    Full Text Available This study constructs the network diffusion model of food safety scare behavior under the effect of information transparency and examines the network topology and evolution characteristics of food safety scare behavior in a numerical simulation. The main conclusions of this study are as follows. (1 Under the effect of information transparency, the network degree distribution of food safety scare behavior diffusion demonstrates the decreasing characteristics of diminishing margins. (2 Food safety scare behavior diffusion increases with the information dissemination rate and consumer concern about food safety incidents and shows the characteristics of monotone increasing. And with the increasing of the government food safety supervision information transparency and media food safety supervision information transparency, the whole is declining characteristic of diminishing marginal. In addition, the extinction of food safety scare behavior cannot be achieved gradually given a single regulation of government food safety supervision information transparency and media food safety supervision information transparency. (3 The interaction effects between improving government food safety supervision information transparency or media food safety supervision information transparency and declining consumer concerns about food safety incidents or information transmission rate can engender the suppression of food safety scare behavior diffusion.

  2. Methods of Certification tests PLC-Networks in Compliance Safety Information

    A. A. Balaev

    2011-12-01

    Full Text Available The aim of this research was description of the methodology of the audit plc-network to meet the requirements of information security. The technique is based on the provisions of the guidance documents and model FSTEC Russia test object methods of information on safety information.

  3. Animal Product Safety Information

    ... Home Animal & Veterinary Safety & Health Product Safety Information Product Safety Information Share Tweet Linkedin Pin it More ... to report adverse experiences with veterinary drugs. Additional Product Information Questions and Answers: Evanger’s Dog and Cat ...

  4. Access management in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  5. Intersection planning in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  6. Route management in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  7. Land use planning in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  8. Flu Vaccine Safety Information

    ... Influenza Types Seasonal Avian Swine Variant Pandemic Other Flu Vaccine Safety Information Questions & Answers Language: English (US) ... safety of flu vaccines monitored? Egg Allergy Are flu vaccines safe? Flu vaccines have good safety record. ...

  9. Establishment of the National Nuclear Regulatory Portal (NNRP) as the key element of the Global Nuclear Safety and Security Network and Regulatory Network (GNSSN/RegNet) for sharing of nuclear safety information and knowledge among the Global Expert Community

    Kuvshinnikov, A.V.

    2011-01-01

    The Global Nuclear Safety and Security Network (GNSSN) implements the concept of the Global Nuclear Safety and Security Framework (GNSSF) as outlined in INSAG 21. This is the framework of instruments and resources for achieving and maintaining worldwide a high level of safety and security at nuclear facilities and activities as stated in SF-1 and supporting safety standards or recommendations such as INSAG-12. National efforts are and should be augmented by the activities of a variety of international enterprises that facilitate safety and security. The IAEA standard GS-R-3 requires that information and knowledge is managed as a resource. Further strengthening of GNSSN in particular regulatory networking as intended by GNSSN/RegNet has to be based on current national priorities, on existing regional and thematic networks and on the established mechanisms of international co-operation as presented for example on the websites of the IAEA or the OECD-NEA. Current design and operation of RegNet are flexible enough to accommodate differences in national and international approaches and practices and to facilitate exchange and cooperation on regulatory matters. The main role of GNSSN/RegNet is sharing knowledge and bringing people together to enhance and promote nuclear safety and security. The objectives of GNSSN/RegNet: enhancing safety and security by international cooperation, sharing information and best practices, enabling adequate access to relevant safety and security information and promoting the dissemination of this information, implementing active collaboration in the relevant areas related to safety and security, such as joint projects, peer reviews, enabling synergies among existing networks and initiatives, informing the public on the relevant safety and security areas and the related international collaboration. In the RegNet part of the GNSSN exist the National Nuclear Regulatory Portal (NNRP) which is on one hand a part of the global RegNet and on the

  10. Mobility Network and Safety

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  11. A Real-Time Construction Safety Monitoring System for Hazardous Gas Integrating Wireless Sensor Network and Building Information Modeling Technologies.

    Cheung, Weng-Fong; Lin, Tzu-Hsuan; Lin, Yu-Cheng

    2018-02-02

    In recent years, many studies have focused on the application of advanced technology as a way to improve management of construction safety management. A Wireless Sensor Network (WSN), one of the key technologies in Internet of Things (IoT) development, enables objects and devices to sense and communicate environmental conditions; Building Information Modeling (BIM), a revolutionary technology in construction, integrates database and geometry into a digital model which provides a visualized way in all construction lifecycle management. This paper integrates BIM and WSN into a unique system which enables the construction site to visually monitor the safety status via a spatial, colored interface and remove any hazardous gas automatically. Many wireless sensor nodes were placed on an underground construction site and to collect hazardous gas level and environmental condition (temperature and humidity) data, and in any region where an abnormal status is detected, the BIM model will alert the region and an alarm and ventilator on site will start automatically for warning and removing the hazard. The proposed system can greatly enhance the efficiency in construction safety management and provide an important reference information in rescue tasks. Finally, a case study demonstrates the applicability of the proposed system and the practical benefits, limitations, conclusions, and suggestions are summarized for further applications.

  12. An online network tool for quality information to answer questions about occupational safety and health: usability and applicability

    van Dijk Frank JH

    2010-10-01

    Full Text Available Abstract Background Common information facilities do not always provide the quality information needed to answer questions on health or health-related issues, such as Occupational Safety and Health (OSH matters. Barriers may be the accessibility, quantity and readability of information. Online Question & Answer (Q&A network tools, which link questioners directly to experts can overcome some of these barriers. When designing and testing online tools, assessing the usability and applicability is essential. Therefore, the purpose of this study is to assess the usability and applicability of a new online Q&A network tool for answers on OSH questions. Methods We applied a cross-sectional usability test design. Eight occupational health experts and twelve potential questioners from the working population (workers were purposively selected to include a variety of computer- and internet-experiences. During the test, participants were first observed while executing eight tasks that entailed important features of the tool. In addition, they were interviewed. Through task observations and interviews we assessed applicability, usability (effectiveness, efficiency and satisfaction and facilitators and barriers in use. Results Most features were usable, though several could be improved. Most tasks were executed effectively. Some tasks, for example searching stored questions in categories, were not executed efficiently and participants were less satisfied with the corresponding features. Participants' recommendations led to improvements. The tool was found mostly applicable for additional information, to observe new OSH trends and to improve contact between OSH experts and workers. Hosting and support by a trustworthy professional organization, effective implementation campaigns, timely answering and anonymity were seen as important use requirements. Conclusions This network tool is a promising new strategy for offering company workers high quality information

  13. A method for risk-informed safety significance categorization using the analytic hierarchy process and bayesian belief networks

    Ha, Jun Su; Seong, Poong Hyun

    2004-01-01

    A risk-informed safety significance categorization (RISSC) is to categorize structures, systems, or components (SSCs) of a nuclear power plant (NPP) into two or more groups, according to their safety significance using both probabilistic and deterministic insights. In the conventional methods for the RISSC, the SSCs are quantitatively categorized according to their importance measures for the initial categorization. The final decisions (categorizations) of SSCs, however, are qualitatively made by an expert panel through discussions and adjustments of opinions by using the probabilistic insights compiled in the initial categorization process and combining the probabilistic insights with the deterministic insights. Therefore, owing to the qualitative and linear decision-making process, the conventional methods have the demerits as follows: (1) they are very costly in terms of time and labor, (2) it is not easy to reach the final decision, when the opinions of the experts are in conflict and (3) they have an overlapping process due to the linear paradigm (the categorization is performed twice - first, by the engineers who propose the method, and second, by the expert panel). In this work, a method for RISSC using the analytic hierarchy process (AHP) and bayesian belief networks (BBN) is proposed to overcome the demerits of the conventional methods and to effectively arrive at a final decision (or categorization). By using the AHP and BBN, the expert panel takes part in the early stage of the categorization (that is, the quantification process) and the safety significance based on both probabilistic and deterministic insights is quantified. According to that safety significance, SSCs are quantitatively categorized into three categories such as high safety significant category (Hi), potentially safety significant category (Po), or low safety significant category (Lo). The proposed method was applied to the components such as CC-V073, CV-V530, and SI-V644 in Ulchin Unit

  14. State Traffic Safety Information

    Department of Transportation — The State Traffic Safety Information (STSI) portal is part of the larger Fatality Analysis Reporting System (FARS) Encyclopedia. STSI provides state-by-state traffic...

  15. Overlay networks toward information networking

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  16. Global Nuclear Safety and Security Network

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  17. Safety Information System Guide

    Bullock, M.G.

    1977-03-01

    This Guide provides guidelines for the design and evaluation of a working safety information system. For the relatively few safety professionals who have already adopted computer-based programs, this Guide may aid them in the evaluation of their present system. To those who intend to develop an information system, it will, hopefully, inspire new thinking and encourage steps towards systems safety management. For the line manager who is working where the action is, this Guide may provide insight on the importance of accident facts as a tool for moving ideas up the communication ladder where they will be heard and acted upon; where what he has to say will influence beneficial changes among those who plan and control his operations. In the design of a safety information system, it is suggested that the safety manager make friends with a computer expert or someone on the management team who has some feeling for, and understanding of, the art of information storage and retrieval as a new and better means for communication

  18. Congenital Heart Information Network

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  19. An online expert network for high quality information on occupational safety and health: cross-sectional study of user satisfaction and impact

    Rhebergen, Martijn D. F.; Lenderink, Annet F.; van Dijk, Frank J. H.; Hulshof, Carel T. J.

    2011-01-01

    Many people have difficulties finding information on health questions, including occupational safety and health (OSH) issues. One solution to alleviate these difficulties could be to offer questioners free-of-charge, online access to a network of OSH experts who provide tailored, high-quality

  20. Information network architectures

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  1. An online network tool for quality information to answer questions about occupational safety and health: usability and applicability

    Rhebergen, Martijn D. F.; Hulshof, Carel T. J.; Lenderink, Annet F.; van Dijk, Frank J. H.

    2010-01-01

    Common information facilities do not always provide the quality information needed to answer questions on health or health-related issues, such as Occupational Safety and Health (OSH) matters. Barriers may be the accessibility, quantity and readability of information. Online Question & Answer (Q&A)

  2. An Online Network Tool for Quality Information to Answer Questions about Occupational Safety and Health: Usability and Applicability

    Rhebergen, M.D.F.; Hulshof, C.T.J.; Lenderink, A.F.; van Dijk, F.J.H.

    2010-01-01

    ABSTRACT: BACKGROUND: Common information facilities do not always provide the quality information needed to answer questions on health or health-related issues, such as Occupational Safety and Health (OSH) matters. Barriers may be the accessibility, quantity and readability of information. Online

  3. European vehicle passive safety network

    Wismans, J.S.H.M.; Janssen, E.G.

    1999-01-01

    The general objective of the European Vehicle Passive Safety Network is to contribute to the reduction of the number of road traffic victims in Europe by passive safety measures. The aim of the road safety policy of the European Commission is to reduce the annual total of fatalities to 18000 in

  4. Managing knowledge and information on nuclear safety

    Hahn, L.

    2005-01-01

    Described is the management of nuclear safety knowledge through education networks, knowledge pool, sharing, archiving and distributing the knowledge information. Demonstrated is the system used at Gesellschaft fuer Anlagen-und Reaktorsicherheit

  5. INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN

    E. G. Belyakova

    2017-01-01

    Full Text Available Introduction. The article is devoted to the problem of interaction between schoolchildren and possible informational risks transmitted on the Internet. Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. The aim of the present research is to analyze the state of informational safety of schoolchildren while using the Internet; gaining an understanding of the role of external restrictions and opportunities of intrapersonal filtration of the harmful Internet content depending on children age. Methodology and research methods. The methodology of the research is based on modern methods aimed to consider the problem of personal socialization in modern information society. Thus, the Internet Initiatives Development Fund (IIDF questionnaire let the authors define the level of awareness of recipients on the problem under consideration. Results and scientific novelty. The theoretical analysis helped the authors predict the correlation of basic methods in order to guarantee personal safety of schoolchildren taking into account the process of maturity as well as the decrease of external filters that may stop harmful content. Empirical part of the research has enabled to reveal decrease in external control of staying of a child in network in the process of growing up against the background of restrictive attitudes prevalence among teachers and parents. Therefore, the research supposed to improve information culture of schoolchildren from the earliest ages encouraging them to sensibly and correctly interpret the information on the Internet. Practical significance. The practical recommendations to parents and teachers in order to improve informational personal safety of schoolchildren are proposed. The relevancy

  6. An online expert network for high quality information on occupational safety and health: cross-sectional study of user satisfaction and impact

    Rhebergen Martijn DF

    2011-11-01

    Full Text Available Abstract Background Many people have difficulties finding information on health questions, including occupational safety and health (OSH issues. One solution to alleviate these difficulties could be to offer questioners free-of-charge, online access to a network of OSH experts who provide tailored, high-quality information. The aim of this study was to assess whether network quality, respectively information quality, as perceived by the questioners, is associated with questioners' overall satisfaction and to explore the impact of the information received on questioners' knowledge, work and work functioning. Methods We evaluated the experiences of OSH questioners with the online network ArboAntwoord.com over a two-year period. In this network, approximately 80 qualified experts are available to answer OSH questions. By means of a questionnaire, we assessed questioners' overall satisfaction with the network, whether the network was user-friendly, easily accessible and easy to handle and whether the information provided was complete, applicable and received in a timely manner. The impact of the information on questioners' knowledge, work or work functioning was explored with seven questions. In the study period, 460 unique OSH questioners asked 851 OSH questions. In total, 205 of the 460 questioners completed the questionnaire (response rate 45%. Results Of the responders, 71% were satisfied with the ArboAntwoord network. Multiple logistic regression analysis showed that the applicability of the information had a positive influence on the questioners' overall satisfaction (OR = 16.0, 95% CI: 7.0-36.4. Also, user friendliness of the network (OR = 3.3, 95% CI: 1.3-8.6 and completeness of the information provided (OR = 3.0, 95% CI: 1.3-6.8 were positively related to the questioners' satisfaction. For 74% of the questioners, the information helped to increase their knowledge and understanding. Overall, 25% of the questioners indicated that the received

  7. An online expert network for high quality information on occupational safety and health: cross-sectional study of user satisfaction and impact.

    Rhebergen, Martijn D F; Lenderink, Annet F; van Dijk, Frank J H; Hulshof, Carel T J

    2011-11-23

    Many people have difficulties finding information on health questions, including occupational safety and health (OSH) issues. One solution to alleviate these difficulties could be to offer questioners free-of-charge, online access to a network of OSH experts who provide tailored, high-quality information. The aim of this study was to assess whether network quality, respectively information quality, as perceived by the questioners, is associated with questioners' overall satisfaction and to explore the impact of the information received on questioners' knowledge, work and work functioning. We evaluated the experiences of OSH questioners with the online network ArboAntwoord.com over a two-year period. In this network, approximately 80 qualified experts are available to answer OSH questions. By means of a questionnaire, we assessed questioners' overall satisfaction with the network, whether the network was user-friendly, easily accessible and easy to handle and whether the information provided was complete, applicable and received in a timely manner. The impact of the information on questioners' knowledge, work or work functioning was explored with seven questions. In the study period, 460 unique OSH questioners asked 851 OSH questions. In total, 205 of the 460 questioners completed the questionnaire (response rate 45%). Of the responders, 71% were satisfied with the ArboAntwoord network. Multiple logistic regression analysis showed that the applicability of the information had a positive influence on the questioners' overall satisfaction (OR = 16.0, 95% CI: 7.0-36.4). Also, user friendliness of the network (OR = 3.3, 95% CI: 1.3-8.6) and completeness of the information provided (OR = 3.0, 95% CI: 1.3-6.8) were positively related to the questioners' satisfaction. For 74% of the questioners, the information helped to increase their knowledge and understanding. Overall, 25% of the questioners indicated that the received information improved their work, work functioning

  8. A unified plant information network

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  9. National Network for Immunization Information

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  10. Information Networks in Biomedicine

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  11. NIDDK Information Network (DKnet)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  12. Measuring Health Information Dissemination and Identifying Target Interest Communities on Twitter: Methods Development and Case Study of the @SafetyMD Network.

    Kandadai, Venk; Yang, Haodong; Jiang, Ling; Yang, Christopher C; Fleisher, Linda; Winston, Flaura Koplin

    2016-05-05

    Little is known about the ability of individual stakeholder groups to achieve health information dissemination goals through Twitter. This study aimed to develop and apply methods for the systematic evaluation and optimization of health information dissemination by stakeholders through Twitter. Tweet content from 1790 followers of @SafetyMD (July-November 2012) was examined. User emphasis, a new indicator of Twitter information dissemination, was defined and applied to retweets across two levels of retweeters originating from @SafetyMD. User interest clusters were identified based on principal component analysis (PCA) and hierarchical cluster analysis (HCA) of a random sample of 170 followers. User emphasis of keywords remained across levels but decreased by 9.5 percentage points. PCA and HCA identified 12 statistically unique clusters of followers within the @SafetyMD Twitter network. This study is one of the first to develop methods for use by stakeholders to evaluate and optimize their use of Twitter to disseminate health information. Our new methods provide preliminary evidence that individual stakeholders can evaluate the effectiveness of health information dissemination and create content-specific clusters for more specific targeted messaging.

  13. Aviation Safety Hotline Information System -

    Department of Transportation — The Aviation Safety Hotline Information System (ASHIS) collects, stores, and retrieves reports submitted by pilots, mechanics, cabin crew, passengers, or the public...

  14. The commercial vehicle information systems and networks program, 2013.

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  15. Information cascade on networks

    Hisakado, Masato; Mori, Shintaro

    2016-05-01

    In this paper, we discuss a voting model by considering three different kinds of networks: a random graph, the Barabási-Albert (BA) model, and a fitness model. A voting model represents the way in which public perceptions are conveyed to voters. Our voting model is constructed by using two types of voters-herders and independents-and two candidates. Independents conduct voting based on their fundamental values; on the other hand, herders base their voting on the number of previous votes. Hence, herders vote for the majority candidates and obtain information relating to previous votes from their networks. We discuss the difference between the phases on which the networks depend. Two kinds of phase transitions, an information cascade transition and a super-normal transition, were identified. The first of these is a transition between a state in which most voters make the correct choices and a state in which most of them are wrong. The second is a transition of convergence speed. The information cascade transition prevails when herder effects are stronger than the super-normal transition. In the BA and fitness models, the critical point of the information cascade transition is the same as that of the random network model. However, the critical point of the super-normal transition disappears when these two models are used. In conclusion, the influence of networks is shown to only affect the convergence speed and not the information cascade transition. We are therefore able to conclude that the influence of hubs on voters' perceptions is limited.

  16. Wireless Sensor Network Safety Study

    M.Shankar; Dr.M.Sridar; Dr.M.Rajani

    2012-01-01

    Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact...

  17. Safety and security profiles of industry networks used in safety- critical applications

    Mária FRANEKOVÁ

    2008-01-01

    Full Text Available The author describes the mechanisms of safety and security profiles of industry and communication networks used within safety – related applications in technological and information levels of process control recommended according to standards IEC 61784-3,4. Nowadays the number of vendors of the safety – related communication technologies who guarantees besides the standard communication, the communication amongst the safety – related equipment according to IEC 61508 is increasing. Also the number of safety – related products is increasing, e. g. safety Fieldbus, safety PLC, safety curtains, safety laser scanners, safety buttons, safety relays and other. According to world survey the safety Fieldbus denoted the highest growth from all manufactured safety products.The main part of this paper is the description of the safety-related Fieldbus communication system, which has to guaranty Safety Integrity Level.

  18. Information theoretic description of networks

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  19. International exchange of safety and licensing information

    Lafleur, J.D. Jr.; Hauber, R.D.; Chenier, D.M.

    1977-01-01

    A network of formal and informal bilateral arrangements for the exchange of nuclear safety information is being established by the US Nuclear Regulatory Commission. For developing countries such arrangements can provide ready access to the extensive, fully documented safety analyses and safety research results that USNRC has accumulated. USNRC has been receiving foreign visitors at a rate of about 500 per year, largely for discussions of safety and licensing questions related to light water reactors. Exchanges also are taking place on the safety of advanced reactors. A special interest of the USNRC is in providing for reciprocal communication, at the earliest possible time, of important problems, decisions and other actions on nuclear safety matters. For example, it is essential that a newly discovered problem in a nuclear reactor be brought immediately to the attention of other governments that are responsible for the safety of similar reactors. Definite progress has been made in the USA in defining categories of information that USNRC can receive in confidence from foreign countries, and can protect from disclosure under the US Freedom of Information Act. Certain exchanges have taken place on this basis. Experience in the establishment and operation of USNRC's bilateral exchange arrangements is summarized. A typical exchange with the regulatory authority of a country building its first power reactor is described. (author)

  20. Exploring network operations for data and information networks

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  1. Information networks and worker recruitment

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  2. International exchange of safety and licensing information

    Lafleur, J.D. Jr.; Hauber, R.D.; Chenier, D.M.

    1977-01-01

    A network of formal and informal bilateral arrangements for the exchange of nuclear safety information is being established by the U.S. Nuclear Regulatory Commission. For developing countries, such arrangements can provide ready access to the extensive, fully documented safety analyses and safety research results that NRC has accumulated. NRC has been receiving foreign visitors at a rate of about 500 per year, largely for discussions of safety and licensing questions related to light water reactors. Exchanges also are taking place on the safety of advanced reactors. A special interest of the NRC is in providing for reciprocal communicaion, at the earliest possible time, of important problems, decisions and other actions on nuclear safety matters. For example, it is essential that a newly-discovered problem in a nuclear reactor be brought immediately to the attention of other governments which are responsible for the safety of similar reactors. Definite progress has been made in the U.S. Freedom of Information Act. Certain exchanges have taken place on this basis. Experience in the establishment and operation of NRC's bilateral exchange arrangements is summarized. A typical exchange with the regulatory authority of country building its first power reactor is described

  3. Agricultural informational flow in informal communication networks ...

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  4. The Commercial Vehicle Information Systems and Network program, 2012.

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  5. Network Centric Information Structure - Crisis Information Management

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  6. Extracting information from multiplex networks

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  7. Network Paradigm of Information Security

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  8. Radiation safety research information database

    Yukawa, Masae; Miyamoto, Kiriko; Takeda, Hiroshi; Kuroda, Noriko; Yamamoto, Kazuhiko

    2004-01-01

    National Institute of Radiological Sciences in Japan began to construct Radiation Safety Research Information Database' in 2001. The research information database is of great service to evaluate the effects of radiation on people by estimating exposure dose by determining radiation and radioactive matters in the environment. The above database (DB) consists of seven DB such as Nirs Air Borne Dust Survey DB, Nirs Environmental Tritium Survey DB, Nirs Environmental Carbon Survey DB, Environmental Radiation Levels, Abe, Metabolic Database for Assessment of Internal Dose, Graphs of Predicted Monitoring Data, and Nirs nuclear installation environment water tritium survey DB. Outline of DB and each DB are explained. (S.Y.)

  9. Research on network information security model and system construction

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  10. Networks and informal contract law

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  11. Investigation of road network features and safety performance.

    Wang, Xuesong; Wu, Xingwei; Abdel-Aty, Mohamed; Tremont, Paul J

    2013-07-01

    The analysis of road network designs can provide useful information to transportation planners as they seek to improve the safety of road networks. The objectives of this study were to compare and define the effective road network indices and to analyze the relationship between road network structure and traffic safety at the level of the Traffic Analysis Zone (TAZ). One problem in comparing different road networks is establishing criteria that can be used to scale networks in terms of their structures. Based on data from Orange and Hillsborough Counties in Florida, road network structural properties within TAZs were scaled using 3 indices: Closeness Centrality, Betweenness Centrality, and Meshedness Coefficient. The Meshedness Coefficient performed best in capturing the structural features of the road network. Bayesian Conditional Autoregressive (CAR) models were developed to assess the safety of various network configurations as measured by total crashes, crashes on state roads, and crashes on local roads. The models' results showed that crash frequencies on local roads were closely related to factors within the TAZs (e.g., zonal network structure, TAZ population), while crash frequencies on state roads were closely related to the road and traffic features of state roads. For the safety effects of different networks, the Grid type was associated with the highest frequency of crashes, followed by the Mixed type, the Loops & Lollipops type, and the Sparse type. This study shows that it is possible to develop a quantitative scale for structural properties of a road network, and to use that scale to calculate the relationships between network structural properties and safety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Information transmission on hybrid networks

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  13. Safety message broadcast in vehicular networks

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  14. Research Award: Information and Networks

    IDRC CRDI

    ... of networked technologies has created new opportunities for advancing human ... The I&N Research Awardee will ideally explore research questions centred ... Examples of questions include: ... engineering or computer/information science;.

  15. Information and Networks

    arashid

    Information and Communication Technologies for Development .... costs of digital media reproduction – combined with rampant piracy – are fundamentally .... namely those related to reputation, resources, time, and ethics - all challenges that ...

  16. Safety evaluation of large ventilation networks

    Barrocas, M.; Pruchon, P.; Robin, J.P.; Rouyer, J.L.; Salmon, P.

    1981-01-01

    For large ventilation networks, it is necessary to make a safety evaluation of their responses to perturbations such as blower failure, unexpected transfers, local pressurization. This evaluation is not easy to perform because of the many interrelationships between the different parts of the networks, interrelationships coming from the circulations of workers and matetials between cells and rooms and from the usefulness of air transfers through zones of different classifications. This evaluation is all the more necessary since new imperatives in energy savings push for minimizing the air flows, which tends to render the network more sensitive to perturbations. A program to evaluate safety has been developed by the Service de Protection Technique in cooperation with operators and designers of big nuclear facilities and the first applications presented here show the weak points of the installation studied from the safety view point

  17. Information communication on complex networks

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  18. Information Assurance in Wireless Networks

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  19. Safety culture and networks of influence

    Pereira, Carlos Henrique V.; Barroso, Antonio C.O.; Vieira Neto, Antonio S.

    2011-01-01

    This paper analyzes the social networks that influence the formation and maintenance of the safety culture within the Institute of Energy and Nuclear Research (IPEN-CNEN/SP). From the mapping and analysis of social networks, actors with a significant degree of influence were identified. Later using a questionnaire, the beliefs of the population sample were mapped. Thus, the importance of key actors in the network analysis could be confirmed statistically. Therefore, based on the mentioned methods we could demonstrate our hypothesis, that there are some social networks that are important in the formation of safety culture, as well as the fact that the influence of some distinguished actors plays an essential role in this amalgam. (author)

  20. Safety culture and networks of influence

    Pereira, Carlos Henrique V.; Barroso, Antonio C.O.; Vieira Neto, Antonio S., E-mail: carloshvp@usp.br, E-mail: barroso@ipen.br, E-mail: asvneto@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2011-07-01

    This paper analyzes the social networks that influence the formation and maintenance of the safety culture within the Institute of Energy and Nuclear Research (IPEN-CNEN/SP). From the mapping and analysis of social networks, actors with a significant degree of influence were identified. Later using a questionnaire, the beliefs of the population sample were mapped. Thus, the importance of key actors in the network analysis could be confirmed statistically. Therefore, based on the mentioned methods we could demonstrate our hypothesis, that there are some social networks that are important in the formation of safety culture, as well as the fact that the influence of some distinguished actors plays an essential role in this amalgam. (author)

  1. Information systems in food safety management.

    McMeekin, T A; Baranyi, J; Bowman, J; Dalgaard, P; Kirk, M; Ross, T; Schmid, S; Zwietering, M H

    2006-12-01

    Information systems are concerned with data capture, storage, analysis and retrieval. In the context of food safety management they are vital to assist decision making in a short time frame, potentially allowing decisions to be made and practices to be actioned in real time. Databases with information on microorganisms pertinent to the identification of foodborne pathogens, response of microbial populations to the environment and characteristics of foods and processing conditions are the cornerstone of food safety management systems. Such databases find application in: Identifying pathogens in food at the genus or species level using applied systematics in automated ways. Identifying pathogens below the species level by molecular subtyping, an approach successfully applied in epidemiological investigations of foodborne disease and the basis for national surveillance programs. Predictive modelling software, such as the Pathogen Modeling Program and Growth Predictor (that took over the main functions of Food Micromodel) the raw data of which were combined as the genesis of an international web based searchable database (ComBase). Expert systems combining databases on microbial characteristics, food composition and processing information with the resulting "pattern match" indicating problems that may arise from changes in product formulation or processing conditions. Computer software packages to aid the practical application of HACCP and risk assessment and decision trees to bring logical sequences to establishing and modifying food safety management practices. In addition there are many other uses of information systems that benefit food safety more globally, including: Rapid dissemination of information on foodborne disease outbreaks via websites or list servers carrying commentary from many sources, including the press and interest groups, on the reasons for and consequences of foodborne disease incidents. Active surveillance networks allowing rapid dissemination

  2. The Commodity Form of Safety Information

    Rodrigo Finkelstein

    2015-10-01

    Full Text Available The production of safety information is deemed a vital resource to protect human lives at the work site. The injury rate, lost days, incapacity rate, and fatality rate, are key indicators to prop up labour risk awareness and identify job hazards. However, safety information gets highly distorted because it does not only measure risk but serves as a means of exchange. It determines the amount of money to be swapped between Workers’ Compensation Boards and their client corporations. Moreover, as a depository of exchange value, safety information tends to exert pressure over social reality rather than just being a passive reflection of it. This paper discloses the commodity form of safety information. Based on a political economy of information framework, it identifies, describes, and analyses the safety information commodity in its active role of organizing safety and labour health.

  3. Pesticide Health and Safety Information

    Animal Health Safe Use Practices Pest Control Food Safety Low Risk Pesticides Integrated Pest Management directed by the product label. Pesticides may be ingested if stored improperly in food or beverage ; Environment Human Health Animal Health Safe Use Practices Food Safety Environment Air Water Soil Wildlife

  4. Information and control in networks

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  5. Reactor operation safety information document

    1990-01-01

    The report contains a reactor facility description which includes K, P, and L reactor sites, structures, operating systems, engineered safety systems, support systems, and process and effluent monitoring systems; an accident analysis section which includes cooling system anomalies, radioactive materials releases, and anticipated transients without scram; a summary of onsite doses from design basis accidents; severe accident analysis (reactor core disruption); a description of operating contractor organization and emergency planning; and a summary of reactor safety evolution. (MB)

  6. IMNN: Information Maximizing Neural Networks

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  7. Safety campaigns. TIS Launches New Safety Information Campaign

    2001-01-01

    Need to start a new installation and worried about safety aspects? Or are you newly responsible for safety matters in a CERN building? Perhaps you're simply interested in how to make the working environment safer for yourself and your colleagues. Whatever the case, a new information campaign launched by TIS this week can help. The most visible aspects of the new campaign will be posters distributed around the Laboratory treating a different subject each month. The Web site - http://safety.cern.ch/ - which provides all safety related information. But these are not the only aspects of the new campaign. Members of the TIS/GS group, whose contact details can be found on the safety web site, are available to give information and advice on a one-to-one basis at any time. The campaign's launch has been timed to coincide with European Safety Week, organized by the European Agency for Safety and Health at Work and the subject treated in the first posters is safety inspection. This particular topic only concerns thos...

  8. Nuclear safety education and training network

    Bastos, J.; Ulfkjaer, L.

    2004-01-01

    In March 2001, the Secretariat convened an Advisory Group on Education and Training in nuclear safety. The Advisory Group considered structure, scope and means related to the implementation of an IAEA Programme on Education and Training . A strategic plan was agreed and the following outputs were envisaged: 1. A Training Support Programme in nuclear safety, including a standardized and harmonized approach for training developed by the IAEA and in use by Member States. 2. National and regional training centres, established to support sustainable national nuclear safety infrastructures. 3. Training material for use by lecturers and students developed by the IAEA in English and translated to other languages. The implementation of the plan was initiated in 2002 emphasizing the preparation of training materials. In 2003 a pilot project for a network on Education and Training in Asia was initiated

  9. Environmental safety of the global information space

    В’ячеслав Степанович Волошин

    2015-03-01

    Databases of full-text publications – journals, articles, monographs- are surely a means of salvation for science. There already exist a large number of such portals. Besides, advantages and disadvantages of electronic subscriptions to periodicals should certainly be considered. The former include the following most evident ones: aggregation of large data arrays, saving money on a subscription, an opportunity to work with relevant publications, thematic collections of materials, availability of records, simultaneous access of an unlimited number of users and others. Nevertheless, there are many disadvantages that make it difficult to work with full-text publications. They are the following: selective representativeness of publication numbers, complexity of keyword search, occasional presence of obsolete text formats, printed versions, possible psychological barrier, physiological incompatibility with computer equipment, fatigue caused by prolonged work on the computer. The Internet was followed by the appearance of global control networks, their aims ranging from control of a human life support to a unified control of humanity. So, the formed global information space promises the man to get access to almost any information source. Meanwhile, environmental safety of the man, his/her objective biological psyche and abilities in harmonious development are at serious risk

  10. Review of Public Safety in Viewpoint of Complex Networks

    Gai Chengcheng; Weng Wenguo; Yuan Hongyong

    2010-01-01

    In this paper, a brief review of public safety in viewpoint of complex networks is presented. Public safety incidents are divided into four categories: natural disasters, industry accidents, public health and social security, in which the complex network approaches and theories are need. We review how the complex network methods was developed and used in the studies of the three kinds of public safety incidents. The typical public safety incidents studied by the complex network methods in this paper are introduced, including the natural disaster chains, blackouts on electric power grids and epidemic spreading. Finally, we look ahead to the application prospects of the complex network theory on public safety.

  11. 40 CFR 68.48 - Safety information.

    2010-07-01

    ...) CHEMICAL ACCIDENT PREVENTION PROVISIONS Program 2 Prevention Program § 68.48 Safety information. (a) The... regulated substances, processes, and equipment: (1) Material Safety Data Sheets that meet the requirements...) Equipment specifications; and (5) Codes and standards used to design, build, and operate the process. (b...

  12. Spinal Cord Injury Model System Information Network

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  13. Functional safety of health information technology.

    Chadwick, Liam

    2012-03-01

    In an effort to improve patient safety and reduce adverse events, there has been a rapid growth in the utilisation of health information technology (HIT). However, little work has examined the safety of the HIT systems themselves, the methods used in their development or the potential errors they may introduce into existing systems. This article introduces the conventional safety-related systems development standard IEC 61508 to the medical domain. It is proposed that the techniques used in conventional safety-related systems development should be utilised by regulation bodies, healthcare organisations and HIT developers to provide an assurance of safety for HIT systems. In adopting the IEC 61508 methodology for HIT development and integration, inherent problems in the new systems can be identified and corrected during their development. Also, IEC 61508 should be used to develop a healthcare-specific standard to allow stakeholders to provide an assurance of a system\\'s safety.

  14. Vulnerability Assessment Tools for Complex Information Networks

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  15. FOOD SAFETY SYSTEMS’ FUNCTIONING IN POLISH NETWORKS OF GROCERY STORES

    Paweł NOWICKI

    2013-04-01

    Full Text Available This article shows the way how the food safety systems are functioning in Polish networks of grocery stores. The study was conducted in the fourth quarter of 2012 in the south‐eastern Poland. There were chosen three organizations that meet certain conditions: medium size Polish grocery network without participation of foreign capital and up to 30 retail locations within the group. Studies based on a case study model. The research found that regular and unannounced inspections carried out to each store's, impact on increasing safety of food offered and the verification of GHP requirements on the headquarters level has a significant impact on the safety of food offered as well as on the knowledge and behavior of employees. In addition it was found that the verification and analysis of food safety management system is an effective tool for improving food safety. It was also shown that in most cases there is no formal crisis management system for the food protection in the surveyed companies and employees are only informed of what to do in case of an emergency.

  16. The Use of Wireless Sensor Network for Increasing Airport Safety

    Jakub Kraus

    2013-09-01

    Full Text Available This article deals with the use of wireless sensor networks for increasing safety at airports, respectively for replacing the current monitoring system to ensure safety. The article describes sensor networks and their applications to the identified processes and consideration of financial and safety benefits.

  17. Survey of network and information security technology

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  18. Development of Broadband Nuclear Safety Data Network (B-NSDN)

    Son, Gwang Seop; Kim, Dong Hoon; Park, Gi Yong

    2011-01-01

    Recently as introducing digital safety system in nuclear power plant, more data transmission capacity is required. Bandwidth of existing communication network is about a few Mbps. Thus data transmission quantity in recently digital safety system is beyond existing communication network's capacity. In this paper, new protocol that is suitable for safety system communication network is designed. FPGA based communication system is implemented. As result of test, effective bandwidth of B-NSDN is about 20Mbps

  19. Food safety: correct information for pregnant women

    Bartolomeo Griglio

    2013-04-01

    Full Text Available This study was aimed at investigating the knowledge of pregnant women on food safety with particular attention to the effectiveness of the informative material (pamphlet and poster prepared in a previous study. To this scope, a questionnaire composed by 8 questions (Likert scaled was used except for one which was a Y/N question. Themes of the questionnaire were: level of concerns on food safety, and knowledge on foodborne diseases (salomonellosis, toxoplasmosis and listeriosis, risk factors and preventive measures. Results indicate that knowledge increased in respect to that of the previous study, but in relation to informative material previously distributed.

  20. A new information dimension of complex networks

    Wei, Daijun; Wei, Bo; Hu, Yong; Zhang, Haixin; Deng, Yong

    2014-01-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  1. A new information dimension of complex networks

    Wei, Daijun [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Science, Hubei University for Nationalities, Enshi 445000 (China); Wei, Bo [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Hu, Yong [Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006 (China); Zhang, Haixin [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Deng, Yong, E-mail: ydeng@swu.edu.cn [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Engineering, Vanderbilt University, TN 37235 (United States)

    2014-03-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  2. Risk assessment of safety data link and network communication in digital safety feature control system of nuclear power plant

    Lee, Sang Hun; Son, Kwang Seop; Jung, Wondea; Kang, Hyun Gook

    2017-01-01

    Highlights: • Safety data communication risk assessment framework and quantitative scheme were proposed. • Fault-tree model of ESFAS unavailability due to safety data communication failure was developed. • Safety data link and network risk were assessed based on various ESF-CCS design specifications. • The effect of fault-tolerant algorithm reliability of safety data network on ESFAS unavailability was assessed. - Abstract: As one of the safety-critical systems in nuclear power plants (NPPs), the Engineered Safety Feature-Component Control System (ESF-CCS) employs safety data link and network communication for the transmission of safety component actuation signals from the group controllers to loop controllers to effectively accommodate various safety-critical field controllers. Since data communication failure risk in the ESF-CCS has yet to be fully quantified, the ESF-CCS employing data communication systems have not been applied in NPPs. This study therefore developed a fault tree model to assess the data link and data network failure-induced unavailability of a system function used to generate an automated control signal for accident mitigation equipment. The current aim is to provide risk information regarding data communication failure in a digital safety feature control system in consideration of interconnection between controllers and the fault-tolerant algorithm implemented in the target system. Based on the developed fault tree model, case studies were performed to quantitatively assess the unavailability of ESF-CCS signal generation due to data link and network failure and its risk effect on safety signal generation failure. This study is expected to provide insight into the risk assessment of safety-critical data communication in a digitalized NPP instrumentation and control system.

  3. Protecting information on local area networks

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  4. European TSO Network (ETSON) as Important Part of International Nuclear Safety Knowledge Networks

    Teske, Hartmuth; Dierschow, Frank; Eibl-Schwäger, Carla

    2014-01-01

    Conclusion: • Nuclear networks, including ETSON, are fulfilling their respective and defined specific aims; • Common are such objectives like: – exchange of information; – transfer of knowledge; – support education and training; – collaborate effectively together; – promote coordination and – support harmonization. • Further endeavor are needed to: – Make more significant efforts in promoting the opportunities of collaborative actions; – Use more active the existing features of the modern network tools; – Combine regional or global networks with national web-based knowledge resources by developing and maintaining further the National Nuclear Regulatory Portals. • Nuclear safety and security networks are effectively contributing to build and sustain needed capacities and capabilities

  5. Multimedia Information Networks in Social Media

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  6. HySafe - The Network of Excellence for Hydrogen Safety

    Jordan, T.

    2006-01-01

    Safety always has been a critical issue for innovations as it influences the economic attractiveness and public acceptance of any new idea. Furthermore, a fair market for trading innovative products has to be based on homogenized legal regulations, which usually refer commonly accepted standards. Ideally, these standards should be the unique outcome of safety assessments, based on profound and concerted pre-normative research work. However, in Europe the research related to hydrogen safety is still fragmented. This was the reason for the European Commission to support the needed integration and focusing of the related efforts with the help of a new instrument, the so-called Networks of Excellence NoE. So, the goal of NoE HySafe is to provide the basis to facilitate the safe introduction of hydrogen as an energy carrier, by removing the described safety related obstacles. The network is constituted by 24 partners from 12 European countries and from Canada, representing private industries, especially from the automotive sector, universities and research institutions. More than 120 scientists perform integrative work in 15 work packages. A biennial report on Hydrogen Safety is going to be published, the available experimental facilities have been catalogued and qualified, educational programs are designed. After the first successful International Conference on Hydrogen Safety the second will be organized 2007 in San Sebastian, Spain. The European codes and standards activities will be supported by scientifically based information formulated in the HySafe position papers. The web-site www.hysafe.net offers a versatile platform for internal and external communication. The further work program is orientated not only at the results of a state-of-the-art report and a PIRT analysis performed within the NoE but also complies with the needs identified in the external network including other European projects related to hydrogen like StorHy, HyWays and NATURALHY. By shifting

  7. Inter-American Biodiversity Information Network (IABIN)

    site. IABIN Inter-American Biodiversity Information Network (IABIN) OAS » SEDI » DSD » IABIN IABIN GEF Logo inbio natserve usgs polpar wcm The Inter-American Biodiversity Information Network (IABIN , and use of biodiversity information relevant to policy and decision-making on natural resources

  8. Predicting Information Flows in Network Traffic.

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  9. Network analytical tool for monitoring global food safety highlights China.

    Tamás Nepusz

    Full Text Available BACKGROUND: The Beijing Declaration on food safety and security was signed by over fifty countries with the aim of developing comprehensive programs for monitoring food safety and security on behalf of their citizens. Currently, comprehensive systems for food safety and security are absent in many countries, and the systems that are in place have been developed on different principles allowing poor opportunities for integration. METHODOLOGY/PRINCIPAL FINDINGS: We have developed a user-friendly analytical tool based on network approaches for instant customized analysis of food alert patterns in the European dataset from the Rapid Alert System for Food and Feed. Data taken from alert logs between January 2003-August 2008 were processed using network analysis to i capture complexity, ii analyze trends, and iii predict possible effects of interventions by identifying patterns of reporting activities between countries. The detector and transgressor relationships are readily identifiable between countries which are ranked using i Google's PageRank algorithm and ii the HITS algorithm of Kleinberg. The program identifies Iran, China and Turkey as the transgressors with the largest number of alerts. However, when characterized by impact, counting the transgressor index and the number of countries involved, China predominates as a transgressor country. CONCLUSIONS/SIGNIFICANCE: This study reports the first development of a network analysis approach to inform countries on their transgressor and detector profiles as a user-friendly aid for the adoption of the Beijing Declaration. The ability to instantly access the country-specific components of the several thousand annual reports will enable each country to identify the major transgressors and detectors within its trading network. Moreover, the tool can be used to monitor trading countries for improved detector/transgressor ratios.

  10. Social Network Analysis and informal trade

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  11. Development of Network Protocol for the Integrated Safety System

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M. [Hannam Univ., Daejeon (Korea, Republic of)

    2007-06-15

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants.

  12. Development of Network Protocol for the Integrated Safety System

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M.

    2007-06-01

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants

  13. Road safety performance indicators for the interurban road network.

    Yannis, G. Weijermars, W.A.M. Gitelman, V. Vis, M. Chazirisa, A. Papadimitriou, E. & Lima Azevedo, C.

    2013-01-01

    Various road safety performance indicators (SPIs) have been proposed for different road safety research areas, mainly as regards driver behaviour (e.g. seat belt use, alcohol, drugs, etc.) and vehicles (e.g. passive safety); however, no SPIs for the road network and design have been developed. The

  14. Dissemination of information in a networked environment

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  15. RISK-INFORMED SAFETY MARGIN CHARACTERIZATION

    Dinh, Nam; Szilard, Ronaldo

    2009-01-01

    The concept of safety margins has served as a fundamental principle in the design and operation of commercial nuclear power plants (NPPs). Defined as the minimum distance between a system's 'loading' and its 'capacity', plant design and operation is predicated on ensuring an adequate safety margin for safety-significant parameters (e.g., fuel cladding temperature, containment pressure, etc.) is provided over the spectrum of anticipated plant operating, transient and accident conditions. To meet the anticipated challenges associated with extending the operational lifetimes of the current fleet of operating NPPs, the United States Department of Energy (USDOE), the Idaho National Laboratory (INL) and the Electric Power Research Institute (EPRI) have developed a collaboration to conduct coordinated research to identify and address the technological challenges and opportunities that likely would affect the safe and economic operation of the existing NPP fleet over the postulated long-term time horizons. In this paper we describe a framework for developing and implementing a Risk-Informed Safety Margin Characterization (RISMC) approach to evaluate and manage changes in plant safety margins over long time horizons

  16. Kowledge-based dynamic network safety calculations. Wissensbasierte dynamische Netzsicherheitsberechnungen

    Kulicke, B [Inst. fuer Hochspannungstechnik und Starkstromanlagen, Berlin (Germany); Schlegel, S [Inst. fuer Hochspannungstechnik und Starkstromanlagen, Berlin (Germany)

    1993-06-28

    An important part of network operation management is the estimation and maintenance of the security of supply. So far the control personnel has only been supported by static network analyses and safety calculations. The authors describe an expert system, which is coupled to a real time simulation program on a transputer basis, for dynamic network safety calculations. They also introduce the system concept and the most important functions of the expert system. (orig.)

  17. Status of DOE information network modifications

    Fuchs, R.

    1988-01-01

    This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support

  18. Students' Informal Peer Feedback Networks

    Headington, Rita

    2018-01-01

    The nature and significance of students' informal peer feedback networks is an under-explored area. This paper offers the findings of a longitudinal investigation of the informal peer feedback networks of a cohort of student teachers [n = 105] across the three years of a UK primary education degree programme. It tracked the dynamic nature of these…

  19. Social Networks and Corporate Information Security

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  20. Information Network on Rural Development (INRD), Bangladesh.

    Wanasundra, Leelangi

    1994-01-01

    Discusses information networking in Bangladesh and describes the formation of the Information Network on Rural Development (INRD) which was initiated by the Center on Integrated Rural Development for Asia and the Pacific (CIRDAP). Organization, membership, activities, participation, and finance are examined. (four references) (LRW)

  1. Analysis and design on airport safety information management system

    Yan Lin

    2017-01-01

    Full Text Available Airport safety information management system is the foundation of implementing safety operation, risk control, safety performance monitor, and safety management decision for the airport. The paper puts forward the architecture of airport safety information management system based on B/S model, focuses on safety information processing flow, designs the functional modules and proposes the supporting conditions for system operation. The system construction is helpful to perfecting the long effect mechanism driven by safety information, continually increasing airport safety management level and control proficiency.

  2. Safety performance indicators for the road network.

    Weijermars, W. Gitelman, V. Papadimitriou, E. Lima De & Azevedo, C.

    2010-01-01

    Within the 6th FP European project SafetyNet, a team has worked on the development of Safety Performance Indicators (SPIs) on seven road safety related areas. These SPIs reflect the operational conditions of the road traffic system that influence the system's safety performance. SPIs were developed

  3. Maintenance of radiation safety information system

    Choi, Ho Sun [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of); Park, Moon Il; Chung, Chong Kyu; Lim, Bock Soo; Kim, Hyung Uk; Chang, Kwang Il; Nam, Kwan Hyun; Cho, Hye Ryan [AD center incubation LAB, Taejon (Korea, Republic of)

    2001-12-15

    The objectives of radiation safety information system maintenance are to maintain the requirement of users, change of job process and upgrade of the system performance stably and effectively while system maintenance. We conduct the code of conduct recommended by IAEA, management of radioisotope inventory database systematically using analysis for the state of inventory database integrated in this system. This system and database will be support the regulatory guidance, rule making and information to the MOST, KINS, other regulatory related organization and general public optimizationally.

  4. Microbial profiling, neural network and semantic web: an integrated information system for human pathogen risk management, prevention and surveillance in food safety

    It is estimated that food-borne pathogens cause approximately 76 million cases of gastrointestinal illnesses, 325,000 hospitalizations, and 5,000 deaths in the United States annually. Genomic, proteomic, and metabolomic studies, particularly, genome sequencing projects are providing valuable inform...

  5. Information Flows in Networked Engineering Design Projects

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  6. Noise enhances information transfer in hierarchical networks.

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  7. Safety vs. reputation: risk controversies in emerging policy networks regarding school safety in the Netherlands

    Binkhorst, J.; Kingma, S.F.

    2012-01-01

    This article deals with risk controversies in emerging policy networks regarding school safety in the Netherlands. It offers a grounded account of the interpretations of school risks and safety measures by the various stakeholders of the policy network, in particular, schools, local government and

  8. Providing public information in the Slovenian Nuclear Safety Administration

    Fon Jager, Mojca

    2000-01-01

    these activities were organized by the IAEA. For several years the SNSA has been endeavoring to maintain continuity in translating some of the basic IAEA publications stated below: Code on the Safety on Nuclear Power Plants: Siting, Code on the Safety of Nuclear Power Plants Quality Assurance, Code on safety of Nuclear Power Plants: Operation, Code on safety of Nuclear Power Plants: Design, Code on safety of Nuclear Power Plants: Governmental Organization, The safety Nuclear Installations, Intervention Criteria in a Nuclear or Radiation Emergency, Establishing a National System for Radioactive Waste Management, The Principles of Radioactive Management, Radiation Protection and the Safety of Radiation Sources, International Basic Safety Standards for Protection Against Ionizing Radiation and for the Safety of radiation Sources. This publications are distributed free of charge to the institutions concerned. The SNSA also continues sending data to the international network in the field of nuclear and radiation safety NucNet ad distributing the NucNet data to the interested media in Slovenia. Every year the SNSA, the distributor for Slovenia, investigates the interest of media and others in this kind of information and updates the list of receivers. All research work and studies being financed by the SNSA are public and available at the SNSA Library and the international missions' reports are available from the National and University Library, the Central Technical Library, Ljubljana and the University Library, Maribor. (author)

  9. Network information provision to potential generators: Appendices

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)

  10. 77 FR 15453 - Pipeline Safety: Information Collection Activities

    2012-03-15

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... information collection titled, ``Gas Pipeline Safety Program Certification and Hazardous Liquid Pipeline... collection request that PHMSA will be submitting to OMB for renewal titled, ``Gas Pipeline Safety Program...

  11. Road network safety evaluation using Bayesian hierarchical joint model.

    Wang, Jie; Huang, Helai

    2016-05-01

    Safety and efficiency are commonly regarded as two significant performance indicators of transportation systems. In practice, road network planning has focused on road capacity and transport efficiency whereas the safety level of a road network has received little attention in the planning stage. This study develops a Bayesian hierarchical joint model for road network safety evaluation to help planners take traffic safety into account when planning a road network. The proposed model establishes relationships between road network risk and micro-level variables related to road entities and traffic volume, as well as socioeconomic, trip generation and network density variables at macro level which are generally used for long term transportation plans. In addition, network spatial correlation between intersections and their connected road segments is also considered in the model. A road network is elaborately selected in order to compare the proposed hierarchical joint model with a previous joint model and a negative binomial model. According to the results of the model comparison, the hierarchical joint model outperforms the joint model and negative binomial model in terms of the goodness-of-fit and predictive performance, which indicates the reasonableness of considering the hierarchical data structure in crash prediction and analysis. Moreover, both random effects at the TAZ level and the spatial correlation between intersections and their adjacent segments are found to be significant, supporting the employment of the hierarchical joint model as an alternative in road-network-level safety modeling as well. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Mass-media information campaigns about road safety. [previously known as: Public information about road safety.

    2009-01-01

    In the Netherlands, public information is often used as an instrument to improve road safety. The purpose of each public information campaign is a voluntary and lasting change in traffic behaviour. This requires road users to have sufficient knowledge about a problem and to adapt their behaviour.

  13. Searching Information Sources in Networks

    2017-06-14

    with partial observations,” in AAAI Conference on Artificial Intelligence , 2017. [6] D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small...critical infrastructure of our society. The failure of the power grid network will have catastrophic impacts on water supplies, transportation

  14. Safety culture and subcontractor network governance in a complex safety critical project

    Oedewald, Pia; Gotcheva, Nadezhda

    2015-01-01

    In safety critical industries many activities are currently carried out by subcontractor networks. Nevertheless, there are few studies where the core dimensions of resilience would have been studied in safety critical network activities. This paper claims that engineering resilience into a system is largely about steering the development of culture of the system towards better ability to anticipate, monitor, respond and learn. Thus, safety culture literature has relevance in resilience engineering field. This paper analyzes practical and theoretical challenges in applying the concept of safety culture in a complex, dynamic network of subcontractors involved in the construction of a new nuclear power plant in Finland, Olkiluoto 3. The concept of safety culture is in focus since it is widely used in nuclear industry and bridges the scientific and practical interests. This paper approaches subcontractor networks as complex systems. However, the management model of the Olkiluoto 3 project is to a large degree a traditional top-down hierarchy, which creates a mismatch between the management approach and the characteristics of the system to be managed. New insights were drawn from network governance studies. - Highlights: • We studied a relevant topical subject safety culture in nuclear new build project. • We integrated safety science challenges and network governance studies. • We produced practicable insights in managing safety of subcontractor networks

  15. Optimal Information Processing in Biochemical Networks

    Wiggins, Chris

    2012-02-01

    A variety of experimental results over the past decades provide examples of near-optimal information processing in biological networks, including in biochemical and transcriptional regulatory networks. Computing information-theoretic quantities requires first choosing or computing the joint probability distribution describing multiple nodes in such a network --- for example, representing the probability distribution of finding an integer copy number of each of two interacting reactants or gene products while respecting the `intrinsic' small copy number noise constraining information transmission at the scale of the cell. I'll given an overview of some recent analytic and numerical work facilitating calculation of such joint distributions and the associated information, which in turn makes possible numerical optimization of information flow in models of noisy regulatory and biochemical networks. Illustrating cases include quantification of form-function relations, ideal design of regulatory cascades, and response to oscillatory driving.

  16. Towards an Information Theory of Complex Networks

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  17. Information flow analysis of interactome networks.

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  18. Informal networks: the company behind the chart.

    Krackhardt, D; Hanson, J R

    1993-01-01

    A glance at an organizational chart can show who's the boss and who reports to whom. But this formal chart won't reveal which people confer on technical matters or discuss office politics over lunch. Much of the real work in any company gets done through this informal organization with its complex networks of relationships that cross functions and divisions. According to consultants David Krackhardt and Jeffrey Hanson, managers can harness the true power in their companies by diagramming three types of networks: the advice network, which reveals the people to whom others turn to get work done; the trust network, which uncovers who shares delicate information; and the communication network, which shows who talks about work-related matters. Using employee questionnaires, managers can generate network maps that will get to the root of many organizational problems. When a task force in a computer company, for example, was not achieving its goals, the CEO turned to network maps to find out why. He discovered that the task force leader was central in the advice network but marginal in the trust network. Task force members did not believe he would look out for their interests, so the CEO used the trust map to find someone to share responsibility for the group. And when a bank manager saw in the network map that there was little communication between tellers and supervisors, he looked for ways to foster interaction among employees of all levels. As companies continue to flatten and rely on teams, managers must rely less on their authority and more on understanding these informal networks. Managers who can use maps to identify, leverage, and revamp informal networks will have the key to success.

  19. Safety Requirements and Modern Technical Requirements in Human Information Systems in Amman Hotels

    Farouq Ahmad Alazzam; Sattam Rakan Allahawiah; Mohammad Nayef Alsarayreh; Kafa Hmoud Abdallah al Nawaiseh

    2015-01-01

    This study aimed to demonstrate the availability of Safety requirements and modern technical requirements in human information systems in Amman hotels. an the most important results of this study is the availability of security and safety requirements in human information systems In Amman hotels and The adequacy of the information that it provided .and show that all departments are not connected by appropriate and effective communication networks in adequate form . Also sophisticated operatin...

  20. Information theory perspective on network robustness

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  1. Evolution of the Research Libraries Information Network.

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  2. Brain network clustering with information flow motifs

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  3. Nuclear technology databases and information network systems

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  4. Social network in patient safety: Social media visibility

    Azucena Santillán García

    2011-11-01

    Full Text Available Internet social network (social media is a powerful communication tool, and its use is expanding significantly. This paper seeks to know the current state of visibility in online social networks of active citizen talking about patient safety. This is an observational cross-sectional study whose target population is the websites Facebook, Twitter and Tuenti in Spain. By three consecutive cuts social profiles were found using the searching terms “seguridad+paciente” and “safety+patient”. There were found 5 profiles on Facebook that met the search criteria, 6 on Twitter and none were found on Tuenti. It is concluded that although there is evidence of the rise of social networking, citizen network involved in patient safety appears not to be significantly represented within the social networks examined.

  5. Information and influence propagation in social networks

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  6. Assessing the safety of the road network : a simple method.

    Janssen, S.T.M.C.

    1993-01-01

    Research by the SWOV Institute for Road Safety Research in The Netherlands assessing the safety of the Dutch road network is presented. In The Netherlands urban and rural roads and motorways are used roughly equally, however accident rates vary greatly. These are discussed in this paper. Tables show

  7. INTELLIGENT TRAFFIC-SAFETY MIRROR BY USING WIRELESS SENSOR NETWORK

    Peter Danišovič

    2014-03-01

    Full Text Available This article is focused on the problematic of traffic safety, dealing with the problem of car intersections with blocked view crossing by a special wireless sensor network (WSN proposed for the traffic monitoring, concretely for vehicle’s detection at places, where it is necessary. Some ultra-low-power TI products were developed due to this reason: microcontroller MSP430F2232, 868MHz RF transceiver CC1101 and LDO voltage regulator TPS7033. The WSN consist of four network nodes supplied with the special safety lightings which serve the function of intelligent traffic safety mirror.

  8. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  9. Networking and Information Technology Workforce Study: Final Report

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  10. Fisheries Information Network in Indonesia.

    Balachandran, Sarojini

    During the early 1980s the Indonesian government made a policy decision to develop fisheries as an important sector of the national economy. In doing so, it recognized the need for the collection and dissemination of fisheries research information not only for the scientists themselves, but also for the ultimate transfer of technology through…

  11. Probabilistic safety assessment model in consideration of human factors based on object-oriented bayesian networks

    Zhou Zhongbao; Zhou Jinglun; Sun Quan

    2007-01-01

    Effect of Human factors on system safety is increasingly serious, which is often ignored in traditional probabilistic safety assessment methods however. A new probabilistic safety assessment model based on object-oriented Bayesian networks is proposed in this paper. Human factors are integrated into the existed event sequence diagrams. Then the classes of the object-oriented Bayesian networks are constructed which are converted to latent Bayesian networks for inference. Finally, the inference results are integrated into event sequence diagrams for probabilistic safety assessment. The new method is applied to the accident of loss of coolant in a nuclear power plant. the results show that the model is not only applicable to real-time situation assessment, but also applicable to situation assessment based certain amount of information. The modeling complexity is kept down and the new method is appropriate to large complex systems due to the thoughts of object-oriented. (authors)

  12. Information transfer in community structured multiplex networks

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  13. Information transfer in community structured multiplex networks

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  14. Building a Portuguese Food Microbiological Information Network

    Viegas, Silvia; Machado, Claudia; Dantas, Maria; Oliveira, Luísa

    2011-01-01

    Introduction: The integration of food data from research, microbiological monitoring, epidemiological investigation and disease surveillance is crucial to manage foodborne risk. Consequently, INSA launched the Portuguese Food Information Resource Programme (PortFIR) in a partnership with GS1 Portugal to create national food chain expert networks and sustainable databases on food composition, consumption and chemical and microbiological contamination. Presently, the Food Microbiological Inform...

  15. Searching LOGIN, the Local Government Information Network.

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  16. Protecting Personal Information on Social Networking Sites

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  17. 47 CFR 80.1135 - Transmission of maritime safety information.

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Transmission of maritime safety information. 80... RADIO SERVICES STATIONS IN THE MARITIME SERVICES Global Maritime Distress and Safety System (GMDSS) Operating Procedures for Distress and Safety Communications § 80.1135 Transmission of maritime safety...

  18. Knowledge management and networking for enhancing nuclear safety

    Taniguchi, T.; Lederman, L.

    2004-01-01

    Striving for innovative solutions to enhance efficiency of programme delivery and a wider outreach of its nuclear safety activities, the International Atomic Energy Agency (IAEA) has developed an Integrated Safety Approach as a platform for linking its safety related statutory functions and its many associated activities. The approach recognizes the vital importance of effective management of the knowledge base and builds on the integration between the IAEA's safety standards and all aspects of the provision for their application, including peer reviews and technical meetings to share lessons learned. The IAEA is using knowledge management techniques to develop process flows, map safety knowledge and to promote knowledge sharing. The first practical application was the establishment of a knowledge base related to safety aspects of ageing and long-term operation of nuclear power plants. The IAEA is also promoting and facilitating the establishment of regional nuclear and radiation safety networks to preserve existing knowledge and expertise as well as to strengthen sharing and creation of new knowledge in these fields. Prominent examples are the Asian Nuclear Safety Network established in the frame of the IAEA's Programme on the Safety of Nuclear Installations in South East Asia, Pacific and Far East Countries, and the Ibero-American Radiation Safety Network in the frame of the Ibero-American Forum of Nuclear Regulators. Results to date are most encouraging and suggest that this pioneer work should be extended to other regions and eventually to a global nuclear safety network. Responsive to the need of Member States, the IAEA Secretariat has prepared and made available a large number of up-to-date training packages in nuclear, radiation, transport and waste safety, using IAEA safety standards as a basis. It is also providing instruction to trainers in Member States on the use of these modules. This ensures that the material is properly used and that the IAEA

  19. Stakeholder Safety in Information Systems Research

    R.H. Barbour

    2006-11-01

    Full Text Available Information Communication Technology (ICT researchers adapt and use tools from reference and cognate disciplines. This application of existing tools outside the context of their development has implications beyond the immediate problem context. ICT researchers have access to a wide variety of data sources including newer ones, such as the Internet, that may bring unexpected outcomes. ICT research can impact on researchers, their institutions and the researched in unexpected ways. People so affected are the stakeholders in ICT research activities. Reputations, welfare and property may be put at risk by unplanned events described in this paper. Legal aspects of ICT research are broadly identified and linked to the tort of negligence. The Social Research Association’s Code for researcher safety is described and its application extended to include the Internet as a potential data source. A common set of underlying ethical principles is identified suggesting that the ICT researcher can refine particular research protocols for specific social contexts.

  20. Public Safety Broadband Network Architecture Description

    2013-08-01

    could be used to add an in-app purchase to the user’s mobile phone bill. Major operators , such as AT& T , Deutsche Telekom, Orange, Telefonica and...3GPP technologies such as CDMA2000 and WiMAX networks. MME Mobility Managemen t Entity The MME is the key control-node for the LTE access-network... operator ( operator -managed small cells, etc.) or provides sufficient security (authentication, encryption, etc.). See Figure D3. Figure D3: ITU- T

  1. Safety evaluation of ventilation networks in case of fire

    Perdriau, P.; Pourprix, M.; Raboin, S.; Rouyer, J.L.; Tarrago, X.

    1983-01-01

    Several teams from CEA have cooperated to produce a code for modeling ventilation networks under accidental conditions in nuclear facilities. The objective is to study responses to a network to perturbations which are either mechanical or thermal. Such a tool was necessary for safety and protection studies because ventilation network performances are difficult to evaluate when the network gets complex. There was no requirement for a very sophisticated code, considering the margin of error which generally characterizes the ventilation measurements, but this code should be well validated to become a reliable tool for pointing out safety problems at the design stage and during the operating life of the ventilation system. The code has been called PIAF. It solves a set of equations which simulate a ventilation network in a permanent regime

  2. 49 CFR 211.61 - Informal safety inquiries.

    2010-10-01

    ... information on selected topics relating to railroad safety. A notice of each such inquiry will be published in... 49 Transportation 4 2010-10-01 2010-10-01 false Informal safety inquiries. 211.61 Section 211.61..., DEPARTMENT OF TRANSPORTATION RULES OF PRACTICE Miscellaneous Safety-Related Proceedings and Inquiries § 211...

  3. 40 CFR 68.65 - Process safety information.

    2010-07-01

    ... (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Program 3 Prevention Program § 68.65 Process safety... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Process safety information. 68.65... compilation of written process safety information before conducting any process hazard analysis required by...

  4. Health professional networks as a vector for improving healthcare quality and safety: a systematic review.

    Cunningham, Frances C; Ranmuthugala, Geetha; Plumb, Jennifer; Georgiou, Andrew; Westbrook, Johanna I; Braithwaite, Jeffrey

    2012-03-01

    While there is a considerable corpus of theoretical and empirical literature on networks within and outside of the health sector, multiple research questions are yet to be answered. To conduct a systematic review of studies of professionals' network structures, identifying factors associated with network effectiveness and sustainability, particularly in relation to quality of care and patient safety. The authors searched MEDLINE, CINAHL, EMBASE, Web of Science and Business Source Premier from January 1995 to December 2009. A majority of the 26 unique studies identified used social network analysis to examine structural relationships in networks: structural relationships within and between networks, health professionals and their social context, health collaboratives and partnerships, and knowledge sharing networks. Key aspects of networks explored were administrative and clinical exchanges, network performance, integration, stability and influences on the quality of healthcare. More recent studies show that cohesive and collaborative health professional networks can facilitate the coordination of care and contribute to improving quality and safety of care. Structural network vulnerabilities include cliques, professional and gender homophily, and over-reliance on central agencies or individuals. Effective professional networks employ natural structural network features (eg, bridges, brokers, density, centrality, degrees of separation, social capital, trust) in producing collaboratively oriented healthcare. This requires efficient transmission of information and social and professional interaction within and across networks. For those using networks to improve care, recurring success factors are understanding your network's characteristics, attending to its functioning and investing time in facilitating its improvement. Despite this, there is no guarantee that time spent on networks will necessarily improve patient care.

  5. Somatic surveillance: corporeal control through information networks

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  6. Social Networks: Rational Learning and Information Aggregation

    2009-09-01

    predecessor, Gale and Kariv (2003) who generalize the payoff equalization result of Bala and Goyal (1998) in connected social networks (discussed below...requires more notation. Using Bayes’ Rule and the assumption of equal priors on the state θ, we have that the social belief given by observing... Social Networks: Rational Learning and Information Aggregation by Ilan Lobel B.Sc., Pontif́ıcia Universidade Católica do Rio de Janeiro (2004

  7. Network information provision to potential generators

    Nicholson, G.

    2001-07-01

    At the time of finalising this report, an Ofgem consultation is underway on the form of Distribution Licence Condition 25, which will state the requirements for Distribution Network Operators to provide and publish data. This report is also relevant to the DTI Ofgem Embedded Generation Working Group (EGWG), which has recently completed its report and recommendations. It is hoped that this document will provide an overview of the status, importance, role and benefits of network information, which can be utilised by Generators, Network Operators and other industry players in framing their responses to this and future consultations. (Authors)

  8. Design and Management of Networked Information Systems

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  9. 75 FR 53733 - Pipeline Safety: Information Collection Activities

    2010-09-01

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2010-0246] Pipeline Safety: Information Collection Activities AGENCY: Pipeline and Hazardous... liquefied natural gas, hazardous liquid, and gas transmission pipeline systems operated by a company. The...

  10. Reliability modeling of safety-critical network communication in a digitalized nuclear power plant

    Lee, Sang Hun; Kim, Hee Eun; Son, Kwang Seop; Shin, Sung Min; Lee, Seung Jun; Kang, Hyun Gook

    2015-01-01

    The Engineered Safety Feature-Component Control System (ESF-CCS), which uses a network communication system for the transmission of safety-critical information from group controllers (GCs) to loop controllers (LCs), was recently developed. However, the ESF-CCS has not been applied to nuclear power plants (NPPs) because the network communication failure risk in the ESF-CCS has yet to be fully quantified. Therefore, this study was performed to identify the potential hazardous states for network communication between GCs and LCs and to develop quantification schemes for various network failure causes. To estimate the risk effects of network communication failures in the ESF-CCS, a fault-tree model of an ESF-CCS signal failure in the containment spray actuation signal condition was developed for the case study. Based on a specified range of periodic inspection periods for network modules and the baseline probability of software failure, a sensitivity study was conducted to analyze the risk effect of network failure between GCs and LCs on ESF-CCS signal failure. This study is expected to provide insight into the development of a fault-tree model for network failures in digital I&C systems and the quantification of the risk effects of network failures for safety-critical information transmission in NPPs. - Highlights: • Network reliability modeling framework for digital I&C system in NPP is proposed. • Hazardous states of network protocol between GC and LC in ESF-CCS are identified. • Fault-tree model of ESF-CCS signal failure in ESF actuation condition is developed. • Risk effect of network failure on ESF-CCS signal failure is analyzed.

  11. Think over nuclear safety. ''Information asymmetry'' and ''comminicative action''

    Suzuki, Atsuyuki

    2006-01-01

    Nuclear safety should be fully understood not only technically but also socially. In order to think over nuclear safety socially, four different concepts were recommended to refer, which were ''procedural rationality'', information asymmetry'', ''certainty effect'' and ''communicative action'' proposed by three economists and a philosopher respectively. Risk-based communication approach for nuclear safety could be effective within the higher frequency area than safety goal, but not good for the lower frequency area than safety goal. The latter could be highly subjective and more qualitative. For this area, ''safety communication'' would be highly maintained with taking account of existence of ''information asymmetry'' and need of ''communicative action''. (T.Tanaka)

  12. EXPERIENCE NETWORKING UNIVERSITY OF EDUCATION TRAINING MASTERS SAFETY OF LIFE

    Elvira Mikhailovna Rebko

    2016-02-01

    Full Text Available The article discloses experience networking of universities (Herzen State Pedagogical University and Sakhalin State University in the development and implementation of joint training programs for master’s education in the field of life safety «Social security in the urban environment». The novelty of the work is to create a schematic design of basic educational training program for master’s education in the mode of networking, and to identify effective instructional techniques and conditions of networking.Purpose – present the results of the joint development of a network of the basic educational program (BEP, to identify the stages of networking, to design a generalized scheme of development and implementation of a network of educational training program for master’s education in the field of life safety.Results generalized model of networking partner institutions to develop and implement the basic educational program master.Practical implications: the education process for Master of Education in the field of health and safety in Herzen State Pedagogical University and Sakhalin State University.

  13. Information filtering on coupled social networks.

    Nie, Da-Cheng; Zhang, Zi-Ke; Zhou, Jun-Lin; Fu, Yan; Zhang, Kui

    2014-01-01

    In this paper, based on the coupled social networks (CSN), we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  14. Road safety performance indicators for the interurban road network.

    Yannis, George; Weijermars, Wendy; Gitelman, Victoria; Vis, Martijn; Chaziris, Antonis; Papadimitriou, Eleonora; Azevedo, Carlos Lima

    2013-11-01

    Various road safety performance indicators (SPIs) have been proposed for different road safety research areas, mainly as regards driver behaviour (e.g. seat belt use, alcohol, drugs, etc.) and vehicles (e.g. passive safety); however, no SPIs for the road network and design have been developed. The objective of this research is the development of an SPI for the road network, to be used as a benchmark for cross-region comparisons. The developed SPI essentially makes a comparison of the existing road network to the theoretically required one, defined as one which meets some minimum requirements with respect to road safety. This paper presents a theoretical concept for the determination of this SPI as well as a translation of this theory into a practical method. Also, the method is applied in a number of pilot countries namely the Netherlands, Portugal, Greece and Israel. The results show that the SPI could be efficiently calculated in all countries, despite some differences in the data sources. In general, the calculated overall SPI scores were realistic and ranged from 81 to 94%, with the exception of Greece where the SPI was relatively lower (67%). However, the SPI should be considered as a first attempt to determine the safety level of the road network. The proposed method has some limitations and could be further improved. The paper presents directions for further research to further develop the SPI. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. EXPERIENCE NETWORKING UNIVERSITY OF EDUCATION TRAINING MASTERS SAFETY OF LIFE

    Elvira Mikhailovna Rebko

    2016-01-01

    The article discloses experience networking of universities (Herzen State Pedagogical University and Sakhalin State University) in the development and implementation of joint training programs for master’s education in the field of life safety «Social security in the urban environment». The novelty of the work is to create a schematic design of basic educational training program for master’s education in the mode of networking, and to identify effective instructional techniques and conditions...

  16. SAFETY ON UNTRUSTED NETWORK DEVICES (SOUND)

    2017-10-10

    and LSD-41 labs to show how it can work at scale to protect a ship network. 15. SUBJECT TERMS Communities of trust, SAFE architecture, adaptable... environment . Then, SOUND development would extend the SAFE implementation from the CRASH program to allow SAFE hosts to operate in a heterogeneous...hardware level on a SAFE processor (developed under the DARPA CRASH program). This section summarizes our work ; more details can be found in [K+14

  17. Agricultural information systems and communication networks: the ...

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  18. Networked Information: Finding What's Out There.

    Lynch, Clifford A.

    1997-01-01

    Clifford A. Lynch, developer of MELVYL and former director of library automation at the University of California, is now executive director for the Coalition for Networked Information (CNI). This interview discusses Lynch's background, MELVYL, the Web and the role of libraries and librarians, community and collaborative filtering, the library of…

  19. Comprehensive information system development and networking in ...

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  20. Management of information supporting Collaborative Networks

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  1. Safety Case Development as an Information Modelling Problem

    Lewis, Robert

    This paper considers the benefits from applying information modelling as the basis for creating an electronically-based safety case. It highlights the current difficulties of developing and managing large document-based safety cases for complex systems such as those found in Air Traffic Control systems. After a review of current tools and related literature on this subject, the paper proceeds to examine the many relationships between entities that can exist within a large safety case. The paper considers the benefits to both safety case writers and readers from the future development of an ideal safety case tool that is able to exploit these information models. The paper also introduces the idea that the safety case has formal relationships between entities that directly support the safety case argument using a methodology such as GSN, and informal relationships that provide links to direct and backing evidence and to supporting information.

  2. Preliminary safety information document for the standard MHTGR. Volume 4

    None

    1986-01-01

    This report contains information concerning: operational radionuclide control; occupational radiation protection, conduct of operations; initial test program; safety analysis; technical specifications; and quality assurance. (JDB)

  3. Discussion about risk-informed regulations on the nuclear safety

    Gu Yeyi

    2008-01-01

    The article introduces the background and status quo of regulations on the nuclear safety in China, and points out the inadequacies existing with the current regulations. The author explains the risk-informed safety management concerning its development, status quo, and achievements made, in an attempt to make out the trend of improving regulations on the nuclear safety through risk-informed methods. Combining the U.S. development program of establishing risk-informed regulations on the nuclear safety, the author narrates principles and features of the new regulations system, and provides suggestions for the promotion of risk-informed safety management and establishment of risk-informed regulations on the nuclear safety. (author)

  4. Information diffusion in structured online social networks

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  5. Toward introduction of risk informed safety regulation. Nuclear Safety Commission taskforce's interim report

    2006-01-01

    Nuclear Safety Commission's taskforce on 'Introduction of Safety Regulation Utilizing Risk Information' completed the interim report on its future subjects and directions in December 2005. Although current safety regulatory activities have been based on deterministic approach, this report shows the risk informed approach is expected to be very useful for making nuclear safety regulation and assurance activities reasonable and also for appropriate allocation of regulatory resources. For introduction of risk informed regulation, it also recommends pileups of experiences with gradual introduction and trial of the risk informed approach, improvement of plant maintenance rules and regulatory requirements utilizing risk information, and establishment of framework to assure quality of risk evaluation. (T. Tanaka)

  6. Improving information filtering via network manipulation

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  7. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  8. The Decision of Information Safety Problems at Processing of the Biometric Personal Data

    Y. G. Gorshkov

    2010-03-01

    Full Text Available The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. Directions of works are formulated on safety of the personal biometric data transferred in telecommunication systems.

  9. A study on methodologies for assessing safety critical network's risk impact on Nuclear Power Plant

    Lim, T. J.; Lee, H. J.; Park, S. K.; Seo, S. J.

    2006-08-01

    The objectives of this project is to investigate and study existing reliability analysis techniques for communication networks in order to develop reliability analysis models for Nuclear Power Plant's safety-critical networks. It is necessary to make a comprehensive survey of current methodologies for communication network reliability. Major outputs of the first year study are design characteristics of safety-critical communication networks, efficient algorithms for quantifying reliability of communication networks, and preliminary models for assessing reliability of safety-critical communication networks

  10. Social Networking for Emergency Management and Public Safety

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  11. Global information network on chemicals (GINC) and its Asian component

    Kaminuma, Tsuguchika; Nakata, Kotoko

    2003-01-01

    The Global Information Network on Chemicals (GINC) is an effort to build a global information network that links international, national, and other organizations working for the safe management of chemicals in order to exchange information and improve communications. The project was originally proposed in 1993 by one of the authors then at the National Institute of Health Sciences (NIHS) of Japan to the International Program on Chemical Safety (IPCS), which is a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP). The base support system was first implemented at NIHS using the Internet/World Wide Web (WWW) technology in 1995. The project was then endorsed by the Intergovernmental Forum on Chemical Safety (IFCS) and was adopted by the Inter-Organization Program for the Sound Management of Chemicals (IOMC). However, the base system (http://www.nihs.go.jp/GINC/index.html) has been developed and maintained solely by the NIHS group under the support of the Ministry of Health and Welfare (MHW), Japan. Asia, particularly East Asia and the Pacific region, was chosen as the feasibility study region for this project. During the period from December 1994 to July 2002, NIHS hosted eight meetings on this project held in Tokyo

  12. The impact of health information technology on patient safety.

    Alotaibi, Yasser K; Federico, Frank

    2017-12-01

    Since the original Institute of Medicine (IOM) report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety.  This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient's safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  13. The impact of health information technology on patient safety

    Yasser K. Alotaibi

    2017-12-01

    Full Text Available Since the original Institute of Medicine (IOM report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety. This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient’s safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  14. Maximizing information exchange between complex networks

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching

  15. Maximizing information exchange between complex networks

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  16. Maximizing information exchange between complex networks

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  17. Food safety information and food demand

    Smed, Sinne; Jensen, Jørgen Dejgård

    2005-01-01

    Purpose – The purpose of this paper is to analyze how news about food-related health risks affects consumers’ demands for safe food products. Design/methodology/approach – By identifying structural breaks in an econometrically estimated demand model, news with permanent impact on demand...... induces a permanent increase in the demand for pasteurized eggs, while more moderate negative news influences demand temporarily and to a lesser extent. There is, however, considerable variation in the response to food safety news across socio-demographic groups of consumers. Research limitations...... is distinguished from news with temporary impact. The Danish demand for pasteurized versus shell eggs is used as an illustrative case. Findings – Negative safety news about one product variety can provide significant stimulation to the demand for safe varieties. Severe negative news about the safety of shell eggs...

  18. Improving plant state information for better operational safety

    Girard, C.; Olivier, E.; Grimaldi, X.

    1994-01-01

    Nuclear Power Plant (NPP) safety is strongly dependent on components' reliability and particularly on plant state information reliability. This information, used by the plant operators in order to produce appropriate actions, have to be of a high degree of confidence, especially in accidental conditions where safety is threatened. In this perspective, FRAMATOME, EDF and CEA have started a joint research program to prospect different solutions aiming at a better reliability for critical information needed to safety operate the plant. This paper gives the main results of this program and describes the developments that have been made in order to assess reliability of different information systems used in a Nuclear Power Plant. (Author)

  19. Network information improves cancer outcome prediction.

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  20. Integrating Information Networks for Collective Planetary Stewardship

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  1. Mobile Phone Network Operators' Actions on RF Safety (invited paper)

    Causebrook, J.H.

    1999-01-01

    The current and possible future global penetration of mobile phone usage is given. Health and safety aspects relate to both the statutory requirements for the operation of their networks and the public perception of risks in using services provided by the operators. The coordination of this work nationally through trade associations is mentioned. GSM is the predominant standard used for the provision of global mobile phone services. The GSM MoU Association is introduced as the operators' coordination body worldwide for dealing with radio frequency (RF) health and safety issues through its sub-group, EBRC. The scope of the EBRC group is presented with the considerations used to determine if external research should be supported by the GSM MoU Association. A personal view is provided on the present quality of worldwide research on RF health and safety and some consideration is given as to what constitutes 'good' research. The mobile phone network operators' involvement in the science and application of epidemiological research is considered. Consideration is given to introducing risk/benefit analysis into the debate on the health and safety of mobile phone usage. The media presentation of the results of scientific work on this topic often leads to a falsely negative public perception of the perceived risks. This is made worse when such perceptions are used for the purposes of objecting to the deployment of network infrastructure. The operators' approach to RF health and safety procedures is outlined, with a clarification of the distinctions between near-field and far-field methodologies for the calculation of physical exclusion zones. It is concluded that the mobile phone operators are part of an industry which is safe and who work to ensure that their operations are seen to be safe in the context of the best available worldwide scientific knowledge and safety guidelines. (author)

  2. Development of Safety Assessment Information System (SAIS)

    Park, Byung Shik; Lee, Kyung Jin; Lee, Byung Chul [FNC Tech. Co. Ltd. SNU, Seoul (Korea, Republic of); Song, Tae Young; Lee, Chang Ho [KHNP, Daejeon (Korea, Republic of)

    2007-10-15

    Many reports and documents about nuclear power plant safety analysis like a Periodic Safe Review (PSR), Periodic Safety Analysis (PSA) and Severe Accident Management Guideline (SAMG) come to be drawn up from KHNP. Since these are not arranged easy to look up, the systematic arrangement of data was necessary. The solution against hereupon is to store database, and it was developed with the name, SAIS, by FNC Tech. Co. together with NETEC KHNP. In this web program it is easy to manage (registration, search and statistics) data. And the authorized user can approach this system. This was developed, and was verified under the development environment of; - Web Server : Apache 2.2.5 - Program Language : PHP 5.2 - DBMS : Oracle 10g.

  3. Development of Safety Assessment Information System (SAIS)

    Park, Byung Shik; Lee, Kyung Jin; Lee, Byung Chul; Song, Tae Young; Lee, Chang Ho

    2007-01-01

    Many reports and documents about nuclear power plant safety analysis like a Periodic Safe Review (PSR), Periodic Safety Analysis (PSA) and Severe Accident Management Guideline (SAMG) come to be drawn up from KHNP. Since these are not arranged easy to look up, the systematic arrangement of data was necessary. The solution against hereupon is to store database, and it was developed with the name, SAIS, by FNC Tech. Co. together with NETEC KHNP. In this web program it is easy to manage (registration, search and statistics) data. And the authorized user can approach this system. This was developed, and was verified under the development environment of; - Web Server : Apache 2.2.5 - Program Language : PHP 5.2 - DBMS : Oracle 10g

  4. Management of Information Supporting Collaborative Networks

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  5. A Programming Language Approach to Safety in Home Networks

    Mortensen, Kjeld Høyer; Schougaard, Kari Rye; Schultz, Ulrik Pagh

    , even in a worst-case scenario where an unauthorized user gains remote control of the facilities. We address this safety issue at the programming language level by restricting the operations that can be performed on devices according to the physical location of the user initiating the request......-based restrictions on operations. This model has been implemented in a middleware for home AV devices written in Java, using infrared communication and a FireWire network to implement location awareness....

  6. A Programming Language Approach to Safety in Home Networks

    Mortensen, Kjeld Høyer; Schougaard, Kari Sofie Fogh; Schultz, Ulrik Pagh

    2003-01-01

    , even in a worst-case scenario where an unauthorized user gains remote control of the facilities. We address this safety issue at the programming language level by restricting the operations that can be performed on devices according to the physical location of the user initiating the request......-based restrictions on operations. This model has been implemented in a middleware for home AV devices written in Java, using infrared communication and a FireWire network to implement location awareness....

  7. Bayesian-network-based safety risk analysis in construction projects

    Zhang, Limao; Wu, Xianguo; Skibniewski, Miroslaw J.; Zhong, Jingbing; Lu, Yujie

    2014-01-01

    This paper presents a systemic decision support approach for safety risk analysis under uncertainty in tunnel construction. Fuzzy Bayesian Networks (FBN) is used to investigate causal relationships between tunnel-induced damage and its influential variables based upon the risk/hazard mechanism analysis. Aiming to overcome limitations on the current probability estimation, an expert confidence indicator is proposed to ensure the reliability of the surveyed data for fuzzy probability assessment of basic risk factors. A detailed fuzzy-based inference procedure is developed, which has a capacity of implementing deductive reasoning, sensitivity analysis and abductive reasoning. The “3σ criterion” is adopted to calculate the characteristic values of a triangular fuzzy number in the probability fuzzification process, and the α-weighted valuation method is adopted for defuzzification. The construction safety analysis progress is extended to the entire life cycle of risk-prone events, including the pre-accident, during-construction continuous and post-accident control. A typical hazard concerning the tunnel leakage in the construction of Wuhan Yangtze Metro Tunnel in China is presented as a case study, in order to verify the applicability of the proposed approach. The results demonstrate the feasibility of the proposed approach and its application potential. A comparison of advantages and disadvantages between FBN and fuzzy fault tree analysis (FFTA) as risk analysis tools is also conducted. The proposed approach can be used to provide guidelines for safety analysis and management in construction projects, and thus increase the likelihood of a successful project in a complex environment. - Highlights: • A systemic Bayesian network based approach for safety risk analysis is developed. • An expert confidence indicator for probability fuzzification is proposed. • Safety risk analysis progress is extended to entire life cycle of risk-prone events. • A typical

  8. System for prediction of environmental emergency dose information network system

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  9. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  10. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  11. Future Wireless Networks and Information Systems Volume 1

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  12. Development of the Advanced Nuclear Safety Information Management (ANSIM) System

    Sohn, Jae Min; Ko, Young Cheol; Song, Tai Gil [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-05-15

    Korea has become a technically independent nuclear country and has grown into an exporter of nuclear technologies. Thus, nuclear facilities are increasing in significance at KAERI (Korea Atomic Energy Research Institute), and it is time to address the nuclear safety. The importance of nuclear safety cannot be overemphasized. Therefore, a management system is needed urgently to manage the safety of nuclear facilities and to enhance the efficiency of nuclear information. We have established ISP (Information Strategy Planning) for the Integrated Information System of nuclear facility and safety management. The purpose of this paper is to develop a management system for nuclear safety. Therefore, we developed the Advanced Nuclear Safety Information Management system (hereinafter referred to as the 'ANSIM system'). The ANSIM system has been designed and implemented to computerize nuclear safety information for standardization, integration, and sharing in real-time. Figure 1 shows the main home page of the ANSIM system. In this paper, we describe the design requirements, contents, configurations, and utilizations of the ANSIM system

  13. Food Safety and Nutrition Information for Kids and Teens

    ... Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products Food Home Food Resources for You Consumers Kids & Teens ... More sharing options Linkedin Pin it Email Print Food Safety & Nutrition Information for Kids and Teens Fun & ...

  14. A Survey of Pilots on the Dissemination of Safety Information

    Rakovan, Lori

    1999-01-01

    A survey was conducted to obtain information from the pilot population on erections of safety-related training currently being offered, its usefulness, and the process through which it might be better...

  15. Risk-informed, performance-based safety-security interface

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  16. Design of atomic energy information network system

    Kim, Y. T.; Lee, E. J.; Han, K. W.; Lee, H. C.; Chang, J. H.

    2004-01-01

    As the 21 st century is expected to induce a Knowledge based society, responding to this kind of change on our own initiative could be achieved by establishing networks among atomic energy agencies with the Atomic Energy Portal Site in a pivotal role. Thus, enabling the knowledge information from each agency to be easily shared and utilized. Furthermore, it can contribute to further researches by providing accumulated knowledge in the atomic energy, such as research output and past achievements, and by avoiding the repetition of researches on the same subjects. It could also provide remote educational data to researchers and industrial experts in atomic energy, as well as atomic energy information for general public consistently, so that we can promote our confidence in atomic energy

  17. Transactions of the Twentieth Water Reactor Safety Information Meeting

    Weiss, A.J.

    1992-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 20th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 21--23, 1992. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, USNRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included

  18. Educational commitment and social networking: The power of informal networks

    Zwolak, Justyna P.; Zwolak, Michael; Brewe, Eric

    2018-06-01

    The lack of an engaging pedagogy and the highly competitive atmosphere in introductory science courses tend to discourage students from pursuing science, technology, engineering, and mathematics (STEM) majors. Once in a STEM field, academic and social integration has been long thought to be important for students' persistence. Yet, it is rarely investigated. In particular, the relative impact of in-class and out-of-class interactions remains an open issue. Here, we demonstrate that, surprisingly, for students whose grades fall in the "middle of the pack," the out-of-class network is the most significant predictor of persistence. To do so, we use logistic regression combined with Akaike's information criterion to assess in- and out-of-class networks, grades, and other factors. For students with grades at the very top (and bottom), final grade, unsurprisingly, is the best predictor of persistence—these students are likely already committed (or simply restricted from continuing) so they persist (or drop out). For intermediate grades, though, only out-of-class closeness—a measure of one's immersion in the network—helps predict persistence. This does not negate the need for in-class ties. However, it suggests that, in this cohort, only students that get past the convenient in-class interactions and start forming strong bonds outside of class are or become committed to their studies. Since many students are lost through attrition, our results suggest practical routes for increasing students' persistence in STEM majors.

  19. Lewis Information Network (LINK): Background and overview

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  20. Essential elements of online information networks on invasive alien species

    Simpson, A.; Sellers, E.; Grosse, A.; Xie, Y.

    2006-01-01

    In order to be effective, information must be placed in the proper context and organized in a manner that is logical and (preferably) standardized. Recently, invasive alien species (IAS) scientists have begun to create online networks to share their information concerning IAS prevention and control. At a special networking session at the Beijing International Symposium on Biological Invasions, an online Eastern Asia-North American IAS Information Network (EA-NA Network) was proposed. To prepare for the development of this network, and to provide models for other regional collaborations, we compare four examples of global, regional, and national online IAS information networks: the Global Invasive Species Information Network, the Invasives Information Network of the Inter-American Biodiversity Information Network, the Chinese Species Information System, and the Invasive Species Information Node of the US National Biological Information Infrastructure. We conclude that IAS networks require a common goal, dedicated leaders, effective communication, and broad endorsement, in order to obtain sustainable, long-term funding and long-term stability. They need to start small, use the experience of other networks, partner with others, and showcase benefits. Global integration and synergy among invasive species networks will succeed with contributions from both the top-down and the bottom-up. ?? 2006 Springer.

  1. Optimizing online social networks for information propagation.

    Duan-Bing Chen

    Full Text Available Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  2. Optimizing online social networks for information propagation.

    Chen, Duan-Bing; Wang, Guan-Nan; Zeng, An; Fu, Yan; Zhang, Yi-Cheng

    2014-01-01

    Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  3. Atomic Information Technology Safety and Economy of Nuclear Power Plants

    Woo, Taeho

    2012-01-01

    Atomic Information Technology revaluates current conceptions of the information technology aspects of the nuclear industry. Economic and safety research in the nuclear energy sector are explored, considering statistical methods which incorporate Monte-Carlo simulations for practical applications. Divided into three sections, Atomic Information Technology covers: • Atomic economics and management, • Atomic safety and reliability, and • Atomic safeguarding and security. Either as a standalone volume or as a companion to conventional nuclear safety and reliability books, Atomic Information Technology acts as a concise and thorough reference on statistical assessment technology in the nuclear industry. Students and industry professionals alike will find this a key tool in expanding and updating their understanding of this industry and the applications of information technology within it.

  4. Information safety by suppression of chaos

    Loskutov, A; Churaev, A A [Physics Faculty, Moscow State University, Moscow 119899 (Russian Federation)

    2005-01-01

    A new original method of information processing and secure communications based on the coding of alphabet symbols by stabilized cycles of certain perturbed one-dimensional dynamical systems is proposed. The foundation of the proposed method is ciphering by the one-to-one correspondence between periods of such cycles and certain alphabet symbols. It is shown that for some maps perturbations which lead to the stabilization of cycles of the given period, form some domain in the parametric space. This fact is used for coding identical symbols via random selection of parameters from this domain, that ensures that the probability of decoding the transmitting information by an external observer is zero. Analytic estimations of the admissible noise level in the communication channel and the randomness degree of transmitting signals are made. Some variants of the ciphered sequences are presented.

  5. VIOLIN: vaccine investigation and online information network.

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  6. Deep Space Network information system architecture study

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  7. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  8. Analysis of Computer Network Information Based on "Big Data"

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  9. Value of Information Analysis in Structural Safety

    Konakli, Katerina; Faber, Michael Havbro

    2014-01-01

    of structural systems. In this context, experiments may refer to inspections or techniques of structural health monitoring. The Value of Information concept provides a powerful tool for determining whether the experimental cost is justified by the expected benefit and for identifying the optimal among different...... possible experimental schemes. This concept is elaborated through principal examples for structural components and system models. Sensitivity analyses are performed to investigate how the decision problem is influenced by the level of uncertainty that characterizes the structural properties, the amount...

  10. Artificial neural network for research reactor safety status monitoring

    Varde, P.V.

    2001-01-01

    During reactor upset/abnormal conditions, emphasis is placed on plant operator's ability to quickly identify the problem and perform diagnosis and initiate recovery action to ensure safety of the plant. However, the reliability of human action is adversely affected at the time of crisis, due to the time stress and psychological factors. Availability of operational aids capable of monitoring the status of the plant and quickly identifying the deviation from normal operation is expected to significantly improve the operator reliability. Artificial Neural Network (based on Back Propagation Algorithm) has been developed and applied for reactor safety status monitoring, as part of an Operator Support System. ANN has been trained for 14 different plant states using 42 input symptom patterns. Recall tests performed on the ANN show that the system was able to identify the plant state with reasonable accuracy. (author)

  11. Safety recommendation component of mobile information assistant of the tourist

    Savchuk, Valeriya V.; Kunanec, Natalia E.; Pasichnyk, Volodymyr V.; Popiel, Piotr; Weryńska-Bieniasz, RóŻa; Kashaganova, Gulzhamal; Kalizhanova, Aliya

    2017-08-01

    The goal of article is to introduce and justify the need for the safety system components of Mobile Information of the tourist (MIAT). One of the objectives of the system is to determine the level of risk in a particular tourist destination on the basis of available information in the knowledge base.

  12. Game theoretic analysis of congestion, safety and security networks, air traffic and emergency departments

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both way...

  13. A hierarchical network modeling method for railway tunnels safety assessment

    Zhou, Jin; Xu, Weixiang; Guo, Xin; Liu, Xumin

    2017-02-01

    Using network theory to model risk-related knowledge on accidents is regarded as potential very helpful in risk management. A large amount of defects detection data for railway tunnels is collected in autumn every year in China. It is extremely important to discover the regularities knowledge in database. In this paper, based on network theories and by using data mining techniques, a new method is proposed for mining risk-related regularities to support risk management in railway tunnel projects. A hierarchical network (HN) model which takes into account the tunnel structures, tunnel defects, potential failures and accidents is established. An improved Apriori algorithm is designed to rapidly and effectively mine correlations between tunnel structures and tunnel defects. Then an algorithm is presented in order to mine the risk-related regularities table (RRT) from the frequent patterns. At last, a safety assessment method is proposed by consideration of actual defects and possible risks of defects gained from the RRT. This method cannot only generate the quantitative risk results but also reveal the key defects and critical risks of defects. This paper is further development on accident causation network modeling methods which can provide guidance for specific maintenance measure.

  14. Information about the control of nuclear safety in France

    Gerster, D.

    1994-01-01

    The permanent objective of the French Nuclear Safety Authority is the public information about technical controls performed in French nuclear installations. Three publications from the DSIN (Direction of Nuclear Installations Safety) are devoted to this effort: the MAGNUC Minitel magazine, the annual activity report and the CONTROLE magazine. Details about the content of these publications are given. A large part of the information about control of nuclear safety concerns the incidents and accidents and their importance level. A seriousness scale was created in France at the beginning of 1988 and replaced in April 1994 by the very similar International Nuclear Event Scale (INES). Explanation of this scale is given and illustrated with examples of real events and accidents. However, international comparison between incidents and accidents remains delicate because the detailed content of safety reports can change significantly from one country to another. (J.S.). 1 fig

  15. Transactions of the nineteenth water reactor safety information meeting

    Weiss, A.J.

    1991-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 19th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 28--30, 1991. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, USNRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from the governments and industry in Europe and Japan are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting, and are given in the order of their presentation in each session. The individual summaries have been cataloged separately

  16. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Wu, Jibing; Meng, Qinggang; Deng, Su; Huang, Hongbin; Wu, Yahui; Badii, Atta

    2017-01-01

    Heterogeneous information networks (e.g. bibliographic networks and social media networks) that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS) algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  17. Modeling the reemergence of information diffusion in social network

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  18. Information security as part of the nuclear safety culture

    Sitnica, A., E-mail: demetrkj@westinghouse.com [Westinghouse Electric Co., 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2016-09-15

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  19. Information security as part of the nuclear safety culture

    Sitnica, A.

    2016-09-01

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  20. Participatory approach to improving safety, health and working conditions in informal economy workplaces in Cambodia.

    Kawakami, Tsuyoshi; Tong, Leng; Kannitha, Yi; Sophorn, Tun

    2011-01-01

    The present study aimed to improve safety and health in informal economy workplaces such as home workplaces, small construction sites, and rural farms in Cambodia by using "participatory" approach. The government, workers' and employers' organizations and NGOs jointly assisted informal economy workers in improving safety and health by using participatory training methodologies. The steps taken were: (1) to collect existing good practices in safety and health in Cambodia; (2) to develop new participatory training programmes for home workers and small construction sites referring to ILO's WISE training programme, and (3) to train government officers, workers, employers and NGOs as safety and health trainers. The participatory training programmes developed consisted of action-checklists associated with illustrations, good example photo sheets, and texts explaining practical, low-cost improvement measures. The established safety and health trainers reached many informal economy workers through their human networks, and trained them by using the developed participatory training programmes. More than 3,000 informal economy workers were trained and they implemented improvements by using low-cost methods. Participatory training methodologies and active cooperation between the government, workers, employers and NGOs made it possible to provide practical training for those involved in the informal economy workplaces.

  1. Information filtering in evolving online networks

    Chen, Bo-Lun; Li, Fen-Fen; Zhang, Yong-Jun; Ma, Jia-Lin

    2018-02-01

    Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.

  2. Patient safety goals for the proposed Federal Health Information Technology Safety Center.

    Sittig, Dean F; Classen, David C; Singh, Hardeep

    2015-03-01

    The Office of the National Coordinator for Health Information Technology is expected to oversee creation of a Health Information Technology (HIT) Safety Center. While its functions are still being defined, the center is envisioned as a public-private entity focusing on promotion of HIT related patient safety. We propose that the HIT Safety Center leverages its unique position to work with key administrative and policy stakeholders, healthcare organizations (HCOs), and HIT vendors to achieve four goals: (1) facilitate creation of a nationwide 'post-marketing' surveillance system to monitor HIT related safety events; (2) develop methods and governance structures to support investigation of major HIT related safety events; (3) create the infrastructure and methods needed to carry out random assessments of HIT related safety in complex HCOs; and (4) advocate for HIT safety with government and private entities. The convening ability of a federally supported HIT Safety Center could be critically important to our transformation to a safe and effective HIT enabled healthcare system. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Organizational Application of Social Networking Information Technologies

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  4. Organizing safety: conditions for successful information assurance programs.

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  5. Distributed Data Networks That Support Public Health Information Needs.

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  6. An information spreading model based on online social networks

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  7. Application of life-cycle information for advancement in safety of nuclear fuel cycle facilities. Application of safety information to advanced safety management support system

    Suzuki, Kazuhiko; Ishida, Michihiko

    2005-08-01

    Risk management is major concern to nuclear energy reprocessing plants to improve plant and process reliability and ensure their safety. This is because we are required to predict potential risks before any accident or disaster occurs. The advancement of safety design and safety systems technologies showed large amount of useful safety-related knowledge that can be of great importance to plant operation to reduce operation risks and ensure safety. This research proposes safety knowledge modeling framework on the basis of ontology technologies to systematically construct plant knowledge model, which includes plant structure, operation, and the associated behaviors. In such plant knowledge model safety related information is defined and linked to the different elements of plant knowledge model. Ontology editor is employed to define the basic concepts and their inter-relations, which are used to capture and construct plant safety knowledge. In order to provide detailed safety knowledgebase, HAZOP results are analyzed and structured so that safety-related knowledge are identified and structured within the plant knowledgebase. The target safety knowledgebase includes: failures, deviations, causes, consequences, and fault propagation as mapped to plant knowledge. The proposed ontology-based safety framework is applied on case study nuclear plant to structure failures, causes, consequences, and fault propagation, which are used to support plant operation. (author)

  8. Mechanisms of protection of information in computer networks and systems

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  9. Classification Method in Integrated Information Network Using Vector Image Comparison

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  10. Use of risk information to safety regulation. Fabrication facilities

    NONE

    2013-08-15

    A procedure of ISA (Integrated Safety Analysis) for uranium fuel fabrication/enrichment facilities has been under the development aiming to utilize risk information for safety regulations in this project. Activities in the fiscal year 2012 are summarized in the paper. There are two major activities in the year. First one is a study on ISA procedure for external events such as earthquakes. Second one is that for chemical consequences such as UF6 and HF. Other than the activities a fundamental study on a policy of utilizing risk information was conducted. The outline and results are provided in the chapter 1 and 2 respectively. (author)

  11. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  12. Possible improvements of the reactor safety via neural networks

    Marseguerra, M.; Padovani, E.

    1996-01-01

    The artificial neural networks (ANN) represent one of the fastest developing methodologies which has been extensively applied in the past decade to quite different areas such as pattern recognition and dynamic control. In the present paper we consider two possible application of the ANNs to the safe operation of a reactor. The first one concerns the possibility of using an ANN as a fast reactivity meter only based on previously measured values of the neutron flux. Since the network parameters are experimentally estimated during the training phase, this approach looks promising in comparison with others currently adopted which, besides the experimental data, also depend on theoretical assumptions such as the use of the inverse kinetic equations together with effective parameters. The second application concerns the BWRs and aims at obtaining an early indicator of a variation of the coolant velocity through the fuel elements. This velocity may be routinely measured by correlating the signals coming from two vertically displaced in-core detectors. The variation of the coolant velocity represents an indication of instabilities of the two-phase flow and therefore its on line measurements is of importance for the plant safety. Numerical results of simulated experiments concerning the two mentioned applications are reported. It appears that the neural network approach is suitable for obtaining fast and accurate results. (authors)

  13. Safety Psychology Applicating on Coal Mine Safety Management Based on Information System

    Hou, Baoyue; Chen, Fei

    In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.

  14. Spatial anomaly detection in sensor networks using neighborhood information

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  15. Spatial anomaly detection in sensor networks using neighborhood information

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  16. Social Networking among Library and Information Science Undergraduate Students

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  17. Thirteenth water reactor safety research information meeting: proceedings Volume 1

    Weiss, A.J.

    1986-02-01

    This six-volume report contains 151 papers out of the 178 that were presented at the Thirteenth Water Reactor Safety Research Information Meeting held at the National Bureau of Standards, Gaithersburg, Maryland, during the week of October 22-25, 1985. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included thirty-one different papers presented by researchers from Japan, Canada and eight European countries. The title of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume presents information on: risk analysis PRA application; severe accident sequence analysis; risk analysis/dependent failure analysis; and industry safety research

  18. Obtaining informedness in collaborative networks through automated information provisioning

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  19. 78 FR 10200 - Proposed Information Collection; Captive Wildlife Safety Act

    2013-02-13

    ... DEPARTMENT OF THE INTERIOR Fish and Wildlife Service [FWS-HQ-LE-2013-N020; FF09L00200-FX-LE12200900000] Proposed Information Collection; Captive Wildlife Safety Act AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice; request for comments. SUMMARY: We (U.S. Fish and Wildlife Service) will ask the...

  20. Thermal analysis and safety information for metal nanopowders by DSC

    Tseng, J.M.; Huang, S.T. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Duh, Y.S.; Hsieh, T.Y.; Sun, Y.Y. [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China); Lin, J.Z. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Wu, H.C. [Institute of Occupational Safety and Health, Council of Labor Affairs, Taipei, Taiwan, ROC (China); Kao, C.S., E-mail: jcsk@nuu.edu.tw [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China)

    2013-08-20

    Highlights: • Metal nanopowders are common and frequently employed in industry. • Nano iron powder experimental results of T{sub o} were 140–150 °C. • Safety information can benefit relevant metal powders industries. - Abstract: Metal nanopowders are common and frequently employed in industry. Iron is mostly applied in high-performance magnetic materials and pollutants treatment for groundwater. Zinc is widely used in brass, bronze, die casting metal, alloys, rubber, and paints, etc. Nonetheless, some disasters induced by metal powders are due to the lack of related safety information. In this study, we applied differential scanning calorimetry (DSC) and used thermal analysis software to evaluate the related thermal safety information, such as exothermic onset temperature (T{sub o}), peak of temperature (T{sub p}), and heat of reaction (ΔH). The nano iron powder experimental results of T{sub o} were 140–150 °C, 148–158 °C, and 141–149 °C for 15 nm, 35 nm, and 65 nm, respectively. The ΔH was larger than 3900 J/g, 5000 J/g, and 3900 J/g for 15 nm, 35 nm, and 65 nm, respectively. Safety information can benefit the relevant metal powders industries for preventing accidents from occurring.

  1. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  2. Optimal control of epidemic information dissemination over networks.

    Chen, Pin-Yu; Cheng, Shin-Ming; Chen, Kwang-Cheng

    2014-12-01

    Information dissemination control is of crucial importance to facilitate reliable and efficient data delivery, especially in networks consisting of time-varying links or heterogeneous links. Since the abstraction of information dissemination much resembles the spread of epidemics, epidemic models are utilized to characterize the collective dynamics of information dissemination over networks. From a systematic point of view, we aim to explore the optimal control policy for information dissemination given that the control capability is a function of its distribution time, which is a more realistic model in many applications. The main contributions of this paper are to provide an analytically tractable model for information dissemination over networks, to solve the optimal control signal distribution time for minimizing the accumulated network cost via dynamic programming, and to establish a parametric plug-in model for information dissemination control. In particular, we evaluate its performance in mobile and generalized social networks as typical examples.

  3. Social but safe? Quality and safety of diabetes-related online social networks.

    Weitzman, Elissa R; Cole, Emily; Kaci, Liljana; Mandl, Kenneth D

    2011-05-01

    To foster informed decision-making about health social networking (SN) by patients and clinicians, the authors evaluated the quality/safety of SN sites' policies and practices. Multisite structured observation of diabetes-focused SN sites. Measurements 28 indicators of quality and safety covering: (1) alignment of content with diabetes science and clinical practice recommendations; (2) safety practices for auditing content, supporting transparency and moderation; (3) accessibility of privacy policies and the communication and control of privacy risks; and (4) centralized sharing of member data and member control over sharing. Quality was variable across n=10 sites: 50% were aligned with diabetes science/clinical practice recommendations with gaps in medical disclaimer use (30% have) and specification of relevant glycosylated hemoglobin levels (0% have). Safety was mixed with gaps in external review approaches (20% used audits and association links) and internal review approaches (70% use moderation). Internal safety review offers limited protection: misinformation about a diabetes 'cure' was found on four moderated sites. Of nine sites with advertising, transparency was missing on five; ads for unfounded 'cures' were present on three. Technological safety was poor with almost no use of procedures for secure data storage and transmission; only three sites support member controls over personal information. Privacy policies' poor readability impedes risk communication. Only three sites (30%) demonstrated better practice. Limitations English-language diabetes sites only. The quality/safety of diabetes SN is variable. Observed better practice suggests improvement is feasible. Mechanisms for improvement are recommended that engage key stakeholders to balance autonomy, community ownership, conditions for innovation, and consumer protection.

  4. Oceanographic data and information network in the Indian Ocean

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  5. Asia Pacific Mangrove Information Network (APMIN): A conceptual model

    Chavan, V.S.; Jagtap, T.G.; Untawale, A.G.

    Asia Pacific Mangrove Information Network (APMIN), its structure and scope, is discussed in this paper. Establishment of National Mangrove Information Centers (NMIC) in 20 Asia-Pacific countries, would contribute towards development of databases...

  6. Vulnerability of complex networks under intentional attack with incomplete information

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  7. Information Flow Between Resting-State Networks.

    Diez, Ibai; Erramuzpe, Asier; Escudero, Iñaki; Mateos, Beatriz; Cabrera, Alberto; Marinazzo, Daniele; Sanz-Arigita, Ernesto J; Stramaglia, Sebastiano; Cortes Diaz, Jesus M

    2015-11-01

    The resting brain dynamics self-organize into a finite number of correlated patterns known as resting-state networks (RSNs). It is well known that techniques such as independent component analysis can separate the brain activity at rest to provide such RSNs, but the specific pattern of interaction between RSNs is not yet fully understood. To this aim, we propose here a novel method to compute the information flow (IF) between different RSNs from resting-state magnetic resonance imaging. After hemodynamic response function blind deconvolution of all voxel signals, and under the hypothesis that RSNs define regions of interest, our method first uses principal component analysis to reduce dimensionality in each RSN to next compute IF (estimated here in terms of transfer entropy) between the different RSNs by systematically increasing k (the number of principal components used in the calculation). When k=1, this method is equivalent to computing IF using the average of all voxel activities in each RSN. For k≥1, our method calculates the k multivariate IF between the different RSNs. We find that the average IF among RSNs is dimension dependent, increasing from k=1 (i.e., the average voxel activity) up to a maximum occurring at k=5 and to finally decay to zero for k≥10. This suggests that a small number of components (close to five) is sufficient to describe the IF pattern between RSNs. Our method--addressing differences in IF between RSNs for any generic data--can be used for group comparison in health or disease. To illustrate this, we have calculated the inter-RSN IF in a data set of Alzheimer's disease (AD) to find that the most significant differences between AD and controls occurred for k=2, in addition to AD showing increased IF w.r.t. The spatial localization of the k=2 component, within RSNs, allows the characterization of IF differences between AD and controls.

  8. Dynamic safety assessment of natural gas stations using Bayesian network

    Zarei, Esmaeil; Azadeh, Ali; Khakzad, Nima; Aliabadi, Mostafa Mirzaei; Mohammadfam, Iraj

    2017-01-01

    Graphical abstract: Dynamic cause-consequence analysis of the regulator system failure using BN. - Highlights: • A dynamic and comprehensive QRA (DCQRA) framework is proposed for safety assessment of CGSs. • Bow-tie diagram and Bayesian network are employed for accident scenario modeling. • Critical basic events and minimal cut sets are identified using probability updating. - Abstract: Pipelines are one of the most popular and effective ways of transporting hazardous materials, especially natural gas. However, the rapid development of gas pipelines and stations in urban areas has introduced a serious threat to public safety and assets. Although different methods have been developed for risk analysis of gas transportation systems, a comprehensive methodology for risk analysis is still lacking, especially in natural gas stations. The present work is aimed at developing a dynamic and comprehensive quantitative risk analysis (DCQRA) approach for accident scenario and risk modeling of natural gas stations. In this approach, a FMEA is used for hazard analysis while a Bow-tie diagram and Bayesian network are employed to model the worst-case accident scenario and to assess the risks. The results have indicated that the failure of the regulator system was the worst-case accident scenario with the human error as the most contributing factor. Thus, in risk management plan of natural gas stations, priority should be given to the most probable root events and main contribution factors, which have identified in the present study, in order to reduce the occurrence probability of the accident scenarios and thus alleviate the risks.

  9. Dynamic safety assessment of natural gas stations using Bayesian network

    Zarei, Esmaeil, E-mail: smlzarei65@gmail.com [Center of Excellence for Occupational Health Engineering, Research Center for Health Sciences, Faculty of Health, Hamadan University of Medical Sciences, Hamadan (Iran, Islamic Republic of); Azadeh, Ali [School of Industrial and Systems Engineering, Center of Excellence for Intelligent-Based Experimental Mechanic, College of Engineering, University of Tehran (Iran, Islamic Republic of); Khakzad, Nima [Safety and Security Science Section, Delft University of Technology, Delft (Netherlands); Aliabadi, Mostafa Mirzaei [Center of Excellence for Occupational Health Engineering, Research Center for Health Sciences, Faculty of Health, Hamadan University of Medical Sciences, Hamadan (Iran, Islamic Republic of); Mohammadfam, Iraj, E-mail: mohammadfam@umsha.ac.ir [Center of Excellence for Occupational Health Engineering, Research Center for Health Sciences, Faculty of Health, Hamadan University of Medical Sciences, Hamadan (Iran, Islamic Republic of)

    2017-01-05

    Graphical abstract: Dynamic cause-consequence analysis of the regulator system failure using BN. - Highlights: • A dynamic and comprehensive QRA (DCQRA) framework is proposed for safety assessment of CGSs. • Bow-tie diagram and Bayesian network are employed for accident scenario modeling. • Critical basic events and minimal cut sets are identified using probability updating. - Abstract: Pipelines are one of the most popular and effective ways of transporting hazardous materials, especially natural gas. However, the rapid development of gas pipelines and stations in urban areas has introduced a serious threat to public safety and assets. Although different methods have been developed for risk analysis of gas transportation systems, a comprehensive methodology for risk analysis is still lacking, especially in natural gas stations. The present work is aimed at developing a dynamic and comprehensive quantitative risk analysis (DCQRA) approach for accident scenario and risk modeling of natural gas stations. In this approach, a FMEA is used for hazard analysis while a Bow-tie diagram and Bayesian network are employed to model the worst-case accident scenario and to assess the risks. The results have indicated that the failure of the regulator system was the worst-case accident scenario with the human error as the most contributing factor. Thus, in risk management plan of natural gas stations, priority should be given to the most probable root events and main contribution factors, which have identified in the present study, in order to reduce the occurrence probability of the accident scenarios and thus alleviate the risks.

  10. Exploring a social network for sharing information about pain.

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  11. Measuring and improving patient safety through health information technology: The Health IT Safety Framework.

    Singh, Hardeep; Sittig, Dean F

    2016-04-01

    Health information technology (health IT) has potential to improve patient safety but its implementation and use has led to unintended consequences and new safety concerns. A key challenge to improving safety in health IT-enabled healthcare systems is to develop valid, feasible strategies to measure safety concerns at the intersection of health IT and patient safety. In response to the fundamental conceptual and methodological gaps related to both defining and measuring health IT-related patient safety, we propose a new framework, the Health IT Safety (HITS) measurement framework, to provide a conceptual foundation for health IT-related patient safety measurement, monitoring, and improvement. The HITS framework follows both Continuous Quality Improvement (CQI) and sociotechnical approaches and calls for new measures and measurement activities to address safety concerns in three related domains: 1) concerns that are unique and specific to technology (e.g., to address unsafe health IT related to unavailable or malfunctioning hardware or software); 2) concerns created by the failure to use health IT appropriately or by misuse of health IT (e.g. to reduce nuisance alerts in the electronic health record (EHR)), and 3) the use of health IT to monitor risks, health care processes and outcomes and identify potential safety concerns before they can harm patients (e.g. use EHR-based algorithms to identify patients at risk for medication errors or care delays). The framework proposes to integrate both retrospective and prospective measurement of HIT safety with an organization's existing clinical risk management and safety programs. It aims to facilitate organizational learning, comprehensive 360 degree assessment of HIT safety that includes vendor involvement, refinement of measurement tools and strategies, and shared responsibility to identify problems and implement solutions. A long term framework goal is to enable rigorous measurement that helps achieve the safety

  12. Hodge Decomposition of Information Flow on Small-World Networks.

    Haruna, Taichi; Fujiki, Yuuya

    2016-01-01

    We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  13. Hodge decomposition of information flow on small-world networks

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  14. Information and Networks in Asia and Sub-Saharan Africa ...

    Information and Networks in Asia and Sub-Saharan Africa: Strengthening Research Capacity ... credible, high-quality evidence on the influence of digital initiatives in the areas of ... use of digital information networks and economic growth, democratic reform, and increased educational opportunities in developing countries.

  15. Blending Formal and Informal Learning Networks for Online Learning

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  16. Pain: a distributed brain information network?

    Hiroaki Mano

    2015-01-01

    Full Text Available Understanding how pain is processed in the brain has been an enduring puzzle, because there doesn't appear to be a single "pain cortex" that directly codes the subjective perception of pain. An emerging concept is that, instead, pain might emerge from the coordinated activity of an integrated brain network. In support of this view, Woo and colleagues present evidence that distinct brain networks support the subjective changes in pain that result from nociceptive input and self-directed cognitive modulation. This evidence for the sensitivity of distinct neural subsystems to different aspects of pain opens up the way to more formal computational network theories of pain.

  17. Bayesian Network Assessment Method for Civil Aviation Safety Based on Flight Delays

    Huawei Wang; Jun Gao

    2013-01-01

    Flight delays and safety are the principal contradictions in the sound development of civil aviation. Flight delays often come up and induce civil aviation safety risk simultaneously. Based on flight delays, the random characteristics of civil aviation safety risk are analyzed. Flight delays have been deemed to a potential safety hazard. The change rules and characteristics of civil aviation safety risk based on flight delays have been analyzed. Bayesian networks (BN) have been used to build ...

  18. Information Operations Innovation Network (IOIN) Demonstration

    Choo, Vic; Scheiderich, Louis

    2006-01-01

    ...; and Supplement existing/future network defense tools with additional capabilities. The actual software packages used for this effort include VIAasst, VisAlert, Flexviewer, Event Correlation for Cyber Attack Recognition (ECCARS...

  19. Information Dynamics as Foundation for Network Management

    2014-12-04

    developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design

  20. Analysis on evaluation ability of nonlinear safety assessment model of coal mines based on artificial neural network

    SHI Shi-liang; LIU Hai-bo; LIU Ai-hua

    2004-01-01

    Based on the integration analysis of goods and shortcomings of various methods used in safety assessment of coal mines, combining nonlinear feature of mine safety sub-system, this paper establishes the neural network assessment model of mine safety, analyzes the ability of artificial neural network to evaluate mine safety state, and lays the theoretical foundation of artificial neural network using in the systematic optimization of mine safety assessment and getting reasonable accurate safety assessment result.

  1. Integration of genomic information with biological networks using Cytoscape.

    Bauer-Mehren, Anna

    2013-01-01

    Cytoscape is an open-source software for visualizing, analyzing, and modeling biological networks. This chapter explains how to use Cytoscape to analyze the functional effect of sequence variations in the context of biological networks such as protein-protein interaction networks and signaling pathways. The chapter is divided into five parts: (1) obtaining information about the functional effect of sequence variation in a Cytoscape readable format, (2) loading and displaying different types of biological networks in Cytoscape, (3) integrating the genomic information (SNPs and mutations) with the biological networks, and (4) analyzing the effect of the genomic perturbation onto the network structure using Cytoscape built-in functions. Finally, we briefly outline how the integrated data can help in building mathematical network models for analyzing the effect of the sequence variation onto the dynamics of the biological system. Each part is illustrated by step-by-step instructions on an example use case and visualized by many screenshots and figures.

  2. Factors Enabling Information Propagation in a Social Network Site

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    A relevant feature of Social Network Sites is their ability to propagate units of information and create large distributed conversations. This phenomenon is particularly relevant because of the speed of information propagation, which is known to be much faster than within traditional media......, and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...... at measuring specific socio-technical factors enabling information spreading in Social Network Sites....

  3. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  4. Patient-Reported Safety Information: A Renaissance of Pharmacovigilance?

    Härmark, Linda; Raine, June; Leufkens, Hubert; Edwards, I Ralph; Moretti, Ugo; Sarinic, Viola Macolic; Kant, Agnes

    2016-10-01

    The role of patients as key contributors in pharmacovigilance was acknowledged in the new EU pharmacovigilance legislation. This contains several efforts to increase the involvement of the general public, including making patient adverse drug reaction (ADR) reporting systems mandatory. Three years have passed since the legislation was introduced and the key question is: does pharmacovigilance yet make optimal use of patient-reported safety information? Independent research has shown beyond doubt that patients make an important contribution to pharmacovigilance signal detection. Patient reports provide first-hand information about the suspected ADR and the circumstances under which it occurred, including medication errors, quality failures, and 'near misses'. Patient-reported safety information leads to a better understanding of the patient's experiences of the ADR. Patients are better at explaining the nature, personal significance and consequences of ADRs than healthcare professionals' reports on similar associations and they give more detailed information regarding quality of life including psychological effects and effects on everyday tasks. Current methods used in pharmacovigilance need to optimise use of the information reported from patients. To make the most of information from patients, the systems we use for collecting, coding and recording patient-reported information and the methodologies applied for signal detection and assessment need to be further developed, such as a patient-specific form, development of a severity grading and evolution of the database structure and the signal detection methods applied. It is time for a renaissance of pharmacovigilance.

  5. DART - for design basis justification and safety related information management

    Billington, A.; Blondiaux, P.; Boucau, J.; Cantineau, B.; Doumont, C.; Mared, A.

    2000-01-01

    DART is the acronym for Design Analysis Re-engineering Tool. It embodies a systematic and integrated approach to NPP safety re-assessment and configuration management, that makes use of Reverse Failure Mode and Effect Analysis in conjunction with a state-of-the-art relational database and a standardized data format, to permit long-term management of plant safety related information. The plant design is reviewed in a step-by-step logical fashion by constructing fault trees that identify the link between undesired consequences and their causes. Each failure cause identified in a fault tree is addressed by defining functional requirements, which are in turn addressed by documenting the specific manner in which the plant complies with the requirement. The database can be used to generate up-to-date plant safety related documents, including: SAR, Systems Descriptions, Technical Specifications and plant procedures. The approach is open-minded by nature and therefore is not regulatory driven, however the plant licensing basis will also be reviewed and documented within the same database such that a Regulatory Conformance Program may be integrated with the other safety documentation. This methodology can thus reconstitute the plant design bases in a comprehensive and systematic way, while allowing to uncover weaknesses in design. The original feature of the DART methodology is that it links all the safety related documents together, facilitating the evaluation of the safety impact resulting from any plant modification. Due to its capability to retrieve the basic justifications of the plant design, it is also a useful tool for training the young generation of plant personnel. The DART methodology has been developed for application to units 2, 3 and 4 at Vattenfall's Ringhals site in Sweden. It may be applied to any nuclear power plant or industrial facility where public safety is a concern. (author)

  6. DART - for design basis justification and safety related information management

    Billington, A.; Blondiaux, B.; Boucau, J.; Cantineau, B.; Mared, A.

    2001-01-01

    DART is the acronym for Design Analysis Re-Engineering Tool. It embodies a systematic and integrated approach to NPP safety re-assessment and configuration management, that makes use of Reverse Failure Mode and Effect Analysis in conjunction with a state-of-the-art relational database and a standardized data format, to permit long-term management of plant safety related information. The plant design is reviewed in a step-by-step logical fashion by constructing fault trees that identify the link between undesired consequences and their causes. Each failure cause identified in a fault tree is addressed by defining functional requirements, which are in turn addressed by documenting the specific manner in which the plant complies with the requirement. The database can then be used to generate up-to-date plant safety related documents, including: SAR, Systems Descriptions, Technical Specifications and plant procedures. The approach is open-minded by nature and therefore is not regulatory driven, however the plant licensing basis will also be reviewed and documented within the same database such that a Regulatory Conformance Program may be integrated with the other safety documentation. This methodology can thus reconstitute the plant design bases in a comprehensive and systematic way, while allowing to uncover weaknesses in design. The original feature of the DART methodology is that it links all the safety related documents together, facilitating the evaluation of the safety impact resulting from any plant modification. Due to its capability to retrieve the basic justifications of the plant design, it is also a useful tool for training the young generation of plant personnel. The DART methodology has been developed for application to units 2, 3 and 4 at Vattenfall's Ringhals site in Sweden. It may be applied to any nuclear power plant or industrial facility where public safety is a concern. (author)

  7. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  8. Information Systems at Enterprise. Design of Secure Network of Enterprise

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  9. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  10. Development of a Safety Assessment Information System for the Management of Periodic Safety Assessment Activities

    Song, Tae Young

    2007-01-01

    At present, the 10-year Periodic Safety Review(PSR) has been performing to confirm all the aspects of safety issues for all the operating plants in compliance with domestic nuclear law of article 23, subarticle 3. For each plant, in addition, Probabilistic Safety Assessment(PSA) and Severe Accident Management Guideline(SAMG) are being implemented and revised periodically to reflect the latest safety level according to principle fulfillment of severe accident policy statement. The assessment reports, as one of outcomes from these activities, are submitted into and reviewed by domestic regulatory body. During reviewing (in-office duty) and licensing (regulatory duty) process, a large number of outcomes of which most are the formal technical reports and licensing materials, are inevitably produced. Moreover, repeated review process over the plants can make them accumulated and produce a variety of documents additionally. This circumstance motivates to develop effective tool or system for the management of these reports and related technical documents for the future use in licensing process and for subsequent plant assessments. This paper presents the development status of Safety Assessment Information System(SAIS) which manages safety-related documents of PSR, PSA and SAMG for practical use for experienced engineers in charge of these areas

  11. Development of a Safety Assessment Information System for the Management of Periodic Safety Assessment Activities

    Song, Tae Young [Nuclear Engineering and Technology Institute, Daejeon (Korea, Republic of)

    2007-07-01

    At present, the 10-year Periodic Safety Review(PSR) has been performing to confirm all the aspects of safety issues for all the operating plants in compliance with domestic nuclear law of article 23, subarticle 3. For each plant, in addition, Probabilistic Safety Assessment(PSA) and Severe Accident Management Guideline(SAMG) are being implemented and revised periodically to reflect the latest safety level according to principle fulfillment of severe accident policy statement. The assessment reports, as one of outcomes from these activities, are submitted into and reviewed by domestic regulatory body. During reviewing (in-office duty) and licensing (regulatory duty) process, a large number of outcomes of which most are the formal technical reports and licensing materials, are inevitably produced. Moreover, repeated review process over the plants can make them accumulated and produce a variety of documents additionally. This circumstance motivates to develop effective tool or system for the management of these reports and related technical documents for the future use in licensing process and for subsequent plant assessments. This paper presents the development status of Safety Assessment Information System(SAIS) which manages safety-related documents of PSR, PSA and SAMG for practical use for experienced engineers in charge of these areas.

  12. On library information resources construction under network environment

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  13. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  14. Unavailability analysis of a PWR safety system by a Bayesian network

    Estevao, Lilian B.; Melo, Paulo Fernando F. Frutuoso e; Rivero, Jose J.

    2013-01-01

    Bayesian networks (BN) are directed acyclic graphs that have dependencies between variables, which are represented by nodes. These dependencies are represented by lines connecting the nodes and can be directed or not. Thus, it is possible to model conditional probabilities and calculate them with the help of Bayes' Theorem. The objective of this paper is to present the modeling of the failure of a safety system of a typical second generation light water reactor plant, the Containment Heat Removal System (CHRS), whose function is to cool the water of containment reservoir being recirculated through the Containment Spray Recirculation System (CSRS). CSRS is automatically initiated after a loss of coolant accident (LOCA) and together with the CHRS cools the reservoir water. The choice of this system was due to the fact that its analysis by a fault tree is available in Appendix II of the Reactor Safety Study Report (WASH-1400), and therefore all the necessary technical information is also available, such as system diagrams, failure data input and the fault tree itself that was developed to study system failure. The reason for the use of a bayesian network in this context was to assess its ability to reproduce the results of fault tree analyses and also verify the feasibility of treating dependent events. Comparing the fault trees and bayesian networks, the results obtained for the system failure were very close. (author)

  15. Fault-Tree Modeling of Safety-Critical Network Communication in a Digitalized Nuclear Power Plant

    Lee, Sang Hun; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of)

    2015-10-15

    To achieve technical self-reliance for nuclear I and C systems in Korea, the Advanced Power Reactor 1400 (APR-1400) man-machine interface system (MMIS) architecture was developed by the Korea Atomic Energy Research Institute (KAERI). As one of the systems in the developed MMIS architecture, the Engineered Safety Feature-Component Control System (ESF-CCS) employs a network communication system for the transmission of safety-critical information from group controllers (GCs) to loop controllers (LCs) to effectively accommodate the vast number of field controllers. The developed fault-tree model was then applied to several case studies. As an example of the development of a fault-tree model for ESF-CCS signal failure, the fault-tree model of ESF-CCS signal failure for CS pump PP01A in the CSAS condition was designed by considering the identified hazardous states of network failure that would result in a failure to provide input signals to the corresponding LC. The quantitative results for four case studies demonstrated that the probability of overall network communication failure, which was calculated as the sum of the failure probability associated with each failure cause, contributes up to 1.88% of the probability of ESF-CCS signal failure for the CS pump considered in the case studies.

  16. Online Food Safety Information System for Nuclear or Radiological Emergencies

    Albinet, Franck; Adjigogov, Lazar; Dercon, Gerd

    2016-01-01

    Over the last year, the protocol with regards to data management and visualization requirements for food safety decision-making, developed under CRP D1.50.15 on R esponse to Nuclear Emergency Affecting Food and Agriculture , was further implemented. The development team moved away from early series of disconnected prototypes to a more advanced Information System integrating both data management and visualization components outlined in the agreed protocol

  17. Qualia could arise from information processing in local cortical networks.

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  18. Finding quasi-optimal network topologies for information transmission in active networks.

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  19. Finding quasi-optimal network topologies for information transmission in active networks.

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  20. Networks, Netwar, and Information-Age Terrorism

    1999-01-01

    intermediate nodes. • The star, hub, or wheel network, as in a franchise or a cartel structure where a set of actors is tied to a central node or actor...Aviv and Jerusalem. On March 21, a Hamas satchel bomb exploded at a Tel Aviv cafe , killing three persons and injuring 48; on July 30, two Hamas

  1. Information and Networks Working Paper: Aiding surveillance ...

    2014-12-01

    Dec 1, 2014 ... Information technology transfer is increasingly a key component of development and humanitarian aid initiatives. With social protection programs now incorporating digitized management information systems and electronic transfers, registration and electoral systems deploying biometric technologies, and ...

  2. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  3. Use of risk information to safety regulation. Reprocessing facilities

    NONE

    2013-08-15

    A procedure of probabilistic risk assessment (PRA) for a reprocessing facility has been under the development aiming to utilize risk information for safety regulations in this project. Activities in the fiscal year 2012 are summarized in the paper. A major activity is a fundamental study on a concept of serious accidents, requirements of serious accident management, and a policy of utilizing risk information for fabrication and reprocessing facilities. Other than the activity a study on release and transport of aerial radioactive materials at a serious accident in a reprocessing facility has been conducted. The outline and results are provided in the chapter 1 and 2 respectively. (author)

  4. Quality and safety implications of emergency department information systems.

    Farley, Heather L; Baumlin, Kevin M; Hamedani, Azita G; Cheung, Dickson S; Edwards, Michael R; Fuller, Drew C; Genes, Nicholas; Griffey, Richard T; Kelly, John J; McClay, James C; Nielson, Jeff; Phelan, Michael P; Shapiro, Jason S; Stone-Griffith, Suzanne; Pines, Jesse M

    2013-10-01

    The Health Information Technology for Economic and Clinical Health Act of 2009 and the Centers for Medicare & Medicaid Services "meaningful use" incentive programs, in tandem with the boundless additional requirements for detailed reporting of quality metrics, have galvanized hospital efforts to implement hospital-based electronic health records. As such, emergency department information systems (EDISs) are an important and unique component of most hospitals' electronic health records. System functionality varies greatly and affects physician decisionmaking, clinician workflow, communication, and, ultimately, the overall quality of care and patient safety. This article is a joint effort by members of the Quality Improvement and Patient Safety Section and the Informatics Section of the American College of Emergency Physicians. The aim of this effort is to examine the benefits and potential threats to quality and patient safety that could result from the choice of a particular EDIS, its implementation and optimization, and the hospital's or physician group's approach to continuous improvement of the EDIS. Specifically, we explored the following areas of potential EDIS safety concerns: communication failure, wrong order-wrong patient errors, poor data display, and alert fatigue. Case studies are presented that illustrate the potential harm that could befall patients from an inferior EDIS product or suboptimal execution of such a product in the clinical environment. The authors have developed 7 recommendations to improve patient safety with respect to the deployment of EDISs. These include ensuring that emergency providers actively participate in selection of the EDIS product, in the design of processes related to EDIS implementation and optimization, and in the monitoring of the system's ongoing success or failure. Our recommendations apply to emergency departments using any type of EDIS: custom-developed systems, best-of-breed vendor systems, or enterprise systems

  5. Health and safety information program for hazardous materials

    O'Brien, M.P.; Fallon, N.J.; Kuehner, A.V.

    1979-01-01

    The system is used as a management tool in several safety and health programs. It is used to: trace the use of hazardous materials and to determine monitoring needs; inform the occupational physician of the potential health problems associated with materials ordered by a given individual; inform the fire and rescue group of hazardous materials in a given building; provide waste disposal recommendations to the hazardous waste management group; assist the hazardous materials shipping coordinator in identifying materials which are regulated by the Department of Transportation; and guide management decisions in the area of recognizing and rectifying unsafe conditions. The information system has been expanded from a manual effort to provide a brief description of health hazards of chemicals used at the lab to a computerized health and safety information system which serves the needs of all personnel who may encounter the material in the course of their work. The system has been designed to provide information needed to control the potential problems associated with a hazardous material up to the time that it is consumed in a given operation or is sent to the waste disposal facility

  6. Partial Information Community Detection in a Multilayer Network

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  7. Social Circles Detection from Ego Network and Profile Information

    2014-12-19

    way of organizing contacts in personal networks . They are therefore currently implemented in the major social net- working systems, such as Facebook ...0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network ...structural network information but also the contents of social interactions, with the aim to detect copying communities. The views, opinions and/or findings

  8. The Value of Information in Distributed Decision Networks

    2016-03-04

    formulation, and then we describe the various results at- tained. 1 Mathematical description of Distributed Decision Network un- der Information...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...to any linear, combinatorial problem like shortest path optimization, and, further, so long as the original combinatorial problem can be solved in

  9. Advanced information processing system: Input/output network management software

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  10. Incorporating profile information in community detection for online social networks

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  11. The Network Information Management System (NIMS) in the Deep Space Network

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  12. Enabling Controlling Complex Networks with Local Topological Information.

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  13. 78 FR 34703 - Pipeline Safety: Information Collection Activities, Revision to Gas Distribution Annual Report

    2013-06-10

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2013-0004] Pipeline Safety: Information Collection Activities, Revision to Gas Distribution Annual Report AGENCY: Pipeline and Hazardous Materials Safety Administration, DOT. ACTION: Notice and request...

  14. Monitoring system of arch bridge for safety network management

    Joo, Bong Chul; Yoo, Young Jun; Lee, Chin Hyung; Park, Ki Tae; Hwang, Yoon Koog

    2010-03-01

    Korea has constructed the safety management network monitoring test systems for the civil infrastructure since 2006 which includes airport structure, irrigation structure, railroad structure, road structure, and underground structure. Bridges among the road structure include the various superstructure types which are Steel box girder bridge, suspension bridge, PSC-box-girder bridge, and arch bridge. This paper shows the process of constructing the real-time monitoring system for the arch bridge and the measured result by the system. The arch type among various superstructure types has not only the structural efficiency but the visual beauty, because the arch type superstructure makes full use of the feature of curve. The main measuring points of arch bridges composited by curved members make a difference to compare with the system of girder bridges composited by straight members. This paper also shows the method to construct the monitoring system that considers the characteristic of the arch bridge. The system now includes strain gauges and thermometers, and it will include various sensor types such as CCTV, accelerometers and so on additionally. For the long term and accuracy monitoring, the latest optical sensors and equipments are applied to the system.

  15. Development of 'health and environmental safety assessment network system (HESANS)'

    Nakamura, Yuji

    1994-01-01

    With the recent advance of the utilization of nuclear energy in a large scale, social interest is being focussed in the potential risk which the nuclear technology will accompany. Especially after the accidents in Chernobyl and other nuclear facilities, serious anxiety to the utilization of nuclear energy is prevailing among the general public. In order to meet the anxiety and distrust of the population in the use of the nuclear power, the health effect or risk which radioactive materials released into the environment will bring about should be comprehensively and properly evaluated, and then should be widely reported to the population. The development of HESANS code system (Health and Environmental Safety Assessment Network System) was planned to set up such a comprehensive computer code that covers a whole pathway of radioactive material from its release to estimates of derived health effects in the population, including the countermeasures for intervention as well. Though the whole system is not totally completed yet so far, the framework of the system has been concreted together with many sub-systems which compose the main part of the code. This report puts main stress on the objective of the development project and the main frame or the structure of the code system. (author)

  16. Information Propagation in Complex Networks : Structures and Dynamics

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  17. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  18. Information Source Selection and Management Framework in Wireless Sensor Network

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  19. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  20. Grower Communication Networks: Information Sources for Organic Farmers

    Crawford, Chelsi; Grossman, Julie; Warren, Sarah T.; Cubbage, Fred

    2015-01-01

    This article reports on a study to determine which information sources organic growers use to inform farming practices by conducting in-depth semi-structured interviews with 23 organic farmers across 17 North Carolina counties. Effective information sources included: networking, agricultural organizations, universities, conferences, Extension, Web…

  1. Pairwise Network Information and Nonlinear Correlations

    Martin, E.A.; Hlinka, Jaroslav; Davidsen, J.

    2016-01-01

    Roč. 94, č. 4 (2016), č. článku 040301. ISSN 2470-0045 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : mutual information * correlation * information theory * redundancy Subject RIV: BD - Theory of Information Impact factor: 2.366, year: 2016

  2. A participatory model for improving occupational health and safety: improving informal sector working conditions in Thailand.

    Manothum, Aniruth; Rukijkanpanich, Jittra; Thawesaengskulthai, Damrong; Thampitakkul, Boonwa; Chaikittiporn, Chalermchai; Arphorn, Sara

    2009-01-01

    The purpose of this study was to evaluate the implementation of an Occupational Health and Safety Management Model for informal sector workers in Thailand. The studied model was characterized by participatory approaches to preliminary assessment, observation of informal business practices, group discussion and participation, and the use of environmental measurements and samples. This model consisted of four processes: capacity building, risk analysis, problem solving, and monitoring and control. The participants consisted of four local labor groups from different regions, including wood carving, hand-weaving, artificial flower making, and batik processing workers. The results demonstrated that, as a result of applying the model, the working conditions of the informal sector workers had improved to meet necessary standards. This model encouraged the use of local networks, which led to cooperation within the groups to create appropriate technologies to solve their problems. The authors suggest that this model could effectively be applied elsewhere to improve informal sector working conditions on a broader scale.

  3. Architectural Design for the Global Legal Information Network

    Kalpakis, Konstantinos

    1999-01-01

    In this report, we provide a summary of our activities regarding the goals, requirements analysis, design, and prototype implementation for the Global Legal Information Network, a joint effort between the Law Library of Congress and NASA.

  4. Research Award: Information and Networks (I&N) Deadline: 12 ...

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... The growth of networked technologies has created new opportunities for advancing human ... The I&N research awardee will ideally explore research questions centred ... such as engineering or computer/information science.

  5. A Reference Architecture for Network-Centric Information Systems

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  6. Tufts academic health information network: concept and scenario.

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  7. Information jet: Handling noisy big data from weakly disconnected network

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  8. The challenge of effectively communicating patient safety information.

    Hugman, Bruce; Edwards, I Ralph

    2006-07-01

    Rational use of drugs and patient safety are seriously compromised by a lack of good information, education and effective communication at all stages of drug development and use. From animal trials through to dispensing, there are misconceptions and opportunities for error which current methods of drug information communication do not adequately address: they do not provide those responsible for prescribing and dispensing drugs with the data and information they need to pass on complex and often changing messages to patients and the public. The incidence of adverse reactions due to the way drugs are used; the variable impact of regulatory guidelines and warnings on prescribing behaviour; drug scares and crises suggest a great gap between the ideals of the safe use of medicines and the reality in homes, clinics and hospitals around the world. To address these challenges, the authors review the several levels at which safety information is generated and communicated, and examine how, at each stage, the content and its significance, and the method of communication can be improved.

  9. A multivariate extension of mutual information for growing neural networks.

    Ball, Kenneth R; Grant, Christopher; Mundy, William R; Shafer, Timothy J

    2017-11-01

    Recordings of neural network activity in vitro are increasingly being used to assess the development of neural network activity and the effects of drugs, chemicals and disease states on neural network function. The high-content nature of the data derived from such recordings can be used to infer effects of compounds or disease states on a variety of important neural functions, including network synchrony. Historically, synchrony of networks in vitro has been assessed either by determination of correlation coefficients (e.g. Pearson's correlation), by statistics estimated from cross-correlation histograms between pairs of active electrodes, and/or by pairwise mutual information and related measures. The present study examines the application of Normalized Multiinformation (NMI) as a scalar measure of shared information content in a multivariate network that is robust with respect to changes in network size. Theoretical simulations are designed to investigate NMI as a measure of complexity and synchrony in a developing network relative to several alternative approaches. The NMI approach is applied to these simulations and also to data collected during exposure of in vitro neural networks to neuroactive compounds during the first 12 days in vitro, and compared to other common measures, including correlation coefficients and mean firing rates of neurons. NMI is shown to be more sensitive to developmental effects than first order synchronous and nonsynchronous measures of network complexity. Finally, NMI is a scalar measure of global (rather than pairwise) mutual information in a multivariate network, and hence relies on less assumptions for cross-network comparisons than historical approaches. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Developing Visualization Techniques for Semantics-based Information Networks

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  11. Coordinated Economic Development and the Information Network.

    Easton, D. K.

    This is a discussion of some of the problems that the Advisory Organization for Gulf Industries (AOGI) will face when it undertakes (1) to organize both an information center (node) that will serve the information needs of the Gulf States of Iraq, Kuwait, Bahrain, Saudi Arabia, Qatar, the United Arab Emirates (UAE) and Oman; and (2) to compile an…

  12. Graphs for information security control in software defined networks

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  13. Social network profiles as information sources for adolescents' offline relations

    Courtois, Cédric; All, Anissa

    2012-01-01

    This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...

  14. Social network profiles as information sources for adolescents' offline relations

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-01-01

    This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...

  15. Twenty-First Water Reaction Safety Information Meeting

    Monteleone, S.

    1994-04-01

    This three-volume report contains 90 papers out of the 102 that were presented at the Twenty-First Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 25--27, 1993. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Germany, Japan, Russia, Switzerland, Taiwan, and United Kingdom. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. Individual papers have been cataloged separately. This document, Volume 2, presents papers on severe accident research

  16. Twenty-First Water Reactor Safety Information Meeting

    Monteleone, S.

    1994-04-01

    This three-volume report contains 90 papers out of the 102 that were presented at the Twenty-First Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 25-27, 1993. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Germany, Japan, Russia, Switzerland, Taiwan, and United Kingdom. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. Selected papers were indexed separately for inclusion in the Energy Science and Technology Database

  17. Effects of individual popularity on information spreading in complex networks

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  18. Workplace injuries, safety climate and behaviors: application of an artificial neural network.

    Abubakar, A Mohammed; Karadal, Himmet; Bayighomog, Steven W; Merdan, Ethem

    2018-05-09

    This article proposes and tests a model for the interaction effect of the organizational safety climate and behaviors on workplace injuries. Using artificial neural network and survey data from 306 metal casting industry employees in central Anatolia, we found that an organizational safety climate mitigates workplace injuries, and safety behaviors enforce the strength of the negative impact of the safety climate on workplace injuries. The results suggest a complex relationship between the organizational safety climate, safety behavior and workplace injuries. Theoretical and practical implications are discussed in light of decreasing workplace injuries in the Anatolian metal casting industry.

  19. Towards Device-Independent Information Processing on General Quantum Networks

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  20. Patient and nurse safety: how information technology makes a difference.

    Simpson, Roy L

    2005-01-01

    The Institute of Medicine's landmark report asserted medical error is seldom the fault of individuals, but the result of faulty healthcare policy/procedure systems. Numerous studies have shown that information technology can shore up weak systems. For nursing, information technology plays a key role in protecting patients by eliminating nursing mistakes and protecting nurses by reducing their negative exposure. However, managing information technology is a function of managing the people who use it. This article examines critical issues that impact patient and nurse safety, both physical and professional. It discusses the importance of eliminating the culture of blame, the requirements of process change, how to implement technology in harmony with the organization and the significance of vision.

  1. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  2. Interactive network analytical tool for instantaneous bespoke interrogation of food safety notifications.

    Nepusz, Tamás; Petróczi, Andrea; Naughton, Declan P

    2012-01-01

    The globalization of food supply necessitates continued advances in regulatory control measures to ensure that citizens enjoy safe and adequate nutrition. The aim of this study was to extend previous reports on network analysis relating to food notifications by including an optional filter by type of notification and in cases of contamination, by type of contaminant in the notified foodstuff. A filter function has been applied to enable processing of selected notifications by contaminant or type of notification to i) capture complexity, ii) analyze trends, and iii) identify patterns of reporting activities between countries. The program rapidly assesses nations' roles as transgressor and/or detector for each category of contaminant and for the key class of border rejection. In the open access demonstration version, the majority of notifications in the Rapid Alert System for Food and Feed were categorized by contaminant type as mycotoxin (50.4%), heavy metals (10.9%) or bacteria (20.3%). Examples are given demonstrating how network analytical approaches complement, and in some cases supersede, descriptive statistics such as frequency counts, which may give limited or potentially misleading information. One key feature is that network analysis takes the relationship between transgressor and detector countries, along with number of reports and impact simultaneously into consideration. Furhermore, the indices that compliment the network maps and reflect each country's transgressor and detector activities allow comparisons to be made between (transgressing vs. detecting) as well as within (e.g. transgressing) activities. This further development of the network analysis approach to food safety contributes to a better understanding of the complexity of the effort ensuring food is safe for consumption in the European Union. The unique patterns of the interplay between detectors and transgressors, instantly revealed by our approach, could supplement the intelligence

  3. Interactive network analytical tool for instantaneous bespoke interrogation of food safety notifications.

    Tamás Nepusz

    Full Text Available The globalization of food supply necessitates continued advances in regulatory control measures to ensure that citizens enjoy safe and adequate nutrition. The aim of this study was to extend previous reports on network analysis relating to food notifications by including an optional filter by type of notification and in cases of contamination, by type of contaminant in the notified foodstuff.A filter function has been applied to enable processing of selected notifications by contaminant or type of notification to i capture complexity, ii analyze trends, and iii identify patterns of reporting activities between countries. The program rapidly assesses nations' roles as transgressor and/or detector for each category of contaminant and for the key class of border rejection. In the open access demonstration version, the majority of notifications in the Rapid Alert System for Food and Feed were categorized by contaminant type as mycotoxin (50.4%, heavy metals (10.9% or bacteria (20.3%. Examples are given demonstrating how network analytical approaches complement, and in some cases supersede, descriptive statistics such as frequency counts, which may give limited or potentially misleading information. One key feature is that network analysis takes the relationship between transgressor and detector countries, along with number of reports and impact simultaneously into consideration. Furhermore, the indices that compliment the network maps and reflect each country's transgressor and detector activities allow comparisons to be made between (transgressing vs. detecting as well as within (e.g. transgressing activities.This further development of the network analysis approach to food safety contributes to a better understanding of the complexity of the effort ensuring food is safe for consumption in the European Union. The unique patterns of the interplay between detectors and transgressors, instantly revealed by our approach, could supplement the

  4. Effective network inference through multivariate information transfer estimation

    Dahlqvist, Carl-Henrik; Gnabo, Jean-Yves

    2018-06-01

    Network representation has steadily gained in popularity over the past decades. In many disciplines such as finance, genetics, neuroscience or human travel to cite a few, the network may not directly be observable and needs to be inferred from time-series data, leading to the issue of separating direct interactions between two entities forming the network from indirect interactions coming through its remaining part. Drawing on recent contributions proposing strategies to deal with this problem such as the so-called "global silencing" approach of Barzel and Barabasi or "network deconvolution" of Feizi et al. (2013), we propose a novel methodology to infer an effective network structure from multivariate conditional information transfers. Its core principal is to test the information transfer between two nodes through a step-wise approach by conditioning the transfer for each pair on a specific set of relevant nodes as identified by our algorithm from the rest of the network. The methodology is model free and can be applied to high-dimensional networks with both inter-lag and intra-lag relationships. It outperforms state-of-the-art approaches for eliminating the redundancies and more generally retrieving simulated artificial networks in our Monte-Carlo experiments. We apply the method to stock market data at different frequencies (15 min, 1 h, 1 day) to retrieve the network of US largest financial institutions and then document how bank's centrality measurements relate to bank's systemic vulnerability.

  5. Network marketing with bounded rationality and partial information

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  6. Distribution of Information in Ad Hoc Networks

    Hassine, Wijden B

    2007-01-01

    .... This work contributes to this study in two specific ways. First, it provides a mathematical model that deals with the best possible site of information source nodes in a graph of infinite density...

  7. Social networks predict selective observation and information spread in ravens

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  8. Information theory and the ethylene genetic network.

    González-García, José S; Díaz, José

    2011-10-01

    The original aim of the Information Theory (IT) was to solve a purely technical problem: to increase the performance of communication systems, which are constantly affected by interferences that diminish the quality of the transmitted information. That is, the theory deals only with the problem of transmitting with the maximal precision the symbols constituting a message. In Shannon's theory messages are characterized only by their probabilities, regardless of their value or meaning. As for its present day status, it is generally acknowledged that Information Theory has solid mathematical foundations and has fruitful strong links with Physics in both theoretical and experimental areas. However, many applications of Information Theory to Biology are limited to using it as a technical tool to analyze biopolymers, such as DNA, RNA or protein sequences. The main point of discussion about the applicability of IT to explain the information flow in biological systems is that in a classic communication channel, the symbols that conform the coded message are transmitted one by one in an independent form through a noisy communication channel, and noise can alter each of the symbols, distorting the message; in contrast, in a genetic communication channel the coded messages are not transmitted in the form of symbols but signaling cascades transmit them. Consequently, the information flow from the emitter to the effector is due to a series of coupled physicochemical processes that must ensure the accurate transmission of the message. In this review we discussed a novel proposal to overcome this difficulty, which consists of the modeling of gene expression with a stochastic approach that allows Shannon entropy (H) to be directly used to measure the amount of uncertainty that the genetic machinery has in relation to the correct decoding of a message transmitted into the nucleus by a signaling pathway. From the value of H we can define a function I that measures the amount of

  9. A distributed research network model for post-marketing safety studies: the Meningococcal Vaccine Study.

    Velentgas, Priscilla; Bohn, Rhonda L; Brown, Jeffrey S; Chan, K Arnold; Gladowski, Patricia; Holick, Crystal N; Kramer, Judith M; Nakasato, Cynthia; Spettell, Claire M; Walker, Alexander M; Zhang, Fang; Platt, Richard

    2008-12-01

    We describe a multi-center post-marketing safety study that uses distributed data methods to minimize the need for covered entities to share protected health information (PHI). Implementation has addressed several issues relevant to creation of a large scale post-marketing drug safety surveillance system envisioned by the FDA's Sentinel Initiative. This retrospective cohort study of Guillain-Barré syndrome (GBS) following meningococcal conjugate vaccination incorporates the data and analytic expertise of five research organizations closely affiliated with US health insurers. The study uses administrative claims data, plus review of full text medical records to adjudicate the status of individuals with a diagnosis code for GBS (ICD9 357.0). A distributed network approach is used to create the analysis files and to perform most aspects of the analysis, allowing nearly all of the data to remain behind institutional firewalls. Pooled analysis files transferred to a central site will contain one record per person for approximately 0.2% of the study population, and contain PHI limited to the month and year of GBS onset for cases or the index date for matched controls. The first planned data extraction identified over 9 million eligible adolescents in the target age range of 11-21 years. They contributed an average of 14 months of eligible time on study over 27 months of calendar time. MCV4 vaccination coverage levels exceeded 20% among 17-18-year olds and 16% among 11-13 and 14-16-year-old age groups by the second quarter of 2007. This study demonstrates the feasibility of using a distributed data network approach to perform large scale post-marketing safety analyses and is scalable to include additional organizations and data sources. We believe these results can inform the development of a large national surveillance system. Copyright (c) 2008 John Wiley & Sons, Ltd.

  10. Exploiting global information in complex network repair processes

    Tianyu WANG; Jun ZHANG; Sebastian WANDELT

    2017-01-01

    Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger compo nents at a low cost only with local information.In this paper,we discuss the effectiveness and effi ciency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair.

  11. Gender Differences and Informal Networks in a Scandinavian Context

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...

  12. Expanding the informational chemistries of life: peptide/RNA networks

    Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.

    2017-11-01

    The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.

  13. Propagating semantic information in biochemical network models

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  14. MedWatch, the FDA Safety Information and Adverse Event Reporting Program

    ... Reporting Program MedWatch: The FDA Safety Information and Adverse Event Reporting Program Share Tweet Linkedin Pin it ... approved information that can help patients avoid serious adverse events. Potential Signals of Serious Risks/New Safety ...

  15. Views on chemical safety information and influences on chemical disposal behaviour in the UK

    Hinks, J.; Bush, J.; Andras, P.; Garratt, J.; Pigott, G.; Kennedy, A.; Pless-Mulloli, T.

    2009-01-01

    This study examined how groups representing four tiers in the chemical supply chain (manufacturers, vendors, workers and consumers) understood safety information, and the factors that influenced disposal behaviour. Data from seven, semi-structured, focus groups was analysed both qualitatively (textual analysis) and quantitatively (network analysis). Such combined analytical methods enabled us to achieve both detailed insights into perceptions and behaviour and an objective understanding of the prevailing opinions that occurred within and between the focus group discussions. We found issues around awareness, trust, access and disposal behaviours differed between groups within the supply chain. Participants from the lower tiers perceived chemical safety information to be largely inaccessible. Labels were the main source of information on chemical risks for the middle and bottom tiers of the supply chain. Almost all of the participants were aware of the St Andrew's Cross and skull and crossbones symbols but few were familiar with the Volatile Organic Compound logo or the fish and tree symbol. Both the network and thematic analysis demonstrated that whilst frequent references to health risks associated with chemicals were made environmental risks were usually only articulated after prompting. It is clear that the issues surrounding public understanding of chemical safety labels are highly complex and this is compounded by inconsistencies in the cognitive profiles of chemical users. Substantially different cognitive profiles are likely to contribute towards communication difficulties between different tiers of the supply chain. Further research is needed to examine the most effective ways of communicating chemical hazards information to the public. The findings demonstrate a need to improve and simplify disposal guidance to members of the public, to raise public awareness of the graphic symbols in the CHIP 3.1, 2005 regulations and to improve access to disposal guidance

  16. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  17. A Kansas Integrated Commercialization Information Network (KICIN).

    Ambler, C.; And Others

    A consortium of Kansas economic development service providers is building a web of virtual satellite offices that will demonstrate the delivery of economic development services in all areas of Kansas. These "offices" will use the Internet and a novel information delivery system to reach small and medium-sized businesses and individuals…

  18. Mutual information-based LPI optimisation for radar network

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  19. Information about robustness, reliability and safety in early design phases

    Marini, Vinicius Kaster

    methods, and an industrial case to assess how the use of information about robustness, reliability and safety as practised by current methods influences concept development. Current methods cannot be used in early design phases due to their dependence on detailed design information for the identification...... alternatives. This prompts designers to reuse working principles that are inherently flawed, as they are liable to disturbances, failures and hazards. To address this issue, an approach based upon individual records of early design issues consists of comparing failures and benefits from prior working...... principles, before making a decision, and improving the more suitable alternatives through this feedback. Workshops were conducted with design practitioners to evaluate the potential of the approach and to simulate decision-making and gain feedback on a proof-of-concept basis. The evaluation has demonstrated...

  20. Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-hoc Networks

    Ansari, Abdul Rahim; Saeed, Nasir; Haq, Mian Imtiaz Ul; Cho, Sunghyun

    2018-01-01

    Vehicular ad hoc networks (VANETs) represent a very promising research area because of their ever increasing demand, especially for public safety applications. In VANETs vehicles communicate with each other to exchange road maps and traffic

  1. Applying Real Options Thinking to Information Security in Networked Organizations

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  2. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  3. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  4. Information Retrieval on social network: An Adaptive Proof

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  5. Scalable Networked Information Processing Environment (SNIPE)

    Fagg, G.E.; Moore, K. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science; Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science]|[Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.; Geist, A. [Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.

    1997-11-01

    SNIPE is a metacomputing system that aims to provide a reliable, secure, fault tolerant environment for long term distributed computing applications and data stores across the global Internet. This system combines global naming and replication of both processing and data to support large scale information processing applications leading to better availability and reliability than currently available with typical cluster computing and/or distributed computer environments.

  6. Database search for safety information on cosmetic ingredients.

    Pauwels, Marleen; Rogiers, Vera

    2007-12-01

    Ethical considerations with respect to experimental animal use and regulatory testing are worldwide under heavy discussion and are, in certain cases, taken up in legislative measures. The most explicit example is the European cosmetic legislation, establishing a testing ban on finished cosmetic products since 11 September 2004 and enforcing that the safety of a cosmetic product is assessed by taking into consideration "the general toxicological profile of the ingredients, their chemical structure and their level of exposure" (OJ L151, 32-37, 23 June 1993; OJ L066, 26-35, 11 March 2003). Therefore the availability of referenced and reliable information on cosmetic ingredients becomes a dire necessity. Given the high-speed progress of the World Wide Web services and the concurrent drastic increase in free access to information, identification of relevant data sources and evaluation of the scientific value and quality of the retrieved data, are crucial. Based upon own practical experience, a survey is put together of freely and commercially available data sources with their individual description, field of application, benefits and drawbacks. It should be mentioned that the search strategies described are equally useful as a starting point for any quest for safety data on chemicals or chemical-related substances in general.

  7. Scholarly information discovery in the networked academic learning environment

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  8. Brain networks underlying mental imagery of auditory and visual information.

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  9. Information transmission in genetic regulatory networks: a review

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  10. Using Bayesian networks to support decision-focused information retrieval

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  11. An information search model for online social Networks - MOBIRSE

    Miguel Angel Niño Zambrano

    2015-09-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years.  These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  12. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  13. Issues in the use of neural networks in information retrieval

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  14. Can online networks provide quality answers to questions about occupational safety and health?

    Rhebergen, Martijn D F; Lenderink, Annet F; van Dijk, Frank J H; Hulshof, Carel T J

    2012-05-01

    To assess whether experts can provide high-quality answers to occupational safety and health (OSH) questions in online Question & Answer (Q&A) networks. The authors evaluated the quality of answers provided by qualified experts in two Dutch online networks: ArboAntwoord and the Helpdesk of the Netherlands Center for Occupational Diseases. A random sample of 594 answers was independently evaluated by two raters using nine answer quality criteria. An additional criterion, the agreement of answers with the best available evidence, was explored by peer review of a sample of 42 answers. Reviewers performed an evidence search in Medline. The median answer quality score of ArboAntwoord (N=295) and the Netherlands Center for Occupational Diseases Helpdesk (N=299) was 8 of 9 (IQR 2). The inter-rater reliability of the first nine quality criteria was high (κ 0.82-0.90, p<0.05). A question answered by two or more experts had a greater probability of a high-quality score than questions answered by one expert (OR 4.9, 95% CI 2.7 to 9.0). Answers most often scored insufficient on the use of evidence to underpin the answer (36% and 38% for the networks, respectively) and on conciseness (35% and 31%, respectively). Peer review demonstrated that 43%-72% of the answers in both online networks were in complete agreement with the best available evidence. OSH experts are able to provide quality answers in online OSH Q&A networks. Our answer quality appraisal instrument was feasible and provided information on how to improve answer quality.

  15. Models, Entropy and Information of Temporal Social Networks

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  16. Introduction to spiking neural networks: Information processing, learning and applications.

    Ponulak, Filip; Kasinski, Andrzej

    2011-01-01

    The concept that neural information is encoded in the firing rate of neurons has been the dominant paradigm in neurobiology for many years. This paradigm has also been adopted by the theory of artificial neural networks. Recent physiological experiments demonstrate, however, that in many parts of the nervous system, neural code is founded on the timing of individual action potentials. This finding has given rise to the emergence of a new class of neural models, called spiking neural networks. In this paper we summarize basic properties of spiking neurons and spiking networks. Our focus is, specifically, on models of spike-based information coding, synaptic plasticity and learning. We also survey real-life applications of spiking models. The paper is meant to be an introduction to spiking neural networks for scientists from various disciplines interested in spike-based neural processing.

  17. Information loss method to measure node similarity in networks

    Li, Yongli; Luo, Peng; Wu, Chong

    2014-09-01

    Similarity measurement for the network node has been paid increasing attention in the field of statistical physics. In this paper, we propose an entropy-based information loss method to measure the node similarity. The whole model is established based on this idea that less information loss is caused by seeing two more similar nodes as the same. The proposed new method has relatively low algorithm complexity, making it less time-consuming and more efficient to deal with the large scale real-world network. In order to clarify its availability and accuracy, this new approach was compared with some other selected approaches on two artificial examples and synthetic networks. Furthermore, the proposed method is also successfully applied to predict the network evolution and predict the unknown nodes' attributions in the two application examples.

  18. Ontology-supported research on vaccine efficacy, safety and integrative biological networks.

    He, Yongqun

    2014-07-01

    While vaccine efficacy and safety research has dramatically progressed with the methods of in silico prediction and data mining, many challenges still exist. A formal ontology is a human- and computer-interpretable set of terms and relations that represent entities in a specific domain and how these terms relate to each other. Several community-based ontologies (including Vaccine Ontology, Ontology of Adverse Events and Ontology of Vaccine Adverse Events) have been developed to support vaccine and adverse event representation, classification, data integration, literature mining of host-vaccine interaction networks, and analysis of vaccine adverse events. The author further proposes minimal vaccine information standards and their ontology representations, ontology-based linked open vaccine data and meta-analysis, an integrative One Network ('OneNet') Theory of Life, and ontology-based approaches to study and apply the OneNet theory. In the Big Data era, these proposed strategies provide a novel framework for advanced data integration and analysis of fundamental biological networks including vaccine immune mechanisms.

  19. Construction of the NIFS campus information network, NIFS-LAN

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  20. Gravity Effects on Information Filtering and Network Evolving

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  1. Practical characterization of large networks using neighborhood information

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  2. Computer network access to scientific information systems for minority universities

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  3. Proactive Traffic Information Control in Emergency Evacuation Network

    Zhengfeng Huang

    2015-01-01

    Full Text Available Traffic demand in emergency evacuation is usually too large to be effectively managed with reactive traffic information control methods. These methods adapt to the road traffic passively by publishing real-time information without consideration of the routing behavior feedback produced by evacuees. Other remedy measures have to be prepared in case of nonrecurring congestion under these methods. To use the network capacity fully to mitigate near-future evacuation traffic congestion, we propose proactive traffic information control (PTIC model. Based on the mechanism between information and routing behavior feedback, this model can change the route choice of evacuees in advance by dissipating strategic traffic information. Generally, the near-future traffic condition is difficult to accurately predict because it is uncertain in evacuation. Assume that the value of traffic information obeys certain distribution within a range, and then real-time traffic information may reflect the most-likely near-future traffic condition. Unlike the real-time information, the proactive traffic information is a selection within the range to achieve a desired level of the road network performance index (total system travel time. In the aspect of the solution algorithm, differential equilibrium decomposed optimization (D-EDO is proposed to compare with other heuristic methods. A field study on a road network around a large stadium is used to validate the PTIC.

  4. A risk informed safety classification for a Nordic NPP

    Jaenkaelae, K.

    2002-01-01

    The report describes a study to develop a safety classification proposal or classi- fication recommendations based on risks for selected equipment of a nuclear power plant. The application plant in this work is Loviisa NPP unit 1. The safety classification proposals are to be considered as an exercise in this pilot study and do not necessarily represent final proposals in a real situation. Comparisons to original safety classifications and technical specifications were made. The study concludes that it is possible to change safety classes or safety signifi- cances as considered in technical specifications and in in-service-inspections into both directions without endangering the safety or even by improving the safety. (au)

  5. Information flow in layered networks of non-monotonic units

    Schittler Neves, Fabio; Martim Schubert, Benno; Erichsen, Rubem, Jr.

    2015-07-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information.

  6. Prioritizing Signaling Information Transmission in Next Generation Networks

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  7. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  8. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  9. Information flow in layered networks of non-monotonic units

    Neves, Fabio Schittler; Schubert, Benno Martim; Erichsen, Rubem Jr

    2015-01-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information. (paper)

  10. Information flow in a network of dispersed signalers-receivers

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  11. Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-hoc Networks

    Ansari, Abdul Rahim

    2018-04-10

    Vehicular ad hoc networks (VANETs) represent a very promising research area because of their ever increasing demand, especially for public safety applications. In VANETs vehicles communicate with each other to exchange road maps and traffic information. In many applications, location-based services are the main service, and localization accuracy is the main problem. VANETs also require accurate vehicle location information in real time. To fulfill this requirement, a number of algorithms have been proposed; however, the location accuracy required for public safety applications in VANETs has not been achieved. In this paper, an improved subspace algorithm is proposed for time of arrival (TOA) measurements in VANETs localization. The proposed method gives a closed-form solution and it is robust for large measurement noise, as it is based on the eigen form of a scalar product and dimensionality. Furthermore, we developed the Cramer-Rao Lower Bound (CRLB) to evaluate the performance of the proposed 3D VANETs localization method. The performance of the proposed method was evaluated by comparison with the CRLB and other localization algorithms available in the literature through numerous simulations. Simulation results show that the proposed 3D VANETs localization method is better than the literature methods especially for fewer anchors at road side units and large noise variance.

  12. AERB information booklet: personal protective equipment- safety footwear

    1992-01-01

    The main classes of safety footwear required for industrial operations in the units of Department of Atomic Energy are the following; leather safety boots and shoes, firemen's leather boots - Wellington type, electrical safety shoes, chemical safety shoes, shoes suitable for mining operations. The criteria to be adopted for selection of safety shoes for nuclear installations are given. (M.K.V.). 5 annexures, 1 appendix

  13. Interspecific social networks promote information transmission in wild songbirds.

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  14. Scatter networks: a new approach for analysing information scatter

    Adamic, Lada A; Suresh, K; Shi Xiaolin

    2007-01-01

    Information on any given topic is often scattered across the Web. Previously this scatter has been characterized through the inequality of distribution of facts (i.e. pieces of information) across webpages. Such an approach conceals how specific facts (e.g. rare facts) occur in specific types of pages (e.g. fact-rich pages). To reveal such regularities, we construct bipartite networks, consisting of two types of vertices: the facts contained in webpages and the webpages themselves. Such a representation enables the application of a series of network analysis techniques, revealing structural features such as connectivity, robustness and clustering. Not only does network analysis yield new insights into information scatter, but we also illustrate the benefit of applying new and existing analysis techniques directly to a bipartite network as opposed to its one-mode projection. We discuss the implications of each network feature to the users' ability to find comprehensive information online. Finally, we compare the bipartite graph structure of webpages and facts with the hyperlink structure between the webpages

  15. Experience on the FMS Communication module Development for an Application to Safety- Critical Communication Network

    Son, Kwang Seop; Lee, Jang Soo; Kim, Jung Heon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    The field bus has been developed for a network system which supports the real-time communication of various controls and automation equipment. It is known for Profibus in the field of a production automation environment. The Profibus standard uses open communication based on the ISO/OSI model. The Probibus standard uses layer 1, layer 2, layer 7. Layer 7 of Probibus FMS(Fieldbus Message Specification) provides a information and the user of a station. The high-level communication of the safety-grade PLC (POSAFE-Q) developed through the KNICS(Korea Nuclear I and C System) project is the FMS This paper describes the design, the configuration, and the test method of the FMS communication module.

  16. Experience on the FMS Communication module Development for an Application to Safety- Critical Communication Network

    Son, Kwang Seop; Lee, Jang Soo; Kim, Jung Heon

    2009-01-01

    The field bus has been developed for a network system which supports the real-time communication of various controls and automation equipment. It is known for Profibus in the field of a production automation environment. The Profibus standard uses open communication based on the ISO/OSI model. The Probibus standard uses layer 1, layer 2, layer 7. Layer 7 of Probibus FMS(Fieldbus Message Specification) provides a information and the user of a station. The high-level communication of the safety-grade PLC (POSAFE-Q) developed through the KNICS(Korea Nuclear I and C System) project is the FMS This paper describes the design, the configuration, and the test method of the FMS communication module

  17. Neural network ensemble based supplier evaluation model in line with nuclear safety conditions

    Wang Yonggang; Chang Baosheng

    2006-01-01

    Nuclear safety is the most critical target for nuclear power plant operation. Besides the rigid operation procedures established, evaluation of suppliers working with plants can be another important aspects. Selection and evaluation of suppliers can be classified with qualitative analysis and quantitative management. The indicators involved are coupled with each other in a very complicated manner, therefore the relevant data show the strong characteristic of non-linearity. The article is based on the research and analysis of the real conditions of the Daya Bay nuclear power plant operation management. Through study and analysis of the information home and abroad, and with reference to the neural network ensemble technology, the supplier evaluation system and model are established as illustrated within the paper, thus to heighten objectivity of the supplier selection. (authors)

  18. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    NONE

    1994-03-01

    This project is implemented to survey the current statuses and future trends of the Asian district environment-related information networks, for the (research cooperation project for development of environmental condition measuring laser radar systems), being promoted by NEDO. First, current statuses of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, major domestic nodes and internationally connected conditions are surveyed mainly for internet-connected networks, for surveying the current statuses and future trends of the research networks in Asian countries. Second, current statuses in Indonesia of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, domestic node sites and managing organizations, charge systems and institutions, types/reliability/ stability of the circuits, and conditions of restriction of use, if any, for surveying the current statuses and future trends in Indonesia. Third, conditions of and needs for network utilization by researchers for Asian district environments. (NEDO)

  19. Shifts in the architecture of the Nationwide Health Information Network.

    Lenert, Leslie; Sundwall, David; Lenert, Michael Edward

    2012-01-01

    In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internet-like architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood of their success, while making the NwHIN dependent on nascent technologies for community level functions such as record locator services. These changes may impact the health of patients and communities. Independent, scientifically focused debate is needed on the wisdom of ONC's proposed changes in its strategy for the NwHIN.

  20. Risk-informed approaches to assess ecological safety of facilities with radioactive waste

    Vashchenko, V.N.; Zlochevskij, V.V.; Skalozubov, V.I.

    2011-01-01

    Ingenious risk-informed methods to assess ecological safety of facilities with radioactive waste are proposed in the paper. Probabilistic norms on lethal outcomes and reliability of safety barriers are used as safety criteria. Based on the probability measures, it is established that ecological safety conditions are met for the standard criterion of lethal outcomes

  1. Quantifying Safety Margin Using the Risk-Informed Safety Margin Characterization (RISMC)

    Grabaskas, David; Bucknor, Matthew; Brunett, Acacia; Nakayama, Marvin

    2015-04-26

    The Risk-Informed Safety Margin Characterization (RISMC), developed by Idaho National Laboratory as part of the Light-Water Reactor Sustainability Project, utilizes a probabilistic safety margin comparison between a load and capacity distribution, rather than a deterministic comparison between two values, as is usually done in best-estimate plus uncertainty analyses. The goal is to determine the failure probability, or in other words, the probability of the system load equaling or exceeding the system capacity. While this method has been used in pilot studies, there has been little work conducted investigating the statistical significance of the resulting failure probability. In particular, it is difficult to determine how many simulations are necessary to properly characterize the failure probability. This work uses classical (frequentist) statistics and confidence intervals to examine the impact in statistical accuracy when the number of simulations is varied. Two methods are proposed to establish confidence intervals related to the failure probability established using a RISMC analysis. The confidence interval provides information about the statistical accuracy of the method utilized to explore the uncertainty space, and offers a quantitative method to gauge the increase in statistical accuracy due to performing additional simulations.

  2. Measuring mobile patient safety information system success: an empirical study.

    Jen, Wen-Yuan; Chao, Chia-Cheng

    2008-10-01

    The Health Risk Reminders and Surveillance (HRRS) system was designed to deliver critical abnormal test results of severely ill patients from Laboratory, Radiology, and Pathology departments to physicians within 5 min using cell phone text messages. This paper explores the success of the HRRS system. This study employed an augmented version of the DeLone and McLean IS success model. Seven variables (system quality, information quality, system use, user satisfaction, mobile healthcare anxiety, impact on the individual and impact on the organization) were used to evaluate the success of the HRRS system. The interrelationships between the seven variables were hypothesized and the hypotheses were empirically tested. The results indicate that the information quality of the HRRS system is positively associated with both system use and user satisfaction. In addition, system use is positively associated with user satisfaction, which is also positively associated with mobile healthcare anxiety. Moreover, results indicate that impact on the individual is positively associated with both user satisfaction and mobile healthcare anxiety. Finally, the impact of the organization is positively associated with impact on the individual. The results of the study provide an expanded understanding of the factors that contribute to mobile patient safety information system (IS) success. Implications of the relationship between system use and physician mobile healthcare anxiety are discussed.

  3. An approach for risk informed safety culture assessment for Canadian nuclear power stations

    Nelson, W.R.

    2010-01-01

    One of the most important components of effective safety and risk management for nuclear power stations is a healthy safety culture. DNV has developed an approach for risk informed safety culture assessment that combines two complementary paradigms for safety and risk management: loss prevention - for preventing and intervening in accidents; and critical function management - for achieving safety and performance goals. Combining these two paradigms makes it possible to provide more robust systems for safety management and to support a healthy safety culture. This approach is being applied to safety culture assessment in partnership with a Canadian nuclear utility. (author)

  4. Carbon Monoxide Information Center

    Full Text Available ... OnSafety Blog Safety Education Centers Neighborhood Safety Network Community Outreach Resource Center Toy Recall Statistics CO Poster ... Sitemap RSS E-mail Inside CPSC Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of Information ( ...

  5. Collection and accumulation of seismic safety research findings, and considerations for information dissemination

    NONE

    2013-08-15

    Seismic Safety Division of JNES is collecting and analyzing the findings of seismic safety research, and is developing a system to organize and disseminate the information internally and internationally. These tasks have been conducted in response to the lessons learned from Fukushima Daiichi NPP accident. The overview of the tasks is as follows; 1) Collection of the knowledge and findings from seismic safety research. JNES collects information on seismic safety researches including the 2011 off the Pacific coast of Tohoku Earthquake. The information is analyzed whether it is important for regulation to increase seismic safety of NPP. 2) Constructing database of seismic safety research. JNES collects information based on documents published by committee and constructs database of active faults around NPP sites in order to incorporate in the seismic safety review. 3) Dissemination of information related to seismic safety. JNES disseminates outcomes of own researches internally and internationally. (author)

  6. Collection and accumulation of seismic safety research findings, and considerations for information dissemination

    2013-01-01

    Seismic Safety Division of JNES is collecting and analyzing the findings of seismic safety research, and is developing a system to organize and disseminate the information internally and internationally. These tasks have been conducted in response to the lessons learned from Fukushima Daiichi NPP accident. The overview of the tasks is as follows; 1) Collection of the knowledge and findings from seismic safety research. JNES collects information on seismic safety researches including the 2011 off the Pacific coast of Tohoku Earthquake. The information is analyzed whether it is important for regulation to increase seismic safety of NPP. 2) Constructing database of seismic safety research. JNES collects information based on documents published by committee and constructs database of active faults around NPP sites in order to incorporate in the seismic safety review. 3) Dissemination of information related to seismic safety. JNES disseminates outcomes of own researches internally and internationally. (author)

  7. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  8. Lessons learned in building a global information network on chemicals (GINC)

    Kaminuma, Tsuguchika

    2005-01-01

    The Global Information Network on Chemicals (GINC) was a project to construct a worldwide information network linking international, national, and other organizations working for the safe management of chemicals. Proposed in 1993, the project started the next year and lasted almost 10 years. It was begun as a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP), and later endorsed by the Intergovernmental Forum on Chemical Safety (IFCS). Asia, particularly East Asia and the Pacific islands, was chosen as the feasibility study region. The author's group then at the National Institute of Health Sciences (NIHS) of Japan led this initiative and hosted numerous meetings. At these meetings, tutorial sessions for communicating chemical safety expertise and emerging new information technologies relevant to the safe management of chemicals were offered. Our experience with this project, particularly the Web-based system and the tutorial sessions, may be of use to others involved with Web-based instruction and the training of chemical safety specialists from both developed and developing countries

  9. A methodology for a quantitative assessment of safety culture in NPPs based on Bayesian networks

    Kim, Young Gab; Lee, Seung Min; Seong, Poong Hyun

    2017-01-01

    Highlights: • A safety culture framework and a quantitative methodology to assess safety culture were proposed. • The relation among Norm system, Safety Management System and worker's awareness was established. • Safety culture probability at NPPs was updated by collecting actual organizational data. • Vulnerable areas and the relationship between safety culture and human error were confirmed. - Abstract: For a long time, safety has been recognized as a top priority in high-reliability industries such as aviation and nuclear power plants (NPPs). Establishing a safety culture requires a number of actions to enhance safety, one of which is changing the safety culture awareness of workers. The concept of safety culture in the nuclear power domain was established in the International Atomic Energy Agency (IAEA) safety series, wherein the importance of employee attitudes for maintaining organizational safety was emphasized. Safety culture assessment is a critical step in the process of enhancing safety culture. In this respect, assessment is focused on measuring the level of safety culture in an organization, and improving any weakness in the organization. However, many continue to think that the concept of safety culture is abstract and unclear. In addition, the results of safety culture assessments are mostly subjective and qualitative. Given the current situation, this paper suggests a quantitative methodology for safety culture assessments based on a Bayesian network. A proposed safety culture framework for NPPs would include the following: (1) a norm system, (2) a safety management system, (3) safety culture awareness of worker, and (4) Worker behavior. The level of safety culture awareness of workers at NPPs was reasoned through the proposed methodology. Then, areas of the organization that were vulnerable in terms of safety culture were derived by analyzing observational evidence. We also confirmed that the frequency of events involving human error

  10. Information dynamics of brain–heart physiological networks during sleep

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  11. Information dynamics of brain-heart physiological networks during sleep

    Faes, L.; Nollo, G.; Jurysta, F.; Marinazzo, D.

    2014-10-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain-heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain-brain and brain-heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep.

  12. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  13. Towards the understanding of network information processing in biology

    Singh, Vijay

    Living organisms perform incredibly well in detecting a signal present in the environment. This information processing is achieved near optimally and quite reliably, even though the sources of signals are highly variable and complex. The work in the last few decades has given us a fair understanding of how individual signal processing units like neurons and cell receptors process signals, but the principles of collective information processing on biological networks are far from clear. Information processing in biological networks, like the brain, metabolic circuits, cellular-signaling circuits, etc., involves complex interactions among a large number of units (neurons, receptors). The combinatorially large number of states such a system can exist in makes it impossible to study these systems from the first principles, starting from the interactions between the basic units. The principles of collective information processing on such complex networks can be identified using coarse graining approaches. This could provide insights into the organization and function of complex biological networks. Here I study models of biological networks using continuum dynamics, renormalization, maximum likelihood estimation and information theory. Such coarse graining approaches identify features that are essential for certain processes performed by underlying biological networks. We find that long-range connections in the brain allow for global scale feature detection in a signal. These also suppress the noise and remove any gaps present in the signal. Hierarchical organization with long-range connections leads to large-scale connectivity at low synapse numbers. Time delays can be utilized to separate a mixture of signals with temporal scales. Our observations indicate that the rules in multivariate signal processing are quite different from traditional single unit signal processing.

  14. 77 FR 69899 - Public Conference on Geographic Information Systems (GIS) in Transportation Safety

    2012-11-21

    ... NATIONAL TRANSPORTATION SAFETY BOARD Public Conference on Geographic Information Systems (GIS) in... Geographic Information Systems (GIS) in transportation safety on December 4-5, 2012. GIS is a rapidly... visualization of data. The meeting will bring researchers and practitioners in transportation safety and GIS...

  15. 10 CFR 52.157 - Contents of applications; technical information in final safety analysis report.

    2010-01-01

    ...; technical information in final safety analysis report. The application must contain a final safety analysis... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.157 Section 52.157 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  16. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    2010-01-01

    ...; technical information in final safety analysis report. (a) The application must contain a final safety... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.79 Section 52.79 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  17. Directedness of information flow in mobile phone communication networks.

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  18. Chaotic, informational and synchronous behaviour of multiplex networks

    Baptista, M. S.; Szmoski, R. M.; Pereira, R. F.; Pinto, S. E. De Souza

    2016-03-01

    The understanding of the relationship between topology and behaviour in interconnected networks would allow to charac- terise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives complex behaviour: chaos, information, and weak or strong synchronisation; in multiplex net- works with constant Jacobian. We also study this relationship numerically in multiplex networks of Hindmarsh-Rose neurons. Whereas behaviour in the analytically tractable network is a direct but not trivial consequence of the spectra of eigenvalues of the Laplacian matrix, where behaviour may strongly depend on the break of symmetry in the topology of interconnections, in Hindmarsh-Rose neural networks the nonlinear nature of the chemical synapses breaks the elegant mathematical connec- tion between the spectra of eigenvalues of the Laplacian matrix and the behaviour of the network, creating networks whose behaviour strongly depends on the nature (chemical or electrical) of the inter synapses.

  19. Implementing evidence-based policy in a network setting: road safety policy in the Netherlands.

    Bax, Charlotte; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In the early 1990s, in order to improve road safety in The Netherlands, the Institute for Road Safety Research (SWOV) developed an evidence-based "Sustainable Safety" concept. Based on this concept, Dutch road safety policy, was seen as successful and as a best practice in Europe. In The Netherlands, the policy context has now changed from a sectoral policy setting towards a fragmented network in which safety is a facet of other transport-related policies. In this contribution, it is argued that the implementation strategy underlying Sustainable Safety should be aligned with the changed context. In order to explore the adjustments needed, two perspectives of policy implementation are discussed: (1) national evidence-based policies with sectoral implementation; and (2) decentralized negotiation on transport policy in which road safety is but one aspect. We argue that the latter approach matches the characteristics of the newly evolved policy context best, and conclude with recommendations for reformulating the implementation strategy.

  20. Analyzing complex networks evolution through Information Theory quantifiers

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  1. Analyzing complex networks evolution through Information Theory quantifiers

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  2. Drug safety in pregnancy: utopia or achievable prospect? Risk information, risk research and advocacy in Teratology Information Services.

    Schaefer, Christof

    2011-03-01

    Even though from preclinical testing to drug risk labeling, the situation with drugs in pregnancy has improved substantially since the thalidomide scandal, there is still an increasing need to provide healthcare professionals and patients with updated individualized risk information for clinical decision making. For the majority of drugs, clinical experience is still insufficient with respect to their safety in pregnancy. There is often uncertainty in how to interpret the available scientific data. Based on 20 years of experience with Teratology Information Services (TIS) cooperating in the European Network of Teratology Information Services (ENTIS) methods of risk interpretation, follow-up of exposed pregnancies through the consultation process and their evaluation is discussed. Vitamin K antagonists, isotretinoin and angiotensin (AT) II-receptor-antagonists are presented as examples of misinterpretation of drug risks and subjects of research based on observational clinical data recorded in TIS. As many TIS are poorly funded, advocacy is necessary by establishing contacts with decision makers in health politics and administration, informing them of the high return in terms of health outcomes and cost savings provided by TIS as reference institutions in clinical teratology. © 2011 The Author. Congenital Anomalies © 2011 Japanese Teratology Society.

  3. Information processing and routing in wireless sensor networks

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  4. Information spread of emergency events: path searching on social networks.

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  5. Information Spread of Emergency Events: Path Searching on Social Networks

    Weihui Dai

    2014-01-01

    Full Text Available Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  6. Digital Denmark: From Information Society to Network Society

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  7. Strategies on the Implementation of China's Logistics Information Network

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  8. Geographic Response Information Network : a new tool to manage community information for oil spill contingency planning and response operations

    Munger, M.; Bryant, T. [Cook Inlet Regional Citizen' s Advisory Council, Kenai, AK (United States); Haugstad, E.; Kwietniak, J. [Tesora Alaska Petroleum, Kenai, AK (United States); DeCola, E.; Robertson, T. [Nuka Research and Planning Group, Seldovia, AK (United States)

    2006-07-01

    This paper described the Geographic Response Information Network (GRIN) project which was launched to address some of the logistical challenges that often complicate oil spill and emergency response operations. The objective of the project was to develop a computer-based tool for incident logistics to organize maps and data related to oil spills, safety, public relations and basic community resources. In addition to its use for oil spill response planning, the data available can be useful for all-hazards emergency response planning. Early prototypes of the GRIN used PowerPoint slides to organize basic information about coastal communities in Alaska. With time, hyper text markup language (html) was used as the programming format because it can be more readily hyper-linked. Currently, GRIN is organized as a web page with the following 5 categories of information: general, liaison, public information, logistics and safety. There are several sub-headings under each category, such as location, people, economy, subsistence and transportation. This general information allows incident management personnel to obtain a community profile to better understand the cultural, social and economic basis of the community. The GRIN prototype was developed for the Kodiak urban area, but it may be expanded in the future to include other coastal communities in Alaska. 3 refs., 6 figs.

  9. Geographic Response Information Network : a new tool to manage community information for oil spill contingency planning and response operations

    Munger, M.; Bryant, T.; Haugstad, E.; Kwietniak, J.; DeCola, E.; Robertson, T.

    2006-01-01

    This paper described the Geographic Response Information Network (GRIN) project which was launched to address some of the logistical challenges that often complicate oil spill and emergency response operations. The objective of the project was to develop a computer-based tool for incident logistics to organize maps and data related to oil spills, safety, public relations and basic community resources. In addition to its use for oil spill response planning, the data available can be useful for all-hazards emergency response planning. Early prototypes of the GRIN used PowerPoint slides to organize basic information about coastal communities in Alaska. With time, hyper text markup language (html) was used as the programming format because it can be more readily hyper-linked. Currently, GRIN is organized as a web page with the following 5 categories of information: general, liaison, public information, logistics and safety. There are several sub-headings under each category, such as location, people, economy, subsistence and transportation. This general information allows incident management personnel to obtain a community profile to better understand the cultural, social and economic basis of the community. The GRIN prototype was developed for the Kodiak urban area, but it may be expanded in the future to include other coastal communities in Alaska. 3 refs., 6 figs

  10. 75 FR 13807 - Pipeline Safety: Information Collection Activities

    2010-03-23

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... of Transportation, Pipeline and Hazardous Materials Safety Administration, 1200 New Jersey Avenue, SE...: Updates to Pipeline and Liquefied Natural Gas Reporting Requirements (One Rule). The Notice of Proposed...

  11. Topology for efficient information dissemination in ad-hoc networking

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  12. Running a network on a shoestring: the Global Invasive Species Information Network

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  13. A Holistic Approach to Networked Information Systems Design and Analysis

    2016-04-15

    attain quite substantial savings. 11. Optimal algorithms for energy harvesting in wireless networks. We use a Markov- decision-process (MDP) based...approach to obtain optimal policies for transmissions . The key advantage of our approach is that it holistically considers information and energy in a...Coding technique to minimize delays and the number of transmissions in Wireless Systems. As we approach an era of ubiquitous computing with information

  14. User-oriented information access by information need recontextualisation and articulation. Application in nuclear criticality safety

    Medini, Lionel

    2001-01-01

    This research thesis addresses the design methodology of a system of access to information which is based on an access to relevant information with respect to user needs. In a first part, the author addresses the various issues related to access to information and to information understanding. The next part addresses the involved methods and tools and presents the operational approach adopted for this research regarding access to information. Different disciplines are addressed (knowledge management, ergonomics and information science) and different technologies are used (W3 and XML, DVP, ActiveX, pdf format and the Adobe suite). In the core chapter, the author reports the design of a LMCE (a multi-user book of electronic knowledge) which allows both hypermedia navigation in knowledge diagrams and a construction of a document query. This design is based on a knowledge-management modelling to define diagrams, on ergonomics modelling for user profile identification, and on information science for a specific indexing of the information system. The prototype can be visualized with a web browser such as Internet Explorer 5. The author reports a first assessment and discusses the contribution of his approach to the problematic of access to information which is to be applied to nuclear criticality safety [fr

  15. Bridging probabilistic safety assessment studies with information Management System

    Luanco, E. M.

    2010-01-01

    Probabilistic Safety Assessment (PSA) is a critical business often known in conjunction with either new build or life extension of nuclear power plant. However, it is not so often referred to the operation phase of the plant, although it could bring a lot of long term benefits to the operator. The purpose of this paper is to discuss the potential contribution of PSA with day to day operation in bridging the deficiencies and specific failures characteristics of critical Structure System and Component (SSC) with the results of PSA studies. From and Information System prospective, the use of Information Management system (IMS) -also known as EAM solution -widely used by the majority of nuclear operators- is the potential vehicle to bridge the 2 worlds of PSA and daily operation. Most EAM solution get reliability management functionalities which are not really integrated with PSA tools and data and thus cannot provide the anticipated benefits of addressing typical aging phenomena beyond the only predictive models used by the PSA studies. The paper will also discuss potential integration scenario between PSA tools and EAM solutions. (authors)

  16. Risk-informed decision making during Bohunice NPP safety upgrading

    Lipar, M.; Muzikova, E.; Kubanyi, J.

    2001-01-01

    The paper summarizes some facts of risk-informed regulation developments within UJD regulatory environment. Based on national as well as international operating experience and indications resulted from PSA, Nuclear Regulatory Authority of the Slovak Republic (UJD) since its constituting in 1993 has devoted an effort to use PSA technology to support the regulatory policy in Slovakia. The PSA is considered a complement, not a substitute, to the deterministic approach. Suchlike integrated approach is used in decision making processes and the final decision on scope and priorities is based on it. The paper outlines risk insights used in the decision making process concerning Bohunice NPP safety upgrading and focuses on the role of PSA results in Gradual Reconstruction of Bohunice VI NPP. Besides, two other examples of the PSA results application to the decision making process are provided: the assessment of proposal of modifications to the main power supply diagram (incorporation of generator switches) and the assessment of licensee request for motor generator AOT (Allowable Outage Time) extension. As an example of improving support of Bohunice V-2 risk-informed operations, concept of AOT calculations and Bohunice V-2 Risk Monitor Project are briefly described. (author)

  17. Practical characterization of large networks using neighborhood information

    Wang, Pinghui; Zhao, Junzhou; Ribeiro, Bruno; Lui, John C. S.; Towsley, Don; Guan, Xiaohong

    2018-01-01

    querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling

  18. Information Networks and Social Inclusion in Latin America | IDRC ...

    Rapid changes in information networks throughout Latin America may provide new opportunities to address inequalities in the region. ... government and open education, with specific attention paid to women and youth in urban settings; ... optimizes household expenditures : a case study from rural communities in Mexico.

  19. Information system design for demand-driven supply networks

    Selk, Bernhard

    2004-01-01

    Information system design for demand-driven supply networks : integrating CRM & SCM / B. Selk, K. Turowski, C. Winnewisser. - In: EIS : Fourth International ICSC Symposium on Engineering of Intelligent Systems, EIS 2004. [Elektronische Ressource]. - Millet, Alberta : ICSC Interdisciplinary Research Canada, 2004. - 8 S. auf CD-ROM

  20. Audit Trail Management System in Community Health Care Information Network.

    Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio

    2015-01-01

    After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.

  1. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  2. Determinants of informal coordination in networked supply chains

    Ashayeri, J.; Ogulin, R.; Selen, W.

    2012-01-01

    Purpose – The purpose of this paper is to empirically examine capability connectivity, relationship alignment and the ability to informally network in the supply chain as determinants for better utilizing capabilities amongst supply chain partners. In particular, the paper focuses on how the above

  3. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  4. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Cognitive sciences Impact factor: 4.259, year: 2016

  5. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  6. Information transmission and signal permutation in active flow networks

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  7. Relay-based information broadcast in complex networks

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  8. Social Networks as Information Source for the Purchase Decision Process

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  9. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), an international nongovernmental organization, has demonstrated the effectiveness of its open source electronic medical record system (OpenMRS) in eight clinics in Rwanda. As a result, the Ministry of Health has decided to roll ...

  10. Value of digital information networks : A holonic framework

    Madureira, A.J.P.S.

    2011-01-01

    The extraordinary level of interest worldwide in Digital Information Networks (DINs)’ deployment is due to the strong perception that they bring economic, social and environmental value. However, scientific attempts to evidence this perception lead to speculative, elusive or limited conclusions. In

  11. Information and Networks in Asia and Sub-Saharan Africa ...

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research program. INASSA is focused on producing credible, high-quality evidence on the influence of digital initiatives in the areas of governance, science, learning, ...

  12. 77 FR 22387 - Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering...

    2012-04-13

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2012-0024] Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering Pipeline Systems Annual Report, Gas Transmission and Gathering Pipeline Systems Incident Report...

  13. 77 FR 58616 - Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering...

    2012-09-21

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2012-0024] Pipeline Safety: Information Collection Activities, Revision to Gas Transmission and Gathering Pipeline Systems Annual Report, Gas Transmission and Gathering Pipeline Systems Incident Report...

  14. The eNanoMapper database for nanomaterial safety information

    Nina Jeliazkova

    2015-07-01

    Full Text Available Background: The NanoSafety Cluster, a cluster of projects funded by the European Commision, identified the need for a computational infrastructure for toxicological data management of engineered nanomaterials (ENMs. Ontologies, open standards, and interoperable designs were envisioned to empower a harmonized approach to European research in nanotechnology. This setting provides a number of opportunities and challenges in the representation of nanomaterials data and the integration of ENM information originating from diverse systems. Within this cluster, eNanoMapper works towards supporting the collaborative safety assessment for ENMs by creating a modular and extensible infrastructure for data sharing, data analysis, and building computational toxicology models for ENMs.Results: The eNanoMapper database solution builds on the previous experience of the consortium partners in supporting diverse data through flexible data storage, open source components and web services. We have recently described the design of the eNanoMapper prototype database along with a summary of challenges in the representation of ENM data and an extensive review of existing nano-related data models, databases, and nanomaterials-related entries in chemical and toxicogenomic databases. This paper continues with a focus on the database functionality exposed through its application programming interface (API, and its use in visualisation and modelling. Considering the preferred community practice of using spreadsheet templates, we developed a configurable spreadsheet parser facilitating user friendly data preparation and data upload. We further present a web application able to retrieve the experimental data via the API and analyze it with multiple data preprocessing and machine learning algorithms.Conclusion: We demonstrate how the eNanoMapper database is used to import and publish online ENM and assay data from several data sources, how the “representational state

  15. The eNanoMapper database for nanomaterial safety information.

    Jeliazkova, Nina; Chomenidis, Charalampos; Doganis, Philip; Fadeel, Bengt; Grafström, Roland; Hardy, Barry; Hastings, Janna; Hegi, Markus; Jeliazkov, Vedrin; Kochev, Nikolay; Kohonen, Pekka; Munteanu, Cristian R; Sarimveis, Haralambos; Smeets, Bart; Sopasakis, Pantelis; Tsiliki, Georgia; Vorgrimmler, David; Willighagen, Egon

    2015-01-01

    The NanoSafety Cluster, a cluster of projects funded by the European Commision, identified the need for a computational infrastructure for toxicological data management of engineered nanomaterials (ENMs). Ontologies, open standards, and interoperable designs were envisioned to empower a harmonized approach to European research in nanotechnology. This setting provides a number of opportunities and challenges in the representation of nanomaterials data and the integration of ENM information originating from diverse systems. Within this cluster, eNanoMapper works towards supporting the collaborative safety assessment for ENMs by creating a modular and extensible infrastructure for data sharing, data analysis, and building computational toxicology models for ENMs. The eNanoMapper database solution builds on the previous experience of the consortium partners in supporting diverse data through flexible data storage, open source components and web services. We have recently described the design of the eNanoMapper prototype database along with a summary of challenges in the representation of ENM data and an extensive review of existing nano-related data models, databases, and nanomaterials-related entries in chemical and toxicogenomic databases. This paper continues with a focus on the database functionality exposed through its application programming interface (API), and its use in visualisation and modelling. Considering the preferred community practice of using spreadsheet templates, we developed a configurable spreadsheet parser facilitating user friendly data preparation and data upload. We further present a web application able to retrieve the experimental data via the API and analyze it with multiple data preprocessing and machine learning algorithms. We demonstrate how the eNanoMapper database is used to import and publish online ENM and assay data from several data sources, how the "representational state transfer" (REST) API enables building user friendly

  16. Evaluating the impact of connectivity, continuity, and topography of sidewalk network on pedestrian safety.

    Osama, Ahmed; Sayed, Tarek

    2017-10-01

    With the increasing demand for sustainability, walking is being encouraged as one of the main active modes of transportation. However, pedestrians are vulnerable to severe injuries when involved in crashes which can discourage road users from walking. Therefore, studying factors that affect the safety of pedestrians is important. This paper investigates the relationship between pedestrian-motorist crashes and various sidewalk network indicators in the city of Vancouver. The goal is to assess the impact of network connectivity, directness, and topography on pedestrian safety using macro-level collision prediction models. The models were developed using generalized linear regression and full Bayesian techniques. Both walking trips and vehicle kilometers travelled were used as the main traffic exposure variables in the models. The safety models supported the safety in numbers hypothesis showing a non-linear positive association between pedestrian-motorist crashes and the increase in walking trips and vehicle traffic. The model results also suggested that higher continuity, linearity, coverage, and slope of sidewalk networks were associated with lower crash occurrence. However, network connectivity was associated with higher crash occurrence. The spatial effects were accounted for in the full Bayes models and were found significant. The models provide insights about the factors that influence pedestrian safety and the spatial variability of pedestrian crashes within a city, which can be useful for the planning of pedestrian networks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Constructing a Bayesian network model for improving safety behavior of employees at workplaces.

    Mohammadfam, Iraj; Ghasemi, Fakhradin; Kalatpour, Omid; Moghimbeigi, Abbas

    2017-01-01

    Unsafe behavior increases the risk of accident at workplaces and needs to be managed properly. The aim of the present study was to provide a model for managing and improving safety behavior of employees using the Bayesian networks approach. The study was conducted in several power plant construction projects in Iran. The data were collected using a questionnaire composed of nine factors, including management commitment, supporting environment, safety management system, employees' participation, safety knowledge, safety attitude, motivation, resource allocation, and work pressure. In order for measuring the score of each factor assigned by a responder, a measurement model was constructed for each of them. The Bayesian network was constructed using experts' opinions and Dempster-Shafer theory. Using belief updating, the best intervention strategies for improving safety behavior also were selected. The result of the present study demonstrated that the majority of employees do not tend to consider safety rules, regulation, procedures and norms in their behavior at the workplace. Safety attitude, safety knowledge, and supporting environment were the best predictor of safety behavior. Moreover, it was determined that instantaneous improvement of supporting environment and employee participation is the best strategy to reach a high proportion of safety behavior at the workplace. The lack of a comprehensive model that can be used for explaining safety behavior was one of the most problematic issues of the study. Furthermore, it can be concluded that belief updating is a unique feature of Bayesian networks that is very useful in comparing various intervention strategies and selecting the best one form them. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Information Management of Health and Safety at the Tarkwa Mine of ...

    Michael

    2016-06-01

    Jun 1, 2016 ... Information Management of Health and Safety at the Tarkwa ... heap leach technology. ... the quality of information was assessed using the content of information ..... managing library users' expectations; and reference service.

  19. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  20. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode.......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  1. Identification of Functional Information Subgraphs in Complex Networks

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  2. Multimedia information processing in the SWAN mobile networked computing system

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  3. Work of scientific and technological information under network environment

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  4. Unification of Information Security Policies for Network Security Solutions

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  5. The Deep Space Network information system in the year 2000

    Markley, R. W.; Beswick, C. A.

    1992-01-01

    The Deep Space Network (DSN), the largest, most sensitive scientific communications and radio navigation network in the world, is considered. Focus is made on the telemetry processing, monitor and control, and ground data transport architectures of the DSN ground information system envisioned for the year 2000. The telemetry architecture will be unified from the front-end area to the end user. It will provide highly automated monitor and control of the DSN, automated configuration of support activities, and a vastly improved human interface. Automated decision support systems will be in place for DSN resource management, performance analysis, fault diagnosis, and contingency management.

  6. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 4.259, year: 2016

  7. Dynamic safety assessment of natural gas stations using Bayesian network

    Zarei, Esmaeil; Azadeh, Ali; Khakzad Rostami, N.; Mirzaei Aliabadi, Mostafa; Mohammadfam, Iraj

    2017-01-01

    Pipelines are one of the most popular and effective ways of transporting hazardous materials, especially natural gas. However, the rapid development of gas pipelines and stations in urban areas has introduced a serious threat to public safety and assets. Although different methods have been

  8. Integrated care: an Information Model for Patient Safety and Vigilance Reporting Systems.

    Rodrigues, Jean-Marie; Schulz, Stefan; Souvignet, Julien

    2015-01-01

    Quality management information systems for safety as a whole or for specific vigilances share the same information types but are not interoperable. An international initiative tries to develop an integrated information model for patient safety and vigilance reporting to support a global approach of heath care quality.

  9. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    2010-09-10

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD... Information Technology Research and Development (NITRD). ACTION: Notice, request for public comment. FOR..., the National Coordination Office for Networking and Information Technology Research and Development...

  10. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  11. Protecting against cyber threats in networked information systems

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  12. Role of information and communication networks in malaria survival

    Marathe Achla

    2007-10-01

    Full Text Available Abstract Background Quite often symptoms of malaria go unrecognized or untreated. According to the Multilateral Initiative on Malaria, 70% of the malaria cases that are treated at home are mismanaged. Up to 82% of all malaria episodes in sub-Saharan Africa are treated outside the formal health sector. Fast and appropriate diagnosis and treatment of malaria is extremely important in reducing morbidity and mortality. Method Data from 70 different countries is pooled together to construct a panel dataset of health and socio-economic variables for a time span of (1960–2004. The generalized two-stage least squares and panel data models are used to investigate the impact of information and communication network (ICN variables on malaria death probability. The intensity of ICN is represented by the number of telephone main lines per 1,000 people and the number of television sets per 1,000 people. Results The major finding is that the intensity of ICN is associated with reduced probability of deaths of people that are clinically identified as malaria infected. The results are robust for both indicators i.e. interpersonal and mass communication networks and for all model specifications examined. Conclusion The results suggest that information and communication networks can substantially scale up the effectiveness of the existing resources for malaria prevention. Resources spent in preventing malaria are far less than needed. Expanded information and communication networks will widen the avenues for community based "participatory development", that encourages the use of local information, knowledge and decision making. Timely information, immediate care and collective knowledge based treatment can be extremely important in reducing child mortality and achieving the millennium development goal.

  13. Exploring Student Use of Social Networking Services (SNS) Surrounding Moral Development, Gender, Campus Crime, Safety, and the Clery Act: A Mixed Methods Study

    Baum, Haley

    2017-01-01

    The purpose of this explanatory sequential mixed methods study was to explore college students' use of social networking services (SNS); examining how and why they communicate about campus safety information. This study took place at Stockton University, a regional state institution in NJ. Undergraduate students took part in an online quantitative…

  14. Optimal information transfer in enzymatic networks: A field theoretic formulation

    Samanta, Himadri S.; Hinczewski, Michael; Thirumalai, D.

    2017-07-01

    Signaling in enzymatic networks is typically triggered by environmental fluctuations, resulting in a series of stochastic chemical reactions, leading to corruption of the signal by noise. For example, information flow is initiated by binding of extracellular ligands to receptors, which is transmitted through a cascade involving kinase-phosphatase stochastic chemical reactions. For a class of such networks, we develop a general field-theoretic approach to calculate the error in signal transmission as a function of an appropriate control variable. Application of the theory to a simple push-pull network, a module in the kinase-phosphatase cascade, recovers the exact results for error in signal transmission previously obtained using umbral calculus [Hinczewski and Thirumalai, Phys. Rev. X 4, 041017 (2014), 10.1103/PhysRevX.4.041017]. We illustrate the generality of the theory by studying the minimal errors in noise reduction in a reaction cascade with two connected push-pull modules. Such a cascade behaves as an effective three-species network with a pseudointermediate. In this case, optimal information transfer, resulting in the smallest square of the error between the input and output, occurs with a time delay, which is given by the inverse of the decay rate of the pseudointermediate. Surprisingly, in these examples the minimum error computed using simulations that take nonlinearities and discrete nature of molecules into account coincides with the predictions of a linear theory. In contrast, there are substantial deviations between simulations and predictions of the linear theory in error in signal propagation in an enzymatic push-pull network for a certain range of parameters. Inclusion of second-order perturbative corrections shows that differences between simulations and theoretical predictions are minimized. Our study establishes that a field theoretic formulation of stochastic biological signaling offers a systematic way to understand error propagation in

  15. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  16. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  17. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  18. Distance-Based Access Modifiers Applied to Safety in Home Networks

    Mortensen, Kjeld Høyer; Schougaard, Kari Rye; Schultz, Ulrik Pagh

    2004-01-01

    Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of safety: preventing the computerized house from harming the inhabitants, even in a worst-case scenario where...... be performed within a physical proximity that ensures safety. We use a declarative approach integrated with an IDL language to express location-based restrictions on operations. This model has been implemented in a middleware for home audio-video devices, using infrared communication and a local-area network...

  19. An Optimal Balance between Efficiency and Safety of Urban Drainage Networks

    Seo, Y.

    2014-12-01

    Urban drainage networks have been developed to promote the efficiency of a system in terms of drainage time so far. Typically, a drainage system is designed to drain water from developed areas promptly as much as possible during floods. In this regard, an artificial drainage system have been considered to be more efficient compared to river networks in nature. This study examined artificial drainage networks and the results indicate they can be less efficient in terms of network configuration compared with river networks, which is counter-intuitive. The case study of 20 catchments in Seoul, South Korea shows that they have wide range of efficiency in terms of network configuration and consequently, drainage time. This study also demonstrates that efficient drainage networks are more sensitive to spatial and temporal rainfall variation such as rainstorm movement. Peak flows increase more than two times greater in effective drainage networks compared with inefficient and highly sinuous drainage networks. Combining these results, this study implies that the layout of a drainage network is an important factor in terms of efficient drainage and also safety in urban catchments. Design of an optimal layout of the drainage network can be an alternative non-structural measures that mitigate potential risks and it is crucial for the sustainability of urban environments.

  20. Information dynamics algorithm for detecting communities in networks

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  1. Information spread in networks: Games, optimal control, and stabilization

    Khanafer, Ali

    This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack

  2. Processing of chromatic information in a deep convolutional neural network.

    Flachot, Alban; Gegenfurtner, Karl R

    2018-04-01

    Deep convolutional neural networks are a class of machine-learning algorithms capable of solving non-trivial tasks, such as object recognition, with human-like performance. Little is known about the exact computations that deep neural networks learn, and to what extent these computations are similar to the ones performed by the primate brain. Here, we investigate how color information is processed in the different layers of the AlexNet deep neural network, originally trained on object classification of over 1.2M images of objects in their natural contexts. We found that the color-responsive units in the first layer of AlexNet learned linear features and were broadly tuned to two directions in color space, analogously to what is known of color responsive cells in the primate thalamus. Moreover, these directions are decorrelated and lead to statistically efficient representations, similar to the cardinal directions of the second-stage color mechanisms in primates. We also found, in analogy to the early stages of the primate visual system, that chromatic and achromatic information were segregated in the early layers of the network. Units in the higher layers of AlexNet exhibit on average a lower responsivity for color than units at earlier stages.

  3. Visual sensory networks and effective information transfer in animal groups.

    Strandburg-Peshkin, Ariana; Twomey, Colin R; Bode, Nikolai W F; Kao, Albert B; Katz, Yael; Ioannou, Christos C; Rosenthal, Sara B; Torney, Colin J; Wu, Hai Shan; Levin, Simon A; Couzin, Iain D

    2013-09-09

    Social transmission of information is vital for many group-living animals, allowing coordination of motion and effective response to complex environments. Revealing the interaction networks underlying information flow within these groups is a central challenge. Previous work has modeled interactions between individuals based directly on their relative spatial positions: each individual is considered to interact with all neighbors within a fixed distance (metric range), a fixed number of nearest neighbors (topological range), a 'shell' of near neighbors (Voronoi range), or some combination (Figure 1A). However, conclusive evidence to support these assumptions is lacking. Here, we employ a novel approach that considers individual movement decisions to be based explicitly on the sensory information available to the organism. In other words, we consider that while spatial relations do inform interactions between individuals, they do so indirectly, through individuals' detection of sensory cues. We reconstruct computationally the visual field of each individual throughout experiments designed to investigate information propagation within fish schools (golden shiners, Notemigonus crysoleucas). Explicitly considering visual sensing allows us to more accurately predict the propagation of behavioral change in these groups during leadership events. Furthermore, we find that structural properties of visual interaction networks differ markedly from those of metric and topological counterparts, suggesting that previous assumptions may not appropriately reflect information flow in animal groups. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Information processing by networks of quantum decision makers

    Yukalov, V. I.; Yukalova, E. P.; Sornette, D.

    2018-02-01

    We suggest a model of a multi-agent society of decision makers taking decisions being based on two criteria, one is the utility of the prospects and the other is the attractiveness of the considered prospects. The model is the generalization of quantum decision theory, developed earlier for single decision makers realizing one-step decisions, in two principal aspects. First, several decision makers are considered simultaneously, who interact with each other through information exchange. Second, a multistep procedure is treated, when the agents exchange information many times. Several decision makers exchanging information and forming their judgment, using quantum rules, form a kind of a quantum information network, where collective decisions develop in time as a result of information exchange. In addition to characterizing collective decisions that arise in human societies, such networks can describe dynamical processes occurring in artificial quantum intelligence composed of several parts or in a cluster of quantum computers. The practical usage of the theory is illustrated on the dynamic disjunction effect for which three quantitative predictions are made: (i) the probabilistic behavior of decision makers at the initial stage of the process is described; (ii) the decrease of the difference between the initial prospect probabilities and the related utility factors is proved; (iii) the existence of a common consensus after multiple exchange of information is predicted. The predicted numerical values are in very good agreement with empirical data.

  5. PREFACE: Complex Networks: from Biology to Information Technology

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  6. 75 FR 73160 - Pipeline Safety: Information Collection Activities

    2010-11-29

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No...-Related Conditions on Gas, Hazardous Liquid, and Carbon Dioxide Pipelines and Liquefied Natural Gas... Pipelines and Liquefied Natural Gas Facilities.'' The Pipeline Safety Laws (49 U.S.C. 60132) require each...

  7. 76 FR 45904 - Pipeline Safety: Information Collection Activities

    2011-08-01

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... at U.S. Department of Transportation, Pipeline and Hazardous Materials Safety Administration, 1200...: On Occasion. Title: Record Keeping for Natural Gas Pipeline Operators. OMB Control Number: 2137-0049...

  8. The network to review natural analogue studies and their applications to repository safety assessment and public communication (NAnet)

    Miller, W.M.; Hooker, P.J. [ENVIROS Consulting ltd, 61, the Shore Leith, UK-0 EH6 6RA Edinburgh (United Kingdom)

    2004-07-01

    Analogue information can increase our conceptual understanding of long-term repository behaviour in support of post-closure performance assessment (PA), provide quantitative data for PA models and provide ways of communicating safety information to non-specialist audiences. These functions of analogue studies have, however, received too little attention in PA reports and safety cases. Many analogue studies have been undertaken in the last two decades costing tens of millions of euros, and these have covered a wide range of phenomena such as uranium ore deposition, natural fission reactors, natural nuclide migration, contaminant containment by clays and sediments, preservation of ancient fossil trees and buried artefacts etc. The different uses of analogues would be easier to manage if a single database of quality approved analogue information were to be created. NAnet, a Thematic Network within the 5. EURATOM FP is aiming to promote more considered applications of analogues in performance and safety assessments and in audience dialogue. NAnet intends critically to review a number of analogue studies in terms of their relevance and limitations to different repository concepts and environments and with regard to their applications in performance assessments, safety cases and communication. On the basis of these reviews, a simple digital database is being developed for the PA community which will allow PA modelers to make quicker and wider use of natural analogue information in performance and safety assessments. It is expected that some of these tools will help radioactive waste institutions to make better use of natural analogue information for communication with different audiences, including the public. (authors)

  9. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  10. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  11. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  12. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  13. Reliability estimation of safety-critical software-based systems using Bayesian networks

    Helminen, A.

    2001-06-01

    Due to the nature of software faults and the way they cause system failures new methods are needed for the safety and reliability evaluation of software-based safety-critical automation systems in nuclear power plants. In the research project 'Programmable automation system safety integrity assessment (PASSI)', belonging to the Finnish Nuclear Safety Research Programme (FINNUS, 1999-2002), various safety assessment methods and tools for software based systems are developed and evaluated. The project is financed together by the Radiation and Nuclear Safety Authority (STUK), the Ministry of Trade and Industry (KTM) and the Technical Research Centre of Finland (VTT). In this report the applicability of Bayesian networks to the reliability estimation of software-based systems is studied. The applicability is evaluated by building Bayesian network models for the systems of interest and performing simulations for these models. In the simulations hypothetical evidence is used for defining the parameter relations and for determining the ability to compensate disparate evidence in the models. Based on the experiences from modelling and simulations we are able to conclude that Bayesian networks provide a good method for the reliability estimation of software-based systems. (orig.)

  14. Web of Things-Based Remote Monitoring System for Coal Mine Safety Using Wireless Sensor Network

    Bo, Cheng; Xin, Cheng; Zhongyi, Zhai; Chengwen, Zhang; Junliang, Chen

    2014-01-01

    Frequent accidents have occurred in coal mine enterprises; therefore, raising the technological level of coal mine safety monitoring systems is an urgent problem. Wireless sensor networks (WSN), as a new field of research, have broad application prospects. This paper proposes a Web of Things- (WoT-) based remote monitoring system that takes full advantage of wireless sensor networks in combination with the CAN bus communication technique that abstracts the underground sensor data and capabili...

  15. 49 CFR 575.301 - Vehicle Labeling of Safety Rating Information.

    2010-10-01

    ... providing them with safety rating information developed by NHTSA in its New Car Assessment Program (NCAP..., as specified at 15 U.S.C. 1231-1233. (2) Safety rating label means the label with NCAP safety rating... has approved an optional NCAP test that will cover that category, the manufacturer may depict vehicles...

  16. 75 FR 36615 - Pipeline Safety: Information Collection Gas Distribution Annual Report Form

    2010-06-28

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration 49 CFR Part 192 [Docket No. PHMSA-RSPA-2004-19854] Pipeline Safety: Information Collection Gas Distribution Annual Report Form AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Request...

  17. Evaluating and Predicting Patient Safety for Medical Devices With Integral Information Technology

    2005-01-01

    323 Evaluating and Predicting Patient Safety for Medical Devices with Integral Information Technology Jiajie Zhang, Vimla L. Patel, Todd R...errors are due to inappropriate designs for user interactions, rather than mechanical failures. Evaluating and predicting patient safety in medical ...the users on the identified trouble spots in the devices. We developed two methods for evaluating and predicting patient safety in medical devices

  18. 29 CFR 1960.12 - Dissemination of occupational safety and health program information.

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Dissemination of occupational safety and health program... OCCUPATIONAL SAFETY AND HEALTH PROGRAMS AND RELATED MATTERS Administration § 1960.12 Dissemination of occupational safety and health program information. (a) Copies of the Act, Executive Order 12196, program...

  19. Modeling information diffusion in time-varying community networks

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  20. A distributed name resolution system in information centric networks

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  1. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  2. Conceptual Framework for Developing a Diabetes Information Network.

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  3. [Linking: relationships between health professionals in the informal health networks].

    Sarradon-Eck, A; Vega, A; Faure, M; Humbert-Gaudart, A; Lustman, M

    2008-07-01

    During the last years, the french health system has been developing formal health networks. So, it was necessary to study informal health networks as networks. More precisely, we studied the nature of relationships between various stakeholders around general practionners wich are commonly considering as the stakeholder of the health system private sector. Fieldwork (ethnography based on direct observations and interviews) was conducted between October 2002 and april 2004, in the South-East of France. Ten monographs of general practioner's offices were achieved in a rural area; then, we achieved fieldwork of the informal health networks identified. There is a cultural frame wich is common to all private professionals. This frame includes a triple ideal (teamwork built up the hospital model, independance, and an relational approach with patients). This frame does not square with the real practices. In fact, regulation mechanisms preserve the balance of relashionships between professionnal groups, by restricting/promoting exchanges and complex alliance strategies. These mecanisms include: (1) a few professionnal's rule as disponibility (to the patients and to the professionnals), as communication about patient, as patient's reference, as obligation to communicate between professionals; (2) some constraints such as territory superposition and competition with other professional groups; (3) some needs for: rileiving (of emotions and worries connected to work), sharing (decisions, responsabilities), of delegation (medical treatment, practices), protection against social and legal risk through the creation of trust relationships. These trust relationships are based on several logics (affinity, solidarity, similarity). The study shows the major place of the patient who is often the main organizer of his network, and even though he makes an important structuring work between medical staff, and an information transfer (on his diagnosis, on his treatment, and professionals

  4. Additional information for impact response of the restart safety rods

    Yau, W.W.F.

    1991-01-01

    WSRC-RP-91-677 studied the structural response of the safety rods under the conditions of brake failure and accidental release. It was concluded that the maximum impact loading to the safety rod is 6020 pounds based on conservative considerations that energy dissipation attributable to fluid resistance and reactor superstructure flexibility. The staffers of the Defense Nuclear Facility Safety Board reviewed the results and inquired about the extent of conservatism. By request of the RESTART team, I reassessed the impact force due to these conservative assumptions. This memorandum reports these assessments

  5. Reperes, the information magazine of the Institute for Radiation Protection and Nuclear Safety - IRSN, No. 12 - January 2012, Special issue Fukushima - First lessons from the accident

    2012-01-01

    A first set of articles addresses the nuclear crisis in Japan (description of the accident, information mission sent by France, and support actions undertaken by France in Japan in the fields of education, civilian security, culture, sailing, media, dosimeters, robotics). A second set discusses lessons learned in terms of nuclear safety (complementary safety assessments, stress test in Gravelines), radiological consequences (impact on Japanese population, the Symbiose software, the Teleray network), crisis management, and research

  6. DOE waste information network: Data management and communications

    Fore, C.S.

    1986-01-01

    The U.S. Department of Energy's Waste Information Network (WIN) is an integral part of DOE's Hazardous Waste Remedial Actions Program. WIN has played an active role in the national program's mission to identify the magnitude and nature of existing DOE hazardous chemical and mixed radioactive waste streams and inventories and to provide a mechanism for disseminating pertinent information on technology activities. The information systems activity is structured into three key areas: data base development, data analysis, and data dissemination. As a result of this effort, several key data bases have been developed. Data dissemination is important to the use and management of the diversity of information and communication features developed by the program

  7. Controllable quantum information network with a superconducting system

    Zhang, Feng-yang; Liu, Bao; Chen, Zi-hong; Wu, Song-lin; Song, He-shan

    2014-01-01

    We propose a controllable and scalable architecture for quantum information processing using a superconducting system network, which is composed of current-biased Josephson junctions (CBJJs) as tunable couplers between the two superconducting transmission line resonators (TLRs), each coupling to multiple superconducting qubits (SQs). We explicitly demonstrate that the entangled state, the phase gate, and the information transfer between any two selected SQs can be implemented, respectively. Lastly, numerical simulation shows that our scheme is robust against the decoherence of the system. -- Highlights: •An architecture for quantum information processing is proposed. •The quantum information transfer between any two selected SQs is implemented. •This proposal is robust against the decoherence of the system. •This architecture can be fabricated on a chip down to the micrometer scale

  8. 77 FR 51848 - Pipeline Safety: Information Collection Activities

    2012-08-27

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... Program for Gas Distribution Pipelines. DATES: Interested persons are invited to submit comments on or.... These regulations require operators of hazardous liquid pipelines and gas pipelines to develop and...

  9. 76 FR 65778 - Pipeline Safety: Information Collection Activities

    2011-10-24

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No...: 12,120. Frequency of Collection: On occasion. 2. Title: Recordkeeping for Natural Gas Pipeline... investigating incidents. Affected Public: Operators of natural gas pipeline systems. Annual Reporting and...

  10. 77 FR 74275 - Pipeline Safety: Information Collection Activities

    2012-12-13

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No.... These regulations require operators of hazardous liquid pipelines and gas pipelines to develop and... control room. Affected Public: Operators of both natural gas and hazardous liquid pipeline systems. Annual...

  11. 77 FR 27279 - Pipeline Safety: Information Collection Activities

    2012-05-09

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... collections relate to the pipeline integrity management requirements for gas transmission pipeline operators... Management in High Consequence Areas Gas Transmission Pipeline Operators. OMB Control Number: 2137-0610...

  12. 77 FR 46155 - Pipeline Safety: Information Collection Activities

    2012-08-02

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... collections relate to the pipeline integrity management requirements for gas transmission pipeline operators... Management in High Consequence Areas Gas Transmission Pipeline Operators. OMB Control Number: 2137-0610...

  13. Discussion on the nuclear information resources co-constructing and sharing under network information

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  14. Criticality Safety Information Resource Center Web portal: www.csirc.net

    Harmon, C.D. II; Jones, T.

    2000-01-01

    The Nuclear Criticality Safety Group (ESH-6) at Los Alamos National Laboratory (LANL) is in the process of collecting and archiving historical and technical information related to nuclear criticality safety from LANL and other facilities. In an ongoing effort, this information is being made available via the Criticality Safety Information Resource Center (CSIRC) web site, which is hosted and maintained by ESH-6 staff. Recently, the CSIRC Web site was recreated as a Web portal that provides the criticality safety community with much more than just archived data

  15. Patterns of patient safety culture: a complexity and arts-informed project of knowledge translation.

    Mitchell, Gail J; Tregunno, Deborah; Gray, Julia; Ginsberg, Liane

    2011-01-01

    The purpose of this paper is to describe patterns of patient safety culture that emerged from an innovative collaboration among health services researchers and fine arts colleagues. The group engaged in an arts-informed knowledge translation project to produce a dramatic expression of patient safety culture research for inclusion in a symposium. Scholars have called for a deeper understanding of the complex interrelationships among structure, process and outcomes relating to patient safety. Four patterns of patient safety culture--blinding familiarity, unyielding determination, illusion of control and dismissive urgency--are described with respect to how they informed creation of an arts-informed project for knowledge translation.

  16. The Central American Network for Disaster and Health Information.

    Arnesen, Stacey J; Cid, Victor H; Scott, John C; Perez, Ricardo; Zervaas, Dave

    2007-07-01

    This paper describes an international outreach program to support rebuilding Central America's health information infrastructure after several natural disasters in the region, including Hurricane Mitch in 1998 and two major earthquakes in 2001. The National Library of Medicine joined forces with the Pan American Health Organization/World Health Organization, the United Nations International Strategy for Disaster Reduction, and the Regional Center of Disaster Information for Latin America and the Caribbean (CRID) to strengthen libraries and information centers in Central America and improve the availability of and access to health and disaster information in the region by developing the Central American Network for Disaster and Health Information (CANDHI). Through CRID, the program created ten disaster health information centers in medical libraries and disaster-related organizations in six countries. This project served as a catalyst for the modernization of several medical libraries in Central America. The resulting CANDHI provides much needed electronic access to public health "gray literature" on disasters, as well as access to numerous health information resources. CANDHI members assist their institutions and countries in a variety of disaster preparedness activities through collecting and disseminating information.

  17. An open, interoperable, and scalable prehospital information technology network architecture.

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  18. Final report of the 'Nordic thermal-hydraulic and safety network (NOTNET)' - Project

    Tuunanen, J.; Tuomainen, M.

    2005-04-01

    A Nordic network for thermal-hydraulics and nuclear safety research was started. The idea of the network is to combine the resources of different research teams in order to carry out more ambitious and extensive research programs than would be possible for the individual teams. From the very beginning, the end users of the research results have been integrated to the network. Aim of the network is to benefit the partners involved in nuclear energy in the Nordic Countries (power companies, reactor vendors, safety regulators, research units). First task within the project was to describe the resources (personnel, know-how, simulation tools, test facilities) of the various teams. Next step was to discuss with the end users about their research needs. Based on these steps, few most important research topics with defined goals were selected, and coarse road maps were prepared for reaching the targets. These road maps will be used as a starting point for planning the actual research projects in the future. The organisation and work plan for the network were established. National coordinators were appointed, as well as contact persons in each participating organisation, whether research unit or end user. This organisation scheme is valid for the short-term operation of NOTNET when only Nordic organisations take part in the work. Later on, it is possible to enlarge the network e.g. within EC framework programme. The network can now start preparing project proposals and searching funding for the first common research projects. (au)

  19. IT safety in production data networks (PDN). Tracking, evaluation and elimination of safety threats; IT-Sicherheit in Produktionsnetzen (PDN). Aufspueren, einschaetzen und beseitigen von Sicherheitsbedrohungen

    Neider, Ulrich [DETACK GmbH, Ludwigsburg (Germany)

    2013-03-01

    This contribution reports on the threats of production data networks. Within the context of the IT security, the risks of production data networks are not only based on a possible contamination by computer viruses. The author of this contribution increases awareness of dangers to whose production systems are faced. The author also presents a phase model from his own consulting practice in order to increase the safety of production data systems by implementation of a safety control. This phase model consists of the six following steps: (a) Stock taking of the state of the art; (b) Determination of the target (development of a safety concept); (c) Creation of an IT safety policy; (d) Application of IT safety policy; (e) Audit of the results (IT safety audit); (f) Regular safety tests.

  20. Integrated multimedia information system on interactive CATV network

    Lee, Meng-Huang; Chang, Shin-Hung

    1998-10-01

    In the current CATV system architectures, they provide one- way delivery of a common menu of entertainment to all the homes through the cable network. Through the technologies evolution, the interactive services (or two-way services) can be provided in the cable TV systems. They can supply customers with individualized programming and support real- time two-way communications. With a view to the service type changed from the one-way delivery systems to the two-way interactive systems, `on demand services' is a distinct feature of multimedia systems. In this paper, we present our work of building up an integrated multimedia system on interactive CATV network in Shih Chien University. Besides providing the traditional analog TV programming from the cable operator, we filter some channels to reserve them as our campus information channels. In addition to the analog broadcasting channel, the system also provides the interactive digital multimedia services, e.g. Video-On- Demand (VOD), Virtual Reality, BBS, World-Wide-Web, and Internet Radio Station. These two kinds of services are integrated in a CATV network by the separation of frequency allocation for the analog broadcasting service and the digital interactive services. Our ongoing work is to port our previous work of building up a VOD system conformed to DAVIC standard (for inter-operability concern) on Ethernet network into the current system.