WorldWideScience

Sample records for safety information network

  1. A Network Diffusion Model of Food Safety Scare Behavior considering Information Transparency

    Directory of Open Access Journals (Sweden)

    Tingqiang Chen

    2017-01-01

    Full Text Available This study constructs the network diffusion model of food safety scare behavior under the effect of information transparency and examines the network topology and evolution characteristics of food safety scare behavior in a numerical simulation. The main conclusions of this study are as follows. (1 Under the effect of information transparency, the network degree distribution of food safety scare behavior diffusion demonstrates the decreasing characteristics of diminishing margins. (2 Food safety scare behavior diffusion increases with the information dissemination rate and consumer concern about food safety incidents and shows the characteristics of monotone increasing. And with the increasing of the government food safety supervision information transparency and media food safety supervision information transparency, the whole is declining characteristic of diminishing marginal. In addition, the extinction of food safety scare behavior cannot be achieved gradually given a single regulation of government food safety supervision information transparency and media food safety supervision information transparency. (3 The interaction effects between improving government food safety supervision information transparency or media food safety supervision information transparency and declining consumer concerns about food safety incidents or information transmission rate can engender the suppression of food safety scare behavior diffusion.

  2. Methods of Certification tests PLC-Networks in Compliance Safety Information

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2011-12-01

    Full Text Available The aim of this research was description of the methodology of the audit plc-network to meet the requirements of information security. The technique is based on the provisions of the guidance documents and model FSTEC Russia test object methods of information on safety information.

  3. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  4. Establishment of the National Nuclear Regulatory Portal (NNRP) as the key element of the Global Nuclear Safety and Security Network and Regulatory Network (GNSSN/RegNet) for sharing of nuclear safety information and knowledge among the Global Expert Community

    International Nuclear Information System (INIS)

    Kuvshinnikov, A.V.

    2011-01-01

    The Global Nuclear Safety and Security Network (GNSSN) implements the concept of the Global Nuclear Safety and Security Framework (GNSSF) as outlined in INSAG 21. This is the framework of instruments and resources for achieving and maintaining worldwide a high level of safety and security at nuclear facilities and activities as stated in SF-1 and supporting safety standards or recommendations such as INSAG-12. National efforts are and should be augmented by the activities of a variety of international enterprises that facilitate safety and security. The IAEA standard GS-R-3 requires that information and knowledge is managed as a resource. Further strengthening of GNSSN in particular regulatory networking as intended by GNSSN/RegNet has to be based on current national priorities, on existing regional and thematic networks and on the established mechanisms of international co-operation as presented for example on the websites of the IAEA or the OECD-NEA. Current design and operation of RegNet are flexible enough to accommodate differences in national and international approaches and practices and to facilitate exchange and cooperation on regulatory matters. The main role of GNSSN/RegNet is sharing knowledge and bringing people together to enhance and promote nuclear safety and security. The objectives of GNSSN/RegNet: enhancing safety and security by international cooperation, sharing information and best practices, enabling adequate access to relevant safety and security information and promoting the dissemination of this information, implementing active collaboration in the relevant areas related to safety and security, such as joint projects, peer reviews, enabling synergies among existing networks and initiatives, informing the public on the relevant safety and security areas and the related international collaboration. In the RegNet part of the GNSSN exist the National Nuclear Regulatory Portal (NNRP) which is on one hand a part of the global RegNet and on the

  5. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  6. Investigation of road network features and safety performance.

    Science.gov (United States)

    Wang, Xuesong; Wu, Xingwei; Abdel-Aty, Mohamed; Tremont, Paul J

    2013-07-01

    The analysis of road network designs can provide useful information to transportation planners as they seek to improve the safety of road networks. The objectives of this study were to compare and define the effective road network indices and to analyze the relationship between road network structure and traffic safety at the level of the Traffic Analysis Zone (TAZ). One problem in comparing different road networks is establishing criteria that can be used to scale networks in terms of their structures. Based on data from Orange and Hillsborough Counties in Florida, road network structural properties within TAZs were scaled using 3 indices: Closeness Centrality, Betweenness Centrality, and Meshedness Coefficient. The Meshedness Coefficient performed best in capturing the structural features of the road network. Bayesian Conditional Autoregressive (CAR) models were developed to assess the safety of various network configurations as measured by total crashes, crashes on state roads, and crashes on local roads. The models' results showed that crash frequencies on local roads were closely related to factors within the TAZs (e.g., zonal network structure, TAZ population), while crash frequencies on state roads were closely related to the road and traffic features of state roads. For the safety effects of different networks, the Grid type was associated with the highest frequency of crashes, followed by the Mixed type, the Loops & Lollipops type, and the Sparse type. This study shows that it is possible to develop a quantitative scale for structural properties of a road network, and to use that scale to calculate the relationships between network structural properties and safety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. An online expert network for high quality information on occupational safety and health: cross-sectional study of user satisfaction and impact

    Directory of Open Access Journals (Sweden)

    Rhebergen Martijn DF

    2011-11-01

    Full Text Available Abstract Background Many people have difficulties finding information on health questions, including occupational safety and health (OSH issues. One solution to alleviate these difficulties could be to offer questioners free-of-charge, online access to a network of OSH experts who provide tailored, high-quality information. The aim of this study was to assess whether network quality, respectively information quality, as perceived by the questioners, is associated with questioners' overall satisfaction and to explore the impact of the information received on questioners' knowledge, work and work functioning. Methods We evaluated the experiences of OSH questioners with the online network ArboAntwoord.com over a two-year period. In this network, approximately 80 qualified experts are available to answer OSH questions. By means of a questionnaire, we assessed questioners' overall satisfaction with the network, whether the network was user-friendly, easily accessible and easy to handle and whether the information provided was complete, applicable and received in a timely manner. The impact of the information on questioners' knowledge, work or work functioning was explored with seven questions. In the study period, 460 unique OSH questioners asked 851 OSH questions. In total, 205 of the 460 questioners completed the questionnaire (response rate 45%. Results Of the responders, 71% were satisfied with the ArboAntwoord network. Multiple logistic regression analysis showed that the applicability of the information had a positive influence on the questioners' overall satisfaction (OR = 16.0, 95% CI: 7.0-36.4. Also, user friendliness of the network (OR = 3.3, 95% CI: 1.3-8.6 and completeness of the information provided (OR = 3.0, 95% CI: 1.3-6.8 were positively related to the questioners' satisfaction. For 74% of the questioners, the information helped to increase their knowledge and understanding. Overall, 25% of the questioners indicated that the received

  8. An online expert network for high quality information on occupational safety and health: cross-sectional study of user satisfaction and impact.

    Science.gov (United States)

    Rhebergen, Martijn D F; Lenderink, Annet F; van Dijk, Frank J H; Hulshof, Carel T J

    2011-11-23

    Many people have difficulties finding information on health questions, including occupational safety and health (OSH) issues. One solution to alleviate these difficulties could be to offer questioners free-of-charge, online access to a network of OSH experts who provide tailored, high-quality information. The aim of this study was to assess whether network quality, respectively information quality, as perceived by the questioners, is associated with questioners' overall satisfaction and to explore the impact of the information received on questioners' knowledge, work and work functioning. We evaluated the experiences of OSH questioners with the online network ArboAntwoord.com over a two-year period. In this network, approximately 80 qualified experts are available to answer OSH questions. By means of a questionnaire, we assessed questioners' overall satisfaction with the network, whether the network was user-friendly, easily accessible and easy to handle and whether the information provided was complete, applicable and received in a timely manner. The impact of the information on questioners' knowledge, work or work functioning was explored with seven questions. In the study period, 460 unique OSH questioners asked 851 OSH questions. In total, 205 of the 460 questioners completed the questionnaire (response rate 45%). Of the responders, 71% were satisfied with the ArboAntwoord network. Multiple logistic regression analysis showed that the applicability of the information had a positive influence on the questioners' overall satisfaction (OR = 16.0, 95% CI: 7.0-36.4). Also, user friendliness of the network (OR = 3.3, 95% CI: 1.3-8.6) and completeness of the information provided (OR = 3.0, 95% CI: 1.3-6.8) were positively related to the questioners' satisfaction. For 74% of the questioners, the information helped to increase their knowledge and understanding. Overall, 25% of the questioners indicated that the received information improved their work, work functioning

  9. A unified plant information network

    International Nuclear Information System (INIS)

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  10. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  11. Managing knowledge and information on nuclear safety

    International Nuclear Information System (INIS)

    Hahn, L.

    2005-01-01

    Described is the management of nuclear safety knowledge through education networks, knowledge pool, sharing, archiving and distributing the knowledge information. Demonstrated is the system used at Gesellschaft fuer Anlagen-und Reaktorsicherheit

  12. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  13. Safety and security profiles of industry networks used in safety- critical applications

    Directory of Open Access Journals (Sweden)

    Mária FRANEKOVÁ

    2008-01-01

    Full Text Available The author describes the mechanisms of safety and security profiles of industry and communication networks used within safety – related applications in technological and information levels of process control recommended according to standards IEC 61784-3,4. Nowadays the number of vendors of the safety – related communication technologies who guarantees besides the standard communication, the communication amongst the safety – related equipment according to IEC 61508 is increasing. Also the number of safety – related products is increasing, e. g. safety Fieldbus, safety PLC, safety curtains, safety laser scanners, safety buttons, safety relays and other. According to world survey the safety Fieldbus denoted the highest growth from all manufactured safety products.The main part of this paper is the description of the safety-related Fieldbus communication system, which has to guaranty Safety Integrity Level.

  14. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  15. International exchange of safety and licensing information

    International Nuclear Information System (INIS)

    Lafleur, J.D. Jr.; Hauber, R.D.; Chenier, D.M.

    1977-01-01

    A network of formal and informal bilateral arrangements for the exchange of nuclear safety information is being established by the U.S. Nuclear Regulatory Commission. For developing countries, such arrangements can provide ready access to the extensive, fully documented safety analyses and safety research results that NRC has accumulated. NRC has been receiving foreign visitors at a rate of about 500 per year, largely for discussions of safety and licensing questions related to light water reactors. Exchanges also are taking place on the safety of advanced reactors. A special interest of the NRC is in providing for reciprocal communicaion, at the earliest possible time, of important problems, decisions and other actions on nuclear safety matters. For example, it is essential that a newly-discovered problem in a nuclear reactor be brought immediately to the attention of other governments which are responsible for the safety of similar reactors. Definite progress has been made in the U.S. Freedom of Information Act. Certain exchanges have taken place on this basis. Experience in the establishment and operation of NRC's bilateral exchange arrangements is summarized. A typical exchange with the regulatory authority of country building its first power reactor is described

  16. INFORMATION CULTURE AND INFORMATION SAFETY OF SCHOOLCHILDREN

    Directory of Open Access Journals (Sweden)

    E. G. Belyakova

    2017-01-01

    Full Text Available Introduction. The article is devoted to the problem of interaction between schoolchildren and possible informational risks transmitted on the Internet. Considering the lack of external filters on the way of harmful information streams, it is actually necessary to develop information culture of schoolchildren, their abilities to sensibly and critically interpret the information on the Internet, and choice of adequate behaviour models surfing the Web. The aim of the present research is to analyze the state of informational safety of schoolchildren while using the Internet; gaining an understanding of the role of external restrictions and opportunities of intrapersonal filtration of the harmful Internet content depending on children age. Methodology and research methods. The methodology of the research is based on modern methods aimed to consider the problem of personal socialization in modern information society. Thus, the Internet Initiatives Development Fund (IIDF questionnaire let the authors define the level of awareness of recipients on the problem under consideration. Results and scientific novelty. The theoretical analysis helped the authors predict the correlation of basic methods in order to guarantee personal safety of schoolchildren taking into account the process of maturity as well as the decrease of external filters that may stop harmful content. Empirical part of the research has enabled to reveal decrease in external control of staying of a child in network in the process of growing up against the background of restrictive attitudes prevalence among teachers and parents. Therefore, the research supposed to improve information culture of schoolchildren from the earliest ages encouraging them to sensibly and correctly interpret the information on the Internet. Practical significance. The practical recommendations to parents and teachers in order to improve informational personal safety of schoolchildren are proposed. The relevancy

  17. International exchange of safety and licensing information

    International Nuclear Information System (INIS)

    Lafleur, J.D. Jr.; Hauber, R.D.; Chenier, D.M.

    1977-01-01

    A network of formal and informal bilateral arrangements for the exchange of nuclear safety information is being established by the US Nuclear Regulatory Commission. For developing countries such arrangements can provide ready access to the extensive, fully documented safety analyses and safety research results that USNRC has accumulated. USNRC has been receiving foreign visitors at a rate of about 500 per year, largely for discussions of safety and licensing questions related to light water reactors. Exchanges also are taking place on the safety of advanced reactors. A special interest of the USNRC is in providing for reciprocal communication, at the earliest possible time, of important problems, decisions and other actions on nuclear safety matters. For example, it is essential that a newly discovered problem in a nuclear reactor be brought immediately to the attention of other governments that are responsible for the safety of similar reactors. Definite progress has been made in the USA in defining categories of information that USNRC can receive in confidence from foreign countries, and can protect from disclosure under the US Freedom of Information Act. Certain exchanges have taken place on this basis. Experience in the establishment and operation of USNRC's bilateral exchange arrangements is summarized. A typical exchange with the regulatory authority of a country building its first power reactor is described. (author)

  18. An online expert network for high quality information on occupational safety and health: cross-sectional study of user satisfaction and impact

    NARCIS (Netherlands)

    Rhebergen, Martijn D. F.; Lenderink, Annet F.; van Dijk, Frank J. H.; Hulshof, Carel T. J.

    2011-01-01

    Many people have difficulties finding information on health questions, including occupational safety and health (OSH) issues. One solution to alleviate these difficulties could be to offer questioners free-of-charge, online access to a network of OSH experts who provide tailored, high-quality

  19. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  20. Safety culture and subcontractor network governance in a complex safety critical project

    International Nuclear Information System (INIS)

    Oedewald, Pia; Gotcheva, Nadezhda

    2015-01-01

    In safety critical industries many activities are currently carried out by subcontractor networks. Nevertheless, there are few studies where the core dimensions of resilience would have been studied in safety critical network activities. This paper claims that engineering resilience into a system is largely about steering the development of culture of the system towards better ability to anticipate, monitor, respond and learn. Thus, safety culture literature has relevance in resilience engineering field. This paper analyzes practical and theoretical challenges in applying the concept of safety culture in a complex, dynamic network of subcontractors involved in the construction of a new nuclear power plant in Finland, Olkiluoto 3. The concept of safety culture is in focus since it is widely used in nuclear industry and bridges the scientific and practical interests. This paper approaches subcontractor networks as complex systems. However, the management model of the Olkiluoto 3 project is to a large degree a traditional top-down hierarchy, which creates a mismatch between the management approach and the characteristics of the system to be managed. New insights were drawn from network governance studies. - Highlights: • We studied a relevant topical subject safety culture in nuclear new build project. • We integrated safety science challenges and network governance studies. • We produced practicable insights in managing safety of subcontractor networks

  1. Measuring Health Information Dissemination and Identifying Target Interest Communities on Twitter: Methods Development and Case Study of the @SafetyMD Network.

    Science.gov (United States)

    Kandadai, Venk; Yang, Haodong; Jiang, Ling; Yang, Christopher C; Fleisher, Linda; Winston, Flaura Koplin

    2016-05-05

    Little is known about the ability of individual stakeholder groups to achieve health information dissemination goals through Twitter. This study aimed to develop and apply methods for the systematic evaluation and optimization of health information dissemination by stakeholders through Twitter. Tweet content from 1790 followers of @SafetyMD (July-November 2012) was examined. User emphasis, a new indicator of Twitter information dissemination, was defined and applied to retweets across two levels of retweeters originating from @SafetyMD. User interest clusters were identified based on principal component analysis (PCA) and hierarchical cluster analysis (HCA) of a random sample of 170 followers. User emphasis of keywords remained across levels but decreased by 9.5 percentage points. PCA and HCA identified 12 statistically unique clusters of followers within the @SafetyMD Twitter network. This study is one of the first to develop methods for use by stakeholders to evaluate and optimize their use of Twitter to disseminate health information. Our new methods provide preliminary evidence that individual stakeholders can evaluate the effectiveness of health information dissemination and create content-specific clusters for more specific targeted messaging.

  2. Risk assessment of safety data link and network communication in digital safety feature control system of nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Sang Hun; Son, Kwang Seop; Jung, Wondea; Kang, Hyun Gook

    2017-01-01

    Highlights: • Safety data communication risk assessment framework and quantitative scheme were proposed. • Fault-tree model of ESFAS unavailability due to safety data communication failure was developed. • Safety data link and network risk were assessed based on various ESF-CCS design specifications. • The effect of fault-tolerant algorithm reliability of safety data network on ESFAS unavailability was assessed. - Abstract: As one of the safety-critical systems in nuclear power plants (NPPs), the Engineered Safety Feature-Component Control System (ESF-CCS) employs safety data link and network communication for the transmission of safety component actuation signals from the group controllers to loop controllers to effectively accommodate various safety-critical field controllers. Since data communication failure risk in the ESF-CCS has yet to be fully quantified, the ESF-CCS employing data communication systems have not been applied in NPPs. This study therefore developed a fault tree model to assess the data link and data network failure-induced unavailability of a system function used to generate an automated control signal for accident mitigation equipment. The current aim is to provide risk information regarding data communication failure in a digital safety feature control system in consideration of interconnection between controllers and the fault-tolerant algorithm implemented in the target system. Based on the developed fault tree model, case studies were performed to quantitatively assess the unavailability of ESF-CCS signal generation due to data link and network failure and its risk effect on safety signal generation failure. This study is expected to provide insight into the risk assessment of safety-critical data communication in a digitalized NPP instrumentation and control system.

  3. European TSO Network (ETSON) as Important Part of International Nuclear Safety Knowledge Networks

    International Nuclear Information System (INIS)

    Teske, Hartmuth; Dierschow, Frank; Eibl-Schwäger, Carla

    2014-01-01

    Conclusion: • Nuclear networks, including ETSON, are fulfilling their respective and defined specific aims; • Common are such objectives like: – exchange of information; – transfer of knowledge; – support education and training; – collaborate effectively together; – promote coordination and – support harmonization. • Further endeavor are needed to: – Make more significant efforts in promoting the opportunities of collaborative actions; – Use more active the existing features of the modern network tools; – Combine regional or global networks with national web-based knowledge resources by developing and maintaining further the National Nuclear Regulatory Portals. • Nuclear safety and security networks are effectively contributing to build and sustain needed capacities and capabilities

  4. An online network tool for quality information to answer questions about occupational safety and health: usability and applicability

    Directory of Open Access Journals (Sweden)

    van Dijk Frank JH

    2010-10-01

    Full Text Available Abstract Background Common information facilities do not always provide the quality information needed to answer questions on health or health-related issues, such as Occupational Safety and Health (OSH matters. Barriers may be the accessibility, quantity and readability of information. Online Question & Answer (Q&A network tools, which link questioners directly to experts can overcome some of these barriers. When designing and testing online tools, assessing the usability and applicability is essential. Therefore, the purpose of this study is to assess the usability and applicability of a new online Q&A network tool for answers on OSH questions. Methods We applied a cross-sectional usability test design. Eight occupational health experts and twelve potential questioners from the working population (workers were purposively selected to include a variety of computer- and internet-experiences. During the test, participants were first observed while executing eight tasks that entailed important features of the tool. In addition, they were interviewed. Through task observations and interviews we assessed applicability, usability (effectiveness, efficiency and satisfaction and facilitators and barriers in use. Results Most features were usable, though several could be improved. Most tasks were executed effectively. Some tasks, for example searching stored questions in categories, were not executed efficiently and participants were less satisfied with the corresponding features. Participants' recommendations led to improvements. The tool was found mostly applicable for additional information, to observe new OSH trends and to improve contact between OSH experts and workers. Hosting and support by a trustworthy professional organization, effective implementation campaigns, timely answering and anonymity were seen as important use requirements. Conclusions This network tool is a promising new strategy for offering company workers high quality information

  5. European vehicle passive safety network

    NARCIS (Netherlands)

    Wismans, J.S.H.M.; Janssen, E.G.

    1999-01-01

    The general objective of the European Vehicle Passive Safety Network is to contribute to the reduction of the number of road traffic victims in Europe by passive safety measures. The aim of the road safety policy of the European Commission is to reduce the annual total of fatalities to 18000 in

  6. Review of Public Safety in Viewpoint of Complex Networks

    International Nuclear Information System (INIS)

    Gai Chengcheng; Weng Wenguo; Yuan Hongyong

    2010-01-01

    In this paper, a brief review of public safety in viewpoint of complex networks is presented. Public safety incidents are divided into four categories: natural disasters, industry accidents, public health and social security, in which the complex network approaches and theories are need. We review how the complex network methods was developed and used in the studies of the three kinds of public safety incidents. The typical public safety incidents studied by the complex network methods in this paper are introduced, including the natural disaster chains, blackouts on electric power grids and epidemic spreading. Finally, we look ahead to the application prospects of the complex network theory on public safety.

  7. FOOD SAFETY SYSTEMS’ FUNCTIONING IN POLISH NETWORKS OF GROCERY STORES

    Directory of Open Access Journals (Sweden)

    Paweł NOWICKI

    2013-04-01

    Full Text Available This article shows the way how the food safety systems are functioning in Polish networks of grocery stores. The study was conducted in the fourth quarter of 2012 in the south‐eastern Poland. There were chosen three organizations that meet certain conditions: medium size Polish grocery network without participation of foreign capital and up to 30 retail locations within the group. Studies based on a case study model. The research found that regular and unannounced inspections carried out to each store's, impact on increasing safety of food offered and the verification of GHP requirements on the headquarters level has a significant impact on the safety of food offered as well as on the knowledge and behavior of employees. In addition it was found that the verification and analysis of food safety management system is an effective tool for improving food safety. It was also shown that in most cases there is no formal crisis management system for the food protection in the surveyed companies and employees are only informed of what to do in case of an emergency.

  8. Reliability modeling of safety-critical network communication in a digitalized nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Sang Hun; Kim, Hee Eun; Son, Kwang Seop; Shin, Sung Min; Lee, Seung Jun; Kang, Hyun Gook

    2015-01-01

    The Engineered Safety Feature-Component Control System (ESF-CCS), which uses a network communication system for the transmission of safety-critical information from group controllers (GCs) to loop controllers (LCs), was recently developed. However, the ESF-CCS has not been applied to nuclear power plants (NPPs) because the network communication failure risk in the ESF-CCS has yet to be fully quantified. Therefore, this study was performed to identify the potential hazardous states for network communication between GCs and LCs and to develop quantification schemes for various network failure causes. To estimate the risk effects of network communication failures in the ESF-CCS, a fault-tree model of an ESF-CCS signal failure in the containment spray actuation signal condition was developed for the case study. Based on a specified range of periodic inspection periods for network modules and the baseline probability of software failure, a sensitivity study was conducted to analyze the risk effect of network failure between GCs and LCs on ESF-CCS signal failure. This study is expected to provide insight into the development of a fault-tree model for network failures in digital I&C systems and the quantification of the risk effects of network failures for safety-critical information transmission in NPPs. - Highlights: • Network reliability modeling framework for digital I&C system in NPP is proposed. • Hazardous states of network protocol between GC and LC in ESF-CCS are identified. • Fault-tree model of ESF-CCS signal failure in ESF actuation condition is developed. • Risk effect of network failure on ESF-CCS signal failure is analyzed.

  9. Animal Product Safety Information

    Science.gov (United States)

    ... Home Animal & Veterinary Safety & Health Product Safety Information Product Safety Information Share Tweet Linkedin Pin it More ... to report adverse experiences with veterinary drugs. Additional Product Information Questions and Answers: Evanger’s Dog and Cat ...

  10. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  11. Safety Requirements and Modern Technical Requirements in Human Information Systems in Amman Hotels

    OpenAIRE

    Farouq Ahmad Alazzam; Sattam Rakan Allahawiah; Mohammad Nayef Alsarayreh; Kafa Hmoud Abdallah al Nawaiseh

    2015-01-01

    This study aimed to demonstrate the availability of Safety requirements and modern technical requirements in human information systems in Amman hotels. an the most important results of this study is the availability of security and safety requirements in human information systems In Amman hotels and The adequacy of the information that it provided .and show that all departments are not connected by appropriate and effective communication networks in adequate form . Also sophisticated operatin...

  12. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  13. Safety culture and networks of influence

    International Nuclear Information System (INIS)

    Pereira, Carlos Henrique V.; Barroso, Antonio C.O.; Vieira Neto, Antonio S.

    2011-01-01

    This paper analyzes the social networks that influence the formation and maintenance of the safety culture within the Institute of Energy and Nuclear Research (IPEN-CNEN/SP). From the mapping and analysis of social networks, actors with a significant degree of influence were identified. Later using a questionnaire, the beliefs of the population sample were mapped. Thus, the importance of key actors in the network analysis could be confirmed statistically. Therefore, based on the mentioned methods we could demonstrate our hypothesis, that there are some social networks that are important in the formation of safety culture, as well as the fact that the influence of some distinguished actors plays an essential role in this amalgam. (author)

  14. Safety culture and networks of influence

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Carlos Henrique V.; Barroso, Antonio C.O.; Vieira Neto, Antonio S., E-mail: carloshvp@usp.br, E-mail: barroso@ipen.br, E-mail: asvneto@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2011-07-01

    This paper analyzes the social networks that influence the formation and maintenance of the safety culture within the Institute of Energy and Nuclear Research (IPEN-CNEN/SP). From the mapping and analysis of social networks, actors with a significant degree of influence were identified. Later using a questionnaire, the beliefs of the population sample were mapped. Thus, the importance of key actors in the network analysis could be confirmed statistically. Therefore, based on the mentioned methods we could demonstrate our hypothesis, that there are some social networks that are important in the formation of safety culture, as well as the fact that the influence of some distinguished actors plays an essential role in this amalgam. (author)

  15. Safety evaluation of large ventilation networks

    International Nuclear Information System (INIS)

    Barrocas, M.; Pruchon, P.; Robin, J.P.; Rouyer, J.L.; Salmon, P.

    1981-01-01

    For large ventilation networks, it is necessary to make a safety evaluation of their responses to perturbations such as blower failure, unexpected transfers, local pressurization. This evaluation is not easy to perform because of the many interrelationships between the different parts of the networks, interrelationships coming from the circulations of workers and matetials between cells and rooms and from the usefulness of air transfers through zones of different classifications. This evaluation is all the more necessary since new imperatives in energy savings push for minimizing the air flows, which tends to render the network more sensitive to perturbations. A program to evaluate safety has been developed by the Service de Protection Technique in cooperation with operators and designers of big nuclear facilities and the first applications presented here show the weak points of the installation studied from the safety view point

  16. Information systems in food safety management.

    Science.gov (United States)

    McMeekin, T A; Baranyi, J; Bowman, J; Dalgaard, P; Kirk, M; Ross, T; Schmid, S; Zwietering, M H

    2006-12-01

    Information systems are concerned with data capture, storage, analysis and retrieval. In the context of food safety management they are vital to assist decision making in a short time frame, potentially allowing decisions to be made and practices to be actioned in real time. Databases with information on microorganisms pertinent to the identification of foodborne pathogens, response of microbial populations to the environment and characteristics of foods and processing conditions are the cornerstone of food safety management systems. Such databases find application in: Identifying pathogens in food at the genus or species level using applied systematics in automated ways. Identifying pathogens below the species level by molecular subtyping, an approach successfully applied in epidemiological investigations of foodborne disease and the basis for national surveillance programs. Predictive modelling software, such as the Pathogen Modeling Program and Growth Predictor (that took over the main functions of Food Micromodel) the raw data of which were combined as the genesis of an international web based searchable database (ComBase). Expert systems combining databases on microbial characteristics, food composition and processing information with the resulting "pattern match" indicating problems that may arise from changes in product formulation or processing conditions. Computer software packages to aid the practical application of HACCP and risk assessment and decision trees to bring logical sequences to establishing and modifying food safety management practices. In addition there are many other uses of information systems that benefit food safety more globally, including: Rapid dissemination of information on foodborne disease outbreaks via websites or list servers carrying commentary from many sources, including the press and interest groups, on the reasons for and consequences of foodborne disease incidents. Active surveillance networks allowing rapid dissemination

  17. A Real-Time Construction Safety Monitoring System for Hazardous Gas Integrating Wireless Sensor Network and Building Information Modeling Technologies.

    Science.gov (United States)

    Cheung, Weng-Fong; Lin, Tzu-Hsuan; Lin, Yu-Cheng

    2018-02-02

    In recent years, many studies have focused on the application of advanced technology as a way to improve management of construction safety management. A Wireless Sensor Network (WSN), one of the key technologies in Internet of Things (IoT) development, enables objects and devices to sense and communicate environmental conditions; Building Information Modeling (BIM), a revolutionary technology in construction, integrates database and geometry into a digital model which provides a visualized way in all construction lifecycle management. This paper integrates BIM and WSN into a unique system which enables the construction site to visually monitor the safety status via a spatial, colored interface and remove any hazardous gas automatically. Many wireless sensor nodes were placed on an underground construction site and to collect hazardous gas level and environmental condition (temperature and humidity) data, and in any region where an abnormal status is detected, the BIM model will alert the region and an alarm and ventilator on site will start automatically for warning and removing the hazard. The proposed system can greatly enhance the efficiency in construction safety management and provide an important reference information in rescue tasks. Finally, a case study demonstrates the applicability of the proposed system and the practical benefits, limitations, conclusions, and suggestions are summarized for further applications.

  18. HySafe - The Network of Excellence for Hydrogen Safety

    International Nuclear Information System (INIS)

    Jordan, T.

    2006-01-01

    Safety always has been a critical issue for innovations as it influences the economic attractiveness and public acceptance of any new idea. Furthermore, a fair market for trading innovative products has to be based on homogenized legal regulations, which usually refer commonly accepted standards. Ideally, these standards should be the unique outcome of safety assessments, based on profound and concerted pre-normative research work. However, in Europe the research related to hydrogen safety is still fragmented. This was the reason for the European Commission to support the needed integration and focusing of the related efforts with the help of a new instrument, the so-called Networks of Excellence NoE. So, the goal of NoE HySafe is to provide the basis to facilitate the safe introduction of hydrogen as an energy carrier, by removing the described safety related obstacles. The network is constituted by 24 partners from 12 European countries and from Canada, representing private industries, especially from the automotive sector, universities and research institutions. More than 120 scientists perform integrative work in 15 work packages. A biennial report on Hydrogen Safety is going to be published, the available experimental facilities have been catalogued and qualified, educational programs are designed. After the first successful International Conference on Hydrogen Safety the second will be organized 2007 in San Sebastian, Spain. The European codes and standards activities will be supported by scientifically based information formulated in the HySafe position papers. The web-site www.hysafe.net offers a versatile platform for internal and external communication. The further work program is orientated not only at the results of a state-of-the-art report and a PIRT analysis performed within the NoE but also complies with the needs identified in the external network including other European projects related to hydrogen like StorHy, HyWays and NATURALHY. By shifting

  19. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  20. Lessons learned in building a global information network on chemicals (GINC)

    International Nuclear Information System (INIS)

    Kaminuma, Tsuguchika

    2005-01-01

    The Global Information Network on Chemicals (GINC) was a project to construct a worldwide information network linking international, national, and other organizations working for the safe management of chemicals. Proposed in 1993, the project started the next year and lasted almost 10 years. It was begun as a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP), and later endorsed by the Intergovernmental Forum on Chemical Safety (IFCS). Asia, particularly East Asia and the Pacific islands, was chosen as the feasibility study region. The author's group then at the National Institute of Health Sciences (NIHS) of Japan led this initiative and hosted numerous meetings. At these meetings, tutorial sessions for communicating chemical safety expertise and emerging new information technologies relevant to the safe management of chemicals were offered. Our experience with this project, particularly the Web-based system and the tutorial sessions, may be of use to others involved with Web-based instruction and the training of chemical safety specialists from both developed and developing countries

  1. Social network in patient safety: Social media visibility

    Directory of Open Access Journals (Sweden)

    Azucena Santillán García

    2011-11-01

    Full Text Available Internet social network (social media is a powerful communication tool, and its use is expanding significantly. This paper seeks to know the current state of visibility in online social networks of active citizen talking about patient safety. This is an observational cross-sectional study whose target population is the websites Facebook, Twitter and Tuenti in Spain. By three consecutive cuts social profiles were found using the searching terms “seguridad+paciente” and “safety+patient”. There were found 5 profiles on Facebook that met the search criteria, 6 on Twitter and none were found on Tuenti. It is concluded that although there is evidence of the rise of social networking, citizen network involved in patient safety appears not to be significantly represented within the social networks examined.

  2. Development of Broadband Nuclear Safety Data Network (B-NSDN)

    International Nuclear Information System (INIS)

    Son, Gwang Seop; Kim, Dong Hoon; Park, Gi Yong

    2011-01-01

    Recently as introducing digital safety system in nuclear power plant, more data transmission capacity is required. Bandwidth of existing communication network is about a few Mbps. Thus data transmission quantity in recently digital safety system is beyond existing communication network's capacity. In this paper, new protocol that is suitable for safety system communication network is designed. FPGA based communication system is implemented. As result of test, effective bandwidth of B-NSDN is about 20Mbps

  3. Probabilistic safety assessment model in consideration of human factors based on object-oriented bayesian networks

    International Nuclear Information System (INIS)

    Zhou Zhongbao; Zhou Jinglun; Sun Quan

    2007-01-01

    Effect of Human factors on system safety is increasingly serious, which is often ignored in traditional probabilistic safety assessment methods however. A new probabilistic safety assessment model based on object-oriented Bayesian networks is proposed in this paper. Human factors are integrated into the existed event sequence diagrams. Then the classes of the object-oriented Bayesian networks are constructed which are converted to latent Bayesian networks for inference. Finally, the inference results are integrated into event sequence diagrams for probabilistic safety assessment. The new method is applied to the accident of loss of coolant in a nuclear power plant. the results show that the model is not only applicable to real-time situation assessment, but also applicable to situation assessment based certain amount of information. The modeling complexity is kept down and the new method is appropriate to large complex systems due to the thoughts of object-oriented. (authors)

  4. The Decision of Information Safety Problems at Processing of the Biometric Personal Data

    Directory of Open Access Journals (Sweden)

    Y. G. Gorshkov

    2010-03-01

    Full Text Available The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. Directions of works are formulated on safety of the personal biometric data transferred in telecommunication systems.

  5. Safety campaigns. TIS Launches New Safety Information Campaign

    CERN Multimedia

    2001-01-01

    Need to start a new installation and worried about safety aspects? Or are you newly responsible for safety matters in a CERN building? Perhaps you're simply interested in how to make the working environment safer for yourself and your colleagues. Whatever the case, a new information campaign launched by TIS this week can help. The most visible aspects of the new campaign will be posters distributed around the Laboratory treating a different subject each month. The Web site - http://safety.cern.ch/ - which provides all safety related information. But these are not the only aspects of the new campaign. Members of the TIS/GS group, whose contact details can be found on the safety web site, are available to give information and advice on a one-to-one basis at any time. The campaign's launch has been timed to coincide with European Safety Week, organized by the European Agency for Safety and Health at Work and the subject treated in the first posters is safety inspection. This particular topic only concerns thos...

  6. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  7. Road network safety evaluation using Bayesian hierarchical joint model.

    Science.gov (United States)

    Wang, Jie; Huang, Helai

    2016-05-01

    Safety and efficiency are commonly regarded as two significant performance indicators of transportation systems. In practice, road network planning has focused on road capacity and transport efficiency whereas the safety level of a road network has received little attention in the planning stage. This study develops a Bayesian hierarchical joint model for road network safety evaluation to help planners take traffic safety into account when planning a road network. The proposed model establishes relationships between road network risk and micro-level variables related to road entities and traffic volume, as well as socioeconomic, trip generation and network density variables at macro level which are generally used for long term transportation plans. In addition, network spatial correlation between intersections and their connected road segments is also considered in the model. A road network is elaborately selected in order to compare the proposed hierarchical joint model with a previous joint model and a negative binomial model. According to the results of the model comparison, the hierarchical joint model outperforms the joint model and negative binomial model in terms of the goodness-of-fit and predictive performance, which indicates the reasonableness of considering the hierarchical data structure in crash prediction and analysis. Moreover, both random effects at the TAZ level and the spatial correlation between intersections and their adjacent segments are found to be significant, supporting the employment of the hierarchical joint model as an alternative in road-network-level safety modeling as well. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Safety Information System Guide

    International Nuclear Information System (INIS)

    Bullock, M.G.

    1977-03-01

    This Guide provides guidelines for the design and evaluation of a working safety information system. For the relatively few safety professionals who have already adopted computer-based programs, this Guide may aid them in the evaluation of their present system. To those who intend to develop an information system, it will, hopefully, inspire new thinking and encourage steps towards systems safety management. For the line manager who is working where the action is, this Guide may provide insight on the importance of accident facts as a tool for moving ideas up the communication ladder where they will be heard and acted upon; where what he has to say will influence beneficial changes among those who plan and control his operations. In the design of a safety information system, it is suggested that the safety manager make friends with a computer expert or someone on the management team who has some feeling for, and understanding of, the art of information storage and retrieval as a new and better means for communication

  9. Knowledge management and networking for enhancing nuclear safety

    International Nuclear Information System (INIS)

    Taniguchi, T.; Lederman, L.

    2004-01-01

    Striving for innovative solutions to enhance efficiency of programme delivery and a wider outreach of its nuclear safety activities, the International Atomic Energy Agency (IAEA) has developed an Integrated Safety Approach as a platform for linking its safety related statutory functions and its many associated activities. The approach recognizes the vital importance of effective management of the knowledge base and builds on the integration between the IAEA's safety standards and all aspects of the provision for their application, including peer reviews and technical meetings to share lessons learned. The IAEA is using knowledge management techniques to develop process flows, map safety knowledge and to promote knowledge sharing. The first practical application was the establishment of a knowledge base related to safety aspects of ageing and long-term operation of nuclear power plants. The IAEA is also promoting and facilitating the establishment of regional nuclear and radiation safety networks to preserve existing knowledge and expertise as well as to strengthen sharing and creation of new knowledge in these fields. Prominent examples are the Asian Nuclear Safety Network established in the frame of the IAEA's Programme on the Safety of Nuclear Installations in South East Asia, Pacific and Far East Countries, and the Ibero-American Radiation Safety Network in the frame of the Ibero-American Forum of Nuclear Regulators. Results to date are most encouraging and suggest that this pioneer work should be extended to other regions and eventually to a global nuclear safety network. Responsive to the need of Member States, the IAEA Secretariat has prepared and made available a large number of up-to-date training packages in nuclear, radiation, transport and waste safety, using IAEA safety standards as a basis. It is also providing instruction to trainers in Member States on the use of these modules. This ensures that the material is properly used and that the IAEA

  10. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  11. The Use of Wireless Sensor Network for Increasing Airport Safety

    Directory of Open Access Journals (Sweden)

    Jakub Kraus

    2013-09-01

    Full Text Available This article deals with the use of wireless sensor networks for increasing safety at airports, respectively for replacing the current monitoring system to ensure safety. The article describes sensor networks and their applications to the identified processes and consideration of financial and safety benefits.

  12. Flu Vaccine Safety Information

    Science.gov (United States)

    ... Influenza Types Seasonal Avian Swine Variant Pandemic Other Flu Vaccine Safety Information Questions & Answers Language: English (US) ... safety of flu vaccines monitored? Egg Allergy Are flu vaccines safe? Flu vaccines have good safety record. ...

  13. Safety vs. reputation: risk controversies in emerging policy networks regarding school safety in the Netherlands

    NARCIS (Netherlands)

    Binkhorst, J.; Kingma, S.F.

    2012-01-01

    This article deals with risk controversies in emerging policy networks regarding school safety in the Netherlands. It offers a grounded account of the interpretations of school risks and safety measures by the various stakeholders of the policy network, in particular, schools, local government and

  14. Access management in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  15. Intersection planning in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  16. Route management in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  17. The Commodity Form of Safety Information

    Directory of Open Access Journals (Sweden)

    Rodrigo Finkelstein

    2015-10-01

    Full Text Available The production of safety information is deemed a vital resource to protect human lives at the work site. The injury rate, lost days, incapacity rate, and fatality rate, are key indicators to prop up labour risk awareness and identify job hazards. However, safety information gets highly distorted because it does not only measure risk but serves as a means of exchange. It determines the amount of money to be swapped between Workers’ Compensation Boards and their client corporations. Moreover, as a depository of exchange value, safety information tends to exert pressure over social reality rather than just being a passive reflection of it. This paper discloses the commodity form of safety information. Based on a political economy of information framework, it identifies, describes, and analyses the safety information commodity in its active role of organizing safety and labour health.

  18. Kowledge-based dynamic network safety calculations. Wissensbasierte dynamische Netzsicherheitsberechnungen

    Energy Technology Data Exchange (ETDEWEB)

    Kulicke, B [Inst. fuer Hochspannungstechnik und Starkstromanlagen, Berlin (Germany); Schlegel, S [Inst. fuer Hochspannungstechnik und Starkstromanlagen, Berlin (Germany)

    1993-06-28

    An important part of network operation management is the estimation and maintenance of the security of supply. So far the control personnel has only been supported by static network analyses and safety calculations. The authors describe an expert system, which is coupled to a real time simulation program on a transputer basis, for dynamic network safety calculations. They also introduce the system concept and the most important functions of the expert system. (orig.)

  19. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  20. Providing public information in the Slovenian Nuclear Safety Administration

    International Nuclear Information System (INIS)

    Fon Jager, Mojca

    2000-01-01

    these activities were organized by the IAEA. For several years the SNSA has been endeavoring to maintain continuity in translating some of the basic IAEA publications stated below: Code on the Safety on Nuclear Power Plants: Siting, Code on the Safety of Nuclear Power Plants Quality Assurance, Code on safety of Nuclear Power Plants: Operation, Code on safety of Nuclear Power Plants: Design, Code on safety of Nuclear Power Plants: Governmental Organization, The safety Nuclear Installations, Intervention Criteria in a Nuclear or Radiation Emergency, Establishing a National System for Radioactive Waste Management, The Principles of Radioactive Management, Radiation Protection and the Safety of Radiation Sources, International Basic Safety Standards for Protection Against Ionizing Radiation and for the Safety of radiation Sources. This publications are distributed free of charge to the institutions concerned. The SNSA also continues sending data to the international network in the field of nuclear and radiation safety NucNet ad distributing the NucNet data to the interested media in Slovenia. Every year the SNSA, the distributor for Slovenia, investigates the interest of media and others in this kind of information and updates the list of receivers. All research work and studies being financed by the SNSA are public and available at the SNSA Library and the international missions' reports are available from the National and University Library, the Central Technical Library, Ljubljana and the University Library, Maribor. (author)

  1. EXPERIENCE NETWORKING UNIVERSITY OF EDUCATION TRAINING MASTERS SAFETY OF LIFE

    Directory of Open Access Journals (Sweden)

    Elvira Mikhailovna Rebko

    2016-02-01

    Full Text Available The article discloses experience networking of universities (Herzen State Pedagogical University and Sakhalin State University in the development and implementation of joint training programs for master’s education in the field of life safety «Social security in the urban environment». The novelty of the work is to create a schematic design of basic educational training program for master’s education in the mode of networking, and to identify effective instructional techniques and conditions of networking.Purpose – present the results of the joint development of a network of the basic educational program (BEP, to identify the stages of networking, to design a generalized scheme of development and implementation of a network of educational training program for master’s education in the field of life safety.Results generalized model of networking partner institutions to develop and implement the basic educational program master.Practical implications: the education process for Master of Education in the field of health and safety in Herzen State Pedagogical University and Sakhalin State University.

  2. Network analytical tool for monitoring global food safety highlights China.

    Directory of Open Access Journals (Sweden)

    Tamás Nepusz

    Full Text Available BACKGROUND: The Beijing Declaration on food safety and security was signed by over fifty countries with the aim of developing comprehensive programs for monitoring food safety and security on behalf of their citizens. Currently, comprehensive systems for food safety and security are absent in many countries, and the systems that are in place have been developed on different principles allowing poor opportunities for integration. METHODOLOGY/PRINCIPAL FINDINGS: We have developed a user-friendly analytical tool based on network approaches for instant customized analysis of food alert patterns in the European dataset from the Rapid Alert System for Food and Feed. Data taken from alert logs between January 2003-August 2008 were processed using network analysis to i capture complexity, ii analyze trends, and iii predict possible effects of interventions by identifying patterns of reporting activities between countries. The detector and transgressor relationships are readily identifiable between countries which are ranked using i Google's PageRank algorithm and ii the HITS algorithm of Kleinberg. The program identifies Iran, China and Turkey as the transgressors with the largest number of alerts. However, when characterized by impact, counting the transgressor index and the number of countries involved, China predominates as a transgressor country. CONCLUSIONS/SIGNIFICANCE: This study reports the first development of a network analysis approach to inform countries on their transgressor and detector profiles as a user-friendly aid for the adoption of the Beijing Declaration. The ability to instantly access the country-specific components of the several thousand annual reports will enable each country to identify the major transgressors and detectors within its trading network. Moreover, the tool can be used to monitor trading countries for improved detector/transgressor ratios.

  3. A method for risk-informed safety significance categorization using the analytic hierarchy process and bayesian belief networks

    International Nuclear Information System (INIS)

    Ha, Jun Su; Seong, Poong Hyun

    2004-01-01

    A risk-informed safety significance categorization (RISSC) is to categorize structures, systems, or components (SSCs) of a nuclear power plant (NPP) into two or more groups, according to their safety significance using both probabilistic and deterministic insights. In the conventional methods for the RISSC, the SSCs are quantitatively categorized according to their importance measures for the initial categorization. The final decisions (categorizations) of SSCs, however, are qualitatively made by an expert panel through discussions and adjustments of opinions by using the probabilistic insights compiled in the initial categorization process and combining the probabilistic insights with the deterministic insights. Therefore, owing to the qualitative and linear decision-making process, the conventional methods have the demerits as follows: (1) they are very costly in terms of time and labor, (2) it is not easy to reach the final decision, when the opinions of the experts are in conflict and (3) they have an overlapping process due to the linear paradigm (the categorization is performed twice - first, by the engineers who propose the method, and second, by the expert panel). In this work, a method for RISSC using the analytic hierarchy process (AHP) and bayesian belief networks (BBN) is proposed to overcome the demerits of the conventional methods and to effectively arrive at a final decision (or categorization). By using the AHP and BBN, the expert panel takes part in the early stage of the categorization (that is, the quantification process) and the safety significance based on both probabilistic and deterministic insights is quantified. According to that safety significance, SSCs are quantitatively categorized into three categories such as high safety significant category (Hi), potentially safety significant category (Po), or low safety significant category (Lo). The proposed method was applied to the components such as CC-V073, CV-V530, and SI-V644 in Ulchin Unit

  4. Land use planning in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  5. Social Networking for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  6. Global information network on chemicals (GINC) and its Asian component

    International Nuclear Information System (INIS)

    Kaminuma, Tsuguchika; Nakata, Kotoko

    2003-01-01

    The Global Information Network on Chemicals (GINC) is an effort to build a global information network that links international, national, and other organizations working for the safe management of chemicals in order to exchange information and improve communications. The project was originally proposed in 1993 by one of the authors then at the National Institute of Health Sciences (NIHS) of Japan to the International Program on Chemical Safety (IPCS), which is a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP). The base support system was first implemented at NIHS using the Internet/World Wide Web (WWW) technology in 1995. The project was then endorsed by the Intergovernmental Forum on Chemical Safety (IFCS) and was adopted by the Inter-Organization Program for the Sound Management of Chemicals (IOMC). However, the base system (http://www.nihs.go.jp/GINC/index.html) has been developed and maintained solely by the NIHS group under the support of the Ministry of Health and Welfare (MHW), Japan. Asia, particularly East Asia and the Pacific region, was chosen as the feasibility study region for this project. During the period from December 1994 to July 2002, NIHS hosted eight meetings on this project held in Tokyo

  7. Safety evaluation of ventilation networks in case of fire

    International Nuclear Information System (INIS)

    Perdriau, P.; Pourprix, M.; Raboin, S.; Rouyer, J.L.; Tarrago, X.

    1983-01-01

    Several teams from CEA have cooperated to produce a code for modeling ventilation networks under accidental conditions in nuclear facilities. The objective is to study responses to a network to perturbations which are either mechanical or thermal. Such a tool was necessary for safety and protection studies because ventilation network performances are difficult to evaluate when the network gets complex. There was no requirement for a very sophisticated code, considering the margin of error which generally characterizes the ventilation measurements, but this code should be well validated to become a reliable tool for pointing out safety problems at the design stage and during the operating life of the ventilation system. The code has been called PIAF. It solves a set of equations which simulate a ventilation network in a permanent regime

  8. INTELLIGENT TRAFFIC-SAFETY MIRROR BY USING WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Peter Danišovič

    2014-03-01

    Full Text Available This article is focused on the problematic of traffic safety, dealing with the problem of car intersections with blocked view crossing by a special wireless sensor network (WSN proposed for the traffic monitoring, concretely for vehicle’s detection at places, where it is necessary. Some ultra-low-power TI products were developed due to this reason: microcontroller MSP430F2232, 868MHz RF transceiver CC1101 and LDO voltage regulator TPS7033. The WSN consist of four network nodes supplied with the special safety lightings which serve the function of intelligent traffic safety mirror.

  9. Participatory approach to improving safety, health and working conditions in informal economy workplaces in Cambodia.

    Science.gov (United States)

    Kawakami, Tsuyoshi; Tong, Leng; Kannitha, Yi; Sophorn, Tun

    2011-01-01

    The present study aimed to improve safety and health in informal economy workplaces such as home workplaces, small construction sites, and rural farms in Cambodia by using "participatory" approach. The government, workers' and employers' organizations and NGOs jointly assisted informal economy workers in improving safety and health by using participatory training methodologies. The steps taken were: (1) to collect existing good practices in safety and health in Cambodia; (2) to develop new participatory training programmes for home workers and small construction sites referring to ILO's WISE training programme, and (3) to train government officers, workers, employers and NGOs as safety and health trainers. The participatory training programmes developed consisted of action-checklists associated with illustrations, good example photo sheets, and texts explaining practical, low-cost improvement measures. The established safety and health trainers reached many informal economy workers through their human networks, and trained them by using the developed participatory training programmes. More than 3,000 informal economy workers were trained and they implemented improvements by using low-cost methods. Participatory training methodologies and active cooperation between the government, workers, employers and NGOs made it possible to provide practical training for those involved in the informal economy workplaces.

  10. Road safety performance indicators for the interurban road network.

    NARCIS (Netherlands)

    Yannis, G. Weijermars, W.A.M. Gitelman, V. Vis, M. Chazirisa, A. Papadimitriou, E. & Lima Azevedo, C.

    2013-01-01

    Various road safety performance indicators (SPIs) have been proposed for different road safety research areas, mainly as regards driver behaviour (e.g. seat belt use, alcohol, drugs, etc.) and vehicles (e.g. passive safety); however, no SPIs for the road network and design have been developed. The

  11. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  12. Road safety performance indicators for the interurban road network.

    Science.gov (United States)

    Yannis, George; Weijermars, Wendy; Gitelman, Victoria; Vis, Martijn; Chaziris, Antonis; Papadimitriou, Eleonora; Azevedo, Carlos Lima

    2013-11-01

    Various road safety performance indicators (SPIs) have been proposed for different road safety research areas, mainly as regards driver behaviour (e.g. seat belt use, alcohol, drugs, etc.) and vehicles (e.g. passive safety); however, no SPIs for the road network and design have been developed. The objective of this research is the development of an SPI for the road network, to be used as a benchmark for cross-region comparisons. The developed SPI essentially makes a comparison of the existing road network to the theoretically required one, defined as one which meets some minimum requirements with respect to road safety. This paper presents a theoretical concept for the determination of this SPI as well as a translation of this theory into a practical method. Also, the method is applied in a number of pilot countries namely the Netherlands, Portugal, Greece and Israel. The results show that the SPI could be efficiently calculated in all countries, despite some differences in the data sources. In general, the calculated overall SPI scores were realistic and ranged from 81 to 94%, with the exception of Greece where the SPI was relatively lower (67%). However, the SPI should be considered as a first attempt to determine the safety level of the road network. The proposed method has some limitations and could be further improved. The paper presents directions for further research to further develop the SPI. Copyright © 2012 Elsevier Ltd. All rights reserved.

  13. National Network for Immunization Information

    Science.gov (United States)

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  14. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  15. Health professional networks as a vector for improving healthcare quality and safety: a systematic review.

    Science.gov (United States)

    Cunningham, Frances C; Ranmuthugala, Geetha; Plumb, Jennifer; Georgiou, Andrew; Westbrook, Johanna I; Braithwaite, Jeffrey

    2012-03-01

    While there is a considerable corpus of theoretical and empirical literature on networks within and outside of the health sector, multiple research questions are yet to be answered. To conduct a systematic review of studies of professionals' network structures, identifying factors associated with network effectiveness and sustainability, particularly in relation to quality of care and patient safety. The authors searched MEDLINE, CINAHL, EMBASE, Web of Science and Business Source Premier from January 1995 to December 2009. A majority of the 26 unique studies identified used social network analysis to examine structural relationships in networks: structural relationships within and between networks, health professionals and their social context, health collaboratives and partnerships, and knowledge sharing networks. Key aspects of networks explored were administrative and clinical exchanges, network performance, integration, stability and influences on the quality of healthcare. More recent studies show that cohesive and collaborative health professional networks can facilitate the coordination of care and contribute to improving quality and safety of care. Structural network vulnerabilities include cliques, professional and gender homophily, and over-reliance on central agencies or individuals. Effective professional networks employ natural structural network features (eg, bridges, brokers, density, centrality, degrees of separation, social capital, trust) in producing collaboratively oriented healthcare. This requires efficient transmission of information and social and professional interaction within and across networks. For those using networks to improve care, recurring success factors are understanding your network's characteristics, attending to its functioning and investing time in facilitating its improvement. Despite this, there is no guarantee that time spent on networks will necessarily improve patient care.

  16. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  17. 40 CFR 68.65 - Process safety information.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) CHEMICAL ACCIDENT PREVENTION PROVISIONS Program 3 Prevention Program § 68.65 Process safety... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Process safety information. 68.65... compilation of written process safety information before conducting any process hazard analysis required by...

  18. Analysis and design on airport safety information management system

    Directory of Open Access Journals (Sweden)

    Yan Lin

    2017-01-01

    Full Text Available Airport safety information management system is the foundation of implementing safety operation, risk control, safety performance monitor, and safety management decision for the airport. The paper puts forward the architecture of airport safety information management system based on B/S model, focuses on safety information processing flow, designs the functional modules and proposes the supporting conditions for system operation. The system construction is helpful to perfecting the long effect mechanism driven by safety information, continually increasing airport safety management level and control proficiency.

  19. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  20. A study on methodologies for assessing safety critical network's risk impact on Nuclear Power Plant

    International Nuclear Information System (INIS)

    Lim, T. J.; Lee, H. J.; Park, S. K.; Seo, S. J.

    2006-08-01

    The objectives of this project is to investigate and study existing reliability analysis techniques for communication networks in order to develop reliability analysis models for Nuclear Power Plant's safety-critical networks. It is necessary to make a comprehensive survey of current methodologies for communication network reliability. Major outputs of the first year study are design characteristics of safety-critical communication networks, efficient algorithms for quantifying reliability of communication networks, and preliminary models for assessing reliability of safety-critical communication networks

  1. Social but safe? Quality and safety of diabetes-related online social networks.

    Science.gov (United States)

    Weitzman, Elissa R; Cole, Emily; Kaci, Liljana; Mandl, Kenneth D

    2011-05-01

    To foster informed decision-making about health social networking (SN) by patients and clinicians, the authors evaluated the quality/safety of SN sites' policies and practices. Multisite structured observation of diabetes-focused SN sites. Measurements 28 indicators of quality and safety covering: (1) alignment of content with diabetes science and clinical practice recommendations; (2) safety practices for auditing content, supporting transparency and moderation; (3) accessibility of privacy policies and the communication and control of privacy risks; and (4) centralized sharing of member data and member control over sharing. Quality was variable across n=10 sites: 50% were aligned with diabetes science/clinical practice recommendations with gaps in medical disclaimer use (30% have) and specification of relevant glycosylated hemoglobin levels (0% have). Safety was mixed with gaps in external review approaches (20% used audits and association links) and internal review approaches (70% use moderation). Internal safety review offers limited protection: misinformation about a diabetes 'cure' was found on four moderated sites. Of nine sites with advertising, transparency was missing on five; ads for unfounded 'cures' were present on three. Technological safety was poor with almost no use of procedures for secure data storage and transmission; only three sites support member controls over personal information. Privacy policies' poor readability impedes risk communication. Only three sites (30%) demonstrated better practice. Limitations English-language diabetes sites only. The quality/safety of diabetes SN is variable. Observed better practice suggests improvement is feasible. Mechanisms for improvement are recommended that engage key stakeholders to balance autonomy, community ownership, conditions for innovation, and consumer protection.

  2. Unavailability analysis of a PWR safety system by a Bayesian network

    International Nuclear Information System (INIS)

    Estevao, Lilian B.; Melo, Paulo Fernando F. Frutuoso e; Rivero, Jose J.

    2013-01-01

    Bayesian networks (BN) are directed acyclic graphs that have dependencies between variables, which are represented by nodes. These dependencies are represented by lines connecting the nodes and can be directed or not. Thus, it is possible to model conditional probabilities and calculate them with the help of Bayes' Theorem. The objective of this paper is to present the modeling of the failure of a safety system of a typical second generation light water reactor plant, the Containment Heat Removal System (CHRS), whose function is to cool the water of containment reservoir being recirculated through the Containment Spray Recirculation System (CSRS). CSRS is automatically initiated after a loss of coolant accident (LOCA) and together with the CHRS cools the reservoir water. The choice of this system was due to the fact that its analysis by a fault tree is available in Appendix II of the Reactor Safety Study Report (WASH-1400), and therefore all the necessary technical information is also available, such as system diagrams, failure data input and the fault tree itself that was developed to study system failure. The reason for the use of a bayesian network in this context was to assess its ability to reproduce the results of fault tree analyses and also verify the feasibility of treating dependent events. Comparing the fault trees and bayesian networks, the results obtained for the system failure were very close. (author)

  3. Toward introduction of risk informed safety regulation. Nuclear Safety Commission taskforce's interim report

    International Nuclear Information System (INIS)

    2006-01-01

    Nuclear Safety Commission's taskforce on 'Introduction of Safety Regulation Utilizing Risk Information' completed the interim report on its future subjects and directions in December 2005. Although current safety regulatory activities have been based on deterministic approach, this report shows the risk informed approach is expected to be very useful for making nuclear safety regulation and assurance activities reasonable and also for appropriate allocation of regulatory resources. For introduction of risk informed regulation, it also recommends pileups of experiences with gradual introduction and trial of the risk informed approach, improvement of plant maintenance rules and regulatory requirements utilizing risk information, and establishment of framework to assure quality of risk evaluation. (T. Tanaka)

  4. 49 CFR 211.61 - Informal safety inquiries.

    Science.gov (United States)

    2010-10-01

    ... information on selected topics relating to railroad safety. A notice of each such inquiry will be published in... 49 Transportation 4 2010-10-01 2010-10-01 false Informal safety inquiries. 211.61 Section 211.61..., DEPARTMENT OF TRANSPORTATION RULES OF PRACTICE Miscellaneous Safety-Related Proceedings and Inquiries § 211...

  5. Development of Network Protocol for the Integrated Safety System

    Energy Technology Data Exchange (ETDEWEB)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M. [Hannam Univ., Daejeon (Korea, Republic of)

    2007-06-15

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants.

  6. Development of Network Protocol for the Integrated Safety System

    International Nuclear Information System (INIS)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M.

    2007-06-01

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants

  7. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  8. Reliability estimation of safety-critical software-based systems using Bayesian networks

    International Nuclear Information System (INIS)

    Helminen, A.

    2001-06-01

    Due to the nature of software faults and the way they cause system failures new methods are needed for the safety and reliability evaluation of software-based safety-critical automation systems in nuclear power plants. In the research project 'Programmable automation system safety integrity assessment (PASSI)', belonging to the Finnish Nuclear Safety Research Programme (FINNUS, 1999-2002), various safety assessment methods and tools for software based systems are developed and evaluated. The project is financed together by the Radiation and Nuclear Safety Authority (STUK), the Ministry of Trade and Industry (KTM) and the Technical Research Centre of Finland (VTT). In this report the applicability of Bayesian networks to the reliability estimation of software-based systems is studied. The applicability is evaluated by building Bayesian network models for the systems of interest and performing simulations for these models. In the simulations hypothetical evidence is used for defining the parameter relations and for determining the ability to compensate disparate evidence in the models. Based on the experiences from modelling and simulations we are able to conclude that Bayesian networks provide a good method for the reliability estimation of software-based systems. (orig.)

  9. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  10. Ontology-supported research on vaccine efficacy, safety and integrative biological networks.

    Science.gov (United States)

    He, Yongqun

    2014-07-01

    While vaccine efficacy and safety research has dramatically progressed with the methods of in silico prediction and data mining, many challenges still exist. A formal ontology is a human- and computer-interpretable set of terms and relations that represent entities in a specific domain and how these terms relate to each other. Several community-based ontologies (including Vaccine Ontology, Ontology of Adverse Events and Ontology of Vaccine Adverse Events) have been developed to support vaccine and adverse event representation, classification, data integration, literature mining of host-vaccine interaction networks, and analysis of vaccine adverse events. The author further proposes minimal vaccine information standards and their ontology representations, ontology-based linked open vaccine data and meta-analysis, an integrative One Network ('OneNet') Theory of Life, and ontology-based approaches to study and apply the OneNet theory. In the Big Data era, these proposed strategies provide a novel framework for advanced data integration and analysis of fundamental biological networks including vaccine immune mechanisms.

  11. Safety in numbers? Tackling domestic abuse in couples and network therapies.

    Science.gov (United States)

    Galvani, Sarah A

    2007-03-01

    Family, network or couples-based therapies have been helping to support people with substance problems for decades. Their value in supporting a person to change their alcohol or drug use is clear. However, as links between substance use and domestic abuse are increasingly recognised, these approaches need to reflect on the potential safety risks they present to people taking part. The prevalence of domestic abuse among people receiving drug and alcohol services is considerably higher than general population estimates, yet this does not appear to have been adequately addressed in network therapies. This article suggests that this needs to change and that safety of service users needs to be at least as important as the intervention itself. It offers for debate a number of potential safety issues raised by network therapies where there is evidence of domestic abuse; it provides examples of three approaches used to marshal social and network support in substance interventions; and offers a number of suggestions for how network therapies can ensure their use remains safe and supportive where there is domestic abuse.

  12. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  13. Game theoretic analysis of congestion, safety and security networks, air traffic and emergency departments

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both way...

  14. Safety Case Development as an Information Modelling Problem

    Science.gov (United States)

    Lewis, Robert

    This paper considers the benefits from applying information modelling as the basis for creating an electronically-based safety case. It highlights the current difficulties of developing and managing large document-based safety cases for complex systems such as those found in Air Traffic Control systems. After a review of current tools and related literature on this subject, the paper proceeds to examine the many relationships between entities that can exist within a large safety case. The paper considers the benefits to both safety case writers and readers from the future development of an ideal safety case tool that is able to exploit these information models. The paper also introduces the idea that the safety case has formal relationships between entities that directly support the safety case argument using a methodology such as GSN, and informal relationships that provide links to direct and backing evidence and to supporting information.

  15. Safety control of nuclear power operations using self-programming neural networks

    International Nuclear Information System (INIS)

    Jouse, W.C.; Williams, J.G.

    1993-01-01

    In the design and operation of nuclear reactors, safety-related goals must be embedded in complex multivariate control strategies. It is often the case that the goals exist only as mental models in the mind of the designer or the operator. In order to effect control that is risk averse, the goals must be translated into an effective control strategy that can be both verified and validated. The relation that these safety goals have to a particular architecture of artificial neural network, the Barto-Sutton architecture, is examined and the capability of the network to embed safety goals in nontrivial control tasks is demonstrated. To realize these goals, the network was extended to encompass a multiple-input/multiple-output control structure. The network synthesizes a control schedule through the construction of artificial precursors to failure; these serve as an additional, virtual layer in the defenses against fission product release. The synthesized schedule can be visually inspected for anomalies and inconsistencies and is validated during training

  16. Information cascade on networks

    Science.gov (United States)

    Hisakado, Masato; Mori, Shintaro

    2016-05-01

    In this paper, we discuss a voting model by considering three different kinds of networks: a random graph, the Barabási-Albert (BA) model, and a fitness model. A voting model represents the way in which public perceptions are conveyed to voters. Our voting model is constructed by using two types of voters-herders and independents-and two candidates. Independents conduct voting based on their fundamental values; on the other hand, herders base their voting on the number of previous votes. Hence, herders vote for the majority candidates and obtain information relating to previous votes from their networks. We discuss the difference between the phases on which the networks depend. Two kinds of phase transitions, an information cascade transition and a super-normal transition, were identified. The first of these is a transition between a state in which most voters make the correct choices and a state in which most of them are wrong. The second is a transition of convergence speed. The information cascade transition prevails when herder effects are stronger than the super-normal transition. In the BA and fitness models, the critical point of the information cascade transition is the same as that of the random network model. However, the critical point of the super-normal transition disappears when these two models are used. In conclusion, the influence of networks is shown to only affect the convergence speed and not the information cascade transition. We are therefore able to conclude that the influence of hubs on voters' perceptions is limited.

  17. Discussion about risk-informed regulations on the nuclear safety

    International Nuclear Information System (INIS)

    Gu Yeyi

    2008-01-01

    The article introduces the background and status quo of regulations on the nuclear safety in China, and points out the inadequacies existing with the current regulations. The author explains the risk-informed safety management concerning its development, status quo, and achievements made, in an attempt to make out the trend of improving regulations on the nuclear safety through risk-informed methods. Combining the U.S. development program of establishing risk-informed regulations on the nuclear safety, the author narrates principles and features of the new regulations system, and provides suggestions for the promotion of risk-informed safety management and establishment of risk-informed regulations on the nuclear safety. (author)

  18. Nuclear safety education and training network

    International Nuclear Information System (INIS)

    Bastos, J.; Ulfkjaer, L.

    2004-01-01

    In March 2001, the Secretariat convened an Advisory Group on Education and Training in nuclear safety. The Advisory Group considered structure, scope and means related to the implementation of an IAEA Programme on Education and Training . A strategic plan was agreed and the following outputs were envisaged: 1. A Training Support Programme in nuclear safety, including a standardized and harmonized approach for training developed by the IAEA and in use by Member States. 2. National and regional training centres, established to support sustainable national nuclear safety infrastructures. 3. Training material for use by lecturers and students developed by the IAEA in English and translated to other languages. The implementation of the plan was initiated in 2002 emphasizing the preparation of training materials. In 2003 a pilot project for a network on Education and Training in Asia was initiated

  19. State Traffic Safety Information

    Data.gov (United States)

    Department of Transportation — The State Traffic Safety Information (STSI) portal is part of the larger Fatality Analysis Reporting System (FARS) Encyclopedia. STSI provides state-by-state traffic...

  20. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  1. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  2. An Online Network Tool for Quality Information to Answer Questions about Occupational Safety and Health: Usability and Applicability

    NARCIS (Netherlands)

    Rhebergen, M.D.F.; Hulshof, C.T.J.; Lenderink, A.F.; van Dijk, F.J.H.

    2010-01-01

    ABSTRACT: BACKGROUND: Common information facilities do not always provide the quality information needed to answer questions on health or health-related issues, such as Occupational Safety and Health (OSH) matters. Barriers may be the accessibility, quantity and readability of information. Online

  3. An online network tool for quality information to answer questions about occupational safety and health: usability and applicability

    NARCIS (Netherlands)

    Rhebergen, Martijn D. F.; Hulshof, Carel T. J.; Lenderink, Annet F.; van Dijk, Frank J. H.

    2010-01-01

    Common information facilities do not always provide the quality information needed to answer questions on health or health-related issues, such as Occupational Safety and Health (OSH) matters. Barriers may be the accessibility, quantity and readability of information. Online Question & Answer (Q&A)

  4. Distance-Based Access Modifiers Applied to Safety in Home Networks

    DEFF Research Database (Denmark)

    Mortensen, Kjeld Høyer; Schougaard, Kari Rye; Schultz, Ulrik Pagh

    2004-01-01

    Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of safety: preventing the computerized house from harming the inhabitants, even in a worst-case scenario where...... be performed within a physical proximity that ensures safety. We use a declarative approach integrated with an IDL language to express location-based restrictions on operations. This model has been implemented in a middleware for home audio-video devices, using infrared communication and a local-area network...

  5. Analysis on evaluation ability of nonlinear safety assessment model of coal mines based on artificial neural network

    Institute of Scientific and Technical Information of China (English)

    SHI Shi-liang; LIU Hai-bo; LIU Ai-hua

    2004-01-01

    Based on the integration analysis of goods and shortcomings of various methods used in safety assessment of coal mines, combining nonlinear feature of mine safety sub-system, this paper establishes the neural network assessment model of mine safety, analyzes the ability of artificial neural network to evaluate mine safety state, and lays the theoretical foundation of artificial neural network using in the systematic optimization of mine safety assessment and getting reasonable accurate safety assessment result.

  6. A new information dimension of complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Daijun [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Science, Hubei University for Nationalities, Enshi 445000 (China); Wei, Bo [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Hu, Yong [Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006 (China); Zhang, Haixin [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Deng, Yong, E-mail: ydeng@swu.edu.cn [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Engineering, Vanderbilt University, TN 37235 (United States)

    2014-03-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  7. A new information dimension of complex networks

    International Nuclear Information System (INIS)

    Wei, Daijun; Wei, Bo; Hu, Yong; Zhang, Haixin; Deng, Yong

    2014-01-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  8. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  9. Network information provision to potential generators: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)

  10. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  11. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  12. Views on chemical safety information and influences on chemical disposal behaviour in the UK

    International Nuclear Information System (INIS)

    Hinks, J.; Bush, J.; Andras, P.; Garratt, J.; Pigott, G.; Kennedy, A.; Pless-Mulloli, T.

    2009-01-01

    This study examined how groups representing four tiers in the chemical supply chain (manufacturers, vendors, workers and consumers) understood safety information, and the factors that influenced disposal behaviour. Data from seven, semi-structured, focus groups was analysed both qualitatively (textual analysis) and quantitatively (network analysis). Such combined analytical methods enabled us to achieve both detailed insights into perceptions and behaviour and an objective understanding of the prevailing opinions that occurred within and between the focus group discussions. We found issues around awareness, trust, access and disposal behaviours differed between groups within the supply chain. Participants from the lower tiers perceived chemical safety information to be largely inaccessible. Labels were the main source of information on chemical risks for the middle and bottom tiers of the supply chain. Almost all of the participants were aware of the St Andrew's Cross and skull and crossbones symbols but few were familiar with the Volatile Organic Compound logo or the fish and tree symbol. Both the network and thematic analysis demonstrated that whilst frequent references to health risks associated with chemicals were made environmental risks were usually only articulated after prompting. It is clear that the issues surrounding public understanding of chemical safety labels are highly complex and this is compounded by inconsistencies in the cognitive profiles of chemical users. Substantially different cognitive profiles are likely to contribute towards communication difficulties between different tiers of the supply chain. Further research is needed to examine the most effective ways of communicating chemical hazards information to the public. The findings demonstrate a need to improve and simplify disposal guidance to members of the public, to raise public awareness of the graphic symbols in the CHIP 3.1, 2005 regulations and to improve access to disposal guidance

  13. Optimal Information Processing in Biochemical Networks

    Science.gov (United States)

    Wiggins, Chris

    2012-02-01

    A variety of experimental results over the past decades provide examples of near-optimal information processing in biological networks, including in biochemical and transcriptional regulatory networks. Computing information-theoretic quantities requires first choosing or computing the joint probability distribution describing multiple nodes in such a network --- for example, representing the probability distribution of finding an integer copy number of each of two interacting reactants or gene products while respecting the `intrinsic' small copy number noise constraining information transmission at the scale of the cell. I'll given an overview of some recent analytic and numerical work facilitating calculation of such joint distributions and the associated information, which in turn makes possible numerical optimization of information flow in models of noisy regulatory and biochemical networks. Illustrating cases include quantification of form-function relations, ideal design of regulatory cascades, and response to oscillatory driving.

  14. Inter-American Biodiversity Information Network (IABIN)

    Science.gov (United States)

    site. IABIN Inter-American Biodiversity Information Network (IABIN) OAS » SEDI » DSD » IABIN IABIN GEF Logo inbio natserve usgs polpar wcm The Inter-American Biodiversity Information Network (IABIN , and use of biodiversity information relevant to policy and decision-making on natural resources

  15. Assessing the safety of the road network : a simple method.

    NARCIS (Netherlands)

    Janssen, S.T.M.C.

    1993-01-01

    Research by the SWOV Institute for Road Safety Research in The Netherlands assessing the safety of the Dutch road network is presented. In The Netherlands urban and rural roads and motorways are used roughly equally, however accident rates vary greatly. These are discussed in this paper. Tables show

  16. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  17. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  18. The impact of health information technology on patient safety

    Directory of Open Access Journals (Sweden)

    Yasser K. Alotaibi

    2017-12-01

    Full Text Available Since the original Institute of Medicine (IOM report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety. This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient’s safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  19. The impact of health information technology on patient safety.

    Science.gov (United States)

    Alotaibi, Yasser K; Federico, Frank

    2017-12-01

    Since the original Institute of Medicine (IOM) report was published there has been an accelerated development and adoption of health information technology with varying degrees of evidence about the impact of health information technology on patient safety.  This article is intended to review the current available scientific evidence on the impact of different health information technologies on improving patient safety outcomes. We conclude that health information technology improves patient's safety by reducing medication errors, reducing adverse drug reactions, and improving compliance to practice guidelines. There should be no doubt that health information technology is an important tool for improving healthcare quality and safety. Healthcare organizations need to be selective in which technology to invest in, as literature shows that some technologies have limited evidence in improving patient safety outcomes.

  20. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  1. Environmental safety of the global information space

    Directory of Open Access Journals (Sweden)

    В’ячеслав Степанович Волошин

    2015-03-01

    Databases of full-text publications – journals, articles, monographs- are surely a means of salvation for science. There already exist a large number of such portals. Besides, advantages and disadvantages of electronic subscriptions to periodicals should certainly be considered. The former include the following most evident ones: aggregation of large data arrays, saving money on a subscription, an opportunity to work with relevant publications, thematic collections of materials, availability of records, simultaneous access of an unlimited number of users and others. Nevertheless, there are many disadvantages that make it difficult to work with full-text publications. They are the following: selective representativeness of publication numbers, complexity of keyword search, occasional presence of obsolete text formats, printed versions, possible psychological barrier, physiological incompatibility with computer equipment, fatigue caused by prolonged work on the computer. The Internet was followed by the appearance of global control networks, their aims ranging from control of a human life support to a unified control of humanity. So, the formed global information space promises the man to get access to almost any information source. Meanwhile, environmental safety of the man, his/her objective biological psyche and abilities in harmonious development are at serious risk

  2. Status of DOE information network modifications

    International Nuclear Information System (INIS)

    Fuchs, R.

    1988-01-01

    This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support

  3. 40 CFR 68.48 - Safety information.

    Science.gov (United States)

    2010-07-01

    ...) CHEMICAL ACCIDENT PREVENTION PROVISIONS Program 2 Prevention Program § 68.48 Safety information. (a) The... regulated substances, processes, and equipment: (1) Material Safety Data Sheets that meet the requirements...) Equipment specifications; and (5) Codes and standards used to design, build, and operate the process. (b...

  4. Mass-media information campaigns about road safety. [previously known as: Public information about road safety.

    NARCIS (Netherlands)

    2009-01-01

    In the Netherlands, public information is often used as an instrument to improve road safety. The purpose of each public information campaign is a voluntary and lasting change in traffic behaviour. This requires road users to have sufficient knowledge about a problem and to adapt their behaviour.

  5. Fault-Tree Modeling of Safety-Critical Network Communication in a Digitalized Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sang Hun; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of)

    2015-10-15

    To achieve technical self-reliance for nuclear I and C systems in Korea, the Advanced Power Reactor 1400 (APR-1400) man-machine interface system (MMIS) architecture was developed by the Korea Atomic Energy Research Institute (KAERI). As one of the systems in the developed MMIS architecture, the Engineered Safety Feature-Component Control System (ESF-CCS) employs a network communication system for the transmission of safety-critical information from group controllers (GCs) to loop controllers (LCs) to effectively accommodate the vast number of field controllers. The developed fault-tree model was then applied to several case studies. As an example of the development of a fault-tree model for ESF-CCS signal failure, the fault-tree model of ESF-CCS signal failure for CS pump PP01A in the CSAS condition was designed by considering the identified hazardous states of network failure that would result in a failure to provide input signals to the corresponding LC. The quantitative results for four case studies demonstrated that the probability of overall network communication failure, which was calculated as the sum of the failure probability associated with each failure cause, contributes up to 1.88% of the probability of ESF-CCS signal failure for the CS pump considered in the case studies.

  6. Patient safety goals for the proposed Federal Health Information Technology Safety Center.

    Science.gov (United States)

    Sittig, Dean F; Classen, David C; Singh, Hardeep

    2015-03-01

    The Office of the National Coordinator for Health Information Technology is expected to oversee creation of a Health Information Technology (HIT) Safety Center. While its functions are still being defined, the center is envisioned as a public-private entity focusing on promotion of HIT related patient safety. We propose that the HIT Safety Center leverages its unique position to work with key administrative and policy stakeholders, healthcare organizations (HCOs), and HIT vendors to achieve four goals: (1) facilitate creation of a nationwide 'post-marketing' surveillance system to monitor HIT related safety events; (2) develop methods and governance structures to support investigation of major HIT related safety events; (3) create the infrastructure and methods needed to carry out random assessments of HIT related safety in complex HCOs; and (4) advocate for HIT safety with government and private entities. The convening ability of a federally supported HIT Safety Center could be critically important to our transformation to a safe and effective HIT enabled healthcare system. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Mobile Phone Network Operators' Actions on RF Safety (invited paper)

    International Nuclear Information System (INIS)

    Causebrook, J.H.

    1999-01-01

    The current and possible future global penetration of mobile phone usage is given. Health and safety aspects relate to both the statutory requirements for the operation of their networks and the public perception of risks in using services provided by the operators. The coordination of this work nationally through trade associations is mentioned. GSM is the predominant standard used for the provision of global mobile phone services. The GSM MoU Association is introduced as the operators' coordination body worldwide for dealing with radio frequency (RF) health and safety issues through its sub-group, EBRC. The scope of the EBRC group is presented with the considerations used to determine if external research should be supported by the GSM MoU Association. A personal view is provided on the present quality of worldwide research on RF health and safety and some consideration is given as to what constitutes 'good' research. The mobile phone network operators' involvement in the science and application of epidemiological research is considered. Consideration is given to introducing risk/benefit analysis into the debate on the health and safety of mobile phone usage. The media presentation of the results of scientific work on this topic often leads to a falsely negative public perception of the perceived risks. This is made worse when such perceptions are used for the purposes of objecting to the deployment of network infrastructure. The operators' approach to RF health and safety procedures is outlined, with a clarification of the distinctions between near-field and far-field methodologies for the calculation of physical exclusion zones. It is concluded that the mobile phone operators are part of an industry which is safe and who work to ensure that their operations are seen to be safe in the context of the best available worldwide scientific knowledge and safety guidelines. (author)

  8. Aviation Safety Hotline Information System -

    Data.gov (United States)

    Department of Transportation — The Aviation Safety Hotline Information System (ASHIS) collects, stores, and retrieves reports submitted by pilots, mechanics, cabin crew, passengers, or the public...

  9. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  10. Wireless Sensor Network Safety Study

    OpenAIRE

    M.Shankar; Dr.M.Sridar; Dr.M.Rajani

    2012-01-01

    Few security mechanisms in wireless sensor networks (WSNs) have been implemented, and even fewer have been applied in real deployments. The limited resources of each sensor node makes security in WSNs hard, as the tradeoff between security and practicality must be carefully considered. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact...

  11. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  12. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  13. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  14. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  15. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  16. Improving plant state information for better operational safety

    International Nuclear Information System (INIS)

    Girard, C.; Olivier, E.; Grimaldi, X.

    1994-01-01

    Nuclear Power Plant (NPP) safety is strongly dependent on components' reliability and particularly on plant state information reliability. This information, used by the plant operators in order to produce appropriate actions, have to be of a high degree of confidence, especially in accidental conditions where safety is threatened. In this perspective, FRAMATOME, EDF and CEA have started a joint research program to prospect different solutions aiming at a better reliability for critical information needed to safety operate the plant. This paper gives the main results of this program and describes the developments that have been made in order to assess reliability of different information systems used in a Nuclear Power Plant. (Author)

  17. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  18. Evaluating the impact of connectivity, continuity, and topography of sidewalk network on pedestrian safety.

    Science.gov (United States)

    Osama, Ahmed; Sayed, Tarek

    2017-10-01

    With the increasing demand for sustainability, walking is being encouraged as one of the main active modes of transportation. However, pedestrians are vulnerable to severe injuries when involved in crashes which can discourage road users from walking. Therefore, studying factors that affect the safety of pedestrians is important. This paper investigates the relationship between pedestrian-motorist crashes and various sidewalk network indicators in the city of Vancouver. The goal is to assess the impact of network connectivity, directness, and topography on pedestrian safety using macro-level collision prediction models. The models were developed using generalized linear regression and full Bayesian techniques. Both walking trips and vehicle kilometers travelled were used as the main traffic exposure variables in the models. The safety models supported the safety in numbers hypothesis showing a non-linear positive association between pedestrian-motorist crashes and the increase in walking trips and vehicle traffic. The model results also suggested that higher continuity, linearity, coverage, and slope of sidewalk networks were associated with lower crash occurrence. However, network connectivity was associated with higher crash occurrence. The spatial effects were accounted for in the full Bayes models and were found significant. The models provide insights about the factors that influence pedestrian safety and the spatial variability of pedestrian crashes within a city, which can be useful for the planning of pedestrian networks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Constructing a Bayesian network model for improving safety behavior of employees at workplaces.

    Science.gov (United States)

    Mohammadfam, Iraj; Ghasemi, Fakhradin; Kalatpour, Omid; Moghimbeigi, Abbas

    2017-01-01

    Unsafe behavior increases the risk of accident at workplaces and needs to be managed properly. The aim of the present study was to provide a model for managing and improving safety behavior of employees using the Bayesian networks approach. The study was conducted in several power plant construction projects in Iran. The data were collected using a questionnaire composed of nine factors, including management commitment, supporting environment, safety management system, employees' participation, safety knowledge, safety attitude, motivation, resource allocation, and work pressure. In order for measuring the score of each factor assigned by a responder, a measurement model was constructed for each of them. The Bayesian network was constructed using experts' opinions and Dempster-Shafer theory. Using belief updating, the best intervention strategies for improving safety behavior also were selected. The result of the present study demonstrated that the majority of employees do not tend to consider safety rules, regulation, procedures and norms in their behavior at the workplace. Safety attitude, safety knowledge, and supporting environment were the best predictor of safety behavior. Moreover, it was determined that instantaneous improvement of supporting environment and employee participation is the best strategy to reach a high proportion of safety behavior at the workplace. The lack of a comprehensive model that can be used for explaining safety behavior was one of the most problematic issues of the study. Furthermore, it can be concluded that belief updating is a unique feature of Bayesian networks that is very useful in comparing various intervention strategies and selecting the best one form them. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Information communication on complex networks

    International Nuclear Information System (INIS)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  1. Bayesian-network-based safety risk analysis in construction projects

    International Nuclear Information System (INIS)

    Zhang, Limao; Wu, Xianguo; Skibniewski, Miroslaw J.; Zhong, Jingbing; Lu, Yujie

    2014-01-01

    This paper presents a systemic decision support approach for safety risk analysis under uncertainty in tunnel construction. Fuzzy Bayesian Networks (FBN) is used to investigate causal relationships between tunnel-induced damage and its influential variables based upon the risk/hazard mechanism analysis. Aiming to overcome limitations on the current probability estimation, an expert confidence indicator is proposed to ensure the reliability of the surveyed data for fuzzy probability assessment of basic risk factors. A detailed fuzzy-based inference procedure is developed, which has a capacity of implementing deductive reasoning, sensitivity analysis and abductive reasoning. The “3σ criterion” is adopted to calculate the characteristic values of a triangular fuzzy number in the probability fuzzification process, and the α-weighted valuation method is adopted for defuzzification. The construction safety analysis progress is extended to the entire life cycle of risk-prone events, including the pre-accident, during-construction continuous and post-accident control. A typical hazard concerning the tunnel leakage in the construction of Wuhan Yangtze Metro Tunnel in China is presented as a case study, in order to verify the applicability of the proposed approach. The results demonstrate the feasibility of the proposed approach and its application potential. A comparison of advantages and disadvantages between FBN and fuzzy fault tree analysis (FFTA) as risk analysis tools is also conducted. The proposed approach can be used to provide guidelines for safety analysis and management in construction projects, and thus increase the likelihood of a successful project in a complex environment. - Highlights: • A systemic Bayesian network based approach for safety risk analysis is developed. • An expert confidence indicator for probability fuzzification is proposed. • Safety risk analysis progress is extended to entire life cycle of risk-prone events. • A typical

  2. Bayesian Network Assessment Method for Civil Aviation Safety Based on Flight Delays

    OpenAIRE

    Huawei Wang; Jun Gao

    2013-01-01

    Flight delays and safety are the principal contradictions in the sound development of civil aviation. Flight delays often come up and induce civil aviation safety risk simultaneously. Based on flight delays, the random characteristics of civil aviation safety risk are analyzed. Flight delays have been deemed to a potential safety hazard. The change rules and characteristics of civil aviation safety risk based on flight delays have been analyzed. Bayesian networks (BN) have been used to build ...

  3. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  4. Safety- barrier diagrams

    DEFF Research Database (Denmark)

    Duijm, Nijs Jan

    2008-01-01

    Safety-barrier diagrams and the related so-called 'bow-tie' diagrams have become popular methods in risk analysis. This paper describes the syntax and principles for constructing consistent and valid safety-barrier diagrams. The relation of safety-barrier diagrams to other methods such as fault...... trees and Bayesian networks is discussed. A simple method for quantification of safety-barrier diagrams is proposed. It is concluded that safety-barrier diagrams provide a useful framework for an electronic data structure that integrates information from risk analysis with operational safety management....

  5. Safety-barrier diagrams

    DEFF Research Database (Denmark)

    Duijm, Nijs Jan

    2007-01-01

    Safety-barrier diagrams and the related so-called "bow-tie" diagrams have become popular methods in risk analysis. This paper describes the syntax and principles for constructing consistent and valid safety-barrier diagrams. The relation with other methods such as fault trees and Bayesian networks...... are discussed. A simple method for quantification of safety-barrier diagrams is proposed, including situations where safety barriers depend on shared common elements. It is concluded that safety-barrier diagrams provide a useful framework for an electronic data structure that integrates information from risk...... analysis with operational safety management....

  6. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Science.gov (United States)

    Wu, Jibing; Meng, Qinggang; Deng, Su; Huang, Hongbin; Wu, Yahui; Badii, Atta

    2017-01-01

    Heterogeneous information networks (e.g. bibliographic networks and social media networks) that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS) algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  7. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  8. 77 FR 15453 - Pipeline Safety: Information Collection Activities

    Science.gov (United States)

    2012-03-15

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... information collection titled, ``Gas Pipeline Safety Program Certification and Hazardous Liquid Pipeline... collection request that PHMSA will be submitting to OMB for renewal titled, ``Gas Pipeline Safety Program...

  9. Development of the Advanced Nuclear Safety Information Management (ANSIM) System

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Jae Min; Ko, Young Cheol; Song, Tai Gil [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-05-15

    Korea has become a technically independent nuclear country and has grown into an exporter of nuclear technologies. Thus, nuclear facilities are increasing in significance at KAERI (Korea Atomic Energy Research Institute), and it is time to address the nuclear safety. The importance of nuclear safety cannot be overemphasized. Therefore, a management system is needed urgently to manage the safety of nuclear facilities and to enhance the efficiency of nuclear information. We have established ISP (Information Strategy Planning) for the Integrated Information System of nuclear facility and safety management. The purpose of this paper is to develop a management system for nuclear safety. Therefore, we developed the Advanced Nuclear Safety Information Management system (hereinafter referred to as the 'ANSIM system'). The ANSIM system has been designed and implemented to computerize nuclear safety information for standardization, integration, and sharing in real-time. Figure 1 shows the main home page of the ANSIM system. In this paper, we describe the design requirements, contents, configurations, and utilizations of the ANSIM system

  10. Think over nuclear safety. ''Information asymmetry'' and ''comminicative action''

    International Nuclear Information System (INIS)

    Suzuki, Atsuyuki

    2006-01-01

    Nuclear safety should be fully understood not only technically but also socially. In order to think over nuclear safety socially, four different concepts were recommended to refer, which were ''procedural rationality'', information asymmetry'', ''certainty effect'' and ''communicative action'' proposed by three economists and a philosopher respectively. Risk-based communication approach for nuclear safety could be effective within the higher frequency area than safety goal, but not good for the lower frequency area than safety goal. The latter could be highly subjective and more qualitative. For this area, ''safety communication'' would be highly maintained with taking account of existence of ''information asymmetry'' and need of ''communicative action''. (T.Tanaka)

  11. Geographic Response Information Network : a new tool to manage community information for oil spill contingency planning and response operations

    Energy Technology Data Exchange (ETDEWEB)

    Munger, M.; Bryant, T. [Cook Inlet Regional Citizen' s Advisory Council, Kenai, AK (United States); Haugstad, E.; Kwietniak, J. [Tesora Alaska Petroleum, Kenai, AK (United States); DeCola, E.; Robertson, T. [Nuka Research and Planning Group, Seldovia, AK (United States)

    2006-07-01

    This paper described the Geographic Response Information Network (GRIN) project which was launched to address some of the logistical challenges that often complicate oil spill and emergency response operations. The objective of the project was to develop a computer-based tool for incident logistics to organize maps and data related to oil spills, safety, public relations and basic community resources. In addition to its use for oil spill response planning, the data available can be useful for all-hazards emergency response planning. Early prototypes of the GRIN used PowerPoint slides to organize basic information about coastal communities in Alaska. With time, hyper text markup language (html) was used as the programming format because it can be more readily hyper-linked. Currently, GRIN is organized as a web page with the following 5 categories of information: general, liaison, public information, logistics and safety. There are several sub-headings under each category, such as location, people, economy, subsistence and transportation. This general information allows incident management personnel to obtain a community profile to better understand the cultural, social and economic basis of the community. The GRIN prototype was developed for the Kodiak urban area, but it may be expanded in the future to include other coastal communities in Alaska. 3 refs., 6 figs.

  12. Geographic Response Information Network : a new tool to manage community information for oil spill contingency planning and response operations

    International Nuclear Information System (INIS)

    Munger, M.; Bryant, T.; Haugstad, E.; Kwietniak, J.; DeCola, E.; Robertson, T.

    2006-01-01

    This paper described the Geographic Response Information Network (GRIN) project which was launched to address some of the logistical challenges that often complicate oil spill and emergency response operations. The objective of the project was to develop a computer-based tool for incident logistics to organize maps and data related to oil spills, safety, public relations and basic community resources. In addition to its use for oil spill response planning, the data available can be useful for all-hazards emergency response planning. Early prototypes of the GRIN used PowerPoint slides to organize basic information about coastal communities in Alaska. With time, hyper text markup language (html) was used as the programming format because it can be more readily hyper-linked. Currently, GRIN is organized as a web page with the following 5 categories of information: general, liaison, public information, logistics and safety. There are several sub-headings under each category, such as location, people, economy, subsistence and transportation. This general information allows incident management personnel to obtain a community profile to better understand the cultural, social and economic basis of the community. The GRIN prototype was developed for the Kodiak urban area, but it may be expanded in the future to include other coastal communities in Alaska. 3 refs., 6 figs

  13. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  14. RISK-INFORMED SAFETY MARGIN CHARACTERIZATION

    International Nuclear Information System (INIS)

    Dinh, Nam; Szilard, Ronaldo

    2009-01-01

    The concept of safety margins has served as a fundamental principle in the design and operation of commercial nuclear power plants (NPPs). Defined as the minimum distance between a system's 'loading' and its 'capacity', plant design and operation is predicated on ensuring an adequate safety margin for safety-significant parameters (e.g., fuel cladding temperature, containment pressure, etc.) is provided over the spectrum of anticipated plant operating, transient and accident conditions. To meet the anticipated challenges associated with extending the operational lifetimes of the current fleet of operating NPPs, the United States Department of Energy (USDOE), the Idaho National Laboratory (INL) and the Electric Power Research Institute (EPRI) have developed a collaboration to conduct coordinated research to identify and address the technological challenges and opportunities that likely would affect the safe and economic operation of the existing NPP fleet over the postulated long-term time horizons. In this paper we describe a framework for developing and implementing a Risk-Informed Safety Margin Characterization (RISMC) approach to evaluate and manage changes in plant safety margins over long time horizons

  15. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  16. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  17. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  18. Functional safety of health information technology.

    LENUS (Irish Health Repository)

    Chadwick, Liam

    2012-03-01

    In an effort to improve patient safety and reduce adverse events, there has been a rapid growth in the utilisation of health information technology (HIT). However, little work has examined the safety of the HIT systems themselves, the methods used in their development or the potential errors they may introduce into existing systems. This article introduces the conventional safety-related systems development standard IEC 61508 to the medical domain. It is proposed that the techniques used in conventional safety-related systems development should be utilised by regulation bodies, healthcare organisations and HIT developers to provide an assurance of safety for HIT systems. In adopting the IEC 61508 methodology for HIT development and integration, inherent problems in the new systems can be identified and corrected during their development. Also, IEC 61508 should be used to develop a healthcare-specific standard to allow stakeholders to provide an assurance of a system\\'s safety.

  19. Students' Informal Peer Feedback Networks

    Science.gov (United States)

    Headington, Rita

    2018-01-01

    The nature and significance of students' informal peer feedback networks is an under-explored area. This paper offers the findings of a longitudinal investigation of the informal peer feedback networks of a cohort of student teachers [n = 105] across the three years of a UK primary education degree programme. It tracked the dynamic nature of these…

  20. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  1. Optimal control of epidemic information dissemination over networks.

    Science.gov (United States)

    Chen, Pin-Yu; Cheng, Shin-Ming; Chen, Kwang-Cheng

    2014-12-01

    Information dissemination control is of crucial importance to facilitate reliable and efficient data delivery, especially in networks consisting of time-varying links or heterogeneous links. Since the abstraction of information dissemination much resembles the spread of epidemics, epidemic models are utilized to characterize the collective dynamics of information dissemination over networks. From a systematic point of view, we aim to explore the optimal control policy for information dissemination given that the control capability is a function of its distribution time, which is a more realistic model in many applications. The main contributions of this paper are to provide an analytically tractable model for information dissemination over networks, to solve the optimal control signal distribution time for minimizing the accumulated network cost via dynamic programming, and to establish a parametric plug-in model for information dissemination control. In particular, we evaluate its performance in mobile and generalized social networks as typical examples.

  2. Interactive network analytical tool for instantaneous bespoke interrogation of food safety notifications.

    Science.gov (United States)

    Nepusz, Tamás; Petróczi, Andrea; Naughton, Declan P

    2012-01-01

    The globalization of food supply necessitates continued advances in regulatory control measures to ensure that citizens enjoy safe and adequate nutrition. The aim of this study was to extend previous reports on network analysis relating to food notifications by including an optional filter by type of notification and in cases of contamination, by type of contaminant in the notified foodstuff. A filter function has been applied to enable processing of selected notifications by contaminant or type of notification to i) capture complexity, ii) analyze trends, and iii) identify patterns of reporting activities between countries. The program rapidly assesses nations' roles as transgressor and/or detector for each category of contaminant and for the key class of border rejection. In the open access demonstration version, the majority of notifications in the Rapid Alert System for Food and Feed were categorized by contaminant type as mycotoxin (50.4%), heavy metals (10.9%) or bacteria (20.3%). Examples are given demonstrating how network analytical approaches complement, and in some cases supersede, descriptive statistics such as frequency counts, which may give limited or potentially misleading information. One key feature is that network analysis takes the relationship between transgressor and detector countries, along with number of reports and impact simultaneously into consideration. Furhermore, the indices that compliment the network maps and reflect each country's transgressor and detector activities allow comparisons to be made between (transgressing vs. detecting) as well as within (e.g. transgressing) activities. This further development of the network analysis approach to food safety contributes to a better understanding of the complexity of the effort ensuring food is safe for consumption in the European Union. The unique patterns of the interplay between detectors and transgressors, instantly revealed by our approach, could supplement the intelligence

  3. Interactive network analytical tool for instantaneous bespoke interrogation of food safety notifications.

    Directory of Open Access Journals (Sweden)

    Tamás Nepusz

    Full Text Available The globalization of food supply necessitates continued advances in regulatory control measures to ensure that citizens enjoy safe and adequate nutrition. The aim of this study was to extend previous reports on network analysis relating to food notifications by including an optional filter by type of notification and in cases of contamination, by type of contaminant in the notified foodstuff.A filter function has been applied to enable processing of selected notifications by contaminant or type of notification to i capture complexity, ii analyze trends, and iii identify patterns of reporting activities between countries. The program rapidly assesses nations' roles as transgressor and/or detector for each category of contaminant and for the key class of border rejection. In the open access demonstration version, the majority of notifications in the Rapid Alert System for Food and Feed were categorized by contaminant type as mycotoxin (50.4%, heavy metals (10.9% or bacteria (20.3%. Examples are given demonstrating how network analytical approaches complement, and in some cases supersede, descriptive statistics such as frequency counts, which may give limited or potentially misleading information. One key feature is that network analysis takes the relationship between transgressor and detector countries, along with number of reports and impact simultaneously into consideration. Furhermore, the indices that compliment the network maps and reflect each country's transgressor and detector activities allow comparisons to be made between (transgressing vs. detecting as well as within (e.g. transgressing activities.This further development of the network analysis approach to food safety contributes to a better understanding of the complexity of the effort ensuring food is safe for consumption in the European Union. The unique patterns of the interplay between detectors and transgressors, instantly revealed by our approach, could supplement the

  4. Essential elements of online information networks on invasive alien species

    Science.gov (United States)

    Simpson, A.; Sellers, E.; Grosse, A.; Xie, Y.

    2006-01-01

    In order to be effective, information must be placed in the proper context and organized in a manner that is logical and (preferably) standardized. Recently, invasive alien species (IAS) scientists have begun to create online networks to share their information concerning IAS prevention and control. At a special networking session at the Beijing International Symposium on Biological Invasions, an online Eastern Asia-North American IAS Information Network (EA-NA Network) was proposed. To prepare for the development of this network, and to provide models for other regional collaborations, we compare four examples of global, regional, and national online IAS information networks: the Global Invasive Species Information Network, the Invasives Information Network of the Inter-American Biodiversity Information Network, the Chinese Species Information System, and the Invasive Species Information Node of the US National Biological Information Infrastructure. We conclude that IAS networks require a common goal, dedicated leaders, effective communication, and broad endorsement, in order to obtain sustainable, long-term funding and long-term stability. They need to start small, use the experience of other networks, partner with others, and showcase benefits. Global integration and synergy among invasive species networks will succeed with contributions from both the top-down and the bottom-up. ?? 2006 Springer.

  5. The network to review natural analogue studies and their applications to repository safety assessment and public communication (NAnet)

    Energy Technology Data Exchange (ETDEWEB)

    Miller, W.M.; Hooker, P.J. [ENVIROS Consulting ltd, 61, the Shore Leith, UK-0 EH6 6RA Edinburgh (United Kingdom)

    2004-07-01

    Analogue information can increase our conceptual understanding of long-term repository behaviour in support of post-closure performance assessment (PA), provide quantitative data for PA models and provide ways of communicating safety information to non-specialist audiences. These functions of analogue studies have, however, received too little attention in PA reports and safety cases. Many analogue studies have been undertaken in the last two decades costing tens of millions of euros, and these have covered a wide range of phenomena such as uranium ore deposition, natural fission reactors, natural nuclide migration, contaminant containment by clays and sediments, preservation of ancient fossil trees and buried artefacts etc. The different uses of analogues would be easier to manage if a single database of quality approved analogue information were to be created. NAnet, a Thematic Network within the 5. EURATOM FP is aiming to promote more considered applications of analogues in performance and safety assessments and in audience dialogue. NAnet intends critically to review a number of analogue studies in terms of their relevance and limitations to different repository concepts and environments and with regard to their applications in performance assessments, safety cases and communication. On the basis of these reviews, a simple digital database is being developed for the PA community which will allow PA modelers to make quicker and wider use of natural analogue information in performance and safety assessments. It is expected that some of these tools will help radioactive waste institutions to make better use of natural analogue information for communication with different audiences, including the public. (authors)

  6. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  7. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  8. Informal networks: the company behind the chart.

    Science.gov (United States)

    Krackhardt, D; Hanson, J R

    1993-01-01

    A glance at an organizational chart can show who's the boss and who reports to whom. But this formal chart won't reveal which people confer on technical matters or discuss office politics over lunch. Much of the real work in any company gets done through this informal organization with its complex networks of relationships that cross functions and divisions. According to consultants David Krackhardt and Jeffrey Hanson, managers can harness the true power in their companies by diagramming three types of networks: the advice network, which reveals the people to whom others turn to get work done; the trust network, which uncovers who shares delicate information; and the communication network, which shows who talks about work-related matters. Using employee questionnaires, managers can generate network maps that will get to the root of many organizational problems. When a task force in a computer company, for example, was not achieving its goals, the CEO turned to network maps to find out why. He discovered that the task force leader was central in the advice network but marginal in the trust network. Task force members did not believe he would look out for their interests, so the CEO used the trust map to find someone to share responsibility for the group. And when a bank manager saw in the network map that there was little communication between tellers and supervisors, he looked for ways to foster interaction among employees of all levels. As companies continue to flatten and rely on teams, managers must rely less on their authority and more on understanding these informal networks. Managers who can use maps to identify, leverage, and revamp informal networks will have the key to success.

  9. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  10. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  11. A distributed research network model for post-marketing safety studies: the Meningococcal Vaccine Study.

    Science.gov (United States)

    Velentgas, Priscilla; Bohn, Rhonda L; Brown, Jeffrey S; Chan, K Arnold; Gladowski, Patricia; Holick, Crystal N; Kramer, Judith M; Nakasato, Cynthia; Spettell, Claire M; Walker, Alexander M; Zhang, Fang; Platt, Richard

    2008-12-01

    We describe a multi-center post-marketing safety study that uses distributed data methods to minimize the need for covered entities to share protected health information (PHI). Implementation has addressed several issues relevant to creation of a large scale post-marketing drug safety surveillance system envisioned by the FDA's Sentinel Initiative. This retrospective cohort study of Guillain-Barré syndrome (GBS) following meningococcal conjugate vaccination incorporates the data and analytic expertise of five research organizations closely affiliated with US health insurers. The study uses administrative claims data, plus review of full text medical records to adjudicate the status of individuals with a diagnosis code for GBS (ICD9 357.0). A distributed network approach is used to create the analysis files and to perform most aspects of the analysis, allowing nearly all of the data to remain behind institutional firewalls. Pooled analysis files transferred to a central site will contain one record per person for approximately 0.2% of the study population, and contain PHI limited to the month and year of GBS onset for cases or the index date for matched controls. The first planned data extraction identified over 9 million eligible adolescents in the target age range of 11-21 years. They contributed an average of 14 months of eligible time on study over 27 months of calendar time. MCV4 vaccination coverage levels exceeded 20% among 17-18-year olds and 16% among 11-13 and 14-16-year-old age groups by the second quarter of 2007. This study demonstrates the feasibility of using a distributed data network approach to perform large scale post-marketing safety analyses and is scalable to include additional organizations and data sources. We believe these results can inform the development of a large national surveillance system. Copyright (c) 2008 John Wiley & Sons, Ltd.

  12. Building Food Safety Networks in Africa through our Work on Food and Environmental Protection

    International Nuclear Information System (INIS)

    Sasanya, James

    2015-01-01

    In the last newsletter, we featured our support for food safety programs in IAEA/FAO Member States focusing on countries in Latin America and the Caribbean as an example. This feature article highlights our efforts to establish laboratory networks in Africa and the activities supported by the Joint FAO/IAEA Division through the technical cooperation program. Under the Africa Regional Cooperative Agreement on Research, Development and Training Related to Nuclear Science and Technology (AFRA), a project on “Establishing a Food Safety Network through the Application of Nuclear and Related Technologies” is being implemented. This involves food and environmental safety related institutions in Algeria, Botswana, Cameroon, Egypt, Ethiopia, Mauritius, Namibia, Nigeria, South Africa, Sudan, Tunisia, Uganda, United Republic of Tanzania and Zimbabwe, working closely to address common needs and challenges. The project has thus far enhanced the application of nuclear techniques in food safety control programs such as the use of radio receptor assay techniques in these Member States. These rapid laboratory screening tools have been established by sub-regional networking and collaboration, it is paving the way for the establishment of a fully regional network

  13. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  14. Workplace injuries, safety climate and behaviors: application of an artificial neural network.

    Science.gov (United States)

    Abubakar, A Mohammed; Karadal, Himmet; Bayighomog, Steven W; Merdan, Ethem

    2018-05-09

    This article proposes and tests a model for the interaction effect of the organizational safety climate and behaviors on workplace injuries. Using artificial neural network and survey data from 306 metal casting industry employees in central Anatolia, we found that an organizational safety climate mitigates workplace injuries, and safety behaviors enforce the strength of the negative impact of the safety climate on workplace injuries. The results suggest a complex relationship between the organizational safety climate, safety behavior and workplace injuries. Theoretical and practical implications are discussed in light of decreasing workplace injuries in the Anatolian metal casting industry.

  15. Carbon Monoxide Information Center

    Medline Plus

    Full Text Available ... OnSafety Blog Safety Education Centers Neighborhood Safety Network Community Outreach Resource Center Toy Recall Statistics CO Poster ... Sitemap RSS E-mail Inside CPSC Accessibility Privacy Policy Budget, Performances & Finance Open Government Freedom of Information ( ...

  16. Criticality Safety Information Resource Center Web portal: www.csirc.net

    International Nuclear Information System (INIS)

    Harmon, C.D. II; Jones, T.

    2000-01-01

    The Nuclear Criticality Safety Group (ESH-6) at Los Alamos National Laboratory (LANL) is in the process of collecting and archiving historical and technical information related to nuclear criticality safety from LANL and other facilities. In an ongoing effort, this information is being made available via the Criticality Safety Information Resource Center (CSIRC) web site, which is hosted and maintained by ESH-6 staff. Recently, the CSIRC Web site was recreated as a Web portal that provides the criticality safety community with much more than just archived data

  17. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  18. 47 CFR 80.1135 - Transmission of maritime safety information.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Transmission of maritime safety information. 80... RADIO SERVICES STATIONS IN THE MARITIME SERVICES Global Maritime Distress and Safety System (GMDSS) Operating Procedures for Distress and Safety Communications § 80.1135 Transmission of maritime safety...

  19. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  20. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  1. Information Network on Rural Development (INRD), Bangladesh.

    Science.gov (United States)

    Wanasundra, Leelangi

    1994-01-01

    Discusses information networking in Bangladesh and describes the formation of the Information Network on Rural Development (INRD) which was initiated by the Center on Integrated Rural Development for Asia and the Pacific (CIRDAP). Organization, membership, activities, participation, and finance are examined. (four references) (LRW)

  2. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  3. EXPERIENCE NETWORKING UNIVERSITY OF EDUCATION TRAINING MASTERS SAFETY OF LIFE

    OpenAIRE

    Elvira Mikhailovna Rebko

    2016-01-01

    The article discloses experience networking of universities (Herzen State Pedagogical University and Sakhalin State University) in the development and implementation of joint training programs for master’s education in the field of life safety «Social security in the urban environment». The novelty of the work is to create a schematic design of basic educational training program for master’s education in the mode of networking, and to identify effective instructional techniques and conditions...

  4. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  5. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  6. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  7. IT safety in production data networks (PDN). Tracking, evaluation and elimination of safety threats; IT-Sicherheit in Produktionsnetzen (PDN). Aufspueren, einschaetzen und beseitigen von Sicherheitsbedrohungen

    Energy Technology Data Exchange (ETDEWEB)

    Neider, Ulrich [DETACK GmbH, Ludwigsburg (Germany)

    2013-03-01

    This contribution reports on the threats of production data networks. Within the context of the IT security, the risks of production data networks are not only based on a possible contamination by computer viruses. The author of this contribution increases awareness of dangers to whose production systems are faced. The author also presents a phase model from his own consulting practice in order to increase the safety of production data systems by implementation of a safety control. This phase model consists of the six following steps: (a) Stock taking of the state of the art; (b) Determination of the target (development of a safety concept); (c) Creation of an IT safety policy; (d) Application of IT safety policy; (e) Audit of the results (IT safety audit); (f) Regular safety tests.

  8. Organizing safety: conditions for successful information assurance programs.

    Science.gov (United States)

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  9. Application of life-cycle information for advancement in safety of nuclear fuel cycle facilities. Application of safety information to advanced safety management support system

    International Nuclear Information System (INIS)

    Suzuki, Kazuhiko; Ishida, Michihiko

    2005-08-01

    Risk management is major concern to nuclear energy reprocessing plants to improve plant and process reliability and ensure their safety. This is because we are required to predict potential risks before any accident or disaster occurs. The advancement of safety design and safety systems technologies showed large amount of useful safety-related knowledge that can be of great importance to plant operation to reduce operation risks and ensure safety. This research proposes safety knowledge modeling framework on the basis of ontology technologies to systematically construct plant knowledge model, which includes plant structure, operation, and the associated behaviors. In such plant knowledge model safety related information is defined and linked to the different elements of plant knowledge model. Ontology editor is employed to define the basic concepts and their inter-relations, which are used to capture and construct plant safety knowledge. In order to provide detailed safety knowledgebase, HAZOP results are analyzed and structured so that safety-related knowledge are identified and structured within the plant knowledgebase. The target safety knowledgebase includes: failures, deviations, causes, consequences, and fault propagation as mapped to plant knowledge. The proposed ontology-based safety framework is applied on case study nuclear plant to structure failures, causes, consequences, and fault propagation, which are used to support plant operation. (author)

  10. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  11. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  12. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  13. IMNN: Information Maximizing Neural Networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  14. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  15. A Collaborative Learning Network Approach to Improvement: The CUSP Learning Network.

    Science.gov (United States)

    Weaver, Sallie J; Lofthus, Jennifer; Sawyer, Melinda; Greer, Lee; Opett, Kristin; Reynolds, Catherine; Wyskiel, Rhonda; Peditto, Stephanie; Pronovost, Peter J

    2015-04-01

    Collaborative improvement networks draw on the science of collaborative organizational learning and communities of practice to facilitate peer-to-peer learning, coaching, and local adaption. Although significant improvements in patient safety and quality have been achieved through collaborative methods, insight regarding how collaborative networks are used by members is needed. Improvement Strategy: The Comprehensive Unit-based Safety Program (CUSP) Learning Network is a multi-institutional collaborative network that is designed to facilitate peer-to-peer learning and coaching specifically related to CUSP. Member organizations implement all or part of the CUSP methodology to improve organizational safety culture, patient safety, and care quality. Qualitative case studies developed by participating members examine the impact of network participation across three levels of analysis (unit, hospital, health system). In addition, results of a satisfaction survey designed to evaluate member experiences were collected to inform network development. Common themes across case studies suggest that members found value in collaborative learning and sharing strategies across organizational boundaries related to a specific improvement strategy. The CUSP Learning Network is an example of network-based collaborative learning in action. Although this learning network focuses on a particular improvement methodology-CUSP-there is clear potential for member-driven learning networks to grow around other methods or topic areas. Such collaborative learning networks may offer a way to develop an infrastructure for longer-term support of improvement efforts and to more quickly diffuse creative sustainment strategies.

  16. 75 FR 53733 - Pipeline Safety: Information Collection Activities

    Science.gov (United States)

    2010-09-01

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2010-0246] Pipeline Safety: Information Collection Activities AGENCY: Pipeline and Hazardous... liquefied natural gas, hazardous liquid, and gas transmission pipeline systems operated by a company. The...

  17. Food safety: correct information for pregnant women

    Directory of Open Access Journals (Sweden)

    Bartolomeo Griglio

    2013-04-01

    Full Text Available This study was aimed at investigating the knowledge of pregnant women on food safety with particular attention to the effectiveness of the informative material (pamphlet and poster prepared in a previous study. To this scope, a questionnaire composed by 8 questions (Likert scaled was used except for one which was a Y/N question. Themes of the questionnaire were: level of concerns on food safety, and knowledge on foodborne diseases (salomonellosis, toxoplasmosis and listeriosis, risk factors and preventive measures. Results indicate that knowledge increased in respect to that of the previous study, but in relation to informative material previously distributed.

  18. Hodge Decomposition of Information Flow on Small-World Networks.

    Science.gov (United States)

    Haruna, Taichi; Fujiki, Yuuya

    2016-01-01

    We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  19. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  20. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  1. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  2. The development of an information system and installation of an Internet web database for the purposes of the occupational health and safety management system.

    Science.gov (United States)

    Mavrikakis, I; Mantas, J; Diomidous, M

    2007-01-01

    This paper is based on the research on the possible structure of an information system for the purposes of occupational health and safety management. We initiated a questionnaire in order to find the possible interest on the part of potential users in the subject of occupational health and safety. The depiction of the potential interest is vital both for the software analysis cycle and development according to previous models. The evaluation of the results tends to create pilot applications among different enterprises. Documentation and process improvements ascertained quality of services, operational support, occupational health and safety advice are the basics of the above applications. Communication and codified information among intersted parts is the other target of the survey regarding health issues. Computer networks can offer such services. The network will consist of certain nodes responsible to inform executives on Occupational Health and Safety. A web database has been installed for inserting and searching documents. The submission of files to a server and the answers to questionnaires through the web help the experts to perform their activities. Based on the requirements of enterprises we have constructed a web file server. We submit files so that users can retrieve the files which they need. The access is limited to authorized users. Digital watermarks authenticate and protect digital objects.

  3. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  4. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  5. Atomic Information Technology Safety and Economy of Nuclear Power Plants

    CERN Document Server

    Woo, Taeho

    2012-01-01

    Atomic Information Technology revaluates current conceptions of the information technology aspects of the nuclear industry. Economic and safety research in the nuclear energy sector are explored, considering statistical methods which incorporate Monte-Carlo simulations for practical applications. Divided into three sections, Atomic Information Technology covers: • Atomic economics and management, • Atomic safety and reliability, and • Atomic safeguarding and security. Either as a standalone volume or as a companion to conventional nuclear safety and reliability books, Atomic Information Technology acts as a concise and thorough reference on statistical assessment technology in the nuclear industry. Students and industry professionals alike will find this a key tool in expanding and updating their understanding of this industry and the applications of information technology within it.

  6. Targeted neural network interventions for auditory hallucinations: Can TMS inform DBS?

    Science.gov (United States)

    Taylor, Joseph J; Krystal, John H; D'Souza, Deepak C; Gerrard, Jason Lee; Corlett, Philip R

    2017-09-29

    The debilitating and refractory nature of auditory hallucinations (AH) in schizophrenia and other psychiatric disorders has stimulated investigations into neuromodulatory interventions that target the aberrant neural networks associated with them. Internal or invasive forms of brain stimulation such as deep brain stimulation (DBS) are currently being explored for treatment-refractory schizophrenia. The process of developing and implementing DBS is limited by symptom clustering within psychiatric constructs as well as a scarcity of causal tools with which to predict response, refine targeting or guide clinical decisions. Transcranial magnetic stimulation (TMS), an external or non-invasive form of brain stimulation, has shown some promise as a therapeutic intervention for AH but remains relatively underutilized as an investigational probe of clinically relevant neural networks. In this editorial, we propose that TMS has the potential to inform DBS by adding individualized causal evidence to an evaluation processes otherwise devoid of it in patients. Although there are significant limitations and safety concerns regarding DBS, the combination of TMS with computational modeling of neuroimaging and neurophysiological data could provide critical insights into more robust and adaptable network modulation. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  8. Final report of the 'Nordic thermal-hydraulic and safety network (NOTNET)' - Project

    International Nuclear Information System (INIS)

    Tuunanen, J.; Tuomainen, M.

    2005-04-01

    A Nordic network for thermal-hydraulics and nuclear safety research was started. The idea of the network is to combine the resources of different research teams in order to carry out more ambitious and extensive research programs than would be possible for the individual teams. From the very beginning, the end users of the research results have been integrated to the network. Aim of the network is to benefit the partners involved in nuclear energy in the Nordic Countries (power companies, reactor vendors, safety regulators, research units). First task within the project was to describe the resources (personnel, know-how, simulation tools, test facilities) of the various teams. Next step was to discuss with the end users about their research needs. Based on these steps, few most important research topics with defined goals were selected, and coarse road maps were prepared for reaching the targets. These road maps will be used as a starting point for planning the actual research projects in the future. The organisation and work plan for the network were established. National coordinators were appointed, as well as contact persons in each participating organisation, whether research unit or end user. This organisation scheme is valid for the short-term operation of NOTNET when only Nordic organisations take part in the work. Later on, it is possible to enlarge the network e.g. within EC framework programme. The network can now start preparing project proposals and searching funding for the first common research projects. (au)

  9. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  10. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  11. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  12. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  13. Collection and accumulation of seismic safety research findings, and considerations for information dissemination

    International Nuclear Information System (INIS)

    2013-01-01

    Seismic Safety Division of JNES is collecting and analyzing the findings of seismic safety research, and is developing a system to organize and disseminate the information internally and internationally. These tasks have been conducted in response to the lessons learned from Fukushima Daiichi NPP accident. The overview of the tasks is as follows; 1) Collection of the knowledge and findings from seismic safety research. JNES collects information on seismic safety researches including the 2011 off the Pacific coast of Tohoku Earthquake. The information is analyzed whether it is important for regulation to increase seismic safety of NPP. 2) Constructing database of seismic safety research. JNES collects information based on documents published by committee and constructs database of active faults around NPP sites in order to incorporate in the seismic safety review. 3) Dissemination of information related to seismic safety. JNES disseminates outcomes of own researches internally and internationally. (author)

  14. Collection and accumulation of seismic safety research findings, and considerations for information dissemination

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    Seismic Safety Division of JNES is collecting and analyzing the findings of seismic safety research, and is developing a system to organize and disseminate the information internally and internationally. These tasks have been conducted in response to the lessons learned from Fukushima Daiichi NPP accident. The overview of the tasks is as follows; 1) Collection of the knowledge and findings from seismic safety research. JNES collects information on seismic safety researches including the 2011 off the Pacific coast of Tohoku Earthquake. The information is analyzed whether it is important for regulation to increase seismic safety of NPP. 2) Constructing database of seismic safety research. JNES collects information based on documents published by committee and constructs database of active faults around NPP sites in order to incorporate in the seismic safety review. 3) Dissemination of information related to seismic safety. JNES disseminates outcomes of own researches internally and internationally. (author)

  15. Drug safety in pregnancy: utopia or achievable prospect? Risk information, risk research and advocacy in Teratology Information Services.

    Science.gov (United States)

    Schaefer, Christof

    2011-03-01

    Even though from preclinical testing to drug risk labeling, the situation with drugs in pregnancy has improved substantially since the thalidomide scandal, there is still an increasing need to provide healthcare professionals and patients with updated individualized risk information for clinical decision making. For the majority of drugs, clinical experience is still insufficient with respect to their safety in pregnancy. There is often uncertainty in how to interpret the available scientific data. Based on 20 years of experience with Teratology Information Services (TIS) cooperating in the European Network of Teratology Information Services (ENTIS) methods of risk interpretation, follow-up of exposed pregnancies through the consultation process and their evaluation is discussed. Vitamin K antagonists, isotretinoin and angiotensin (AT) II-receptor-antagonists are presented as examples of misinterpretation of drug risks and subjects of research based on observational clinical data recorded in TIS. As many TIS are poorly funded, advocacy is necessary by establishing contacts with decision makers in health politics and administration, informing them of the high return in terms of health outcomes and cost savings provided by TIS as reference institutions in clinical teratology. © 2011 The Author. Congenital Anomalies © 2011 Japanese Teratology Society.

  16. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  17. Research Award: Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    ... of networked technologies has created new opportunities for advancing human ... The I&N Research Awardee will ideally explore research questions centred ... Examples of questions include: ... engineering or computer/information science;.

  18. Qualia could arise from information processing in local cortical networks.

    Science.gov (United States)

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  19. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  20. User Requirements for Technology to Assist Aging in Place: Qualitative Study of Older People and Their Informal Support Networks.

    Science.gov (United States)

    Elers, Phoebe; Hunter, Inga; Whiddett, Dick; Lockhart, Caroline; Guesgen, Hans; Singh, Amardeep

    2018-06-06

    Informal support is essential for enabling many older people to age in place. However, there is limited research examining the information needs of older adults' informal support networks and how these could be met through home monitoring and information and communication technologies. The purpose of this study was to investigate how technologies that connect older adults to their informal and formal support networks could assist aging in place and enhance older adults' health and well-being. Semistructured interviews were conducted with 10 older adults and a total of 31 members of their self-identified informal support networks. They were asked questions about their information needs and how technology could support the older adults to age in place. The interviews were transcribed and thematically analyzed. The analysis identified three overarching themes: (1) the social enablers theme, which outlined how timing, informal support networks, and safety concerns assist the older adults' uptake of technology, (2) the technology concerns theme, which outlined concerns about cost, usability, information security and privacy, and technology superseding face-to-face contact, and (3) the information desired theme, which outlined what information should be collected and transferred and who should make decisions about this. Older adults and their informal support networks may be receptive to technology that monitors older adults within the home if it enables aging in place for longer. However, cost, privacy, security, and usability barriers would need to be considered and the system should be individualizable to older adults' changing needs. The user requirements identified from this study and described in this paper have informed the development of a technology that is currently being prototyped. ©Phoebe Elers, Inga Hunter, Dick Whiddett, Caroline Lockhart, Hans Guesgen, Amardeep Singh. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 06.06.2018.

  1. Transactions of the nineteenth water reactor safety information meeting

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1991-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 19th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 28--30, 1991. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, USNRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from the governments and industry in Europe and Japan are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting, and are given in the order of their presentation in each session. The individual summaries have been cataloged separately

  2. Exploring Student Use of Social Networking Services (SNS) Surrounding Moral Development, Gender, Campus Crime, Safety, and the Clery Act: A Mixed Methods Study

    Science.gov (United States)

    Baum, Haley

    2017-01-01

    The purpose of this explanatory sequential mixed methods study was to explore college students' use of social networking services (SNS); examining how and why they communicate about campus safety information. This study took place at Stockton University, a regional state institution in NJ. Undergraduate students took part in an online quantitative…

  3. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  4. Safety Psychology Applicating on Coal Mine Safety Management Based on Information System

    Science.gov (United States)

    Hou, Baoyue; Chen, Fei

    In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.

  5. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  6. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  7. MedWatch, the FDA Safety Information and Adverse Event Reporting Program

    Science.gov (United States)

    ... Reporting Program MedWatch: The FDA Safety Information and Adverse Event Reporting Program Share Tweet Linkedin Pin it ... approved information that can help patients avoid serious adverse events. Potential Signals of Serious Risks/New Safety ...

  8. Car-to-Pedestrian Communication Safety System Based on the Vehicular Ad-Hoc Network Environment: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Peng Jing

    2017-10-01

    Full Text Available With the unparalleled growth of motor vehicles, traffic accident between pedestrians and vehicles is one of the most serious issues in the word-wild. Plenty of injuries and fatalities are caused by the traffic accidents and crashes. The connected vehicular ad hoc network as an emerging approach which has the potential to reduce and even avoid accidents have been focused on by many researchers. A large number of car-to-pedestrian communication safety systems based on the vehicular ad hoc network are researching and developing. However, to our limited knowledge, a systematic review about the car-to-pedestrian communication safety system based on the vehicular ad-hoc network has not be written. The purpose and goal of this review is to systematically evaluate and access the reliability of car-to-pedestrian communication safety system based on the vehicular ad-hoc network environment and provide some recommendations for the future works according to throwing some light on the previous literatures. A quality evaluation was developed through established items and instruments tailored to this review. Future works are needed to focus on developing a valid as well as effective communication safety system based on the vehicular ad hoc network to protect the vulnerable road users.

  9. Can online networks provide quality answers to questions about occupational safety and health?

    Science.gov (United States)

    Rhebergen, Martijn D F; Lenderink, Annet F; van Dijk, Frank J H; Hulshof, Carel T J

    2012-05-01

    To assess whether experts can provide high-quality answers to occupational safety and health (OSH) questions in online Question & Answer (Q&A) networks. The authors evaluated the quality of answers provided by qualified experts in two Dutch online networks: ArboAntwoord and the Helpdesk of the Netherlands Center for Occupational Diseases. A random sample of 594 answers was independently evaluated by two raters using nine answer quality criteria. An additional criterion, the agreement of answers with the best available evidence, was explored by peer review of a sample of 42 answers. Reviewers performed an evidence search in Medline. The median answer quality score of ArboAntwoord (N=295) and the Netherlands Center for Occupational Diseases Helpdesk (N=299) was 8 of 9 (IQR 2). The inter-rater reliability of the first nine quality criteria was high (κ 0.82-0.90, p<0.05). A question answered by two or more experts had a greater probability of a high-quality score than questions answered by one expert (OR 4.9, 95% CI 2.7 to 9.0). Answers most often scored insufficient on the use of evidence to underpin the answer (36% and 38% for the networks, respectively) and on conciseness (35% and 31%, respectively). Peer review demonstrated that 43%-72% of the answers in both online networks were in complete agreement with the best available evidence. OSH experts are able to provide quality answers in online OSH Q&A networks. Our answer quality appraisal instrument was feasible and provided information on how to improve answer quality.

  10. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  11. Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-hoc Networks

    KAUST Repository

    Ansari, Abdul Rahim

    2018-04-10

    Vehicular ad hoc networks (VANETs) represent a very promising research area because of their ever increasing demand, especially for public safety applications. In VANETs vehicles communicate with each other to exchange road maps and traffic information. In many applications, location-based services are the main service, and localization accuracy is the main problem. VANETs also require accurate vehicle location information in real time. To fulfill this requirement, a number of algorithms have been proposed; however, the location accuracy required for public safety applications in VANETs has not been achieved. In this paper, an improved subspace algorithm is proposed for time of arrival (TOA) measurements in VANETs localization. The proposed method gives a closed-form solution and it is robust for large measurement noise, as it is based on the eigen form of a scalar product and dimensionality. Furthermore, we developed the Cramer-Rao Lower Bound (CRLB) to evaluate the performance of the proposed 3D VANETs localization method. The performance of the proposed method was evaluated by comparison with the CRLB and other localization algorithms available in the literature through numerous simulations. Simulation results show that the proposed 3D VANETs localization method is better than the literature methods especially for fewer anchors at road side units and large noise variance.

  12. Vulnerability Assessment Tools for Complex Information Networks

    National Research Council Canada - National Science Library

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  13. Mutual information-based LPI optimisation for radar network

    Science.gov (United States)

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  14. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  15. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  16. UPGRADE FOR HARDWARE/SOFTWARE SERVER AND NETWORK TOPOLOGY IN INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Oleksii O. Kaplun

    2011-02-01

    Full Text Available The network modernization, educational information systems software and hardware updates problem is actual in modern term of information technologies prompt development. There are server applications and network topology of Institute of Information Technology and Learning Tools of National Academy of Pedagogical Sciences of Ukraine analysis and their improvement methods expound in the article. The article materials represent modernization results implemented to increase network efficiency and reliability, decrease response time in Institute’s network information systems. The article gives diagrams of network topology before upgrading and after finish of optimization and upgrading processes.

  17. An Optimal Balance between Efficiency and Safety of Urban Drainage Networks

    Science.gov (United States)

    Seo, Y.

    2014-12-01

    Urban drainage networks have been developed to promote the efficiency of a system in terms of drainage time so far. Typically, a drainage system is designed to drain water from developed areas promptly as much as possible during floods. In this regard, an artificial drainage system have been considered to be more efficient compared to river networks in nature. This study examined artificial drainage networks and the results indicate they can be less efficient in terms of network configuration compared with river networks, which is counter-intuitive. The case study of 20 catchments in Seoul, South Korea shows that they have wide range of efficiency in terms of network configuration and consequently, drainage time. This study also demonstrates that efficient drainage networks are more sensitive to spatial and temporal rainfall variation such as rainstorm movement. Peak flows increase more than two times greater in effective drainage networks compared with inefficient and highly sinuous drainage networks. Combining these results, this study implies that the layout of a drainage network is an important factor in terms of efficient drainage and also safety in urban catchments. Design of an optimal layout of the drainage network can be an alternative non-structural measures that mitigate potential risks and it is crucial for the sustainability of urban environments.

  18. Transactions of the twenty-fifth water reactor safety information meeting

    Energy Technology Data Exchange (ETDEWEB)

    Monteleone, S. [comp.

    1997-09-01

    This report contains summaries of papers on reactor safety research to be presented at the 25th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 20--22, 1997. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion of information exchanged during the course of the meeting, and are given in order of their presentation in each session.

  19. Transactions of the twenty-fifth water reactor safety information meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1997-09-01

    This report contains summaries of papers on reactor safety research to be presented at the 25th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 20--22, 1997. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion of information exchanged during the course of the meeting, and are given in order of their presentation in each session

  20. Radiation safety research information database

    International Nuclear Information System (INIS)

    Yukawa, Masae; Miyamoto, Kiriko; Takeda, Hiroshi; Kuroda, Noriko; Yamamoto, Kazuhiko

    2004-01-01

    National Institute of Radiological Sciences in Japan began to construct Radiation Safety Research Information Database' in 2001. The research information database is of great service to evaluate the effects of radiation on people by estimating exposure dose by determining radiation and radioactive matters in the environment. The above database (DB) consists of seven DB such as Nirs Air Borne Dust Survey DB, Nirs Environmental Tritium Survey DB, Nirs Environmental Carbon Survey DB, Environmental Radiation Levels, Abe, Metabolic Database for Assessment of Internal Dose, Graphs of Predicted Monitoring Data, and Nirs nuclear installation environment water tritium survey DB. Outline of DB and each DB are explained. (S.Y.)

  1. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  2. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  3. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  4. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  5. Factors Enabling Information Propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    A relevant feature of Social Network Sites is their ability to propagate units of information and create large distributed conversations. This phenomenon is particularly relevant because of the speed of information propagation, which is known to be much faster than within traditional media......, and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...... at measuring specific socio-technical factors enabling information spreading in Social Network Sites....

  6. A Neural Network Classifier Model for Forecasting Safety Behavior at Workplaces

    Directory of Open Access Journals (Sweden)

    Fakhradin Ghasemi

    2017-07-01

    Full Text Available The construction industry is notorious for having an unacceptable rate of fatal accidents. Unsafe behavior has been recognized as the main cause of most accidents occurring at workplaces, particularly construction sites. Having a predictive model of safety behavior can be helpful in preventing construction accidents. The aim of the present study was to build a predictive model of unsafe behavior using the Artificial Neural Network approach. A brief literature review was conducted on factors affecting safe behavior at workplaces and nine factors were selected to be included in the study. Data were gathered using a validated questionnaire from several construction sites. Multilayer perceptron approach was utilized for constructing the desired neural network. Several models with various architectures were tested to find the best one. Sensitivity analysis was conducted to find the most influential factors. The model with one hidden layer containing fourteen hidden neurons demonstrated the best performance (Sum of Squared Errors=6.73. The error rate of the model was approximately 21 percent. The results of sensitivity analysis showed that safety attitude, safety knowledge, supportive environment, and management commitment had the highest effects on safety behavior, while the effects from resource allocation and perceived work pressure were identified to be lower than those of others. The complex nature of human behavior at workplaces and the presence of many influential factors make it difficult to achieve a model with perfect performance.

  7. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  8. Information about the control of nuclear safety in France

    International Nuclear Information System (INIS)

    Gerster, D.

    1994-01-01

    The permanent objective of the French Nuclear Safety Authority is the public information about technical controls performed in French nuclear installations. Three publications from the DSIN (Direction of Nuclear Installations Safety) are devoted to this effort: the MAGNUC Minitel magazine, the annual activity report and the CONTROLE magazine. Details about the content of these publications are given. A large part of the information about control of nuclear safety concerns the incidents and accidents and their importance level. A seriousness scale was created in France at the beginning of 1988 and replaced in April 1994 by the very similar International Nuclear Event Scale (INES). Explanation of this scale is given and illustrated with examples of real events and accidents. However, international comparison between incidents and accidents remains delicate because the detailed content of safety reports can change significantly from one country to another. (J.S.). 1 fig

  9. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  10. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  11. Scatter networks: a new approach for analysing information scatter

    International Nuclear Information System (INIS)

    Adamic, Lada A; Suresh, K; Shi Xiaolin

    2007-01-01

    Information on any given topic is often scattered across the Web. Previously this scatter has been characterized through the inequality of distribution of facts (i.e. pieces of information) across webpages. Such an approach conceals how specific facts (e.g. rare facts) occur in specific types of pages (e.g. fact-rich pages). To reveal such regularities, we construct bipartite networks, consisting of two types of vertices: the facts contained in webpages and the webpages themselves. Such a representation enables the application of a series of network analysis techniques, revealing structural features such as connectivity, robustness and clustering. Not only does network analysis yield new insights into information scatter, but we also illustrate the benefit of applying new and existing analysis techniques directly to a bipartite network as opposed to its one-mode projection. We discuss the implications of each network feature to the users' ability to find comprehensive information online. Finally, we compare the bipartite graph structure of webpages and facts with the hyperlink structure between the webpages

  12. The role of neural networks in nuclear power plant safety systems

    International Nuclear Information System (INIS)

    Boger, Z.

    1993-01-01

    Neural networks (NN) techniques have been applied in recent years to many systems by researchers in the nuclear power industry, mainly for modeling and sensor validation. Recent results are reviewed, including new directions in applications to control systems, safety analysis, and ''virtual'' instruments. As new fast learning algorithms become available, large systems may be learned effectively, even with few training examples. The nuclear industry hesitates to include NN in safety related systems, but it seems that the obstacles could be overcome with the demonstration of successful applications, even from other industries. Coupling of full-scale reactor simulators, as fault database generators, with neural networks learning should be explored. The integration of Expert System technology with NN should improve the Validation and Verification tasks, and also help overcome psychological barriers. It may prove that the potential of NN to help operators, compared with the existing and proposed alternatives, outweigh the risks. (author). 58 refs, 2 figs

  13. The effect of road network patterns on pedestrian safety: A zone-based Bayesian spatial modeling approach.

    Science.gov (United States)

    Guo, Qiang; Xu, Pengpeng; Pei, Xin; Wong, S C; Yao, Danya

    2017-02-01

    Pedestrian safety is increasingly recognized as a major public health concern. Extensive safety studies have been conducted to examine the influence of multiple variables on the occurrence of pedestrian-vehicle crashes. However, the explicit relationship between pedestrian safety and road network characteristics remains unknown. This study particularly focused on the role of different road network patterns on the occurrence of crashes involving pedestrians. A global integration index via space syntax was introduced to quantify the topological structures of road networks. The Bayesian Poisson-lognormal (PLN) models with conditional autoregressive (CAR) prior were then developed via three different proximity structures: contiguity, geometry-centroid distance, and road network connectivity. The models were also compared with the PLN counterpart without spatial correlation effects. The analysis was based on a comprehensive crash dataset from 131 selected traffic analysis zones in Hong Kong. The results indicated that higher global integration was associated with more pedestrian-vehicle crashes; the irregular pattern network was proved to be safest in terms of pedestrian crash occurrences, whereas the grid pattern was the least safe; the CAR model with a neighborhood structure based on road network connectivity was found to outperform in model goodness-of-fit, implying the importance of accurately accounting for spatial correlation when modeling spatially aggregated crash data. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  15. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  16. Information collection and processing of dam distortion in digital reservoir system

    Science.gov (United States)

    Liang, Yong; Zhang, Chengming; Li, Yanling; Wu, Qiulan; Ge, Pingju

    2007-06-01

    The "digital reservoir" is usually understood as describing the whole reservoir with digital information technology to make it serve the human existence and development furthest. Strictly speaking, the "digital reservoir" is referred to describing vast information of the reservoir in different dimension and space-time by RS, GPS, GIS, telemetry, remote-control and virtual reality technology based on computer, multi-media, large-scale memory and wide-band networks technology for the human existence, development and daily work, life and entertainment. The core of "digital reservoir" is to realize the intelligence and visibility of vast information of the reservoir through computers and networks. The dam is main building of reservoir, whose safety concerns reservoir and people's safety. Safety monitoring is important way guaranteeing the dam's safety, which controls the dam's running through collecting the dam's information concerned and developing trend. Safety monitoring of the dam is the process from collection and processing of initial safety information to forming safety concept in the brain. The paper mainly researches information collection and processing of the dam by digital means.

  17. A Dynamic Microblog Network and Information Dissemination in “@” Mode

    Directory of Open Access Journals (Sweden)

    Mingsheng Tang

    2014-01-01

    Full Text Available Social media, especially the microblogs, emerge as a part of our daily life and become a key way to information spread. Thus, information dissemination in the microblog became a research hotspot. Based on some principles that are summarized from the microblog users’ behaviors, this paper proposes a dynamic microblog network model. Through simulations this network has the features of periodicity of average degree, high clustering coefficient, high degree of modularity, and community. Besides, an information dissemination model through “@” in the microblog has been presented. With the microblog network model and the zombie-city model, this paper has modelled an artificial microblog and has simulated the information dissemination in the artificial microblog with different scenes. Therefore, some interesting findings have been presented. (1 Due to a better connectivity, information could spread widely in a random network; (2 information spreads more quickly in a stable microblog network; (3 the decay rate of the relationships will have an effect on information dissemination; that is, with a lower decay rate, information spreads more quickly and widely; (4 the higher active level of users in microblog could promote information spread widely and quickly; (5 the “@” mode of information dissemination makes a high modularity of the information diffusion network.

  18. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Information and Networks in Asia and Sub-Saharan Africa: Strengthening Research Capacity ... credible, high-quality evidence on the influence of digital initiatives in the areas of ... use of digital information networks and economic growth, democratic reform, and increased educational opportunities in developing countries.

  19. Transactions of the Twenty-First Water Reactor Safety Information Meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1993-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 21st Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel, Bethesda, Maryland, October 25--27, 1993. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting and are given in the order of their presentation in each session

  20. Transactions of the Twenty-First Water Reactor Safety Information Meeting

    Energy Technology Data Exchange (ETDEWEB)

    Monteleone, S. [comp.

    1993-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 21st Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel, Bethesda, Maryland, October 25--27, 1993. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting and are given in the order of their presentation in each session.

  1. Transactions of the twenty-second water reactor safety information meeting

    International Nuclear Information System (INIS)

    1994-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 22nd Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel, Bethesda, Maryland, October 24--26, 1994. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, US NRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the nuclear industry, and from foreign governments and industry are also included. The summaries have been compiled in one report to provide a basis for meaningful discussion and information exchange during the course of the meeting and are given in the order of their presentation in each session. Individual papers have been cataloged separately

  2. Transactions of the Twentieth Water Reactor Safety Information Meeting

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1992-10-01

    This report contains summaries of papers on reactor safety research to be presented at the 20th Water Reactor Safety Information Meeting at the Bethesda Marriott Hotel in Bethesda, Maryland, October 21--23, 1992. The summaries briefly describe the programs and results of nuclear safety research sponsored by the Office of Nuclear Regulatory Research, USNRC. Summaries of invited papers concerning nuclear safety issues from US government laboratories, the electric utilities, the Electric Power Research Institute (EPRI), the nuclear industry, and from foreign governments and industry are also included

  3. Maintenance of radiation safety information system

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Ho Sun [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of); Park, Moon Il; Chung, Chong Kyu; Lim, Bock Soo; Kim, Hyung Uk; Chang, Kwang Il; Nam, Kwan Hyun; Cho, Hye Ryan [AD center incubation LAB, Taejon (Korea, Republic of)

    2001-12-15

    The objectives of radiation safety information system maintenance are to maintain the requirement of users, change of job process and upgrade of the system performance stably and effectively while system maintenance. We conduct the code of conduct recommended by IAEA, management of radioisotope inventory database systematically using analysis for the state of inventory database integrated in this system. This system and database will be support the regulatory guidance, rule making and information to the MOST, KINS, other regulatory related organization and general public optimizationally.

  4. Network information provision to potential generators

    Energy Technology Data Exchange (ETDEWEB)

    Nicholson, G.

    2001-07-01

    At the time of finalising this report, an Ofgem consultation is underway on the form of Distribution Licence Condition 25, which will state the requirements for Distribution Network Operators to provide and publish data. This report is also relevant to the DTI Ofgem Embedded Generation Working Group (EGWG), which has recently completed its report and recommendations. It is hoped that this document will provide an overview of the status, importance, role and benefits of network information, which can be utilised by Generators, Network Operators and other industry players in framing their responses to this and future consultations. (Authors)

  5. 49 CFR 575.301 - Vehicle Labeling of Safety Rating Information.

    Science.gov (United States)

    2010-10-01

    ... providing them with safety rating information developed by NHTSA in its New Car Assessment Program (NCAP..., as specified at 15 U.S.C. 1231-1233. (2) Safety rating label means the label with NCAP safety rating... has approved an optional NCAP test that will cover that category, the manufacturer may depict vehicles...

  6. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  7. Artificial neural network model for prediction of safety performance indicators goals in nuclear plants

    Energy Technology Data Exchange (ETDEWEB)

    Souto, Kelling C.; Nunes, Wallace W. [Instituto Federal de Educacao, Ciencia e Tecnologia do Rio de Janeiro, Nilopolis, RJ (Brazil). Lab. de Aplicacoes Computacionais; Machado, Marcelo D., E-mail: dornemd@eletronuclear.gov.b [ELETROBRAS Termonuclear S.A. (ELETRONUCLEAR), Rio de Janeiro, RJ (Brazil). Gerencia de Combustivel Nuclear - GCN.T

    2011-07-01

    Safety performance indicators have been developed to provide a quantitative indication of the performance and safety in various industry sectors. These indexes can provide assess to aspects ranging from production, design, and human performance up to management issues in accordance with policy, objectives and goals of the company. The use of safety performance indicators in nuclear power plants around the world is a reality. However, it is necessary to periodically set goal values. Such goals are targets relating to each of the indicators to be achieved by the plant over a predetermined period of operation. The current process of defining these goals is carried out by experts in a subjective way, based on actual data from the plant, and comparison with global indices. Artificial neural networks are computational techniques that present a mathematical model inspired by the neural structure of intelligent organisms that acquire knowledge through experience. This paper proposes an artificial neural network model aimed at predicting values of goals to be used in the evaluation of safety performance indicators for nuclear power plants. (author)

  8. Artificial neural network model for prediction of safety performance indicators goals in nuclear plants

    International Nuclear Information System (INIS)

    Souto, Kelling C.; Nunes, Wallace W.; Machado, Marcelo D.

    2011-01-01

    Safety performance indicators have been developed to provide a quantitative indication of the performance and safety in various industry sectors. These indexes can provide assess to aspects ranging from production, design, and human performance up to management issues in accordance with policy, objectives and goals of the company. The use of safety performance indicators in nuclear power plants around the world is a reality. However, it is necessary to periodically set goal values. Such goals are targets relating to each of the indicators to be achieved by the plant over a predetermined period of operation. The current process of defining these goals is carried out by experts in a subjective way, based on actual data from the plant, and comparison with global indices. Artificial neural networks are computational techniques that present a mathematical model inspired by the neural structure of intelligent organisms that acquire knowledge through experience. This paper proposes an artificial neural network model aimed at predicting values of goals to be used in the evaluation of safety performance indicators for nuclear power plants. (author)

  9. Integrated care: an Information Model for Patient Safety and Vigilance Reporting Systems.

    Science.gov (United States)

    Rodrigues, Jean-Marie; Schulz, Stefan; Souvignet, Julien

    2015-01-01

    Quality management information systems for safety as a whole or for specific vigilances share the same information types but are not interoperable. An international initiative tries to develop an integrated information model for patient safety and vigilance reporting to support a global approach of heath care quality.

  10. Design Information from the PSA for Digital Safety-Critical Systems

    International Nuclear Information System (INIS)

    Kang, Hyun Gook; Jang, Seung Cheol

    2005-01-01

    Many safety-critical applications such as nuclear field application usually adopt a similar design strategy for digital safety-critical systems. Their differences from the normal design for the non-safety-critical applications could be summarized as: multiple-redundancy, highly reliable components, strengthened monitoring mechanism, verified software, and automated test procedure. These items are focusing on maintaining the capability to perform the given safety function when it is requested. For the past several decades, probabilistic safety assessment (PSA) techniques are used in the nuclear industry to assess the relative effects of contributing events on plant risk and system reliability. They provide a unifying means of assessing physical faults, recovery processes, contributing effects, human actions, and other events that have a high degree of uncertainty. The applications of PSA provide not only the analysis results of already installed system but also the useful information for the system under design. The information could be derived from the PSA experience of the various safety-critical systems. Thanks to the design flexibility, the digital system is one of the most suitable candidates for risk-informed design (RID). In this article, we will describe the feedbacks for system design and try to develop a procedure for RID. Even though the procedure is not sophisticated enough now, it could be the start point of the further investigation for developing more complete and practical methodology

  11. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  12. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  13. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  14. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...

  15. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  16. 77 FR 69899 - Public Conference on Geographic Information Systems (GIS) in Transportation Safety

    Science.gov (United States)

    2012-11-21

    ... NATIONAL TRANSPORTATION SAFETY BOARD Public Conference on Geographic Information Systems (GIS) in... Geographic Information Systems (GIS) in transportation safety on December 4-5, 2012. GIS is a rapidly... visualization of data. The meeting will bring researchers and practitioners in transportation safety and GIS...

  17. Information jet: Handling noisy big data from weakly disconnected network

    Science.gov (United States)

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  18. Reperes, the information magazine of the Institute for Radiation Protection and Nuclear Safety - IRSN, No. 12 - January 2012, Special issue Fukushima - First lessons from the accident

    International Nuclear Information System (INIS)

    2012-01-01

    A first set of articles addresses the nuclear crisis in Japan (description of the accident, information mission sent by France, and support actions undertaken by France in Japan in the fields of education, civilian security, culture, sailing, media, dosimeters, robotics). A second set discusses lessons learned in terms of nuclear safety (complementary safety assessments, stress test in Gravelines), radiological consequences (impact on Japanese population, the Symbiose software, the Teleray network), crisis management, and research

  19. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  20. Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS

    OpenAIRE

    Bauereiss , Thomas; Hutter , Dieter

    2014-01-01

    Part 6: Information Flow Control; International audience; Motivated by typical security requirements of workflow management systems, we consider the integrated verification of both safety properties (e.g. separation of duty) and information flow security predicates of the MAKS framework (e.g. modeling confidentiality requirements). Due to the refinement paradox, enforcement of safety properties might violate possibilistic information flow properties of a system. We present an approach where s...

  1. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  2. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  3. Neural network ensemble based supplier evaluation model in line with nuclear safety conditions

    International Nuclear Information System (INIS)

    Wang Yonggang; Chang Baosheng

    2006-01-01

    Nuclear safety is the most critical target for nuclear power plant operation. Besides the rigid operation procedures established, evaluation of suppliers working with plants can be another important aspects. Selection and evaluation of suppliers can be classified with qualitative analysis and quantitative management. The indicators involved are coupled with each other in a very complicated manner, therefore the relevant data show the strong characteristic of non-linearity. The article is based on the research and analysis of the real conditions of the Daya Bay nuclear power plant operation management. Through study and analysis of the information home and abroad, and with reference to the neural network ensemble technology, the supplier evaluation system and model are established as illustrated within the paper, thus to heighten objectivity of the supplier selection. (authors)

  4. Proactive Traffic Information Control in Emergency Evacuation Network

    Directory of Open Access Journals (Sweden)

    Zhengfeng Huang

    2015-01-01

    Full Text Available Traffic demand in emergency evacuation is usually too large to be effectively managed with reactive traffic information control methods. These methods adapt to the road traffic passively by publishing real-time information without consideration of the routing behavior feedback produced by evacuees. Other remedy measures have to be prepared in case of nonrecurring congestion under these methods. To use the network capacity fully to mitigate near-future evacuation traffic congestion, we propose proactive traffic information control (PTIC model. Based on the mechanism between information and routing behavior feedback, this model can change the route choice of evacuees in advance by dissipating strategic traffic information. Generally, the near-future traffic condition is difficult to accurately predict because it is uncertain in evacuation. Assume that the value of traffic information obeys certain distribution within a range, and then real-time traffic information may reflect the most-likely near-future traffic condition. Unlike the real-time information, the proactive traffic information is a selection within the range to achieve a desired level of the road network performance index (total system travel time. In the aspect of the solution algorithm, differential equilibrium decomposed optimization (D-EDO is proposed to compare with other heuristic methods. A field study on a road network around a large stadium is used to validate the PTIC.

  5. METIS: Dependable Cooperative Systems for Public Safety

    NARCIS (Netherlands)

    Hendriks, A.J.; Laar, P.J.L.J. van de

    2013-01-01

    Much, if not most, information needed to assess a crisis situation originates these days from cooperative sources such as the Internet and social networks. Public safety authorities face the challenge to compile this information of uncertain origin and quality in their situation understanding and

  6. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  7. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  8. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  9. The Criticality Safety Information Resource Center (CSIRC) at Los Alamos National Laboratory

    International Nuclear Information System (INIS)

    Henderson, B.D.; Meade, R.A.; Pruvost, N.L.

    1999-01-01

    The Criticality Safety Information Resource Center (CSIRC) at Los Alamos National Laboratory (LANL) is a program jointly funded by the U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC) in conjunction with the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 97-2. The goal of CSIRC is to preserve primary criticality safety documentation from U.S. critical experimental sites and to make this information available for the benefit of the technical community. Progress in archiving criticality safety primary documents at the LANL archives as well as efforts to make this information available to researchers are discussed. The CSIRC project has a natural linkage to the International Criticality Safety Benchmark Evaluation Project (ICSBEP). This paper raises the possibility that the CSIRC project will evolve in a fashion similar to the ICSBEP. Exploring the implications of linking the CSIRC to the international criticality safety community is the motivation for this paper

  10. A Programming Language Approach to Safety in Home Networks

    DEFF Research Database (Denmark)

    Mortensen, Kjeld Høyer; Schougaard, Kari Rye; Schultz, Ulrik Pagh

    , even in a worst-case scenario where an unauthorized user gains remote control of the facilities. We address this safety issue at the programming language level by restricting the operations that can be performed on devices according to the physical location of the user initiating the request......-based restrictions on operations. This model has been implemented in a middleware for home AV devices written in Java, using infrared communication and a FireWire network to implement location awareness....

  11. A Programming Language Approach to Safety in Home Networks

    DEFF Research Database (Denmark)

    Mortensen, Kjeld Høyer; Schougaard, Kari Sofie Fogh; Schultz, Ulrik Pagh

    2003-01-01

    , even in a worst-case scenario where an unauthorized user gains remote control of the facilities. We address this safety issue at the programming language level by restricting the operations that can be performed on devices according to the physical location of the user initiating the request......-based restrictions on operations. This model has been implemented in a middleware for home AV devices written in Java, using infrared communication and a FireWire network to implement location awareness....

  12. Geosciences Information Network (GIN): A modular, distributed, interoperable data network for the geosciences

    Science.gov (United States)

    Allison, M.; Gundersen, L. C.; Richard, S. M.; Dickinson, T. L.

    2008-12-01

    A coalition of the state geological surveys (AASG), the U.S. Geological Survey (USGS), and partners will receive NSF funding over 3 years under the INTEROP solicitation to start building the Geoscience Information Network (www.geoinformatics.info/gin) a distributed, interoperable data network. The GIN project will develop standardized services to link existing and in-progress components using a few standards and protocols, and work with data providers to implement these services. The key components of this network are 1) catalog system(s) for data discovery; 2) service definitions for interfaces for searching catalogs and accessing resources; 3) shared interchange formats to encode information for transmission (e.g. various XML markup languages); 4) data providers that publish information using standardized services defined by the network; and 5) client applications adapted to use information resources provided by the network. The GIN will integrate and use catalog resources that currently exist or are in development. We are working with the USGS National Geologic Map Database's existing map catalog, with the USGS National Geological and Geophysical Data Preservation Program, which is developing a metadata catalog (National Digital Catalog) for geoscience information resource discovery, and with the GEON catalog. Existing interchange formats will be used, such as GeoSciML, ChemML, and Open Geospatial Consortium sensor, observation and measurement MLs. Client application development will be fostered by collaboration with industry and academic partners. The GIN project will focus on the remaining aspects of the system -- service definitions and assistance to data providers to implement the services and bring content online - and on system integration of the modules. Initial formal collaborators include the OneGeology-Europe consortium of 27 nations that is building a comparable network under the EU INSPIRE initiative, GEON, Earthchem, and GIS software company ESRI

  13. Information filtering on coupled social networks.

    Science.gov (United States)

    Nie, Da-Cheng; Zhang, Zi-Ke; Zhou, Jun-Lin; Fu, Yan; Zhang, Kui

    2014-01-01

    In this paper, based on the coupled social networks (CSN), we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  14. Thermal analysis and safety information for metal nanopowders by DSC

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, J.M.; Huang, S.T. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Duh, Y.S.; Hsieh, T.Y.; Sun, Y.Y. [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China); Lin, J.Z. [Institute of Safety and Disaster Prevention Technology, Central Taiwan University of Science and Technology, 666, Buzih Road, Beitun District, Taichung 40601, Taiwan, ROC (China); Wu, H.C. [Institute of Occupational Safety and Health, Council of Labor Affairs, Taipei, Taiwan, ROC (China); Kao, C.S., E-mail: jcsk@nuu.edu.tw [Department of Safety Health and Environmental Engineering, National United University, Miaoli, Taiwan, ROC (China)

    2013-08-20

    Highlights: • Metal nanopowders are common and frequently employed in industry. • Nano iron powder experimental results of T{sub o} were 140–150 °C. • Safety information can benefit relevant metal powders industries. - Abstract: Metal nanopowders are common and frequently employed in industry. Iron is mostly applied in high-performance magnetic materials and pollutants treatment for groundwater. Zinc is widely used in brass, bronze, die casting metal, alloys, rubber, and paints, etc. Nonetheless, some disasters induced by metal powders are due to the lack of related safety information. In this study, we applied differential scanning calorimetry (DSC) and used thermal analysis software to evaluate the related thermal safety information, such as exothermic onset temperature (T{sub o}), peak of temperature (T{sub p}), and heat of reaction (ΔH). The nano iron powder experimental results of T{sub o} were 140–150 °C, 148–158 °C, and 141–149 °C for 15 nm, 35 nm, and 65 nm, respectively. The ΔH was larger than 3900 J/g, 5000 J/g, and 3900 J/g for 15 nm, 35 nm, and 65 nm, respectively. Safety information can benefit the relevant metal powders industries for preventing accidents from occurring.

  15. Research on the Architecture of a Basic Reconfigurable Information Communication Network

    Directory of Open Access Journals (Sweden)

    Ruimin Wang

    2013-01-01

    Full Text Available The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. This paper provides the theory system for the basic reconfigurable information communication network based on the analysis of present problems on the Internet and summarizes the root of these problems. It also provides an in-depth discussion about the related technologies and the prime components of the architecture.

  16. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  17. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  18. Information Systems at Enterprise. Design of Secure Network of Enterprise

    Science.gov (United States)

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  19. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  20. Graph Regularized Meta-path Based Transductive Regression in Heterogeneous Information Network.

    Science.gov (United States)

    Wan, Mengting; Ouyang, Yunbo; Kaplan, Lance; Han, Jiawei

    2015-01-01

    A number of real-world networks are heterogeneous information networks, which are composed of different types of nodes and links. Numerical prediction in heterogeneous information networks is a challenging but significant area because network based information for unlabeled objects is usually limited to make precise estimations. In this paper, we consider a graph regularized meta-path based transductive regression model ( Grempt ), which combines the principal philosophies of typical graph-based transductive classification methods and transductive regression models designed for homogeneous networks. The computation of our method is time and space efficient and the precision of our model can be verified by numerical experiments.

  1. Final report of the 'Nordic thermal-hydraulic and safety network (NOTNET)' - Project

    Energy Technology Data Exchange (ETDEWEB)

    Tuunanen, J.; Tuomainen, M. [VTT Processes (Finland)

    2005-04-01

    A Nordic network for thermal-hydraulics and nuclear safety research was started. The idea of the network is to combine the resources of different research teams in order to carry out more ambitious and extensive research programs than would be possible for the individual teams. From the very beginning, the end users of the research results have been integrated to the network. Aim of the network is to benefit the partners involved in nuclear energy in the Nordic Countries (power companies, reactor vendors, safety regulators, research units). First task within the project was to describe the resources (personnel, know-how, simulation tools, test facilities) of the various teams. Next step was to discuss with the end users about their research needs. Based on these steps, few most important research topics with defined goals were selected, and coarse road maps were prepared for reaching the targets. These road maps will be used as a starting point for planning the actual research projects in the future. The organisation and work plan for the network were established. National coordinators were appointed, as well as contact persons in each participating organisation, whether research unit or end user. This organisation scheme is valid for the short-term operation of NOTNET when only Nordic organisations take part in the work. Later on, it is possible to enlarge the network e.g. within EC framework programme. The network can now start preparing project proposals and searching funding for the first common research projects. (au)

  2. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  3. Integration of genomic information with biological networks using Cytoscape.

    Science.gov (United States)

    Bauer-Mehren, Anna

    2013-01-01

    Cytoscape is an open-source software for visualizing, analyzing, and modeling biological networks. This chapter explains how to use Cytoscape to analyze the functional effect of sequence variations in the context of biological networks such as protein-protein interaction networks and signaling pathways. The chapter is divided into five parts: (1) obtaining information about the functional effect of sequence variation in a Cytoscape readable format, (2) loading and displaying different types of biological networks in Cytoscape, (3) integrating the genomic information (SNPs and mutations) with the biological networks, and (4) analyzing the effect of the genomic perturbation onto the network structure using Cytoscape built-in functions. Finally, we briefly outline how the integrated data can help in building mathematical network models for analyzing the effect of the sequence variation onto the dynamics of the biological system. Each part is illustrated by step-by-step instructions on an example use case and visualized by many screenshots and figures.

  4. Brain networks underlying mental imagery of auditory and visual information.

    Science.gov (United States)

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  5. Health and safety information program for hazardous materials

    International Nuclear Information System (INIS)

    O'Brien, M.P.; Fallon, N.J.; Kuehner, A.V.

    1979-01-01

    The system is used as a management tool in several safety and health programs. It is used to: trace the use of hazardous materials and to determine monitoring needs; inform the occupational physician of the potential health problems associated with materials ordered by a given individual; inform the fire and rescue group of hazardous materials in a given building; provide waste disposal recommendations to the hazardous waste management group; assist the hazardous materials shipping coordinator in identifying materials which are regulated by the Department of Transportation; and guide management decisions in the area of recognizing and rectifying unsafe conditions. The information system has been expanded from a manual effort to provide a brief description of health hazards of chemicals used at the lab to a computerized health and safety information system which serves the needs of all personnel who may encounter the material in the course of their work. The system has been designed to provide information needed to control the potential problems associated with a hazardous material up to the time that it is consumed in a given operation or is sent to the waste disposal facility

  6. Opportunities for Using Building Information Modeling to Improve Worker Safety Performance

    Directory of Open Access Journals (Sweden)

    Kasim Alomari

    2017-02-01

    Full Text Available Building information modelling (BIM enables the creation of a digital representation of a designed facility combined with additional information about the project attributes, performance criteria, and construction process. Users of BIM tools point to the ability to visualize the final design along with the construction process as a beneficial feature of using BIM. Knowing the construction process in relationship to a facility’s design benefits both safety professionals when planning worker safety measures for a project and designers when creating a project’s design. Success in using BIM to enhance safety partly depends on the familiarity of project personnel with BIM tools and the extent to which the tools can be used to identify and eliminate safety hazards. In a separate, ongoing study, the authors investigated the connection between BIM and safety to document the opportunities, barriers, and impacts. Utilizing an on-line survey of project engineers who work for construction firms together with a comprehensive literature review, the study found those who use BIM feel that it aids in communication of project information and project delivery, both of which have been found to have positive impacts on construction site safety. Further, utilizing the survey results, the authors apply the binary logistic regression econometric framework to better understand the factors that lead to safety professionals believing that BIM increases safety in the work place. In addition, according to the survey results, a large percentage of the engineers who use BIM feel that ultimately it helps to eliminate safety hazards and improve worker safety. The study findings suggest that improvements in safety performance across the construction industry may be due in part to increased use of BIM in the construction industry.

  7. A participatory model for improving occupational health and safety: improving informal sector working conditions in Thailand.

    Science.gov (United States)

    Manothum, Aniruth; Rukijkanpanich, Jittra; Thawesaengskulthai, Damrong; Thampitakkul, Boonwa; Chaikittiporn, Chalermchai; Arphorn, Sara

    2009-01-01

    The purpose of this study was to evaluate the implementation of an Occupational Health and Safety Management Model for informal sector workers in Thailand. The studied model was characterized by participatory approaches to preliminary assessment, observation of informal business practices, group discussion and participation, and the use of environmental measurements and samples. This model consisted of four processes: capacity building, risk analysis, problem solving, and monitoring and control. The participants consisted of four local labor groups from different regions, including wood carving, hand-weaving, artificial flower making, and batik processing workers. The results demonstrated that, as a result of applying the model, the working conditions of the informal sector workers had improved to meet necessary standards. This model encouraged the use of local networks, which led to cooperation within the groups to create appropriate technologies to solve their problems. The authors suggest that this model could effectively be applied elsewhere to improve informal sector working conditions on a broader scale.

  8. The challenge of effectively communicating patient safety information.

    Science.gov (United States)

    Hugman, Bruce; Edwards, I Ralph

    2006-07-01

    Rational use of drugs and patient safety are seriously compromised by a lack of good information, education and effective communication at all stages of drug development and use. From animal trials through to dispensing, there are misconceptions and opportunities for error which current methods of drug information communication do not adequately address: they do not provide those responsible for prescribing and dispensing drugs with the data and information they need to pass on complex and often changing messages to patients and the public. The incidence of adverse reactions due to the way drugs are used; the variable impact of regulatory guidelines and warnings on prescribing behaviour; drug scares and crises suggest a great gap between the ideals of the safe use of medicines and the reality in homes, clinics and hospitals around the world. To address these challenges, the authors review the several levels at which safety information is generated and communicated, and examine how, at each stage, the content and its significance, and the method of communication can be improved.

  9. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  10. Artificial neural networks and neuro-fuzzy inference systems as virtual sensors for hydrogen safety prediction

    Energy Technology Data Exchange (ETDEWEB)

    Karri, Vishy; Ho, Tien [School of Engineering, University of Tasmania, GPO Box 252-65, Hobart, Tasmania 7001 (Australia); Madsen, Ole [Department of Production, Aalborg University, Fibigerstraede 16, DK-9220 Aalborg (Denmark)

    2008-06-15

    Hydrogen is increasingly investigated as an alternative fuel to petroleum products in running internal combustion engines and as powering remote area power systems using generators. The safety issues related to hydrogen gas are further exasperated by expensive instrumentation required to measure the percentage of explosive limits, flow rates and production pressure. This paper investigates the use of model based virtual sensors (rather than expensive physical sensors) in connection with hydrogen production with a Hogen 20 electrolyzer system. The virtual sensors are used to predict relevant hydrogen safety parameters, such as the percentage of lower explosive limit, hydrogen pressure and hydrogen flow rate as a function of different input conditions of power supplied (voltage and current), the feed of de-ionized water and Hogen 20 electrolyzer system parameters. The virtual sensors are developed by means of the application of various Artificial Intelligent techniques. To train and appraise the neural network models as virtual sensors, the Hogen 20 electrolyzer is instrumented with necessary sensors to gather experimental data which together with MATLAB neural networks toolbox and tailor made adaptive neuro-fuzzy inference systems (ANFIS) were used as predictive tools to estimate hydrogen safety parameters. It was shown that using the neural networks hydrogen safety parameters were predicted to less than 3% of percentage average root mean square error. The most accurate prediction was achieved by using ANFIS. (author)

  11. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  12. Experience on the FMS Communication module Development for an Application to Safety- Critical Communication Network

    Energy Technology Data Exchange (ETDEWEB)

    Son, Kwang Seop; Lee, Jang Soo; Kim, Jung Heon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    The field bus has been developed for a network system which supports the real-time communication of various controls and automation equipment. It is known for Profibus in the field of a production automation environment. The Profibus standard uses open communication based on the ISO/OSI model. The Probibus standard uses layer 1, layer 2, layer 7. Layer 7 of Probibus FMS(Fieldbus Message Specification) provides a information and the user of a station. The high-level communication of the safety-grade PLC (POSAFE-Q) developed through the KNICS(Korea Nuclear I and C System) project is the FMS This paper describes the design, the configuration, and the test method of the FMS communication module.

  13. Experience on the FMS Communication module Development for an Application to Safety- Critical Communication Network

    International Nuclear Information System (INIS)

    Son, Kwang Seop; Lee, Jang Soo; Kim, Jung Heon

    2009-01-01

    The field bus has been developed for a network system which supports the real-time communication of various controls and automation equipment. It is known for Profibus in the field of a production automation environment. The Profibus standard uses open communication based on the ISO/OSI model. The Probibus standard uses layer 1, layer 2, layer 7. Layer 7 of Probibus FMS(Fieldbus Message Specification) provides a information and the user of a station. The high-level communication of the safety-grade PLC (POSAFE-Q) developed through the KNICS(Korea Nuclear I and C System) project is the FMS This paper describes the design, the configuration, and the test method of the FMS communication module

  14. Information need about the safety of the final disposal of nuclear waste. Information receiver's views in Eurajoki, Kuhmo and Aeaenekoski municipalities

    International Nuclear Information System (INIS)

    Hautakangas, H.

    1997-03-01

    The study analyses the public's information need about the safety issues related to the final disposal of spent nuclear fuel generated by the Finnish nuclear power stations. Locals in three municipalities that are studied as possible sites for final disposal were interviewed for the study. Earlier studies made in Finland had indicated that the public's knowledge about safety issues related to the final disposal was almost opposite to the findings of the natural sciences. Also, the public had expressed a wish to receive more information from the safety authority, the Finnish Centre for Radiation and Nuclear Safety (STUK). This study therefore had two basic objectives: To find out what kind of safety information the locals need and what the safety authority's role could be in providing information. The main results show interest and need especially for information concerning the disposal phases taking place on the ground level, such as nuclear waste transportation and encapsulation. Also, the interviews show a clear need and desire for an impartial actor such as STUK in the information and communication process. (author) (107 refs.)

  15. Information Retrieval on social network: An Adaptive Proof

    Science.gov (United States)

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  16. Artificial neural network for research reactor safety status monitoring

    International Nuclear Information System (INIS)

    Varde, P.V.

    2001-01-01

    During reactor upset/abnormal conditions, emphasis is placed on plant operator's ability to quickly identify the problem and perform diagnosis and initiate recovery action to ensure safety of the plant. However, the reliability of human action is adversely affected at the time of crisis, due to the time stress and psychological factors. Availability of operational aids capable of monitoring the status of the plant and quickly identifying the deviation from normal operation is expected to significantly improve the operator reliability. Artificial Neural Network (based on Back Propagation Algorithm) has been developed and applied for reactor safety status monitoring, as part of an Operator Support System. ANN has been trained for 14 different plant states using 42 input symptom patterns. Recall tests performed on the ANN show that the system was able to identify the plant state with reasonable accuracy. (author)

  17. Exchange of information between nuclear safety authorities: Policy of the French regulator

    International Nuclear Information System (INIS)

    Asty, Michel

    2000-01-01

    Full text: The decree setting up the Nuclear Safety Authority in 1973 entrusted it with international assignments whose objectives are still valid: - develop exchanges of information with foreign counterparts on regulatory systems and practices, on problems encountered in the nuclear safety field and on provisions made, with a view to enhancing its approach, and - becoming better acquainted with the actual operating practice of these Safety Authorities from which lessons could be learned for its own working procedures; - improving its position in the technical discussions with the French operators, since its arguments would be strengthened by practical knowledge of conditions abroad; - make known and explain the French approach and practices in the nuclear safety field and provide information on measures taken to deal with the problems encountered. This approach has several objectives: - promote the circulation of information on French positions on certain issues, such as very low level waste, for instance; - assist some countries wishing to create or modify their Nuclear Safety Authority, such as countries of the former USSR, the Central and Eastern European countries, and emerging countries on other continents; - help, when requested, foreign Safety Authorities required to issue permits for nuclear equipment of French origin; - provide the countries concerned with all relevant information on French nuclear installations located near their frontiers. Examples are given on the way the French Nuclear Safety Authority implements these objectives. (author)

  18. Impediments for the application of risk-informed decision making in nuclear safety

    International Nuclear Information System (INIS)

    Hahn, L.

    2001-01-01

    A broad application of risk-informed decision making in the regulation of safety of nuclear power plants is hindered by the lack of quantitative risk and safety standards as well as of precise instruments to demonstrate an appropriate safety. An additional severe problem is associated with the difficulty to harmonize deterministic design requirements and probabilistic safety assessment. The problem is strengthened by the vulnerability of PSA for subjective influences and the potential of misuse. Beside this scepticism the nuclear community is encouraged to intensify the efforts to improve the quality standards for probabilistic safety assessments and their quality assurance. A prerequisite for reliable risk-informed decision making processes is also a well-defined and transparent relationship between deterministic and probabilistic safety approaches. (author)

  19. An investigation into users' information security awareness on social networks in south western Nigeria

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2016-11-01

    Full Text Available Background: Social networks (SNs offer new and exciting opportunities for interaction among people, cutting across different stratum of the society and providing a ubiquitous mechanism that supports a wide variety of activities. They are at the same time being exploited by criminals to fraudulently obtain information from unsuspecting users. Unfortunately, the seamless communication and semblance of safety assumed by most users make them oblivious to the potential online dangers. Objective: Using quantitative methods on selected social sites, this study empirically examined the information security awareness of SN users in south western Nigeria. Method: A self-designed research instrument was administered for data collection while descriptive and inferential statistics were employed using chi-square, cross-tabulation and t-test for data analysis and result interpretation. Result: Findings from the analysed data suggest that the risk perception vary among male and female SN users and that the general perception of risks regarding SN usage is also very low. Conclusion: Adequate security awareness coupled with detailed legal measures are required to keep SNs secured. However, an individual is duly responsible for the habit of ignoring potential risks posed by the networks.

  20. Tackling Information Asymmetry in Networks: A New Entropy-Based Ranking Index

    Science.gov (United States)

    Barucca, Paolo; Caldarelli, Guido; Squartini, Tiziano

    2018-06-01

    Information is a valuable asset in socio-economic systems, a significant part of which is entailed into the network of connections between agents. The different interlinkages patterns that agents establish may, in fact, lead to asymmetries in the knowledge of the network structure; since this entails a different ability of quantifying relevant, systemic properties (e.g. the risk of contagion in a network of liabilities), agents capable of providing a better estimation of (otherwise) inaccessible network properties, ultimately have a competitive advantage. In this paper, we address the issue of quantifying the information asymmetry of nodes: to this aim, we define a novel index—InfoRank—intended to rank nodes according to their information content. In order to do so, each node ego-network is enforced as a constraint of an entropy-maximization problem and the subsequent uncertainty reduction is used to quantify the node-specific accessible information. We, then, test the performance of our ranking procedure in terms of reconstruction accuracy and show that it outperforms other centrality measures in identifying the "most informative" nodes. Finally, we discuss the socio-economic implications of network information asymmetry.

  1. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  2. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  3. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  4. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Marina V. Tumbinskaya

    2017-01-01

    Full Text Available Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level. 

  5. Effective network inference through multivariate information transfer estimation

    Science.gov (United States)

    Dahlqvist, Carl-Henrik; Gnabo, Jean-Yves

    2018-06-01

    Network representation has steadily gained in popularity over the past decades. In many disciplines such as finance, genetics, neuroscience or human travel to cite a few, the network may not directly be observable and needs to be inferred from time-series data, leading to the issue of separating direct interactions between two entities forming the network from indirect interactions coming through its remaining part. Drawing on recent contributions proposing strategies to deal with this problem such as the so-called "global silencing" approach of Barzel and Barabasi or "network deconvolution" of Feizi et al. (2013), we propose a novel methodology to infer an effective network structure from multivariate conditional information transfers. Its core principal is to test the information transfer between two nodes through a step-wise approach by conditioning the transfer for each pair on a specific set of relevant nodes as identified by our algorithm from the rest of the network. The methodology is model free and can be applied to high-dimensional networks with both inter-lag and intra-lag relationships. It outperforms state-of-the-art approaches for eliminating the redundancies and more generally retrieving simulated artificial networks in our Monte-Carlo experiments. We apply the method to stock market data at different frequencies (15 min, 1 h, 1 day) to retrieve the network of US largest financial institutions and then document how bank's centrality measurements relate to bank's systemic vulnerability.

  6. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  7. Towards the understanding of network information processing in biology

    Science.gov (United States)

    Singh, Vijay

    Living organisms perform incredibly well in detecting a signal present in the environment. This information processing is achieved near optimally and quite reliably, even though the sources of signals are highly variable and complex. The work in the last few decades has given us a fair understanding of how individual signal processing units like neurons and cell receptors process signals, but the principles of collective information processing on biological networks are far from clear. Information processing in biological networks, like the brain, metabolic circuits, cellular-signaling circuits, etc., involves complex interactions among a large number of units (neurons, receptors). The combinatorially large number of states such a system can exist in makes it impossible to study these systems from the first principles, starting from the interactions between the basic units. The principles of collective information processing on such complex networks can be identified using coarse graining approaches. This could provide insights into the organization and function of complex biological networks. Here I study models of biological networks using continuum dynamics, renormalization, maximum likelihood estimation and information theory. Such coarse graining approaches identify features that are essential for certain processes performed by underlying biological networks. We find that long-range connections in the brain allow for global scale feature detection in a signal. These also suppress the noise and remove any gaps present in the signal. Hierarchical organization with long-range connections leads to large-scale connectivity at low synapse numbers. Time delays can be utilized to separate a mixture of signals with temporal scales. Our observations indicate that the rules in multivariate signal processing are quite different from traditional single unit signal processing.

  8. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  9. A quantitative approach to measure road network information based on edge diversity

    Science.gov (United States)

    Wu, Xun; Zhang, Hong; Lan, Tian; Cao, Weiwei; He, Jing

    2015-12-01

    The measure of map information has been one of the key issues in assessing cartographic quality and map generalization algorithms. It is also important for developing efficient approaches to transfer geospatial information. Road network is the most common linear object in real world. Approximately describe road network information will benefit road map generalization, navigation map production and urban planning. Most of current approaches focused on node diversities and supposed that all the edges are the same, which is inconsistent to real-life condition, and thus show limitations in measuring network information. As real-life traffic flow are directed and of different quantities, the original undirected vector road map was first converted to a directed topographic connectivity map. Then in consideration of preferential attachment in complex network study and rich-club phenomenon in social network, the from and to weights of each edge are assigned. The from weight of a given edge is defined as the connectivity of its end node to the sum of the connectivities of all the neighbors of the from nodes of the edge. After getting the from and to weights of each edge, edge information, node information and the whole network structure information entropies could be obtained based on information theory. The approach has been applied to several 1 square mile road network samples. Results show that information entropies based on edge diversities could successfully describe the structural differences of road networks. This approach is a complementarity to current map information measurements, and can be extended to measure other kinds of geographical objects.

  10. Probabilistic Safety Analysis of High Speed and Conventional Lines Using Bayesian Networks

    Energy Technology Data Exchange (ETDEWEB)

    Grande Andrade, Z.; Castillo Ron, E.; O' Connor, A.; Nogal, M.

    2016-07-01

    A Bayesian network approach is presented for probabilistic safety analysis (PSA) of railway lines. The idea consists of identifying and reproducing all the elements that the train encounters when circulating along a railway line, such as light and speed limit signals, tunnel or viaduct entries or exits, cuttings and embankments, acoustic sounds received in the cabin, curves, switches, etc. In addition, since the human error is very relevant for safety evaluation, the automatic train protection (ATP) systems and the driver behavior and its time evolution are modelled and taken into account to determine the probabilities of human errors. The nodes of the Bayesian network, their links and the associated probability tables are automatically constructed based on the line data that need to be carefully given. The conditional probability tables are reproduced by closed formulas, which facilitate the modelling and the sensitivity analysis. A sorted list of the most dangerous elements in the line is obtained, which permits making decisions about the line safety and programming maintenance operations in order to optimize them and reduce the maintenance costs substantially. The proposed methodology is illustrated by its application to several cases that include real lines such as the Palencia-Santander and the Dublin-Belfast lines. (Author)

  11. Actor-network Theory and cartography of controversies in Information Science

    OpenAIRE

    LOURENÇO, Ramon Fernandes; TOMAÉL, Maria Inês

    2018-01-01

    Abstract The present study aims to discuss the interactions between the Actor-network Theory and the Cartography of Controversies method in Information Science research. A literature review was conducted on books, scholarly articles, and any other sources addressing the Theory-Actor Network and Cartography of Controversies. The understanding of the theoretical assumptions that guide the Network-Actor Theory allows examining important aspects to Information Science research, seeking to identif...

  12. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  13. E-learning objects and actor-networks as configuring information literacy teaching

    DEFF Research Database (Denmark)

    Schreiber, Trine Louise

    2017-01-01

    Introduction. With actor-network theory (ANT) as the theoretical lens the aim of the paper is to examine attempts to build network for shaping information literacy teaching. Method. The paper is based on a study of a project in 2014-2016 where information professionals representing ten educational...... libraries produced and implemented e-learning objects in information literacy teaching. The material was collected through interviews, observations, documents and feedback sessions. Analysis. Latour´s concept of translation and Callon´s four translation moments are used to analyze the network building...... that a network configuring information literacy teaching based on new interactive roles has not been stabilized. Conclusion. The paper concludes that the strength of ANT is first of all the mediation of an overview of different kinds of actors involved in network building. Further, the paper proposes to combine...

  14. Expanding the informational chemistries of life: peptide/RNA networks

    Science.gov (United States)

    Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.

    2017-11-01

    The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.

  15. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  16. Feedback from incident reporting: information and action to improve patient safety.

    Science.gov (United States)

    Benn, J; Koutantji, M; Wallace, L; Spurgeon, P; Rejman, M; Healey, A; Vincent, C

    2009-02-01

    Effective feedback from incident reporting systems in healthcare is essential if organisations are to learn from failures in the delivery of care. Despite the wide-scale development and implementation of incident reporting in healthcare, studies in the UK suggest that information concerning system vulnerabilities could be better applied to improve operational safety within organisations. In this article, the findings and implications of research to identify forms of effective feedback from incident reporting are discussed, to promote best practices in this area. The research comprised a mixed methods review to investigate mechanisms of effective feedback for healthcare, drawing upon experience within established reporting programmes in high-risk industry and transport domains. Systematic searches of published literature were undertaken, and 23 case studies describing incident reporting programmes with feedback were identified for analysis from the international healthcare literature. Semistructured interviews were undertaken with 19 subject matter experts across a range of domains, including: civil aviation, maritime, energy, rail, offshore production and healthcare. In analysis, qualitative information from several sources was synthesised into practical requirements for developing effective feedback in healthcare. Both action and information feedback mechanisms were identified, serving safety awareness, improvement and motivational functions. The provision of actionable feedback that visibly improved systems was highlighted as important in promoting future reporting. Fifteen requirements for the design of effective feedback systems were identified, concerning: the role of leadership, the credibility and content of information, effective dissemination channels, the capacity for rapid action and the need for feedback at all levels of the organisation, among others. Above all, the safety-feedback cycle must be closed by ensuring that reporting, analysis and

  17. A multivariate extension of mutual information for growing neural networks.

    Science.gov (United States)

    Ball, Kenneth R; Grant, Christopher; Mundy, William R; Shafer, Timothy J

    2017-11-01

    Recordings of neural network activity in vitro are increasingly being used to assess the development of neural network activity and the effects of drugs, chemicals and disease states on neural network function. The high-content nature of the data derived from such recordings can be used to infer effects of compounds or disease states on a variety of important neural functions, including network synchrony. Historically, synchrony of networks in vitro has been assessed either by determination of correlation coefficients (e.g. Pearson's correlation), by statistics estimated from cross-correlation histograms between pairs of active electrodes, and/or by pairwise mutual information and related measures. The present study examines the application of Normalized Multiinformation (NMI) as a scalar measure of shared information content in a multivariate network that is robust with respect to changes in network size. Theoretical simulations are designed to investigate NMI as a measure of complexity and synchrony in a developing network relative to several alternative approaches. The NMI approach is applied to these simulations and also to data collected during exposure of in vitro neural networks to neuroactive compounds during the first 12 days in vitro, and compared to other common measures, including correlation coefficients and mean firing rates of neurons. NMI is shown to be more sensitive to developmental effects than first order synchronous and nonsynchronous measures of network complexity. Finally, NMI is a scalar measure of global (rather than pairwise) mutual information in a multivariate network, and hence relies on less assumptions for cross-network comparisons than historical approaches. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. A hierarchical network modeling method for railway tunnels safety assessment

    Science.gov (United States)

    Zhou, Jin; Xu, Weixiang; Guo, Xin; Liu, Xumin

    2017-02-01

    Using network theory to model risk-related knowledge on accidents is regarded as potential very helpful in risk management. A large amount of defects detection data for railway tunnels is collected in autumn every year in China. It is extremely important to discover the regularities knowledge in database. In this paper, based on network theories and by using data mining techniques, a new method is proposed for mining risk-related regularities to support risk management in railway tunnel projects. A hierarchical network (HN) model which takes into account the tunnel structures, tunnel defects, potential failures and accidents is established. An improved Apriori algorithm is designed to rapidly and effectively mine correlations between tunnel structures and tunnel defects. Then an algorithm is presented in order to mine the risk-related regularities table (RRT) from the frequent patterns. At last, a safety assessment method is proposed by consideration of actual defects and possible risks of defects gained from the RRT. This method cannot only generate the quantitative risk results but also reveal the key defects and critical risks of defects. This paper is further development on accident causation network modeling methods which can provide guidance for specific maintenance measure.

  19. The Value of Information in Distributed Decision Networks

    Science.gov (United States)

    2016-03-04

    formulation, and then we describe the various results at- tained. 1 Mathematical description of Distributed Decision Network un- der Information...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...to any linear, combinatorial problem like shortest path optimization, and, further, so long as the original combinatorial problem can be solved in

  20. 'BeSAFE', effect-evaluation of internet-based, tailored safety information combined with personal counselling on parents' child safety behaviours: study design of a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    van Beeck Eduard F

    2010-08-01

    Full Text Available Abstract Background Injuries in or around the home are the most important cause of death among children aged 0-4 years old. It is also a major source of morbidity and loss of quality of life. In order to reduce the number of injuries, the Consumer Safety Institute introduced the use of Safety Information Leaflets in the Netherlands to provide safety education to parents of children aged 0-4 years. Despite current safety education, necessary safety behaviours are still not taken by a large number of parents, causing unnecessary risk of injury among young children. In an earlier study an E-health module with internet-based, tailored safety information was developed and applied. It concerns an advice for parents on safety behaviours in their homes regarding their child. The aim of this study is to evaluate the effect of this safety information combined with personal counselling on parents' child safety behaviours. Methods/Design Parents who are eligible for the regular well-child visit with their child at child age 5-8 months are invited to participate in this study. Participating parents are randomized into one of two groups: 1 internet-based, tailored safety information combined with personal counselling (intervention group, or 2 personal counselling using the Safety Information Leaflets of the Consumer Safety Institute in the Netherlands for children aged 12 to 24 months (control group. All parents receive safety information on safety topics regarding the prevention of falling, poisoning, drowning and burning. Parents of the intervention group will access the internet-based, tailored safety information module when their child is approximately 10 months old. After completion of the assessment questions, the program compiles a tailored safety advice. The parents are asked to devise and inscribe a personal implementation intention. During the next well-child visit, the Child Health Clinic professional will discuss this tailored safety information

  1. Use of risk information to safety regulation. Fabrication facilities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    A procedure of ISA (Integrated Safety Analysis) for uranium fuel fabrication/enrichment facilities has been under the development aiming to utilize risk information for safety regulations in this project. Activities in the fiscal year 2012 are summarized in the paper. There are two major activities in the year. First one is a study on ISA procedure for external events such as earthquakes. Second one is that for chemical consequences such as UF6 and HF. Other than the activities a fundamental study on a policy of utilizing risk information was conducted. The outline and results are provided in the chapter 1 and 2 respectively. (author)

  2. Quantifying Safety Margin Using the Risk-Informed Safety Margin Characterization (RISMC)

    Energy Technology Data Exchange (ETDEWEB)

    Grabaskas, David; Bucknor, Matthew; Brunett, Acacia; Nakayama, Marvin

    2015-04-26

    The Risk-Informed Safety Margin Characterization (RISMC), developed by Idaho National Laboratory as part of the Light-Water Reactor Sustainability Project, utilizes a probabilistic safety margin comparison between a load and capacity distribution, rather than a deterministic comparison between two values, as is usually done in best-estimate plus uncertainty analyses. The goal is to determine the failure probability, or in other words, the probability of the system load equaling or exceeding the system capacity. While this method has been used in pilot studies, there has been little work conducted investigating the statistical significance of the resulting failure probability. In particular, it is difficult to determine how many simulations are necessary to properly characterize the failure probability. This work uses classical (frequentist) statistics and confidence intervals to examine the impact in statistical accuracy when the number of simulations is varied. Two methods are proposed to establish confidence intervals related to the failure probability established using a RISMC analysis. The confidence interval provides information about the statistical accuracy of the method utilized to explore the uncertainty space, and offers a quantitative method to gauge the increase in statistical accuracy due to performing additional simulations.

  3. Grower Communication Networks: Information Sources for Organic Farmers

    Science.gov (United States)

    Crawford, Chelsi; Grossman, Julie; Warren, Sarah T.; Cubbage, Fred

    2015-01-01

    This article reports on a study to determine which information sources organic growers use to inform farming practices by conducting in-depth semi-structured interviews with 23 organic farmers across 17 North Carolina counties. Effective information sources included: networking, agricultural organizations, universities, conferences, Extension, Web…

  4. Research on the method of measuring space information network capacity in communication service

    Directory of Open Access Journals (Sweden)

    Zhu Shichao

    2017-02-01

    Full Text Available Because of the large scale characteristic of space information network in terms of space and time and the increasing of its complexity,existing measuring methods of information transmission capacity have been unable to measure the existing and future space information networkeffectively.In this study,we firstly established a complex model of space information network,and measured the whole space information network capacity by means of analyzing data access capability to the network and data transmission capability within the network.At last,we verified the rationality of the proposed measuring method by using STK and Matlab simulation software for collaborative simulation.

  5. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  6. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  7. A dynamic Bayesian network based approach to safety decision support in tunnel construction

    International Nuclear Information System (INIS)

    Wu, Xianguo; Liu, Huitao; Zhang, Limao; Skibniewski, Miroslaw J.; Deng, Qianli; Teng, Jiaying

    2015-01-01

    This paper presents a systemic decision approach with step-by-step procedures based on dynamic Bayesian network (DBN), aiming to provide guidelines for dynamic safety analysis of the tunnel-induced road surface damage over time. The proposed DBN-based approach can accurately illustrate the dynamic and updated feature of geological, design and mechanical variables as the construction progress evolves, in order to overcome deficiencies of traditional fault analysis methods. Adopting the predictive, sensitivity and diagnostic analysis techniques in the DBN inference, this approach is able to perform feed-forward, concurrent and back-forward control respectively on a quantitative basis, and provide real-time support before and after an accident. A case study in relating to dynamic safety analysis in the construction of Wuhan Yangtze Metro Tunnel in China is used to verify the feasibility of the proposed approach, as well as its application potential. The relationships between the DBN-based and BN-based approaches are further discussed according to analysis results. The proposed approach can be used as a decision tool to provide support for safety analysis in tunnel construction, and thus increase the likelihood of a successful project in a dynamic project environment. - Highlights: • A dynamic Bayesian network (DBN) based approach for safety decision support is developed. • This approach is able to perform feed-forward, concurrent and back-forward analysis and control. • A case concerning dynamic safety analysis in Wuhan Yangtze Metro Tunnel in China is presented. • DBN-based approach can perform a higher accuracy than traditional static BN-based approach

  8. Teleradiology network system and computer-aided diagnosis workstation using the web medical image conference system with a new information security solution

    Science.gov (United States)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2011-03-01

    We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.

  9. Exploiting global information in complex network repair processes

    Institute of Scientific and Technical Information of China (English)

    Tianyu WANG; Jun ZHANG; Sebastian WANDELT

    2017-01-01

    Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger compo nents at a low cost only with local information.In this paper,we discuss the effectiveness and effi ciency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair.

  10. Use of information technologies to contribute for optimizing the safety radiation management in Cuba

    International Nuclear Information System (INIS)

    Valdes Ramos, M.; Prendes Alonso, M.; Hernandez Saiz, A.; Manzano de Armas, J.

    2013-01-01

    This paper presents the results achieved in Cuba, with the development of a group of information management tools to implement radiation safety systemic and proactive approaches to safety and ICT supported. These tools were designed for different organisms with responsibility for the security at the country level, to the regulatory authority, for user entities, for individual monitoring services and other radiation protection services. It describes the philosophy of information management model used, the characteristics of the developed tools and their integration, the work performed for the homogenization of information available and the ability to capture and deliver data at different levels in decision making. The tools developed are based on the use of variables and indicators of importance to the safety and the systemic approach adopted allows to facilitate the optimization process for supervision of safety practices as well as contribute to the management of knowledge in radiation safety, through a synergistic combination of process data, information, information management systems, and the creative and innovative radiation safety experts

  11. THE FORMATION OF THE CONTOUR OF THE DOCUMENTED AND REAL FLIGHT SAFETY IN THE SYSTEM OF THE INFORMATION PROVISION OF SAFETY OF FLIGHTS

    Directory of Open Access Journals (Sweden)

    B. I. Bachkalo

    2015-01-01

    Full Text Available The article discusses the principles and mechanisms of formation of the contour of the real safety of flights and contour of the documented safety, allowing us to obtain information to control fligh safety. The proposed approach can be used in the algorithms of active on-board flight safety management system for the implementation of information support to the crew in flight and automatic control of flight safety.

  12. 75 FR 36615 - Pipeline Safety: Information Collection Gas Distribution Annual Report Form

    Science.gov (United States)

    2010-06-28

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration 49 CFR Part 192 [Docket No. PHMSA-RSPA-2004-19854] Pipeline Safety: Information Collection Gas Distribution Annual Report Form AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Request...

  13. Patient-Reported Safety Information: A Renaissance of Pharmacovigilance?

    Science.gov (United States)

    Härmark, Linda; Raine, June; Leufkens, Hubert; Edwards, I Ralph; Moretti, Ugo; Sarinic, Viola Macolic; Kant, Agnes

    2016-10-01

    The role of patients as key contributors in pharmacovigilance was acknowledged in the new EU pharmacovigilance legislation. This contains several efforts to increase the involvement of the general public, including making patient adverse drug reaction (ADR) reporting systems mandatory. Three years have passed since the legislation was introduced and the key question is: does pharmacovigilance yet make optimal use of patient-reported safety information? Independent research has shown beyond doubt that patients make an important contribution to pharmacovigilance signal detection. Patient reports provide first-hand information about the suspected ADR and the circumstances under which it occurred, including medication errors, quality failures, and 'near misses'. Patient-reported safety information leads to a better understanding of the patient's experiences of the ADR. Patients are better at explaining the nature, personal significance and consequences of ADRs than healthcare professionals' reports on similar associations and they give more detailed information regarding quality of life including psychological effects and effects on everyday tasks. Current methods used in pharmacovigilance need to optimise use of the information reported from patients. To make the most of information from patients, the systems we use for collecting, coding and recording patient-reported information and the methodologies applied for signal detection and assessment need to be further developed, such as a patient-specific form, development of a severity grading and evolution of the database structure and the signal detection methods applied. It is time for a renaissance of pharmacovigilance.

  14. Report on probabilistic safety assessment (PSA) quality assurance in utilization of risk information

    International Nuclear Information System (INIS)

    2006-12-01

    Recently in Japan, introduction of nuclear safety regulations using risk information such as probabilistic safety assessment (PSA) has been considered and utilization of risk information in the rational and practical measures on safety assurance has made a progress to start with the operation or inspection area. The report compiled results of investigation and studies of PSA quality assurance in risk-informed activities in the USA. Relevant regulatory guide and standard review plan as well as issues and recommendations were reviewed for technical adequacy and advancement of probabilistic risk assessment technology in risk-informed decision making. Useful and important information to be referred as issues in PSA quality assurance was identified. (T. Tanaka)

  15. Human behavior understanding in networked sensing theory and applications of networks of sensors

    CERN Document Server

    Spagnolo, Paolo; Distante, Cosimo

    2014-01-01

    This unique text/reference provides a broad overview of both the technical challenges in sensor network development, and the real-world applications of distributed sensing. Important aspects of distributed computing in large-scale networked sensor systems are analyzed in the context of human behavior understanding, including such topics as systems design tools and techniques, in-network signals, and information processing. Additionally, the book examines a varied range of application scenarios, covering surveillance, indexing and retrieval, patient care, industrial safety, social and ambient

  16. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  17. High committee for nuclear safety transparency and information. July 1, 2009 meeting

    International Nuclear Information System (INIS)

    2009-07-01

    The high committee for the nuclear safety transparency and information (HCTISN) is an information, consultation and debate authority devoted to the assessment of the risks linked with nuclear activities and to the analysis of their impact on public health, on the environment and on nuclear safety. Each year, the HCTISN organizes several ordinary meetings in order to analyze some specific topics of the moment. This meeting was organized around 5 main points: 1 - radioactive waste management: status and steps of the June 28, 2006 law, ANDRA's projects of deep geologic disposal for long living/high-medium activity wastes and of low depth disposal for long living/low activity wastes, French nuclear safety authority (ASN) opinion about the sites choice, implementation of article 10 of the June 28, 2006 law relative to public information; 2 - progress of the working groups' works on transparency and secrecy, on the development of a communication scale, and on the creation of an Internet portal for the radio-ecological follow-up of nuclear sites; 3 - comments of the ASN's report on the nuclear safety and radiation protection in France in 2008; 4 - procedure of management of the radio-physicists shortage in order to warrant the patients' safety and information; 5 - miscellaneous points: project of European directive on nuclear safety, organisation of a visit day onboard of a ship for nuclear materials transportation, comments about the by-law from May 5, 2009, relative to the exemption to informing consumers about the addition of radionuclides to consumption and construction products. (J.S.)

  18. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  19. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  20. National information network and database system of hazardous waste management in China

    Energy Technology Data Exchange (ETDEWEB)

    Ma Hongchang [National Environmental Protection Agency, Beijing (China)

    1996-12-31

    Industries in China generate large volumes of hazardous waste, which makes it essential for the nation to pay more attention to hazardous waste management. National laws and regulations, waste surveys, and manifest tracking and permission systems have been initiated. Some centralized hazardous waste disposal facilities are under construction. China`s National Environmental Protection Agency (NEPA) has also obtained valuable information on hazardous waste management from developed countries. To effectively share this information with local environmental protection bureaus, NEPA developed a national information network and database system for hazardous waste management. This information network will have such functions as information collection, inquiry, and connection. The long-term objective is to establish and develop a national and local hazardous waste management information network. This network will significantly help decision makers and researchers because it will be easy to obtain information (e.g., experiences of developed countries in hazardous waste management) to enhance hazardous waste management in China. The information network consists of five parts: technology consulting, import-export management, regulation inquiry, waste survey, and literature inquiry.

  1. Risk-informed decision making a keystone in advanced safety assessment

    International Nuclear Information System (INIS)

    Reinhart, M.

    2007-01-01

    Probabilistic Safety Assessment (PSA) has provided extremely valuable complementary insight, perspective, comprehension, and balance to deterministic nuclear reactor safety assessment. This integrated approach of risk-informed management and decision making has been called Risk-Informed Decision Making (RIDM). RIDM provides enhanced safety, reliability, operational flexibility, reduced radiological exposure, and improved fiscal economy. Applications of RIDM continuously increase. Current applications are in the areas of design, construction, licensing, operations, and security. Operational phase safety applications include the following: technical specifications improvement, risk-monitors and configuration control, maintenance planning, outage planning and management, in-service inspection, inservice testing, graded quality assurance, reactor oversight and inspection, inspection finding significance determination, operational events assessment, and rulemaking. Interestingly there is a significant spectrum of approaches, methods, programs, controls, data bases, and standards. The quest of many is to assimilate the full compliment of PSA and RIDM information and to achieve a balanced international harmony. The goal is to focus the best of the best, so to speak, for the benefit of all. Accordingly, this presentation will address the principles, benefits, and applications of RIDM. It will also address some of the challenges and areas to improve. Finally it will highlight efforts by the IAEA and others to capture the international thinking, experience, successes, challenges, and lessons in RIDM. (authors)

  2. Management of information supporting Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  3. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  4. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  5. 10 CFR 52.157 - Contents of applications; technical information in final safety analysis report.

    Science.gov (United States)

    2010-01-01

    ...; technical information in final safety analysis report. The application must contain a final safety analysis... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.157 Section 52.157 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  6. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Science.gov (United States)

    2010-01-01

    ...; technical information in final safety analysis report. (a) The application must contain a final safety... 10 Energy 2 2010-01-01 2010-01-01 false Contents of applications; technical information in final safety analysis report. 52.79 Section 52.79 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) LICENSES...

  7. Risk-informed approaches to assess ecological safety of facilities with radioactive waste

    International Nuclear Information System (INIS)

    Vashchenko, V.N.; Zlochevskij, V.V.; Skalozubov, V.I.

    2011-01-01

    Ingenious risk-informed methods to assess ecological safety of facilities with radioactive waste are proposed in the paper. Probabilistic norms on lethal outcomes and reliability of safety barriers are used as safety criteria. Based on the probability measures, it is established that ecological safety conditions are met for the standard criterion of lethal outcomes

  8. It Takes More than a Village: Building a Network of Safety in Nepal's Mountain Communities.

    Science.gov (United States)

    Adams, Vincanne; Craig, Sienna; Samen, Arlene; Bhatta, Surya

    2016-12-01

    Purpose This report from the field details the ways that one small maternal child health NGO, which began its work in Tibet and now works in the mountain communities of Nepal, has established a model for integrated healthcare delivery and support it calls the "network of safety." Description It discusses some of the challenges faced both by the NGO and by the rural mountain communities with whom it partners, as well as with the government of Nepal. Conclusion This report describes and analyzes successful efforts to reduce maternal and infant mortality in a culturally astute, durable, and integrated way, as well as examples of innovation and success experienced by enacting the network of safety model.

  9. Buff book 1: status summary report, water reactor safety research

    International Nuclear Information System (INIS)

    1980-01-01

    This Management Report, to provide information for monitoring and controlling the progress of LWR Safety Research Projects Associated with the Office of Nuclear Regulatory Research and other agencies and organizations engaged in nuclear safety research. It utilizes data pertaining to project schedules, cost, and status which have been integrated into a network-based management information system, The purpose of this publication is to provide a vehicle for review of the current status and overall progress of the safety Research Program from a managerial point of view

  10. Implementing evidence-based policy in a network setting: road safety policy in the Netherlands.

    Science.gov (United States)

    Bax, Charlotte; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In the early 1990s, in order to improve road safety in The Netherlands, the Institute for Road Safety Research (SWOV) developed an evidence-based "Sustainable Safety" concept. Based on this concept, Dutch road safety policy, was seen as successful and as a best practice in Europe. In The Netherlands, the policy context has now changed from a sectoral policy setting towards a fragmented network in which safety is a facet of other transport-related policies. In this contribution, it is argued that the implementation strategy underlying Sustainable Safety should be aligned with the changed context. In order to explore the adjustments needed, two perspectives of policy implementation are discussed: (1) national evidence-based policies with sectoral implementation; and (2) decentralized negotiation on transport policy in which road safety is but one aspect. We argue that the latter approach matches the characteristics of the newly evolved policy context best, and conclude with recommendations for reformulating the implementation strategy.

  11. Factors shaping effective utilization of health information technology in urban safety-net clinics.

    Science.gov (United States)

    George, Sheba; Garth, Belinda; Fish, Allison; Baker, Richard

    2013-09-01

    Urban safety-net clinics are considered prime targets for the adoption of health information technology innovations; however, little is known about their utilization in such safety-net settings. Current scholarship provides limited guidance on the implementation of health information technology into safety-net settings as it typically assumes that adopting institutions have sufficient basic resources. This study addresses this gap by exploring the unique challenges urban resource-poor safety-net clinics must consider when adopting and utilizing health information technology. In-depth interviews (N = 15) were used with key stakeholders (clinic chief executive officers, medical directors, nursing directors, chief financial officers, and information technology directors) from staff at four clinics to explore (a) nonhealth information technology-related clinic needs, (b) how health information technology may provide solutions, and (c) perceptions of and experiences with health information technology. Participants identified several challenges, some of which appear amenable to health information technology solutions. Also identified were requirements for effective utilization of health information technology including physical infrastructural improvements, funding for equipment/training, creation of user groups to share health information technology knowledge/experiences, and specially tailored electronic billing guidelines. We found that despite the potential benefit that can be derived from health information technologies, the unplanned and uninformed introduction of these tools into these settings might actually create more problems than are solved. From these data, we were able to identify a set of factors that should be considered when integrating health information technology into the existing workflows of low-resourced urban safety-net clinics in order to maximize their utilization and enhance the quality of health care in such settings.

  12. Risk-based reconfiguration of safety monitoring system using dynamic Bayesian network

    International Nuclear Information System (INIS)

    Kohda, Takehisa; Cui Weimin

    2007-01-01

    To prevent an abnormal event from leading to an accident, the role of its safety monitoring system is very important. The safety monitoring system detects symptoms of an abnormal event to mitigate its effect at its early stage. As the operation time passes by, the sensor reliability decreases, which implies that the decision criteria of the safety monitoring system should be modified depending on the sensor reliability as well as the system reliability. This paper presents a framework for the decision criteria (or diagnosis logic) of the safety monitoring system. The logic can be dynamically modified based on sensor output data monitored at regular intervals to minimize the expected loss caused by two types of safety monitoring system failure events: failed-dangerous (FD) and failed-safe (FS). The former corresponds to no response under an abnormal system condition, while the latter implies a spurious activation under a normal system condition. Dynamic Bayesian network theory can be applied to modeling the entire system behavior composed of the system and its safety monitoring system. Using the estimated state probabilities, the optimal decision criterion is given to obtain the optimal diagnosis logic. An illustrative example of a three-sensor system shows the merits and characteristics of the proposed method, where the reasonable interpretation of sensor data can be obtained

  13. An information search model for online social Networks - MOBIRSE

    Directory of Open Access Journals (Sweden)

    Miguel Angel Niño Zambrano

    2015-09-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years.  These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  14. Information dynamics of brain–heart physiological networks during sleep

    International Nuclear Information System (INIS)

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  15. Information dynamics of brain-heart physiological networks during sleep

    Science.gov (United States)

    Faes, L.; Nollo, G.; Jurysta, F.; Marinazzo, D.

    2014-10-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain-heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain-brain and brain-heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep.

  16. Information Management of Health and Safety at the Tarkwa Mine of ...

    African Journals Online (AJOL)

    Michael

    2016-06-01

    Jun 1, 2016 ... Information Management of Health and Safety at the Tarkwa ... heap leach technology. ... the quality of information was assessed using the content of information ..... managing library users' expectations; and reference service.

  17. Accurate 3D Localization Method for Public Safety Applications in Vehicular Ad-hoc Networks

    KAUST Repository

    Ansari, Abdul Rahim; Saeed, Nasir; Haq, Mian Imtiaz Ul; Cho, Sunghyun

    2018-01-01

    Vehicular ad hoc networks (VANETs) represent a very promising research area because of their ever increasing demand, especially for public safety applications. In VANETs vehicles communicate with each other to exchange road maps and traffic

  18. Information loss method to measure node similarity in networks

    Science.gov (United States)

    Li, Yongli; Luo, Peng; Wu, Chong

    2014-09-01

    Similarity measurement for the network node has been paid increasing attention in the field of statistical physics. In this paper, we propose an entropy-based information loss method to measure the node similarity. The whole model is established based on this idea that less information loss is caused by seeing two more similar nodes as the same. The proposed new method has relatively low algorithm complexity, making it less time-consuming and more efficient to deal with the large scale real-world network. In order to clarify its availability and accuracy, this new approach was compared with some other selected approaches on two artificial examples and synthetic networks. Furthermore, the proposed method is also successfully applied to predict the network evolution and predict the unknown nodes' attributions in the two application examples.

  19. Cyber Insurance for Heterogeneous Wireless Networks

    OpenAIRE

    Lu, Xiao; Niyato, Dusit; Jiang, Hai; Wang, Ping; Poor, H. Vincent

    2017-01-01

    Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and public safety. Cyber risks, representing one of the most significant threats to network security an...

  20. Next-generation science information network for leading-edge applications

    International Nuclear Information System (INIS)

    Urushidani, S.; Matsukata, J.

    2008-01-01

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines

  1. Next-generation science information network for leading-edge applications

    Energy Technology Data Exchange (ETDEWEB)

    Urushidani, S. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)], E-mail: urushi@nii.ac.jp; Matsukata, J. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)

    2008-04-15

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines.

  2. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  3. Information flow in layered networks of non-monotonic units

    International Nuclear Information System (INIS)

    Neves, Fabio Schittler; Schubert, Benno Martim; Erichsen, Rubem Jr

    2015-01-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information. (paper)

  4. Information flow in layered networks of non-monotonic units

    Science.gov (United States)

    Schittler Neves, Fabio; Martim Schubert, Benno; Erichsen, Rubem, Jr.

    2015-07-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information.

  5. Safety culture in nuclear installations. Management of safety and safety culture in Indian NPPs

    International Nuclear Information System (INIS)

    Rawal, S.C.

    2002-01-01

    culture is being used and continuously being upgraded in: Training, Work procedure, Work practice, Internal information exchange Seminars/workshops/event analysis reports sharing between various units in the country. International information exchange programme through IAEA and WANO programmes Information exchange through c-network of IAEA/WANO

  6. Construction and discussion of the science and technology information network of SWIP

    International Nuclear Information System (INIS)

    Wang Li; Zhang Yiming

    2010-01-01

    The digital library needs to be developed with the advancement of digitalisation and network, and the construction of digital information resource is more indispensable. This paper introduces the exploration and the work performed by the Research Office of Science and Technology Information of the Southwestern Institute of Physics with respect to preliminary construction of science and technology (S and T) information network resources and the magnitude alteration of S and T information service platform subsequently and the building of a dynamical network information service mode of its own characteristics. (authors)

  7. Measuring and improving patient safety through health information technology: The Health IT Safety Framework.

    Science.gov (United States)

    Singh, Hardeep; Sittig, Dean F

    2016-04-01

    Health information technology (health IT) has potential to improve patient safety but its implementation and use has led to unintended consequences and new safety concerns. A key challenge to improving safety in health IT-enabled healthcare systems is to develop valid, feasible strategies to measure safety concerns at the intersection of health IT and patient safety. In response to the fundamental conceptual and methodological gaps related to both defining and measuring health IT-related patient safety, we propose a new framework, the Health IT Safety (HITS) measurement framework, to provide a conceptual foundation for health IT-related patient safety measurement, monitoring, and improvement. The HITS framework follows both Continuous Quality Improvement (CQI) and sociotechnical approaches and calls for new measures and measurement activities to address safety concerns in three related domains: 1) concerns that are unique and specific to technology (e.g., to address unsafe health IT related to unavailable or malfunctioning hardware or software); 2) concerns created by the failure to use health IT appropriately or by misuse of health IT (e.g. to reduce nuisance alerts in the electronic health record (EHR)), and 3) the use of health IT to monitor risks, health care processes and outcomes and identify potential safety concerns before they can harm patients (e.g. use EHR-based algorithms to identify patients at risk for medication errors or care delays). The framework proposes to integrate both retrospective and prospective measurement of HIT safety with an organization's existing clinical risk management and safety programs. It aims to facilitate organizational learning, comprehensive 360 degree assessment of HIT safety that includes vendor involvement, refinement of measurement tools and strategies, and shared responsibility to identify problems and implement solutions. A long term framework goal is to enable rigorous measurement that helps achieve the safety

  8. Social Networks: Rational Learning and Information Aggregation

    Science.gov (United States)

    2009-09-01

    predecessor, Gale and Kariv (2003) who generalize the payoff equalization result of Bala and Goyal (1998) in connected social networks (discussed below...requires more notation. Using Bayes’ Rule and the assumption of equal priors on the state θ, we have that the social belief given by observing... Social Networks: Rational Learning and Information Aggregation by Ilan Lobel B.Sc., Pontif́ıcia Universidade Católica do Rio de Janeiro (2004

  9. 29 CFR 1960.12 - Dissemination of occupational safety and health program information.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Dissemination of occupational safety and health program... OCCUPATIONAL SAFETY AND HEALTH PROGRAMS AND RELATED MATTERS Administration § 1960.12 Dissemination of occupational safety and health program information. (a) Copies of the Act, Executive Order 12196, program...

  10. Effects of rewiring strategies on information spreading in complex dynamic networks

    Science.gov (United States)

    Ally, Abdulla F.; Zhang, Ning

    2018-04-01

    Recent advances in networks and communication services have attracted much interest to understand information spreading in social networks. Consequently, numerous studies have been devoted to provide effective and accurate models for mimicking information spreading. However, knowledge on how to spread information faster and more widely remains a contentious issue. Yet, most existing works are based on static networks which limit the reality of dynamism of entities that participate in information spreading. Using the SIR epidemic model, this study explores and compares effects of two rewiring models (Fermi-Dirac and Linear functions) on information spreading in scale free and small world networks. Our results show that for all the rewiring strategies, the spreading influence replenishes with time but stabilizes in a steady state at later time-steps. This means that information spreading takes-off during the initial spreading steps, after which the spreading prevalence settles toward its equilibrium, with majority of the population having recovered and thus, no longer affecting the spreading. Meanwhile, rewiring strategy based on Fermi-Dirac distribution function in one way or another impedes the spreading process, however, the structure of the networks mimic the spreading, even with a low spreading rate. The worst case can be when the spreading rate is extremely small. The results emphasize that despite a big role of such networks in mimicking the spreading, the role of the parameters cannot be simply ignored. Apparently, the probability of giant degree neighbors being informed grows much faster with the rewiring strategy of linear function compared to that of Fermi-Dirac distribution function. Clearly, rewiring model based on linear function generates the fastest spreading across the networks. Therefore, if we are interested in speeding up the spreading process in stochastic modeling, linear function may play a pivotal role.

  11. Thirteenth water reactor safety research information meeting: proceedings Volume 1

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1986-02-01

    This six-volume report contains 151 papers out of the 178 that were presented at the Thirteenth Water Reactor Safety Research Information Meeting held at the National Bureau of Standards, Gaithersburg, Maryland, during the week of October 22-25, 1985. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included thirty-one different papers presented by researchers from Japan, Canada and eight European countries. The title of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. This volume presents information on: risk analysis PRA application; severe accident sequence analysis; risk analysis/dependent failure analysis; and industry safety research

  12. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  13. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  14. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... criminal investigation or national security, such agency may direct the carrier not to so disclose or...

  15. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  16. Patterns of patient safety culture: a complexity and arts-informed project of knowledge translation.

    Science.gov (United States)

    Mitchell, Gail J; Tregunno, Deborah; Gray, Julia; Ginsberg, Liane

    2011-01-01

    The purpose of this paper is to describe patterns of patient safety culture that emerged from an innovative collaboration among health services researchers and fine arts colleagues. The group engaged in an arts-informed knowledge translation project to produce a dramatic expression of patient safety culture research for inclusion in a symposium. Scholars have called for a deeper understanding of the complex interrelationships among structure, process and outcomes relating to patient safety. Four patterns of patient safety culture--blinding familiarity, unyielding determination, illusion of control and dismissive urgency--are described with respect to how they informed creation of an arts-informed project for knowledge translation.

  17. Analyzing complex networks evolution through Information Theory quantifiers

    International Nuclear Information System (INIS)

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  18. Quantum demultiplexer of quantum parameter-estimation information in quantum networks

    Science.gov (United States)

    Xie, Yanqing; Huang, Yumeng; Wu, Yinzhong; Hao, Xiang

    2018-05-01

    The quantum demultiplexer is constructed by a series of unitary operators and multipartite entangled states. It is used to realize information broadcasting from an input node to multiple output nodes in quantum networks. The scheme of quantum network communication with respect to phase estimation is put forward through the demultiplexer subjected to amplitude damping noises. The generalized partial measurements can be applied to protect the transferring efficiency from environmental noises in the protocol. It is found out that there are some optimal coherent states which can be prepared to enhance the transmission of phase estimation. The dynamics of state fidelity and quantum Fisher information are investigated to evaluate the feasibility of the network communication. While the state fidelity deteriorates rapidly, the quantum Fisher information can be enhanced to a maximum value and then decreases slowly. The memory effect of the environment induces the oscillations of fidelity and quantum Fisher information. The adjustment of the strength of partial measurements is helpful to increase quantum Fisher information.

  19. Actor Network Theory Approach and its Application in Investigating Agricultural Climate Information System

    Directory of Open Access Journals (Sweden)

    Maryam Sharifzadeh

    2013-03-01

    Full Text Available Actor network theory as a qualitative approach to study complex social factors and process of socio-technical interaction provides new concepts and ideas to understand socio-technical nature of information systems. From the actor network theory viewpoint, agricultural climate information system is a network consisting of actors, actions and information related processes (production, transformation, storage, retrieval, integration, diffusion and utilization, control and management, and system mechanisms (interfaces and networks. Analysis of such systemsembody the identification of basic components and structure of the system (nodes –thedifferent sources of information production, extension, and users, and the understanding of how successfully the system works (interaction and links – in order to promote climate knowledge content and improve system performance to reach agricultural development. The present research attempted to introduce actor network theory as research framework based on network view of agricultural climate information system.

  20. An experimental study of the Online Information Paradox: Does en-route information improve road network performance?

    Science.gov (United States)

    Wijayaratna, Kasun P; Dixit, Vinayak V; Denant-Boemont, Laurent; Waller, S Travis

    2017-01-01

    This study investigates the empirical presence of a theoretical transportation paradox, defined as the "Online Information Paradox" (OIP). The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE) solution (no information scenario) and the other being the User Equilibrium with Recourse (UER) solution (with information scenario). An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC) were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network.

  1. Directedness of information flow in mobile phone communication networks.

    Directory of Open Access Journals (Sweden)

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  2. Health Information Technology in Healthcare Quality and Patient Safety: Literature Review.

    Science.gov (United States)

    Feldman, Sue S; Buchalter, Scott; Hayes, Leslie W

    2018-06-04

    The area of healthcare quality and patient safety is starting to use health information technology to prevent reportable events, identify them before they become issues, and act on events that are thought to be unavoidable. As healthcare organizations begin to explore the use of health information technology in this realm, it is often unclear where fiscal and human efforts should be focused. The purpose of this study was to provide a foundation for understanding where to focus health information technology fiscal and human resources as well as expectations for the use of health information technology in healthcare quality and patient safety. A literature review was conducted to identify peer-reviewed publications reporting on the actual use of health information technology in healthcare quality and patient safety. Inductive thematic analysis with open coding was used to categorize a total of 41 studies. Three pre-set categories were used: prevention, identification, and action. Three additional categories were formed through coding: challenges, outcomes, and location. This study identifies five main categories across seven study settings. A majority of the studies used health IT for identification and prevention of healthcare quality and patient safety issues. In this realm, alerts, clinical decision support, and customized health IT solutions were most often implemented. Implementation, interface design, and culture were most often noted as challenges. This study provides valuable information as organizations determine where they stand to get the most "bang for their buck" relative to health IT for quality and patient safety. Knowing what implementations are being effectivity used by other organizations helps with fiscal and human resource planning as well as managing expectations relative to cost, scope, and outcomes. The findings from this scan of the literature suggest that having organizational champion leaders that can shepherd implementation, impact culture

  3. Polarity-specific high-level information propagation in neural networks.

    Science.gov (United States)

    Lin, Yen-Nan; Chang, Po-Yen; Hsiao, Pao-Yueh; Lo, Chung-Chuan

    2014-01-01

    Analyzing the connectome of a nervous system provides valuable information about the functions of its subsystems. Although much has been learned about the architectures of neural networks in various organisms by applying analytical tools developed for general networks, two distinct and functionally important properties of neural networks are often overlooked. First, neural networks are endowed with polarity at the circuit level: Information enters a neural network at input neurons, propagates through interneurons, and leaves via output neurons. Second, many functions of nervous systems are implemented by signal propagation through high-level pathways involving multiple and often recurrent connections rather than by the shortest paths between nodes. In the present study, we analyzed two neural networks: the somatic nervous system of Caenorhabditis elegans (C. elegans) and the partial central complex network of Drosophila, in light of these properties. Specifically, we quantified high-level propagation in the vertical and horizontal directions: the former characterizes how signals propagate from specific input nodes to specific output nodes and the latter characterizes how a signal from a specific input node is shared by all output nodes. We found that the two neural networks are characterized by very efficient vertical and horizontal propagation. In comparison, classic small-world networks show a trade-off between vertical and horizontal propagation; increasing the rewiring probability improves the efficiency of horizontal propagation but worsens the efficiency of vertical propagation. Our result provides insights into how the complex functions of natural neural networks may arise from a design that allows them to efficiently transform and combine input signals.

  4. Information security as part of the nuclear safety culture

    Energy Technology Data Exchange (ETDEWEB)

    Sitnica, A., E-mail: demetrkj@westinghouse.com [Westinghouse Electric Co., 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2016-09-15

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  5. Information security as part of the nuclear safety culture

    International Nuclear Information System (INIS)

    Sitnica, A.

    2016-09-01

    No industry, organization, individual or even the government is immune to the information security risks which are associated with nuclear power. It can no longer be ignored, delayed or treated as unimportant. Nuclear safety is paramount to our industry, and cyber security must be woven into the fabric of our safety culture in order to succeed. Achieving this in an environment which has remained relatively unchanged and conservative prior to digitalisation demands a shift in behavior and culture. (Author)

  6. Building a Portuguese Food Microbiological Information Network

    OpenAIRE

    Viegas, Silvia; Machado, Claudia; Dantas, Maria; Oliveira, Luísa

    2011-01-01

    Introduction: The integration of food data from research, microbiological monitoring, epidemiological investigation and disease surveillance is crucial to manage foodborne risk. Consequently, INSA launched the Portuguese Food Information Resource Programme (PortFIR) in a partnership with GS1 Portugal to create national food chain expert networks and sustainable databases on food composition, consumption and chemical and microbiological contamination. Presently, the Food Microbiological Inform...

  7. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  8. Establishing management information system to solve the information management problem of nuclear safety related personnel's qualification management

    International Nuclear Information System (INIS)

    Sun Haipeng; Liu Zhijun; Li Tianshu

    2013-01-01

    With the rapid progress of nuclear energy and nuclear technology utilization, nuclear safety related personnel play an increasingly important role in ensuring nuclear safety. NNSA personnel qualification management information system conducts a multi-faceted, effective, real-time monitoring and information collection for nuclear safety staff practice unit management, knowledge management, license application, appraisal management or supervision, training management or supervision and certified staff management, and also is a milestone for NNSA to build the state department with 'five-feature' (learning-oriented, service-oriented, economical, innovative, clean-type). (authors)

  9. Identification of Functional Information Subgraphs in Complex Networks

    International Nuclear Information System (INIS)

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  10. Mobile Virtual Network Operator Information Systems for Increased Sustainability in Utilities

    DEFF Research Database (Denmark)

    Joensen, Hallur Leivsgard; Tambo, Torben

    2011-01-01

    sales from efficiency of business processes, underlying information systems, and the ability to make the link from consumption to cost visual and transparent to consumers. The conclusion is that the energy sector should look into other sectors and learn from information systems which ease up business......, sales and buying processes are separated from physical networks and energy production. This study aims to characterise and evaluate information systems supporting the transformation of the free market-orientation of energy and provision of utilities in a cross-sectorial proposition known as Mobile...... Virtual Network Operator (MVNO). Emphasis is particularly on standardised information systems for automatically linking consumers, sellers and integration of network infrastructure actors. The method used is a feasibility study assessing business and information processes of a forthcoming utilities market...

  11. Simplified application of probabilistic safety analysis in nuclear power plants by means of artificial neural networks

    International Nuclear Information System (INIS)

    Oehmgen, T.; Knorr, J.

    2004-01-01

    Probabilistic safety analyses (PSA) are conducted to assess the balanced nature of plant design in terms of technical safety and the administrative management of plant operation in nuclear power plants. In the evaluation shown in this article of the operating experience accumulated in two nuclear power plants, all failures are traced back consistently to the plant media and component levels, respectively, for the calculation of reliability coefficients. Moreover, the use of neural networks for probabilistic calculations is examined. The results are verified on the basis of test examples. Calculations with neural networks are very easy to carry out in a kind of 'black box'. There is a possibility, for instance, to use the system in plant maintenance. (orig.) [de

  12. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  13. Networked Information: Finding What's Out There.

    Science.gov (United States)

    Lynch, Clifford A.

    1997-01-01

    Clifford A. Lynch, developer of MELVYL and former director of library automation at the University of California, is now executive director for the Coalition for Networked Information (CNI). This interview discusses Lynch's background, MELVYL, the Web and the role of libraries and librarians, community and collaborative filtering, the library of…

  14. Information Extraction with Character-level Neural Networks and Free Noisy Supervision

    OpenAIRE

    Meerkamp, Philipp; Zhou, Zhengyi

    2016-01-01

    We present an architecture for information extraction from text that augments an existing parser with a character-level neural network. The network is trained using a measure of consistency of extracted data with existing databases as a form of noisy supervision. Our architecture combines the ability of constraint-based information extraction systems to easily incorporate domain knowledge and constraints with the ability of deep neural networks to leverage large amounts of data to learn compl...

  15. High committee for nuclear safety transparency and information. March 17, 2009 meeting

    International Nuclear Information System (INIS)

    2009-03-01

    The high committee for the nuclear safety transparency and information (HCTISN) is an information, consultation and debate authority devoted to the assessment of the risks linked with nuclear activities and to the analysis of their impact on public health, on the environment and on nuclear safety. Each year, the HCTISN organizes several ordinary meetings in order to analyze some specific topics of the moment. This meeting was organized around 9 main topics: 1 - presentation by the French nuclear safety authority (ASN) of a dismantling strategy for nuclear facilities, in particular taking into account a final state for the site and the information of populations; 2 - status of the next campaign of iodine tablets distribution; 3 - the management of ancient uranium mines and in particular the long-term environmental and health impact of mine tailings; 4 - the implementation of the high committee's recommendations; 5 - work progress of the working group on information transparency; 6 - Areva's invitation of the working group on information transparency to assist to the organisation of a Mox fuel convoy between Cherbourg and Japan; 7 - progress of the working group on the elaboration of a 'communication scale' comparable to the INES scale; 8 - presentation of the meetings organized by the ANCLI (French national association of local information commissions) about the implementation of the Aarhus convention; 9 - presentation by the IRSN (Institute of radiation protection and nuclear safety) of its communication approach towards the public. (J.S.)

  16. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  17. Food Safety and Nutrition Information for Kids and Teens

    Science.gov (United States)

    ... Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco Products Food Home Food Resources for You Consumers Kids & Teens ... More sharing options Linkedin Pin it Email Print Food Safety & Nutrition Information for Kids and Teens Fun & ...

  18. Social Circles Detection from Ego Network and Profile Information

    Science.gov (United States)

    2014-12-19

    way of organizing contacts in personal networks . They are therefore currently implemented in the major social net- working systems, such as Facebook ...0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network ...structural network information but also the contents of social interactions, with the aim to detect copying communities. The views, opinions and/or findings

  19. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  20. Uranium mining and metallurgy library information service under the network environment

    International Nuclear Information System (INIS)

    Tang Lilei

    2012-01-01

    This paper analyzes the effect of the network environment on the uranium mining and metallurgy of the information service. Introduces some measures such as strengthening professional characteristic literature resources construction, changing the service mode, building up information navigation, deepening service, meet the individual needs of users, raising librarian's quality, promoting the co-construction and sharing of library information resources, and puts forward the development idea of uranium mining and metallurgy library information service under the network environment. (author)

  1. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  2. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  3. An experimental study of the Online Information Paradox: Does en-route information improve road network performance?

    Directory of Open Access Journals (Sweden)

    Kasun P Wijayaratna

    Full Text Available This study investigates the empirical presence of a theoretical transportation paradox, defined as the "Online Information Paradox" (OIP. The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE solution (no information scenario and the other being the User Equilibrium with Recourse (UER solution (with information scenario. An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network.

  4. Asia Pacific Mangrove Information Network (APMIN): A conceptual model

    Digital Repository Service at National Institute of Oceanography (India)

    Chavan, V.S.; Jagtap, T.G.; Untawale, A.G.

    Asia Pacific Mangrove Information Network (APMIN), its structure and scope, is discussed in this paper. Establishment of National Mangrove Information Centers (NMIC) in 20 Asia-Pacific countries, would contribute towards development of databases...

  5. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-01-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized. PMID:26960247

  6. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-03-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.

  7. Twenty-First Water Reaction Safety Information Meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1994-04-01

    This three-volume report contains 90 papers out of the 102 that were presented at the Twenty-First Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 25--27, 1993. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Germany, Japan, Russia, Switzerland, Taiwan, and United Kingdom. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. Individual papers have been cataloged separately. This document, Volume 2, presents papers on severe accident research

  8. Twenty-First Water Reactor Safety Information Meeting

    International Nuclear Information System (INIS)

    Monteleone, S.

    1994-04-01

    This three-volume report contains 90 papers out of the 102 that were presented at the Twenty-First Water Reactor Safety Information Meeting held at the Bethesda Marriott Hotel, Bethesda, Maryland, during the week of October 25-27, 1993. The papers are printed in the order of their presentation in each session and describe progress and results of programs in nuclear safety research conducted in this country and abroad. Foreign participation in the meeting included papers presented by researchers from France, Germany, Japan, Russia, Switzerland, Taiwan, and United Kingdom. The titles of the papers and the names of the authors have been updated and may differ from those that appeared in the final program of the meeting. Selected papers were indexed separately for inclusion in the Energy Science and Technology Database

  9. Experiences with using information and communication technology to build a multi-municipal support network for informal carers.

    Science.gov (United States)

    Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth

    2013-09-01

    This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.

  10. Standardized System of Nuclear Safety Information for the Promotion of Transparency and Openness

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Gihyung; Kim, Sanghyun; Lee, Gyehwi; Yoon, Yeonhwa; Song, Song Hyerim; Jeong, Jina [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Byun, Jaehyung; Seo, Jonghwan [Dong-A Univ., Busan (Korea, Republic of)

    2013-05-15

    There has been an increasing emphasis on the need for increased disclosure of information through the home page of the Korea Institute of Nuclear Safety (KINS), responsible for nuclear safety regulations, and the Nuclear Safety Information Center (NSIC) to enhance public understanding of nuclear safety. However, due to the dazzled structure of the existing KINS and NSIC home pages, improvements in accessibility and convenience are necessary. At the same time, content standardization is required to increase operational efficiency and provide coherent information. In this study, the Delphi method was used to select the major contents to make available on the home page as well as the main user base definition for the home page layout development. Also, internal and external expert groups were created to conduct AHP (Analytic Hierarchy Process) analysis and develop the comparative analysis items for the U. S. Nuclear Regulatory Commission(NRC)/KINS/NSIC home pages. Afterwards, problems and points of improvements for the home page system, design, and profile were derived using heuristic analysis. The implications arising from the Delphi analysis results were applied to the home page layout. In the nuclear safety information standardized system construction process, the comparative analysis conducted using the AHP and heuristic analyses of the NRC home page resulted in deriving improvements for the Guidance, Organization, and Trustworthy items of the KINS/NSIC home page. Furthermore, through the Delphi analysis, a clear purpose and core values were set for the KINS web site, and the needs of the main user base were identified. By developing the home page layout, user interest and utility were raised to improve the organization method and layout. Through this study, KINS was able to construct a nuclear safety information standardized system and increase transparency and openness by providing feature enhancements in information provision as well as user accessibility and

  11. Standardized System of Nuclear Safety Information for the Promotion of Transparency and Openness

    International Nuclear Information System (INIS)

    Lee, Gihyung; Kim, Sanghyun; Lee, Gyehwi; Yoon, Yeonhwa; Song, Song Hyerim; Jeong, Jina; Byun, Jaehyung; Seo, Jonghwan

    2013-01-01

    There has been an increasing emphasis on the need for increased disclosure of information through the home page of the Korea Institute of Nuclear Safety (KINS), responsible for nuclear safety regulations, and the Nuclear Safety Information Center (NSIC) to enhance public understanding of nuclear safety. However, due to the dazzled structure of the existing KINS and NSIC home pages, improvements in accessibility and convenience are necessary. At the same time, content standardization is required to increase operational efficiency and provide coherent information. In this study, the Delphi method was used to select the major contents to make available on the home page as well as the main user base definition for the home page layout development. Also, internal and external expert groups were created to conduct AHP (Analytic Hierarchy Process) analysis and develop the comparative analysis items for the U. S. Nuclear Regulatory Commission(NRC)/KINS/NSIC home pages. Afterwards, problems and points of improvements for the home page system, design, and profile were derived using heuristic analysis. The implications arising from the Delphi analysis results were applied to the home page layout. In the nuclear safety information standardized system construction process, the comparative analysis conducted using the AHP and heuristic analyses of the NRC home page resulted in deriving improvements for the Guidance, Organization, and Trustworthy items of the KINS/NSIC home page. Furthermore, through the Delphi analysis, a clear purpose and core values were set for the KINS web site, and the needs of the main user base were identified. By developing the home page layout, user interest and utility were raised to improve the organization method and layout. Through this study, KINS was able to construct a nuclear safety information standardized system and increase transparency and openness by providing feature enhancements in information provision as well as user accessibility and

  12. Comparing the use of an online expert health network against common information sources to answer health questions.

    Science.gov (United States)

    Rhebergen, Martijn D F; Lenderink, Annet F; van Dijk, Frank J H; Hulshof, Carel T J

    2012-02-02

    Many workers have questions about occupational safety and health (OSH). It is unknown whether workers are able to find correct, evidence-based answers to OSH questions when they use common information sources, such as websites, or whether they would benefit from using an easily accessible, free-of-charge online network of OSH experts providing advice. To assess the rate of correct, evidence-based answers to OSH questions in a group of workers who used an online network of OSH experts (intervention group) compared with a group of workers who used common information sources (control group). In a quasi-experimental study, workers in the intervention and control groups were randomly offered 2 questions from a pool of 16 standardized OSH questions. Both questions were sent by mail to all participants, who had 3 weeks to answer them. The intervention group was instructed to use only the online network ArboAntwoord, a network of about 80 OSH experts, to solve the questions. The control group was instructed that they could use all information sources available to them. To assess answer correctness as the main study outcome, 16 standardized correct model answers were constructed with the help of reviewers who performed literature searches. Subsequently, the answers provided by all participants in the intervention (n = 94 answers) and control groups (n = 124 answers) were blinded and compared with the correct model answers on the degree of correctness. Of the 94 answers given by participants in the intervention group, 58 were correct (62%), compared with 24 of the 124 answers (19%) in the control group, who mainly used informational websites found via Google. The difference between the 2 groups was significant (rate difference = 43%, 95% confidence interval [CI] 30%-54%). Additional analysis showed that the rate of correct main conclusions of the answers was 85 of 94 answers (90%) in the intervention group and 75 of 124 answers (61%) in the control group (rate difference

  13. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  14. Riding on air: critical safety information for you and your tires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This booklet is issued for public distribution by Transport Canada. It provides a few simple tips concerning automobile tire safety which, if followed, is expected to result in increased personal and vehicle safety, improved fuel economy, prolonged tire life, energy savings and reduced environmental pollution. The information provided include tips about tire pressure, tire inspection for damage and wear, rotation of tires for more even wear, replacing worn tires, the advantages of using snow tires in winter and an explanation of the meaning of the information found on the tire sidewall.

  15. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  16. SDN-enabled dynamic WDM networks to address routing information inaccuracy

    CSIR Research Space (South Africa)

    Ravhuanzwo, Lusani

    2016-11-01

    Full Text Available Large dynamic wavelength-division multiplexed (WDM) networks based on the distributed control mechanism are susceptible to routing information inaccuracies. Factors such as non-negligible propagation delays, infrequent network state updates...

  17. Web of Things-Based Remote Monitoring System for Coal Mine Safety Using Wireless Sensor Network

    OpenAIRE

    Bo, Cheng; Xin, Cheng; Zhongyi, Zhai; Chengwen, Zhang; Junliang, Chen

    2014-01-01

    Frequent accidents have occurred in coal mine enterprises; therefore, raising the technological level of coal mine safety monitoring systems is an urgent problem. Wireless sensor networks (WSN), as a new field of research, have broad application prospects. This paper proposes a Web of Things- (WoT-) based remote monitoring system that takes full advantage of wireless sensor networks in combination with the CAN bus communication technique that abstracts the underground sensor data and capabili...

  18. A risk-informed perspective on deterministic safety analysis of nuclear power plants

    International Nuclear Information System (INIS)

    Wan, P.T.

    2009-01-01

    In this work, the deterministic safety analysis (DSA) approach to nuclear safety is examined from a risk-informed perspective. One objective of safety analysis of a nuclear power plant is to demonstrate via analysis that the risks to the public from events or accidents that are within the design basis of the power plant are within acceptable levels with a high degree of assurance. This nuclear safety analysis objective can be translated into two requirements on the risk estimates of design basis events or accidents: the nominal risk estimate to the public must be shown to be within acceptable levels, and the uncertainty in the risk estimates must be shown to be small on an absolute or relative basis. The DSA approach combined with the defense-in-depth (DID) principle is a simplified safety analysis approach that attempts to achieve the above safety analysis objective in the face of potentially large uncertainties in the risk estimates of a nuclear power plant by treating the various uncertainty contributors using a stylized conservative binary (yes-no) approach, and applying multiple overlapping physical barriers and defense levels to protect against the release of radioactivity from the reactor. It is shown that by focusing on the consequence aspect of risk, the previous two nuclear safety analysis requirements on risk can be satisfied with the DSA-DID approach to nuclear safety. It is also shown the use of multiple overlapping physical barriers and defense levels in the traditional DSA-DID approach to nuclear safety is risk-informed in the sense that it provides a consistently high level of confidence in the validity of the safety analysis results for various design basis events or accidents with a wide range of frequency of occurrence. It is hoped that by providing a linkage between the consequence analysis approach in DSA with a risk-informed perspective, greater understanding of the limitation and capability of the DSA approach is obtained. (author)

  19. Information processing in the transcriptional regulatory network of yeast: Functional robustness

    Directory of Open Access Journals (Sweden)

    Dehmer Matthias

    2009-03-01

    Full Text Available Abstract Background Gene networks are considered to represent various aspects of molecular biological systems meaningfully because they naturally provide a systems perspective of molecular interactions. In this respect, the functional understanding of the transcriptional regulatory network is considered as key to elucidate the functional organization of an organism. Results In this paper we study the functional robustness of the transcriptional regulatory network of S. cerevisiae. We model the information processing in the network as a first order Markov chain and study the influence of single gene perturbations on the global, asymptotic communication among genes. Modification in the communication is measured by an information theoretic measure allowing to predict genes that are 'fragile' with respect to single gene knockouts. Our results demonstrate that the predicted set of fragile genes contains a statistically significant enrichment of so called essential genes that are experimentally found to be necessary to ensure vital yeast. Further, a structural analysis of the transcriptional regulatory network reveals that there are significant differences between fragile genes, hub genes and genes with a high betweenness centrality value. Conclusion Our study does not only demonstrate that a combination of graph theoretical, information theoretical and statistical methods leads to meaningful biological results but also that such methods allow to study information processing in gene networks instead of just their structural properties.

  20. Preliminary safety information document for the standard MHTGR. Volume 4

    Energy Technology Data Exchange (ETDEWEB)

    None

    1986-01-01

    This report contains information concerning: operational radionuclide control; occupational radiation protection, conduct of operations; initial test program; safety analysis; technical specifications; and quality assurance. (JDB)

  1. Chaotic, informational and synchronous behaviour of multiplex networks

    Science.gov (United States)

    Baptista, M. S.; Szmoski, R. M.; Pereira, R. F.; Pinto, S. E. De Souza

    2016-03-01

    The understanding of the relationship between topology and behaviour in interconnected networks would allow to charac- terise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives complex behaviour: chaos, information, and weak or strong synchronisation; in multiplex net- works with constant Jacobian. We also study this relationship numerically in multiplex networks of Hindmarsh-Rose neurons. Whereas behaviour in the analytically tractable network is a direct but not trivial consequence of the spectra of eigenvalues of the Laplacian matrix, where behaviour may strongly depend on the break of symmetry in the topology of interconnections, in Hindmarsh-Rose neural networks the nonlinear nature of the chemical synapses breaks the elegant mathematical connec- tion between the spectra of eigenvalues of the Laplacian matrix and the behaviour of the network, creating networks whose behaviour strongly depends on the nature (chemical or electrical) of the inter synapses.

  2. Evaluating and Predicting Patient Safety for Medical Devices With Integral Information Technology

    Science.gov (United States)

    2005-01-01

    323 Evaluating and Predicting Patient Safety for Medical Devices with Integral Information Technology Jiajie Zhang, Vimla L. Patel, Todd R...errors are due to inappropriate designs for user interactions, rather than mechanical failures. Evaluating and predicting patient safety in medical ...the users on the identified trouble spots in the devices. We developed two methods for evaluating and predicting patient safety in medical devices

  3. On the Use of Information Quality in Stochastic Networked Control Systems

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Madsen, Jacob Theilgaard; Rasmussen, Jakob Gulddahl

    2017-01-01

    Networked control is challenged by stochastic delays that are caused by the communication networks as well as by the approach taken to exchange information about system state and set-points. Combined with stochastic changing information, there is a probability that information at the controller....... This is first analyzed in simulation models for the example system of a wind-farm controller. As simulation analysis is subject to stochastic variability and requires large computational effort, the paper develops a Markov model of a simplified networked control system and uses numerical results from the Markov...... is not matching the true system observation, which we call mismatch probability (mmPr). The hypothesis is that the optimization of certain parameters of networked control systems targeting mmPr is equivalent to the optimization targeting control performance, while the former is practically much easier to conduct...

  4. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  5. Possible improvements of the reactor safety via neural networks

    International Nuclear Information System (INIS)

    Marseguerra, M.; Padovani, E.

    1996-01-01

    The artificial neural networks (ANN) represent one of the fastest developing methodologies which has been extensively applied in the past decade to quite different areas such as pattern recognition and dynamic control. In the present paper we consider two possible application of the ANNs to the safe operation of a reactor. The first one concerns the possibility of using an ANN as a fast reactivity meter only based on previously measured values of the neutron flux. Since the network parameters are experimentally estimated during the training phase, this approach looks promising in comparison with others currently adopted which, besides the experimental data, also depend on theoretical assumptions such as the use of the inverse kinetic equations together with effective parameters. The second application concerns the BWRs and aims at obtaining an early indicator of a variation of the coolant velocity through the fuel elements. This velocity may be routinely measured by correlating the signals coming from two vertically displaced in-core detectors. The variation of the coolant velocity represents an indication of instabilities of the two-phase flow and therefore its on line measurements is of importance for the plant safety. Numerical results of simulated experiments concerning the two mentioned applications are reported. It appears that the neural network approach is suitable for obtaining fast and accurate results. (authors)

  6. An approach for risk informed safety culture assessment for Canadian nuclear power stations

    International Nuclear Information System (INIS)

    Nelson, W.R.

    2010-01-01

    One of the most important components of effective safety and risk management for nuclear power stations is a healthy safety culture. DNV has developed an approach for risk informed safety culture assessment that combines two complementary paradigms for safety and risk management: loss prevention - for preventing and intervening in accidents; and critical function management - for achieving safety and performance goals. Combining these two paradigms makes it possible to provide more robust systems for safety management and to support a healthy safety culture. This approach is being applied to safety culture assessment in partnership with a Canadian nuclear utility. (author)

  7. Role of information and communication networks in malaria survival

    Directory of Open Access Journals (Sweden)

    Marathe Achla

    2007-10-01

    Full Text Available Abstract Background Quite often symptoms of malaria go unrecognized or untreated. According to the Multilateral Initiative on Malaria, 70% of the malaria cases that are treated at home are mismanaged. Up to 82% of all malaria episodes in sub-Saharan Africa are treated outside the formal health sector. Fast and appropriate diagnosis and treatment of malaria is extremely important in reducing morbidity and mortality. Method Data from 70 different countries is pooled together to construct a panel dataset of health and socio-economic variables for a time span of (1960–2004. The generalized two-stage least squares and panel data models are used to investigate the impact of information and communication network (ICN variables on malaria death probability. The intensity of ICN is represented by the number of telephone main lines per 1,000 people and the number of television sets per 1,000 people. Results The major finding is that the intensity of ICN is associated with reduced probability of deaths of people that are clinically identified as malaria infected. The results are robust for both indicators i.e. interpersonal and mass communication networks and for all model specifications examined. Conclusion The results suggest that information and communication networks can substantially scale up the effectiveness of the existing resources for malaria prevention. Resources spent in preventing malaria are far less than needed. Expanded information and communication networks will widen the avenues for community based "participatory development", that encourages the use of local information, knowledge and decision making. Timely information, immediate care and collective knowledge based treatment can be extremely important in reducing child mortality and achieving the millennium development goal.

  8. Development of a Safety Assessment Information System for the Management of Periodic Safety Assessment Activities

    International Nuclear Information System (INIS)

    Song, Tae Young

    2007-01-01

    At present, the 10-year Periodic Safety Review(PSR) has been performing to confirm all the aspects of safety issues for all the operating plants in compliance with domestic nuclear law of article 23, subarticle 3. For each plant, in addition, Probabilistic Safety Assessment(PSA) and Severe Accident Management Guideline(SAMG) are being implemented and revised periodically to reflect the latest safety level according to principle fulfillment of severe accident policy statement. The assessment reports, as one of outcomes from these activities, are submitted into and reviewed by domestic regulatory body. During reviewing (in-office duty) and licensing (regulatory duty) process, a large number of outcomes of which most are the formal technical reports and licensing materials, are inevitably produced. Moreover, repeated review process over the plants can make them accumulated and produce a variety of documents additionally. This circumstance motivates to develop effective tool or system for the management of these reports and related technical documents for the future use in licensing process and for subsequent plant assessments. This paper presents the development status of Safety Assessment Information System(SAIS) which manages safety-related documents of PSR, PSA and SAMG for practical use for experienced engineers in charge of these areas

  9. Development of a Safety Assessment Information System for the Management of Periodic Safety Assessment Activities

    Energy Technology Data Exchange (ETDEWEB)

    Song, Tae Young [Nuclear Engineering and Technology Institute, Daejeon (Korea, Republic of)

    2007-07-01

    At present, the 10-year Periodic Safety Review(PSR) has been performing to confirm all the aspects of safety issues for all the operating plants in compliance with domestic nuclear law of article 23, subarticle 3. For each plant, in addition, Probabilistic Safety Assessment(PSA) and Severe Accident Management Guideline(SAMG) are being implemented and revised periodically to reflect the latest safety level according to principle fulfillment of severe accident policy statement. The assessment reports, as one of outcomes from these activities, are submitted into and reviewed by domestic regulatory body. During reviewing (in-office duty) and licensing (regulatory duty) process, a large number of outcomes of which most are the formal technical reports and licensing materials, are inevitably produced. Moreover, repeated review process over the plants can make them accumulated and produce a variety of documents additionally. This circumstance motivates to develop effective tool or system for the management of these reports and related technical documents for the future use in licensing process and for subsequent plant assessments. This paper presents the development status of Safety Assessment Information System(SAIS) which manages safety-related documents of PSR, PSA and SAMG for practical use for experienced engineers in charge of these areas.

  10. Safety management of Ethernet broadband access based on VLAN aggregation

    Science.gov (United States)

    Wang, Li

    2004-04-01

    With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.

  11. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  12. Social adaptation in multi-agent model of linguistic categorization is affected by network information flow.

    Science.gov (United States)

    Zubek, Julian; Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz

    2017-01-01

    This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.

  13. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation.

    Science.gov (United States)

    Hu, Hongzhi; Mao, Huajuan; Hu, Xiaohua; Hu, Feng; Sun, Xuemin; Jing, Zaiping; Duan, Yunsuo

    2015-01-01

    Due to the extensive social influence, public health emergency has attracted great attention in today's society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event's social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution) provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback) based on ACP simulation system which was successfully applied to the analysis of A (H1N1) Flu emergency.

  14. NASA Aviation Safety Program Weather Accident Prevention/weather Information Communications (WINCOMM)

    Science.gov (United States)

    Feinberg, Arthur; Tauss, James; Chomos, Gerald (Technical Monitor)

    2002-01-01

    Weather is a contributing factor in approximately 25-30 percent of general aviation accidents. The lack of timely, accurate and usable weather information to the general aviation pilot in the cockpit to enhance pilot situational awareness and improve pilot judgment remains a major impediment to improving aviation safety. NASA Glenn Research Center commissioned this 120 day weather datalink market survey to assess the technologies, infrastructure, products, and services of commercial avionics systems being marketed to the general aviation community to address these longstanding safety concerns. A market survey of companies providing or proposing to provide graphical weather information to the general aviation cockpit was conducted. Fifteen commercial companies were surveyed. These systems are characterized and evaluated in this report by availability, end-user pricing/cost, system constraints/limits and technical specifications. An analysis of market survey results and an evaluation of product offerings were made. In addition, recommendations to NASA for additional research and technology development investment have been made as a result of this survey to accelerate deployment of cockpit weather information systems for enhancing aviation safety.

  15. Memorandum on the use of information technology to improve medication safety.

    Science.gov (United States)

    Ammenwerth, E; Aly, A-F; Bürkle, T; Christ, P; Dormann, H; Friesdorf, W; Haas, C; Haefeli, W E; Jeske, M; Kaltschmidt, J; Menges, K; Möller, H; Neubert, A; Rascher, W; Reichert, H; Schuler, J; Schreier, G; Schulz, S; Seidling, H M; Stühlinger, W; Criegee-Rieck, M

    2014-01-01

    Information technology in health care has a clear potential to improve the quality and efficiency of health care, especially in the area of medication processes. On the other hand, existing studies show possible adverse effects on patient safety when IT for medication-related processes is developed, introduced or used inappropriately. To summarize definitions and observations on IT usage in pharmacotherapy and to derive recommendations and future research priorities for decision makers and domain experts. This memorandum was developed in a consensus-based iterative process that included workshops and e-mail discussions among 21 experts coordinated by the Drug Information Systems Working Group of the German Society for Medical Informatics, Biometry and Epidemiology (GMDS). The recommendations address, among other things, a stepwise and comprehensive strategy for IT usage in medication processes, the integration of contextual information for alert generation, the involvement of patients, the semantic integration of information resources, usability and adaptability of IT solutions, and the need for their continuous evaluation. Information technology can help to improve medication safety. However, challenges remain regarding access to information, quality of information, and measurable benefits.

  16. Iterative Neighbour-Information Gathering for Ranking Nodes in Complex Networks

    Science.gov (United States)

    Xu, Shuang; Wang, Pei; Lü, Jinhu

    2017-01-01

    Designing node influence ranking algorithms can provide insights into network dynamics, functions and structures. Increasingly evidences reveal that node’s spreading ability largely depends on its neighbours. We introduce an iterative neighbourinformation gathering (Ing) process with three parameters, including a transformation matrix, a priori information and an iteration time. The Ing process iteratively combines priori information from neighbours via the transformation matrix, and iteratively assigns an Ing score to each node to evaluate its influence. The algorithm appropriates for any types of networks, and includes some traditional centralities as special cases, such as degree, semi-local, LeaderRank. The Ing process converges in strongly connected networks with speed relying on the first two largest eigenvalues of the transformation matrix. Interestingly, the eigenvector centrality corresponds to a limit case of the algorithm. By comparing with eight renowned centralities, simulations of susceptible-infected-removed (SIR) model on real-world networks reveal that the Ing can offer more exact rankings, even without a priori information. We also observe that an optimal iteration time is always in existence to realize best characterizing of node influence. The proposed algorithms bridge the gaps among some existing measures, and may have potential applications in infectious disease control, designing of optimal information spreading strategies.

  17. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  18. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  19. Oceanographic data and information network in the Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  20. Trade associations and labor organizations as intermediaries for disseminating workplace safety and health information.

    Science.gov (United States)

    Okun, Andrea H; Watkins, Janice P; Schulte, Paul A

    2017-09-01

    There has not been a systematic study of the nature and extent to which business and professional trade associations and labor organizations obtain and communicate workplace safety and health information to their members. These organizations can serve as important intermediaries and play a central role in transferring this information to their members. A sample of 2294 business and professional trade associations and labor organizations in eight industrial sectors identified by the National Occupational Research Agenda was surveyed via telephone. A small percent of these organizations (40.9% of labor organizations, 15.6% of business associations, and 9.6% of professional associations) were shown to distribute workplace safety and health information to their members. Large differences were also observed between industrial sectors with construction having the highest total percent of organizations disseminating workplace safety and health information. There appears to be significant potential to utilize trade and labor organizations as intermediaries for transferring workplace safety and health information to their members. Government agencies have a unique opportunity to partner with these organizations and to utilize their existing communication channels to address high risk workplace safety and health concerns. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  1. Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks

    Science.gov (United States)

    Banani, Sam; Thiemjarus, Surapa; Kittipiyakul, Somsak

    2018-01-01

    In high-density road networks, with each vehicle broadcasting multiple messages per second, the arrival rate of safety messages can easily exceed the rate at which digital signatures can be verified. Since not all messages can be verified, algorithms for selecting which messages to verify are required to ensure that each vehicle receives appropriate awareness about neighbouring vehicles. This paper presents a novel scheme to select important safety messages for verification in vehicular ad hoc networks (VANETs). The proposed scheme uses location and direction of the sender, as well as proximity and relative-time between vehicles, to reduce the number of irrelevant messages verified (i.e., messages from vehicles that are unlikely to cause an accident). Compared with other existing schemes, the analysis results show that the proposed scheme can verify messages from nearby vehicles with lower inter-message delay and reduced packet loss and thus provides high level of awareness of the nearby vehicles. PMID:29652840

  2. Modeling information diffusion in time-varying community networks

    Science.gov (United States)

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  3. Data Quality in Online Health Social Networks for Chronic Diseases

    Science.gov (United States)

    Venkatesan, Srikanth

    2017-01-01

    Can medical advice from other participants in online health social networks impact patient safety? What can we do alleviate this problem? How does the accuracy of information on such networks affect the patients?. There has been a significant increase , in recent years, in the use of online health social network sites as more patients seek to…

  4. Safety recommendation component of mobile information assistant of the tourist

    Science.gov (United States)

    Savchuk, Valeriya V.; Kunanec, Natalia E.; Pasichnyk, Volodymyr V.; Popiel, Piotr; Weryńska-Bieniasz, RóŻa; Kashaganova, Gulzhamal; Kalizhanova, Aliya

    2017-08-01

    The goal of article is to introduce and justify the need for the safety system components of Mobile Information of the tourist (MIAT). One of the objectives of the system is to determine the level of risk in a particular tourist destination on the basis of available information in the knowledge base.

  5. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  6. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  7. The Role of Globe Innovation Networks in Development of Information Society

    Directory of Open Access Journals (Sweden)

    Anna T. Girenko

    2016-12-01

    Full Text Available The author explores the evolution of the concept of the information society. There is identified the role of the formation of global innovation networks. The formation of global innovation networks is carried out through coordination and cooperation of scientific and technological activities on the basis of bilateral and multilateral relations, information exchange, scientific and technical services areas of development, implementation of scientific-technical activities in the framework of the international organizations, as well as through the development of national and regional innovation networks.

  8. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa

    2012-01-01

    This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...

  9. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-01-01

    This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...

  10. Instrumentation for Scientific Computing in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics.

    Science.gov (United States)

    1987-10-01

    include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen

  11. Information Decomposition in Multivariate Systems: Definitions, Implementation and Application to Cardiovascular Networks

    Directory of Open Access Journals (Sweden)

    Luca Faes

    2016-12-01

    Full Text Available The continuously growing framework of information dynamics encompasses a set of tools, rooted in information theory and statistical physics, which allow to quantify different aspects of the statistical structure of multivariate processes reflecting the temporal dynamics of complex networks. Building on the most recent developments in this field, this work designs a complete approach to dissect the information carried by the target of a network of multiple interacting systems into the new information produced by the system, the information stored in the system, and the information transferred to it from the other systems; information storage and transfer are then further decomposed into amounts eliciting the specific contribution of assigned source systems to the target dynamics, and amounts reflecting information modification through the balance between redundant and synergetic interaction between systems. These decompositions are formulated quantifying information either as the variance or as the entropy of the investigated processes, and their exact computation for the case of linear Gaussian processes is presented. The theoretical properties of the resulting measures are first investigated in simulations of vector autoregressive processes. Then, the measures are applied to assess information dynamics in cardiovascular networks from the variability series of heart period, systolic arterial pressure and respiratory activity measured in healthy subjects during supine rest, orthostatic stress, and mental stress. Our results document the importance of combining the assessment of information storage, transfer and modification to investigate common and complementary aspects of network dynamics; suggest the higher specificity to alterations in the network properties of the measures derived from the decompositions; and indicate that measures of information transfer and information modification are better assessed, respectively, through entropy

  12. State Traffic Safety Information - 2010-2015 FARS Accident File data

    Data.gov (United States)

    Department of Transportation — The State Traffic Safety Information (STSI) portal is part of the larger Fatality Analysis Reporting System (FARS) Encyclopedia. STSI provides state-by-state traffic...

  13. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  14. Gene regulatory network inference by point-based Gaussian approximation filters incorporating the prior information.

    Science.gov (United States)

    Jia, Bin; Wang, Xiaodong

    2013-12-17

    : The extended Kalman filter (EKF) has been applied to inferring gene regulatory networks. However, it is well known that the EKF becomes less accurate when the system exhibits high nonlinearity. In addition, certain prior information about the gene regulatory network exists in practice, and no systematic approach has been developed to incorporate such prior information into the Kalman-type filter for inferring the structure of the gene regulatory network. In this paper, an inference framework based on point-based Gaussian approximation filters that can exploit the prior information is developed to solve the gene regulatory network inference problem. Different point-based Gaussian approximation filters, including the unscented Kalman filter (UKF), the third-degree cubature Kalman filter (CKF3), and the fifth-degree cubature Kalman filter (CKF5) are employed. Several types of network prior information, including the existing network structure information, sparsity assumption, and the range constraint of parameters, are considered, and the corresponding filters incorporating the prior information are developed. Experiments on a synthetic network of eight genes and the yeast protein synthesis network of five genes are carried out to demonstrate the performance of the proposed framework. The results show that the proposed methods provide more accurate inference results than existing methods, such as the EKF and the traditional UKF.

  15. Information processing and routing in wireless sensor networks

    CERN Document Server

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  16. The Research on Safety Management Information System of Railway Passenger Based on Risk Management Theory

    Science.gov (United States)

    Zhu, Wenmin; Jia, Yuanhua

    2018-01-01

    Based on the risk management theory and the PDCA cycle model, requirements of the railway passenger transport safety production is analyzed, and the establishment of the security risk assessment team is proposed to manage risk by FTA with Delphi from both qualitative and quantitative aspects. The safety production committee is also established to accomplish performance appraisal, which is for further ensuring the correctness of risk management results, optimizing the safety management business processes and improving risk management capabilities. The basic framework and risk information database of risk management information system of railway passenger transport safety are designed by Ajax, Web Services and SQL technologies. The system realizes functions about risk management, performance appraisal and data management, and provides an efficient and convenient information management platform for railway passenger safety manager.

  17. Mapping the nomological network of employee self-determined safety motivation: A preliminary measure in China.

    Science.gov (United States)

    Jiang, Li; Tetrick, Lois E

    2016-09-01

    The present study introduced a preliminary measure of employee safety motivation based on the definition of self-determination theory from Fleming (2012) research and validated the structure of self-determined safety motivation (SDSM) by surveying 375 employees in a Chinese high-risk organization. First, confirmatory factor analysis (CFA) was used to examine the factor structure of SDSM, and indices of five-factor model CFA met the requirements. Second, a nomological network was examined to provide evidence of the construct validity of SDSM. Beyond construct validity, the analysis also produced some interesting results concerning the relationship between leadership antecedents and safety motivation, and between safety motivation and safety behavior. Autonomous motivation was positively related to transformational leadership, negatively related to abusive supervision, and positively related to safety behavior. Controlled motivation with the exception of introjected regulation was negatively related to transformational leadership, positively related to abusive supervision, and negatively related to safety behavior. The unique role of introjected regulation and future research based on self-determination theory were discussed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Applying Sensor-Based Technology to Improve Construction Safety Management.

    Science.gov (United States)

    Zhang, Mingyuan; Cao, Tianzhuo; Zhao, Xuefeng

    2017-08-11

    Construction sites are dynamic and complicated systems. The movement and interaction of people, goods and energy make construction safety management extremely difficult. Due to the ever-increasing amount of information, traditional construction safety management has operated under difficult circumstances. As an effective way to collect, identify and process information, sensor-based technology is deemed to provide new generation of methods for advancing construction safety management. It makes the real-time construction safety management with high efficiency and accuracy a reality and provides a solid foundation for facilitating its modernization, and informatization. Nowadays, various sensor-based technologies have been adopted for construction safety management, including locating sensor-based technology, vision-based sensing and wireless sensor networks. This paper provides a systematic and comprehensive review of previous studies in this field to acknowledge useful findings, identify the research gaps and point out future research directions.

  19. Introduction to spiking neural networks: Information processing, learning and applications.

    Science.gov (United States)

    Ponulak, Filip; Kasinski, Andrzej

    2011-01-01

    The concept that neural information is encoded in the firing rate of neurons has been the dominant paradigm in neurobiology for many years. This paradigm has also been adopted by the theory of artificial neural networks. Recent physiological experiments demonstrate, however, that in many parts of the nervous system, neural code is founded on the timing of individual action potentials. This finding has given rise to the emergence of a new class of neural models, called spiking neural networks. In this paper we summarize basic properties of spiking neurons and spiking networks. Our focus is, specifically, on models of spike-based information coding, synaptic plasticity and learning. We also survey real-life applications of spiking models. The paper is meant to be an introduction to spiking neural networks for scientists from various disciplines interested in spike-based neural processing.

  20. Risk-informed regulation: handling uncertainty for a rational management of safety

    International Nuclear Information System (INIS)

    Zio, Enrico

    2008-01-01

    A risk-informed regulatory approach implies that risk insights be used as supplement of deterministic information for safety decision-making purposes. In this view, the use of risk assessment techniques is expected to lead to improved safety and a more rational allocation of the limited resources available. On the other hand, it is recognized that uncertainties affect both the deterministic safety analyses and the risk assessments. In order for the risk-informed decision making process to be effective, the adequate representation and treatment of such uncertainties is mandatory. In this paper, the risk-informed regulatory framework is considered under the focus of the uncertainty issue. Traditionally, probability theory has provided the language and mathematics for the representation and treatment of uncertainty. More recently, other mathematical structures have been introduced. In particular, the Dempster-Shafer theory of evidence is here illustrated as a generalized framework encompassing probability theory and possibility theory. The special case of probability theory is only addressed as term of comparison, given that it is a well known subject. On the other hand, the special case of possibility theory is amply illustrated. An example of the combination of probability and possibility for treating the uncertainty in the parameters of an event tree is illustrated

  1. Quality and safety implications of emergency department information systems.

    Science.gov (United States)

    Farley, Heather L; Baumlin, Kevin M; Hamedani, Azita G; Cheung, Dickson S; Edwards, Michael R; Fuller, Drew C; Genes, Nicholas; Griffey, Richard T; Kelly, John J; McClay, James C; Nielson, Jeff; Phelan, Michael P; Shapiro, Jason S; Stone-Griffith, Suzanne; Pines, Jesse M

    2013-10-01

    The Health Information Technology for Economic and Clinical Health Act of 2009 and the Centers for Medicare & Medicaid Services "meaningful use" incentive programs, in tandem with the boundless additional requirements for detailed reporting of quality metrics, have galvanized hospital efforts to implement hospital-based electronic health records. As such, emergency department information systems (EDISs) are an important and unique component of most hospitals' electronic health records. System functionality varies greatly and affects physician decisionmaking, clinician workflow, communication, and, ultimately, the overall quality of care and patient safety. This article is a joint effort by members of the Quality Improvement and Patient Safety Section and the Informatics Section of the American College of Emergency Physicians. The aim of this effort is to examine the benefits and potential threats to quality and patient safety that could result from the choice of a particular EDIS, its implementation and optimization, and the hospital's or physician group's approach to continuous improvement of the EDIS. Specifically, we explored the following areas of potential EDIS safety concerns: communication failure, wrong order-wrong patient errors, poor data display, and alert fatigue. Case studies are presented that illustrate the potential harm that could befall patients from an inferior EDIS product or suboptimal execution of such a product in the clinical environment. The authors have developed 7 recommendations to improve patient safety with respect to the deployment of EDISs. These include ensuring that emergency providers actively participate in selection of the EDIS product, in the design of processes related to EDIS implementation and optimization, and in the monitoring of the system's ongoing success or failure. Our recommendations apply to emergency departments using any type of EDIS: custom-developed systems, best-of-breed vendor systems, or enterprise systems

  2. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  3. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  4. 78 FR 34703 - Pipeline Safety: Information Collection Activities, Revision to Gas Distribution Annual Report

    Science.gov (United States)

    2013-06-10

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2013-0004] Pipeline Safety: Information Collection Activities, Revision to Gas Distribution Annual Report AGENCY: Pipeline and Hazardous Materials Safety Administration, DOT. ACTION: Notice and request...

  5. New Fault Recognition Method for Rotary Machinery Based on Information Entropy and a Probabilistic Neural Network.

    Science.gov (United States)

    Jiang, Quansheng; Shen, Yehu; Li, Hua; Xu, Fengyu

    2018-01-24

    Feature recognition and fault diagnosis plays an important role in equipment safety and stable operation of rotating machinery. In order to cope with the complexity problem of the vibration signal of rotating machinery, a feature fusion model based on information entropy and probabilistic neural network is proposed in this paper. The new method first uses information entropy theory to extract three kinds of characteristics entropy in vibration signals, namely, singular spectrum entropy, power spectrum entropy, and approximate entropy. Then the feature fusion model is constructed to classify and diagnose the fault signals. The proposed approach can combine comprehensive information from different aspects and is more sensitive to the fault features. The experimental results on simulated fault signals verified better performances of our proposed approach. In real two-span rotor data, the fault detection accuracy of the new method is more than 10% higher compared with the methods using three kinds of information entropy separately. The new approach is proved to be an effective fault recognition method for rotating machinery.

  6. The informal networks in food procurement by older people - A cross European comparison

    DEFF Research Database (Denmark)

    Turrini, Aida; D'Addezio, Laura; Maccati, Fabrizia

    2010-01-01

    .e., alone vs. with others) in FSW was revealed. Informal social networks may play an important role in public health and welfare policies, particularly given the increase in this demographic group. Assistance with grocery shopping and the availability of trained personnel could widen informal networks......, and effective informal networks may be an important supportive service for older adults. The comparison across countries highlighted relationships between food procurement capabilities and social networks. These findings may be used to develop resources to better meet the nutritional needs of older adults.......Healthy dietary profiles contribute to successful aging, and dietary intake is dependent upon food procurement capabilities. Both formal and informal social networks can contribute to grocery shopping capabilities and methods of food procurement. This investigation explores the role of informal...

  7. Distributed health data networks: a practical and preferred approach to multi-institutional evaluations of comparative effectiveness, safety, and quality of care.

    Science.gov (United States)

    Brown, Jeffrey S; Holmes, John H; Shah, Kiran; Hall, Ken; Lazarus, Ross; Platt, Richard

    2010-06-01

    Comparative effectiveness research, medical product safety evaluation, and quality measurement will require the ability to use electronic health data held by multiple organizations. There is no consensus about whether to create regional or national combined (eg, "all payer") databases for these purposes, or distributed data networks that leave most Protected Health Information and proprietary data in the possession of the original data holders. Demonstrate functions of a distributed research network that supports research needs and also address data holders concerns about participation. Key design functions included strong local control of data uses and a centralized web-based querying interface. We implemented a pilot distributed research network and evaluated the design considerations, utility for research, and the acceptability to data holders of methods for menu-driven querying. We developed and tested a central, web-based interface with supporting network software. Specific functions assessed include query formation and distribution, query execution and review, and aggregation of results. This pilot successfully evaluated temporal trends in medication use and diagnoses at 5 separate sites, demonstrating some of the possibilities of using a distributed research network. The pilot demonstrated the potential utility of the design, which addressed the major concerns of both users and data holders. No serious obstacles were identified that would prevent development of a fully functional, scalable network. Distributed networks are capable of addressing nearly all anticipated uses of routinely collected electronic healthcare data. Distributed networks would obviate the need for centralized databases, thus avoiding numerous obstacles.

  8. Generation of a superposition of odd photon number states for quantum information networks

    DEFF Research Database (Denmark)

    Neergaard-Nielsen, Jonas Schou; Nielsen, B.; Hettich, C.

    2006-01-01

    Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August......Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August...

  9. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Directory of Open Access Journals (Sweden)

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  10. A qualitative exploration of the perceptions and information needs of public health inspectors responsible for food safety

    Directory of Open Access Journals (Sweden)

    Sargeant Jan M

    2010-06-01

    Full Text Available Abstract Background In Ontario, local public health inspectors play an important frontline role in protecting the public from foodborne illness. This study was an in-depth exploration of public health inspectors' perceptions of the key food safety issues in public health, and their opinions and needs with regards to food safety information resources. Methods Four focus group discussions were conducted with public health inspectors from the Central West region of Ontario, Canada during June and July, 2008. A questioning route was used to standardize qualitative data collection. Audio recordings of sessions were transcribed verbatim and data-driven content analysis was performed. Results A total of 23 public health inspectors participated in four focus group discussions. Five themes emerged as key food safety issues: time-temperature abuse, inadequate handwashing, cross-contamination, the lack of food safety knowledge by food handlers and food premise operators, and the lack of food safety information and knowledge about specialty foods (i.e., foods from different cultures. In general, participants reported confidence with their current knowledge of food safety issues and foodborne pathogens. Participants highlighted the need for a central source for food safety information, access to up-to-date food safety information, resources in different languages, and additional food safety information on specialty foods. Conclusions The information gathered from these focus groups can provide a basis for the development of resources that will meet the specific needs of public health inspectors involved in protecting and promoting food safety.

  11. Case study of physician leaders in quality and patient safety, and the development of a physician leadership network.

    Science.gov (United States)

    Hayes, Chris; Yousefi, Vandad; Wallington, Tamara; Ginzburg, Amir

    2010-01-01

    There is increasing recognition of the need for physician leadership in quality and patient safety, and emerging evidence that physician leadership contributes to improved care. Hospitals are beginning to establish physician leader positions; however, there is little guidance on how to define these roles and the strategies physician leaders can use toward improving care. This case study examines the roles of four physician leaders, describes their contribution to the design and implementation of hospital quality and patient safety agendas and discusses the creation of a physician network to support these activities. The positions were established between July 2006 and April 2009. All are corporate roles with varying reporting and accountability structures. The physician leads are involved in strategic planning, identifying and leading quality and safety initiatives, physician engagement and culture change. All have significantly contributed to the implementation of hospital improvement activities and are seen as influential among their peers as resources and mentors for local project success. Despite their accomplishments, these physician leads have been challenged by ambiguous role descriptions and difficulty identifying effective improvement strategies. As such, an expanding physician network was created with the goal of sharing approaches and tools and creating new strategies. Physician leaders are an important factor in the improvement of safety and quality within hospitals. This case study provides a template for the creation of such positions and highlights the importance of networking as an effective strategy for improving local care and advancing professional development of physician leaders in quality and patient safety.

  12. Future view of electric power information processing techniques. Architecture techniques for power supply communication network

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Keisuke

    1988-06-20

    Present situations of a power supply communication are described, and the future trend of a power supply information network is reviewed. For the improvement of a transmission efficiency and quality and a cost benefit for the power supply communication, the introduction of digital networks has been promoted. As for a protection information network, since there is the difference between a required communication quality of system protection information and that of power supply operation information, the individual digital network configuration is expected, in addition, the increasing of image information transmission for monitoring is also estimated. As for a business information network, the construction of a broad-band switched network is expected with increasing of image transmission needs such as a television meeting. Furthermore, the expansion to a power supply ISDN which is possible to connect between a telephone, facsimile and data terminal, to exchange various media and to connect between networks is expected with higher communication services in the protection and business network. However, for its practical use, the standardization of various interfaces will become essential. (3 figs, 1 tab)

  13. The use of network theory to model disparate ship design information

    Science.gov (United States)

    Rigterink, Douglas; Piks, Rebecca; Singer, David J.

    2014-06-01

    This paper introduces the use of network theory to model and analyze disparate ship design information. This work will focus on a ship's distributed systems and their intra- and intersystem structures and interactions. The three system to be analyzed are: a passageway system, an electrical system, and a fire fighting system. These systems will be analyzed individually using common network metrics to glean information regarding their structures and attributes. The systems will also be subjected to community detection algorithms both separately and as a multiplex network to compare their similarities, differences, and interactions. Network theory will be shown to be useful in the early design stage due to its simplicity and ability to model any shipboard system.

  14. Phenotypic assortment in wild primate networks: implications for the dissemination of information.

    Science.gov (United States)

    Carter, Alecia J; Lee, Alexander E G; Marshall, Harry H; Ticó, Miquel Torrents; Cowlishaw, Guy

    2015-05-01

    Individuals' access to social information can depend on their social network. Homophily-a preference to associate with similar phenotypes-may cause assortment within social networks that could preclude information transfer from individuals who generate information to those who would benefit from acquiring it. Thus, understanding phenotypic assortment may lead to a greater understanding of the factors that could limit the transfer of information between individuals. We tested whether there was assortment in wild baboon (Papio ursinus) networks, using data collected from two troops over 6 years for six phenotypic traits-boldness, age, dominance rank, sex and the propensity to generate/exploit information-using two methods for defining a connection between individuals-time spent in proximity and grooming. Our analysis indicated that assortment was more common in grooming than proximity networks. In general, there was homophily for boldness, age, rank and the propensity to both generate and exploit information, but heterophily for sex. However, there was considerable variability both between troops and years. The patterns of homophily we observed for these phenotypes may impede information transfer between them. However, the inconsistency in the strength of assortment between troops and years suggests that the limitations to information flow may be quite variable.

  15. Dynamic safety assessment of natural gas stations using Bayesian network

    Energy Technology Data Exchange (ETDEWEB)

    Zarei, Esmaeil, E-mail: smlzarei65@gmail.com [Center of Excellence for Occupational Health Engineering, Research Center for Health Sciences, Faculty of Health, Hamadan University of Medical Sciences, Hamadan (Iran, Islamic Republic of); Azadeh, Ali [School of Industrial and Systems Engineering, Center of Excellence for Intelligent-Based Experimental Mechanic, College of Engineering, University of Tehran (Iran, Islamic Republic of); Khakzad, Nima [Safety and Security Science Section, Delft University of Technology, Delft (Netherlands); Aliabadi, Mostafa Mirzaei [Center of Excellence for Occupational Health Engineering, Research Center for Health Sciences, Faculty of Health, Hamadan University of Medical Sciences, Hamadan (Iran, Islamic Republic of); Mohammadfam, Iraj, E-mail: mohammadfam@umsha.ac.ir [Center of Excellence for Occupational Health Engineering, Research Center for Health Sciences, Faculty of Health, Hamadan University of Medical Sciences, Hamadan (Iran, Islamic Republic of)

    2017-01-05

    Graphical abstract: Dynamic cause-consequence analysis of the regulator system failure using BN. - Highlights: • A dynamic and comprehensive QRA (DCQRA) framework is proposed for safety assessment of CGSs. • Bow-tie diagram and Bayesian network are employed for accident scenario modeling. • Critical basic events and minimal cut sets are identified using probability updating. - Abstract: Pipelines are one of the most popular and effective ways of transporting hazardous materials, especially natural gas. However, the rapid development of gas pipelines and stations in urban areas has introduced a serious threat to public safety and assets. Although different methods have been developed for risk analysis of gas transportation systems, a comprehensive methodology for risk analysis is still lacking, especially in natural gas stations. The present work is aimed at developing a dynamic and comprehensive quantitative risk analysis (DCQRA) approach for accident scenario and risk modeling of natural gas stations. In this approach, a FMEA is used for hazard analysis while a Bow-tie diagram and Bayesian network are employed to model the worst-case accident scenario and to assess the risks. The results have indicated that the failure of the regulator system was the worst-case accident scenario with the human error as the most contributing factor. Thus, in risk management plan of natural gas stations, priority should be given to the most probable root events and main contribution factors, which have identified in the present study, in order to reduce the occurrence probability of the accident scenarios and thus alleviate the risks.

  16. Dynamic safety assessment of natural gas stations using Bayesian network

    International Nuclear Information System (INIS)

    Zarei, Esmaeil; Azadeh, Ali; Khakzad, Nima; Aliabadi, Mostafa Mirzaei; Mohammadfam, Iraj

    2017-01-01

    Graphical abstract: Dynamic cause-consequence analysis of the regulator system failure using BN. - Highlights: • A dynamic and comprehensive QRA (DCQRA) framework is proposed for safety assessment of CGSs. • Bow-tie diagram and Bayesian network are employed for accident scenario modeling. • Critical basic events and minimal cut sets are identified using probability updating. - Abstract: Pipelines are one of the most popular and effective ways of transporting hazardous materials, especially natural gas. However, the rapid development of gas pipelines and stations in urban areas has introduced a serious threat to public safety and assets. Although different methods have been developed for risk analysis of gas transportation systems, a comprehensive methodology for risk analysis is still lacking, especially in natural gas stations. The present work is aimed at developing a dynamic and comprehensive quantitative risk analysis (DCQRA) approach for accident scenario and risk modeling of natural gas stations. In this approach, a FMEA is used for hazard analysis while a Bow-tie diagram and Bayesian network are employed to model the worst-case accident scenario and to assess the risks. The results have indicated that the failure of the regulator system was the worst-case accident scenario with the human error as the most contributing factor. Thus, in risk management plan of natural gas stations, priority should be given to the most probable root events and main contribution factors, which have identified in the present study, in order to reduce the occurrence probability of the accident scenarios and thus alleviate the risks.

  17. NS [Nuclear Safety] update. Current safety and security activities and developments taking place in the Department of Nuclear Safety and Security, Issue no. 6, March 2008

    International Nuclear Information System (INIS)

    2008-03-01

    The current issue presents information about the following activities: 1) International Conference on Illicit Nuclear Trafficking which took place in November 2007 in Edinburgh. The principal aim of the conference was to examine the threat and context of illicit nuclear trafficking of radioactive material, specifically, what is being done to combat such trafficking and where more needs to be done. The conference was also to consider how the obligations and commitments of the legally binding and non-binding international instruments could be and are being implemented by various States. 2) INSAG Message on Nuclear Safety Infrastructure in which the INSAG Chairman Richard Meserve addressed nuclear safety in the current context and various issues that warrant special attention. 3) approved for publication the Safety Requirements publication on Safety of Nuclear Fuel Cycle Facilities. 4) The Asian Nuclear Safety Network (ANSN)

  18. Information theory and signal transduction systems: from molecular information processing to network inference.

    Science.gov (United States)

    Mc Mahon, Siobhan S; Sim, Aaron; Filippi, Sarah; Johnson, Robert; Liepe, Juliane; Smith, Dominic; Stumpf, Michael P H

    2014-11-01

    Sensing and responding to the environment are two essential functions that all biological organisms need to master for survival and successful reproduction. Developmental processes are marshalled by a diverse set of signalling and control systems, ranging from systems with simple chemical inputs and outputs to complex molecular and cellular networks with non-linear dynamics. Information theory provides a powerful and convenient framework in which such systems can be studied; but it also provides the means to reconstruct the structure and dynamics of molecular interaction networks underlying physiological and developmental processes. Here we supply a brief description of its basic concepts and introduce some useful tools for systems and developmental biologists. Along with a brief but thorough theoretical primer, we demonstrate the wide applicability and biological application-specific nuances by way of different illustrative vignettes. In particular, we focus on the characterisation of biological information processing efficiency, examining cell-fate decision making processes, gene regulatory network reconstruction, and efficient signal transduction experimental design. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  20. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.