WorldWideScience

Sample records for technology networks control

  1. Control of coupled oscillator networks with application to microgrid technologies.

    Science.gov (United States)

    Skardal, Per Sebastian; Arenas, Alex

    2015-08-01

    The control of complex systems and network-coupled dynamical systems is a topic of vital theoretical importance in mathematics and physics with a wide range of applications in engineering and various other sciences. Motivated by recent research into smart grid technologies, we study the control of synchronization and consider the important case of networks of coupled phase oscillators with nonlinear interactions-a paradigmatic example that has guided our understanding of self-organization for decades. We develop a method for control based on identifying and stabilizing problematic oscillators, resulting in a stable spectrum of eigenvalues, and in turn a linearly stable synchronized state. The amount of control, that is, number of oscillators, required to stabilize the network is primarily dictated by the coupling strength, dynamical heterogeneity, and mean degree of the network, and depends little on the structural heterogeneity of the network itself.

  2. Elastic optical networks architectures, technologies, and control

    CERN Document Server

    Velasco, Luis

    2016-01-01

    This book addresses challenges and potential solutions surrounding the dramatic yearly increases in bandwidth demand. The editors discuss the predicament surrounding current growth, which is predicted to continue because of the proliferation of disruptive, high bandwidth applications like video and cloud applications. They also discuss that in addition to growth, traffic will become much more dynamic, both in time and direction. The contributors show how large changes in traffic magnitude during a 24-hour period can be observed, as day-time business users have very different demands to evening-time residential customers, and how this plays into addressing future challenges. In addition, they discuss potential solutions for the issues surrounding situations where multiple content and cloud service providers offer competing services, causing the traffic direction to become more dynamic. The contributors discuss that although the WDM transponder technology can be upgraded to 100Gb/s in the short to medium term, ...

  3. Network Congestion Control in 4G Technology Through Iterative Server

    Directory of Open Access Journals (Sweden)

    Khaleel Ahmad

    2012-07-01

    Full Text Available During the last few decades, mobile communication has developed rapidly. The increasing dependency of people on telecommunication resources is pushing even more current technological developments in the mobile world. In Real-time multimedia applications, such as Live TV or live movie, video conferencing, VoIP, on-line gaming etc. are exciting applications to the success of 4G.In todays Internet these applications are not subject to congestion control, therefore the growth of popularity of these applications may endanger the stability of the Internet. In this paper, we propose a novel model to solve the network congestion problem through iterative server. In this model, when a client send a request to server then server will generate a individual iterative server for requesting client. After completing the request, the iterative server will be automatically destroyed.

  4. Wearable Device Control Platform Technology for Network Application Development

    Directory of Open Access Journals (Sweden)

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  5. Controlling and Monitoring of Electric Feeders Using GSM Network Technology

    Directory of Open Access Journals (Sweden)

    AHMED Afaz Uddin

    2013-10-01

    Full Text Available The application of computer interfaced controlling devices is increasingly rapidly in modern age. Analogous wired systems are substituted by computer interfaced system alternatives in growingnumber of industries. Such control systems had been developed with complex and critical high-end stuffs. In this paper, we developed an automated system that controls the switching of electric feeder power supply featuring the existing GSM technology. The target is tooperate the device according to a preset sequence of on-off mode for three feeders after a particular time interval and to monitor the running condition. The device sends short message updating the status of every action. It also warns the consumers about load shedding using GSM module via sending message. Controlling the gate pulse of a MOSFET that operates the relay, it executes on-off operation of the circuit breaker of the respective feeders. Since GSM technology is used worldwide for communication, third world countries that are still struggling to meet the power demand can use this technology to operate and monitor the condition of power distribution. To operate the GSM device, AT command of GSM location operation for SIM900 is used. This paper targets to improve the power distribution system in developing countries like India, Bangladesh, Nepal where powercrisis and load shedding is quite a common phenomenon.

  6. Zigbee networking technology and its application in Lamost optical fiber positioning and control system

    Science.gov (United States)

    Jin, Yi; Zhai, Chao; Gu, Yonggang; Zhou, Zengxiang; Gai, Xiaofeng

    2010-07-01

    4,000 fiber positioning units need to be positioned precisely in LAMOST(Large Sky Area Multi-object Optical Spectroscopic Telescope) optical fiber positioning & control system, and every fiber positioning unit needs two stepper motors for its driven, so 8,000 stepper motors need to be controlled in the entire system. Wireless communication mode is adopted to save the installing space on the back of the focal panel, and can save more than 95% external wires compared to the traditional cable control mode. This paper studies how to use the ZigBee technology to group these 8000 nodes, explores the pros and cons of star network and tree network in order to search the stars quickly and efficiently. ZigBee technology is a short distance, low-complexity, low power, low data rate, low-cost two-way wireless communication technology based on the IEEE 802.15.4 protocol. It based on standard Open Systems Interconnection (OSI): The 802.15.4 standard specifies the lower protocol layers-the physical layer (PHY), and the media access control (MAC). ZigBee Alliance defined on this basis, the rest layers such as the network layer and application layer, and is responsible for high-level applications, testing and marketing. The network layer used here, based on ad hoc network protocols, includes the following functions: construction and maintenance of the topological structure, nomenclature and associated businesses which involves addressing, routing and security and a self-organizing-self-maintenance functions which will minimize consumer spending and maintenance costs. In this paper, freescale's 802.15.4 protocol was used to configure the network layer. A star network and a tree network topology is realized, which can build network, maintenance network and create a routing function automatically. A concise tree network address allocate algorithm is present to assign the network ID automatically.

  7. The Network Policy Control Technology%网络策略控制技术

    Institute of Scientific and Technical Information of China (English)

    桂勇胜; 陶妍丹; 钟华

    2012-01-01

    With the the complexity of network system management and the conrtol technology, the network policy control technology causes the attention of people. Introduces the lastest research situation of network policy control technology of abroad, and describes it from the management based on policy and strategy oriented middleware. Introduces the research situation of domestic network policy control technology, and points out the deficiency of similar technology in our country. Points out that the digital policy description language based on the semantic, policy collision de- tection technology, examination and approval technology based on policy, and automatic deploy- ment and autonomous technology based on digital strategy, making them as the research direc- tion of this field.%随着网络系统管理和控制技术发展的复杂性,网络策略控制技术引起人们的关注。介绍国外网络策略控制技术的最新研究现状,从基于策略的管理、策略中间件两方面进行阐述。介绍国内网络策略控制技术的研究现状,并指出国内同类技术存在的不足之处:指出以基于语义的数字策略描述语言、策略冲突检测技术、基于策略审核批准技术、基于数字策略的自动部署和自治执行技术等四个方面作为该领域的研究方向。

  8. LTE mobile network technology

    OpenAIRE

    Sladič, Klemen

    2012-01-01

    The main purpose of this thesis is an introduction to long term evolution of fourth generation mobile networks based on LTE mobile network standard. Fourth generation mobile networks are currently one of the most developed technology in the world of mobile communications and are somewhere already available for commercial use. At the beginning is a short history of mobile networks evolution, for easier understanding. In the history you can find information from first researches of magnetic...

  9. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP......-based services and possibly becoming service providers themselves. This is already happening in the so-called "social networks" and peer-to-peer file sharing networks on the Internet - making this emerging topic one of the most active research areas in the wireless communications filed....

  10. Establishment of 2000 National Geodetic Control Network of China and It’s Technological Progress

    Directory of Open Access Journals (Sweden)

    CHEN Junyong

    2007-02-01

    Full Text Available Objectives: 2000’ National Geodetic Control Network of China is an important fundamental scientific engineering project in China. It consists of three parts which are establishment of 2000 National GPS Geodetic Network, its combination adjustment with national astro-geodetic network and 2000 National Gravity Fundamental network. It provides the high precise coordinate reference and gravity reference for three dimensional geo-center national coordinates system and gravity system, respectively. Additionally, it provides precise unified geometric and physical geodesy information for the economic construction, the national defense and the scientific research. Methods: 1. The larger number of data are processed in triple networks adjustment of 2000 National GPS Geodetic Network, which are chosen from the GPS monitoring stations, such as grade A, B of national GPS network , grade 1st and 2nd of national GPS network, crustal movement observation network of China, and others crustal deformation monitoring stations. Finally, the data of 2666 GPS stations are used in the data processing of 2000 National GPS Geodetic Network, including 124 external stations and 2542 internal stations. In order to the results of triple networks adjustment are corresponding to that of three dimensional geo-center coordinates system, ITRF 97 and epoch 2000.0 are chosen as the coordinate reference frame and epoch reference, respectively. The methods of “strong reference” and “weak reference” are combined used in the control data selection of triple networks adjustment. The scale and rotation scales are adopted for each sub network. The least square adjustment is firstly adopted in each sub network adjustment. The data of obvious abnormal baselines are found and rejected firstly. And the method of double factor robust estimation is adopted in the data processing. 2. The combined adjustment of 2000 National GPS Geodetic Network and national astro-geodetic network is

  11. Mapping Technology Space by Normalizing Technology Relatedness Networks

    CERN Document Server

    Alstott, Jeff; Yan, Bowen; Luo, Jianxi

    2015-01-01

    Technology is a complex system, with technologies relating to each other in a space that can be mapped as a network. The technology relatedness network's structure can reveal properties of technologies and of human behavior, if it can be mapped accurately. Technology networks have been made from patent data, using several measures of relatedness. These measures, however, are influenced by factors of the patenting system that do not reflect technologies or their relatedness. We created technology networks that precisely controlled for these impinging factors and normalized them out, using data from 3.9 million patents. The normalized technology relatedness networks were sparse, with only ~20% of technology domain pairs more related than would be expected by chance. Different measures of technology relatedness became more correlated with each other after normalization, approaching a single dimension of technology relatedness. The normalized network corresponded with human behavior: we analyzed the patenting his...

  12. Technological Developments in Networking, Education and Automation

    CERN Document Server

    Elleithy, Khaled; Iskander, Magued; Kapila, Vikram; Karim, Mohammad A; Mahmood, Ausif

    2010-01-01

    "Technological Developments in Networking, Education and Automation" includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent

  13. On the Political Value of Network Technology

    Institute of Scientific and Technical Information of China (English)

    Gong Xiaoping

    2011-01-01

    Since the 1990s,with the emergence of the Internet,rapid development of network technology,based on computer technology,communication technology and information technology,has affected all aspects of social life.As the network technology has the characteristics of openness,interactivity,anonymity,transparency,globalization and the decentralization,it is becoming more and more popular and adds a number of new technologies of variables and restrictive factors into traditional sense of political participation and political control mode.The links between Internet and politics grow increasingly and the political value of network technology becomes more prominent.

  14. 智能家居的网络控制技术探密%Smart Home Network Control Technology

    Institute of Scientific and Technical Information of China (English)

    陆刚

    2016-01-01

    The smart home is a house as a platform,the use of integrated wiring technology,network communication technology,intelligent household design scheme-system security technology,automatic control technology,audio and video technology to integrate the household life related facilities,to build efficient residential facilities and family sched-ule affairs management system,improve home security,convenience,comfort,artistry,and realize environmental pro-tection and energy saving living environment. Smart home embodies the latest technology,home appliances the key is to adopt the advanced control technology,which makes home appliances from a mechanical appliance into a kind of intelli-gent equipment. Discusses the fostering of national policy regulation will promote the development of smart home indus-try,introduces the function of smart home control system and the application field,analyses the types of intelligent household control system structure,basic characteristics and scope of application,intelligent control of smart home is proposed.%智能家居是以住宅为平台,利用综合布线技术、网络通信技术、智能家居-系统设计方案安全防范技术、自动控制技术、音视频技术将家居生活有关的设施集成,构建高效的住宅设施与家庭日程事务的管理系统,提升家居安全性、便利性、舒适性、艺术性,并实现环保节能的居住环境。智能家居体现了家用电器最新技术面貌,其关键在于采用了先进的控制技术,从而使家用电器从一种机械式的用具变成一种具有智能的设备。论述了国家政策的扶植调控促进了智能家居产业的发展,介绍了智能家居控制系统的功能和应用领域,研究了智能家居控制系统的类型结构、基本特点和适用范围,提出了智能家居的智能控制。

  15. Control of Multilayer Networks

    CERN Document Server

    Menichetti, Giulia; Bianconi, Ginestra

    2015-01-01

    The controllability of a network is a theoretical problem of relevance in a variety of contexts ranging from financial markets to the brain. Until now, network controllability has been characterized only on isolated networks, while the vast majority of complex systems are formed by multilayer networks. Here we build a theoretical framework for the linear controllability of multilayer networks by mapping the problem into a combinatorial matching problem. We found that correlating the external signals in the different layers can significantly reduce the multiplex network robustness to node removal, as it can be seen in conjunction with a hybrid phase transition occurring in interacting Poisson networks. Moreover we observe that multilayer networks can stabilize the fully controllable multiplex network configuration that can be stable also when the full controllability of the single network is not stable.

  16. Networked Control System – A Survey

    Directory of Open Access Journals (Sweden)

    M. Brindha

    2013-07-01

    Full Text Available Networked Control System (NCS is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy maintenance and high reliability. Networked control systems (NCSs have been gaining popularity with their high potential in widespread applications and becoming realizable with the rapid developments in computer, communication and control technologies. This paper reviews the development history of the NCS, and point out the field of further researches.

  17. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  18. Software Defined Networking Demands on Software Technologies

    DEFF Research Database (Denmark)

    Galinac Grbac, T.; Caba, Cosmin Marius; Soler, José

    2015-01-01

    Software Defined Networking (SDN) is a networking approach based on a centralized control plane architecture with standardised interfaces between control and data planes. SDN enables fast configuration and reconfiguration of the network to enhance resource utilization and service performances....... This new approach enables a more dynamic and flexible network, which may adapt to user needs and application requirements. To this end, systemized solutions must be implemented in network software, aiming to provide secure network services that meet the required service performance levels. In this paper......, we review this new approach to networking from an architectural point of view, and identify and discuss some critical quality issues that require new developments in software technologies. These issues we discuss along with use case scenarios. Here in this paper we aim to identify challenges...

  19. Key to Network Controllability

    OpenAIRE

    Banerjee, Soumya Jyoti; Roy, Soumen

    2012-01-01

    Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network. Driver nodes are unmatched nodes, from which there are directed paths to all matched nodes. Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, $P(k_{in}, k_{out})$. Is the controllability of a network decided almost completely by the immediate neighbourhood of a node, ...

  20. Technology comparison of wireless of control networks for smart home and smart metering applications; Technologievergleich drahtloser Steuernetzwerke fuer Smart Home und Smart Metering Anwendungen

    Energy Technology Data Exchange (ETDEWEB)

    Langhammer, N.; Kays, R. [Technische Univ. Dortmund (Germany). Lehrstuhl fuer Kommunikationstechnik

    2012-07-01

    Smart grid power systems require a continuous communication technology networking at all levels of the hierarchy. In addition to large industrial consumers in the higher network levels, components in low voltage networks must be integrated into the smart grid. The realization of a robust control network for smart home and smart metering applications in the residential environment requires a major challenge. Due to the easy upgradeability and the great flexibility, the utilization of wireless technologies is very attractive. In practice, however, many different standards are competing. Examples for this include IEEE 802.15.4 and Konnex-RF. A tendency towards a de-facto standard is not yet in sight. In addition, the individual performance of the various technologies is difficult to estimate due to the large variety of parameters. This complicates the selection and commitment to a particular technology. However, in order to make a decision, the authors of the contribution under consideration report on an objective comparison of the new communication technology layers of the current wireless control networks. As a comparison, the parameters of reliable indoor coverage and the expected energy consumption are used.

  1. Controllability of Brain Networks

    OpenAIRE

    Gu, Shi; Pasqualetti, Fabio; Cieslak, Matthew; Grafton, Scott T.; Bassett, Danielle S.

    2014-01-01

    Cognitive function is driven by dynamic interactions between large-scale neural circuits or networks, enabling behavior. Fundamental principles constraining these dynamic network processes have remained elusive. Here we use network control theory to offer a mechanistic explanation for how the brain moves between cognitive states drawn from the network organization of white matter microstructure. Our results suggest that densely connected areas, particularly in the default mode system, facilit...

  2. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  3. Controllability of the better chosen partial networks

    Science.gov (United States)

    Liu, Xueming; Pan, Linqiang

    2016-08-01

    How to control large complex networks is a great challenge. Recent studies have proved that the whole network can be sufficiently steered by injecting control signals into a minimum set of driver nodes, and the minimum numbers of driver nodes for many real networks are high, indicating that it is difficult to control them. For some large natural and technological networks, it is impossible and not feasible to control the full network. For example, in biological networks like large-scale gene regulatory networks it is impossible to control all the genes. This prompts us to explore the question how to choose partial networks that are easy for controlling and important in networked systems. In this work, we propose a method to achieve this goal. By computing the minimum driver nodes densities of the partial networks of Erdös-Rényi (ER) networks, scale-free (SF) networks and 23 real networks, we find that our method performs better than random method that chooses nodes randomly. Moreover, we find that the nodes chosen by our method tend to be the essential elements of the whole systems, via studying the nodes chosen by our method of a real human signaling network and a human protein interaction network and discovering that the chosen nodes from these networks tend to be cancer-associated genes. The implementation of our method shows some interesting connections between the structure and the controllability of networks, improving our understanding of the control principles of complex systems.

  4. Digital station control technology with system bus in RWE's transmission network; Digitale Stationsleittechnik mit Systembus im RWE-Transportnetz

    Energy Technology Data Exchange (ETDEWEB)

    Tessmer, Kai [Siemens Energy Automation, Dortmund (Germany). RWE Transportnetzprojekte; Friedrich, Wolfgang [Helmut Mauell GmbH, Velbert (Germany); Krueger, Roland; Ruemenapp, Peter [RWE Westfalen Weser Ems Netzservice GmbH (Germany). Bereich Grundsatzplanung Sekundaertechnik

    2009-10-15

    As early as the 1990s RWE began equipping its transmission network stations with digital station control technology, this involving control station linkage and a proprietary station bus. Ten years later, however, a market analysis taking account of the costs and the technical possibilities found that the use of a standardised RWE-profile station bus in accordance with 60870-5-104 offers substantial advantages. Integration tests followed to determine how this might be implemented. The experiences gained in these tests will go into the development of a migration concept for the introduction of IEC 61850 in transmission network stations.

  5. Controllability of Real Networks

    CERN Document Server

    Cowan, Noah J; Vilhena, Daril A; Bergstrom, Carl T

    2011-01-01

    Liu \\emph{et al.}\\ have forged new links between control theory and network dynamics by focusing on the structural controllability of networks [Lui et al., Nature:473(7346), 167-173, 2011]. Two main results in the paper are that (1) the number of driver nodes, $N_D$, necessary to control a network is determined by the network's degree distribution and (2) $N_D$ tends to represent a substantial fraction of the nodes in inhomogeneous networks such as the real-world examples considered therein. These conclusions hinge on a critical modeling assumption: the dynamical system at each node in the network is degenerate in the sense that it has an infinite time constant, implying that its value neither grows nor decays absent influence from inbound connections. However, the real networks considered in the paper---including food webs, power grids, electronic circuits, metabolic networks, and neuronal networks---manifest dynamics at each node that have finite time constants. Here we apply Liu \\emph{et al.}'s theoretical...

  6. Health Center Controlled Network

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Health Center Controlled Network (HCCN) tool is a locator tool designed to make data and information concerning HCCN resources more easily available to our...

  7. Primary Study on Controllable Network---The Only Roads in Network Security Technology Development%可控网络初探--网络安全技术发展的必由之路

    Institute of Scientific and Technical Information of China (English)

    卢昱; 李玺; 吴忠望; 王宇

    2015-01-01

    针对信息网络面临的安全威胁,首次提出了可控网络理论和可控网络系统的概念、理论基础、分析方法、研究内容和发展趋势。随着可控网络理论研究的深入和可控网络技术的普及,可控网络将形成网络安全研究领域新的重要的研究方向,信息网络安全环境会得到极大改善。%In view of the security threats to the information network,the concept,theoretical basis, analysis method,research content and development trend of controllable network theory and controllable network system are proposed for the first time.With the research of controllable network theory and the popularization of controllable network technology,controllable network will form a new important research direction in the network security research field,and the information network security environment will be greatly improved.

  8. Structural Dissection for Controlling Complex Networks

    CERN Document Server

    Wang, Wen-Xu; Zhao, Chen; Liu, Yang-Yu; Lai, Ying-Cheng

    2015-01-01

    Controlling complex networked systems has been a central goal in different fields and understanding controllability of complex networks has been at the forefront of contemporary science. Despite the recent progress in the development of controllability theories for complex networks, we continue to lack efficient tools to fully understand the effect of network topology and interaction strengths among nodes on controllability. Here we establish a framework to discern the significance of links and nodes for controlling general complex networks in a simple way based on local information. A dissection process is offered by the framework to probe and classify nodes and links completely, giving rise to a criterion for strong structural controllability. Analytical results indicate phase transitions associated with link and node categories, and strong structural controllability. Applying the tools to real networks demonstrate that real technological networks are strong structurally controllable, whereas most of real s...

  9. Ultrafast technologies for photonic networks

    Science.gov (United States)

    Prucnal, Paul R.; Baby, Varghese; Xu, Lei; Glesk, Ivan

    2004-10-01

    Considerable progress has been in the last decade in the fields of photonic networks and ultra-fast optics. The past few years has seen the widespread use of wavelength division multiplexing (WDM) to provide enormous point-to-point capacity in the backbone and metro area networks. Remarkable progress in electronics, in terms of both costs and performance speeds, has to some extent alleviated the 'electronic bottleneck'. Developments in fiber-optics such as novel fiber types and Raman amplification have opened up additional wavelength regions of operation resulting in great expansion of usable fiber bandwidth. There exist unique opportunities for ultrafast technologies - a subject of much interest in the last decade and reaching a point of maturity - to complement these advances and spark the next generation networks. In our talk, we will mention two networking environments very different from WDM - (1) optical time division multiplexing (OTDM) and (2) optical code division multiple access (OCDMA). We will look at the potential of both these scenarios for different applications, focusing in particular on the latter as an approach that provides maximum flexibility to utilize the immense bandwidth of the optical fiber. We will also describe various ultra-fast technologies that have been developed e.g. .high repetition rate pulsed lasers, ultra-fast optical switches, time delay elements etc. which have a direct relevance to both these types of networks.

  10. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  11. Global business networks and technology

    Directory of Open Access Journals (Sweden)

    Pomykalski Andrzej

    2015-05-01

    Full Text Available The current economic development changes the perception of technology innovation and business cooperation. Global business networks create very competitive markets characterised by constant innovation and dynamic changes. Further changes may come with growing involvement of active consumers and the development of Internet of Things. Focusing mainly on activities of multinational business networks operating in Poland the author describes selected aspects of gradual adoption of innovation management concepts in firms. The article provides with an overview of concepts described in innovation management literature during the last decade and of new concepts evolving.

  12. Recent Technology Advances in Distributed Engine Control

    Science.gov (United States)

    Culley, Dennis

    2017-01-01

    This presentation provides an overview of the work performed at NASA Glenn Research Center in distributed engine control technology. This is control system hardware technology that overcomes engine system constraints by modularizing control hardware and integrating the components over communication networks.

  13. 南水北调中线控制专网计算机网络技术探讨%Discuss on Computer Network Technology of Control Private Network in Middle Route Project for South-to-North Water

    Institute of Scientific and Technical Information of China (English)

    王敏

    2014-01-01

    根据南水北调中线工程远程闸站监控系统的控制专网计算机组网需求,结合现有主流计算机网络组网技术,阐述控制专网组网设计原则,通过对提出的3个计算机组网技术方案进行详细的技术比较和分析,给出控制专网的最优组网解决方案。%Based on the demand of control private network of remote sluice-station monitoring system of Middle Route Project for South-to-North Water, this paper explains the principles of constructing control private network in view of the current network construction technology of computer network. The optimal solution for constructing control private network is proposed through comparing and analyzing three solutions of computer networking technology in detail.

  14. Research on Remote Network Bidirectional Detect and Control Model

    Directory of Open Access Journals (Sweden)

    Hongyao Ju

    2013-09-01

    Full Text Available Remote network bidirectional detect and control technologies are the key factors to solve local network allopatry expansibility and management. With studying gateway integration technology, bidirectional VPN technology, identity authentication technology and dynamic host management technology can be integrated into gateway. Thus, bidirectional connect and control among allopatry local networks based on Internet can be solved. Whole area expansibility of local network is realized. With experiment, the model is proved to finish remote bidirectional interconnection of local network automatically and to obtain allopatry local users authority. The equipment detecting and controlling in remote local networks are realized.  

  15. CCTV networking and digital technology

    CERN Document Server

    Damjanovski, Vlado

    2005-01-01

    Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the te

  16. Fuzzy logic and neural network technologies

    Science.gov (United States)

    Villarreal, James A.; Lea, Robert N.; Savely, Robert T.

    1992-01-01

    Applications of fuzzy logic technologies in NASA projects are reviewed to examine their advantages in the development of neural networks for aerospace and commercial expert systems and control. Examples of fuzzy-logic applications include a 6-DOF spacecraft controller, collision-avoidance systems, and reinforcement-learning techniques. The commercial applications examined include a fuzzy autofocusing system, an air conditioning system, and an automobile transmission application. The practical use of fuzzy logic is set in the theoretical context of artificial neural systems (ANSs) to give the background for an overview of ANS research programs at NASA. The research and application programs include the Network Execution and Training Simulator and faster training algorithms such as the Difference Optimized Training Scheme. The networks are well suited for pattern-recognition applications such as predicting sunspots, controlling posture maintenance, and conducting adaptive diagnoses.

  17. Controlling edge dynamics in complex networks

    CERN Document Server

    Nepusz, Tamás

    2011-01-01

    The interaction of distinct units in physical, social, biological and technological systems naturally gives rise to complex network structures. Networks have constantly been in the focus of research for the last decade, with considerable advances in the description of their structural and dynamical properties. However, much less effort has been devoted to studying the controllability of the dynamics taking place on them. Here we introduce and evaluate a dynamical process defined on the edges of a network, and demonstrate that the controllability properties of this process significantly differ from simple nodal dynamics. Evaluation of real-world networks indicates that most of them are more controllable than their randomized counterparts. We also find that transcriptional regulatory networks are particularly easy to control. Analytic calculations show that networks with scale-free degree distributions have better controllability properties than uncorrelated networks, and positively correlated in- and out-degre...

  18. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Science.gov (United States)

    Messinger, Gioia; Goldberg, Giora

    2006-09-01

    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  19. Technologies for Legionella Control

    Science.gov (United States)

    Presentation includes a review of new Office of Water document entitled "Technologies for Legionella Control in Premise Plumbing Systems", and discussion on ORD research projects involving Legionella and disinfection.

  20. MUPBED - interworking challenges in a multi-domain and multi-technology network environment

    DEFF Research Database (Denmark)

    Foisel, Hans-Martin; Spaeth, Jan; Cavazzoni, Carlo

    2007-01-01

    Todays data transport networks are evolving continuously towards customer oriented and application aware networks. This evolution happens in Europe in a highly diverse network environment, covering multiple network domains, layers, technologies, control and management approaches. In this paper...

  1. Mass storage technology in networks

    Science.gov (United States)

    Ishii, Katsunori; Takeda, Toru; Itao, Kiyoshi; Kaneko, Reizo

    1990-08-01

    Trends and features of mass storage subsystems in network are surveyed and their key technologies spotlighted. Storage subsystems are becoming increasingly important in new network systems in which communications and data processing are systematically combined. These systems require a new class of high-performance mass-information storage in order to effectively utilize their processing power. The requirements of high transfer rates, high transactional rates and large storage capacities, coupled with high functionality, fault tolerance and flexibility in configuration, are major challenges in storage subsystems. Recent progress in optical disk technology has resulted in improved performance of on-line external memories to optical disk drives, which are competing with mid-range magnetic disks. Optical disks are more effective than magnetic disks in using low-traffic random-access file storing multimedia data that requires large capacity, such as in archive use and in information distribution use by ROM disks. Finally, it demonstrates image coded document file servers for local area network use that employ 130mm rewritable magneto-optical disk subsystems.

  2. Networked and Distributed Predictive Control

    CERN Document Server

    Christofides, Panagiotis D; De La Pena, David Munoz

    2011-01-01

    "Networked and Distributed Predictive Control" presents rigorous, yet practical, methods for the design of networked and distributed predictive control systems - the first book to do so. The design of model predictive control systems using Lyapunov-based techniques accounting for the influence of asynchronous and delayed measurements is followed by a treatment of networked control architecture development. This shows how networked control can augment dedicated control systems in a natural way and takes advantage of additional, potentially asynchronous and delayed measurements to main

  3. Network technology for depot modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hostick, C.J.

    1990-12-01

    This report was prepared by the Pacific Northwest Laboratory to summarize existing and emerging information system technology and standards applicable to Depot System Command (DESCOM) modernization efforts. The intent of this summarization is to provide the Revitalization of Army Depots for the Year 2000 (READY 2000) team a clear understanding of the enabling information system technologies required to support effective modernization activities. Much of the information contained in this report was acquired during the last year in support of the US Army Armament, Munitions, and Chemical Command (AMCCOM) Facility Integrated Manufacturing Management System (FIMMS) project at PNL, which is targeting the modernization of plant-wide information systems at Army Ammunition Plants. The objective of information system modernization is to improve the effectiveness of an organization in performing its mission. Information system modernization strives to meet this objective by creating an environment where data is electronically captured near the source and readily available to all areas of the organization. Advanced networks, together with related information system technology, are the enabling mechanisms that make modern information system infrastructures possible. The intent of this paper is to present an overview of advanced information system network technology to support depot modernization planners in making technology management decisions. Existing and emerging Open System Interconnection (OSI) and Government Open System Interconnection Profile (GOSIP) standards are explained, as well as a brief assessment of existing products compliant with these standards. Finally, recommendations for achieving plant-wide integration using existing products are presented, and migration strategies for full OSI compliance are introduced. 5 refs., 16 figs. (JF)

  4. Some Issues on Computer Networks: Architecture and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    Guan-Qun Gu; Jun-Zhou Luo

    2006-01-01

    The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware,wireless/mobile network, new generation network services and applications, and foundational theories on network modeling.Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.

  5. Networking Technologies and the Rate of Technological Change

    Directory of Open Access Journals (Sweden)

    Charles Mitchell

    2005-12-01

    Full Text Available Network technology is changing rapidly and those adept at ICT analysis need resolve rate of change issues. Developments in networking now are in the direction of heuristic intelligence. Since about 1980, networking techniques have encouraged combining bits of information with imagination cognitively to improve ideas about reality. ICT enterprise projects utilize networking to sustain requisite imagination. Assumptions and misassuptions of project builders are rationally comprehended as networking sustains creative processes. The monopolization of valuable network techniques influences in the direction of esoteric networking. Data presents that substantial knowledge and networking is now occurring globally. As a netaphor, networking

  6. Networking Technologies and the Rate of Technological Change

    Directory of Open Access Journals (Sweden)

    Charles Mitchell

    2005-12-01

    Full Text Available Network technology is changing rapidly and those adept at ICT analysis need resolve rate of change issues. Developments in networking now are in the direction of heuristic intelligence. Since about 1980, networking techniques have encouraged combining bits of information with imagination cognitively to improve ideas about reality. ICT enterprise projects utilize networking to sustain requisite imagination. Assumptions and misassuptions of project builders are rationally comprehended as networking sustains creative processes. The monopolization of valuable network techniques influences in the direction of esoteric networking. Data presents that substantial knowledge and networking is now occurring globally. As a netaphor, networking

  7. Evaluating innovation networks in emerging technologies

    NARCIS (Netherlands)

    Valk, T. van der; Chappin, M.M.H.; Gijsbers, G.W.

    2011-01-01

    Interorganisational innovation networks are increasingly important for innovation in emerging technology fields. The performance of such networks can have a large impact on the future development of emerging technologies. A useful framework for the evaluation of innovation networks however does not

  8. Wi-Fi Wireless Networks and Technology

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Most agree that wireless networking represent the future of computer and Internet connectivity worldwide.Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks. 1 What is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers.Wireless net- working is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices.

  9. Weight-Control Information Network

    Science.gov (United States)

    ... of resources . Alternate Language URL Weight-control Information Network (WIN) Page Content The Weight-control Information Network ( ... and Digestive and Kidney Diseases, Health Information Center, Telephone: 1-800-860-8747 Contact the NIDDK Health ...

  10. 智能配电网故障自愈控制技术分析%Analysis of Fault Self Healing Control Technology for Intelligent Distribution Network

    Institute of Scientific and Technical Information of China (English)

    周虎

    2015-01-01

    Smart grid is the modern social response to the global energy, climate, environment and sustainable development of economy and social problems in many aspects such as integrated solutions, is also the main direction of the future power grid development. The intelligent power distribution network is an important content of unified strong smart grid, self-healing is the core content of intelligent distribution network to achieve development. Smart distribution network fault self-healing control technology were analyzed, and the characteristics and realization of the intelligent distribution network fault self-healing control conditions were introduced, as well as the intelligent distribution network fault self-healing process were analyzed, and ifnally through the analysis of the fault handling including distributed power supply for the application of the intelligent distribution network self-healing technology.%智能电网是现代社会应对全球能源、气候、环境以及经济和可持续发展等多方面社会问题的综合解决方案,同时也是未来电网发展的最主要方向。配电网的智能化是统一坚强智能电网的重要内容,自愈是配电网实现智能化发展的核心内容。文章对智能配电网故障自愈控制技术进行了分析,介绍了智能配电网故障自愈控制的特点及实现的条件,同时对智能配电网故障自愈流程进行了分析,最后通过含分布式电源的故障处理分析了智能配电网自愈技术的应用。

  11. Advanced radio over fiber network technologies.

    Science.gov (United States)

    Novak, Dalma; Waterhouse, Rod

    2013-09-23

    The evolution of wireless communication networks supporting emerging broadband services and applications offers new opportunities for realizing integrated optical and wireless network infrastructures. We report on some of our recent activities investigating advanced technologies for next generation converged optical wireless networks. Developments in Active Antenna Systems, mobile fronthaul architectures, and 60 GHz fiber distributed wireless networks are described. We also discuss the potential for analog radio over fiber distribution links as a viable solution for meeting the capacity requirements of new network architectures.

  12. Robust H∞ control for networked control systems

    Institute of Scientific and Technical Information of China (English)

    Ma Weiguo; Shao Cheng

    2008-01-01

    The robust H∞ control for networked control systems with both stochastic network-induced delay and data packet dropout is studied.When data are transmitted over network,the stochastic data packet dropout process can be described by a two-state Markov chain.The networked control systems with stochastic network-induced delay and data packet dropout are modeled as a discrete time Markov jump linear system with two operation modes.The sufficient condition of robust H∞ control for networked control systems stabilized by state feedback controller is presented in terms of linear matrix inequality.The state feedback controller can be constructed via the solution of a set of linear matrix inequalities.An example is given to verify the effectiveness of the method proposed.

  13. The Key Technologies Demanding Prompt Solution in Network Fire Control System%网络火控中一些亟待解决的关键技术

    Institute of Scientific and Technical Information of China (English)

    陈勇; 刘克敏; 孙幸福

    2011-01-01

    According to the actualities that the demestic fire control system development still remains at multi-computer communication system, this paper presents the background and present situation of networks fire control system development. The influence of this trend on weapon system is analyzed briefly. On this basis, we put forward some key technologies demanding prompt solution.%针对国内火控系统发展仍停留在“多计算机通讯体制的现状”,阐述了网络火控的研究背景、现状及发展方向。论述了火控系统信息化、网络化对武器系统的影响,在此基础上提出了网络火控中亟待解决的几个关键问题。

  14. Sparsity Methods for Networked Control

    OpenAIRE

    Nagahara, Masaaki

    2014-01-01

    In this presentation, we introduce sparsity methods for networked control systems and show the effectiveness of sparse control. In networked control, efficient data transmission is important since transmission delay and error can critically deteriorate the stability and performance. We will show that this problem is solved by sparse control designed by recent sparse optimization methods.

  15. Neural Networks for Optimal Control

    DEFF Research Database (Denmark)

    Sørensen, O.

    1995-01-01

    Two neural networks are trained to act as an observer and a controller, respectively, to control a non-linear, multi-variable process.......Two neural networks are trained to act as an observer and a controller, respectively, to control a non-linear, multi-variable process....

  16. Neural Networks for Optimal Control

    DEFF Research Database (Denmark)

    Sørensen, O.

    1995-01-01

    Two neural networks are trained to act as an observer and a controller, respectively, to control a non-linear, multi-variable process.......Two neural networks are trained to act as an observer and a controller, respectively, to control a non-linear, multi-variable process....

  17. Control efficacy of complex networks

    Science.gov (United States)

    Gao, Xin-Dong; Wang, Wen-Xu; Lai, Ying-Cheng

    2016-06-01

    Controlling complex networks has become a forefront research area in network science and engineering. Recent efforts have led to theoretical frameworks of controllability to fully control a network through steering a minimum set of driver nodes. However, in realistic situations not every node is accessible or can be externally driven, raising the fundamental issue of control efficacy: if driving signals are applied to an arbitrary subset of nodes, how many other nodes can be controlled? We develop a framework to determine the control efficacy for undirected networks of arbitrary topology. Mathematically, based on non-singular transformation, we prove a theorem to determine rigorously the control efficacy of the network and to identify the nodes that can be controlled for any given driver nodes. Physically, we develop the picture of diffusion that views the control process as a signal diffused from input signals to the set of controllable nodes. The combination of mathematical theory and physical reasoning allows us not only to determine the control efficacy for model complex networks and a large number of empirical networks, but also to uncover phenomena in network control, e.g., hub nodes in general possess lower control centrality than an average node in undirected networks.

  18. Technology report on Railway Embedded Network solutions

    OpenAIRE

    Wahl, M; BERNOCCHI, M; Just, P.; WEISS, AH; GOIKOETXEA, J; BILLION, J; NEMORIN, J

    2007-01-01

    Deliverable D3D.3.1 Technology report on Railway Embedded Network solutions is a deliverable of Work Package SP3D_WP3 ICOM Specification & Telecom Interfaces of Onboard and Train Train Networks. It takes place within the InteGRail Task 3D_03.1 State of the Art in Embedded Networks. The objectives of this deliverable are: - to consider which embedded communication network technologies are already into ser-vice within the trains; - to analyse Ethernet-based technologies; - to evaluate how Ethe...

  19. Handbook of social network technologies and applications

    CERN Document Server

    Furht, Borko

    2010-01-01

    Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past. The recent development of Web 2.0 has provided many new applications, such as Myspace, Facebook, and LinkedIn. The purpose of ""Handbook of Social Networks: Technologies and Applications"" is to provide comprehensive guidelines on the current and future trends in social network technologies and applications in the field of Web-based Social Networks. This handbook includes

  20. Controlling Congestion on Complex Networks

    CERN Document Server

    Buzna, Lubos

    2016-01-01

    From the Internet to road networks and the power grid, modern life depends on controlling flows on critical infrastructure networks that often operate in a congested state. Yet, we have a limited understanding of the relative performance of the control mechanisms available to manage congestion and of the interplay between network topology, path layout and congestion control algorithms. Here, we consider two flow algorithms (max-flow and uniform-flow), and two more realistic congestion control schemes (max-min fairness and proportional fairness). We analyse how the algorithms and network topology affect throughput, fairness and the location of bottleneck edges. Our results show that on large random networks a network operator can implement the trade-off (proportional fairness) instead of the fair allocation (max-min fairness) with little sacrifice in throughput. We illustrate how the previously studied uniform-flow approach leaves networks severely underutilised in comparison with congestion control algorithms...

  1. Supervisory Control of Networked Control Systems

    Science.gov (United States)

    2006-01-15

    REPORT: January 15, 2006 Problem Statement: A networked control system is a control system whose feedback path is realized over a computer...theoretical bounds derived in [Ling03a]. 6. The feedback information in a networked control system is quantized due to the digital nature of

  2. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  3. Survey of Promising Technologies for 5G Networks

    Directory of Open Access Journals (Sweden)

    Nam Tuan Le

    2016-01-01

    Full Text Available As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, Internet of things (IoT, and software-defined networking (SDN have become some of the core technologies for the 5G network. Cloud-based services provide flexible and efficient solutions for information and communications technology by reducing the cost of investing in and managing information technology infrastructure. In terms of functionality, SDN is a promising architecture that decouples control planes and data planes to support programmability, adaptability, and flexibility in ever-changing network architectures. However, IoT combines cloud computing and SDN to achieve greater productivity for evolving technologies in 5G by facilitating interaction between the physical and human world. The major objective of this study provides a lawless vision on comprehensive works related to enabling technologies for the next generation of mobile systems and networks, mainly focusing on 5G mobile communications.

  4. Controllability of structural brain networks.

    Science.gov (United States)

    Gu, Shi; Pasqualetti, Fabio; Cieslak, Matthew; Telesford, Qawi K; Yu, Alfred B; Kahn, Ari E; Medaglia, John D; Vettel, Jean M; Miller, Michael B; Grafton, Scott T; Bassett, Danielle S

    2015-10-01

    Cognitive function is driven by dynamic interactions between large-scale neural circuits or networks, enabling behaviour. However, fundamental principles constraining these dynamic network processes have remained elusive. Here we use tools from control and network theories to offer a mechanistic explanation for how the brain moves between cognitive states drawn from the network organization of white matter microstructure. Our results suggest that densely connected areas, particularly in the default mode system, facilitate the movement of the brain to many easily reachable states. Weakly connected areas, particularly in cognitive control systems, facilitate the movement of the brain to difficult-to-reach states. Areas located on the boundary between network communities, particularly in attentional control systems, facilitate the integration or segregation of diverse cognitive systems. Our results suggest that structural network differences between cognitive circuits dictate their distinct roles in controlling trajectories of brain network function.

  5. Latest Trends in Home Networking Technologies

    Science.gov (United States)

    Tsutsui, Akihiro

    Broadband access service, including FTTH, is now in widespread use in Japan. More than half of the households that have broadband Internet access construct local area networks (home networks) in their homes. In addition, information appliances such as personal computers, networked audio, and visual devices and game machines are connected to home networks, and many novel service applications are provided via the Internet. However, it is still difficult to install and incorporate these devices and services because networked devices have been developed in different communities. I briefly explain the current status of information appliances and home networking technologies and services and discuss some of the problems in this and their solutions.

  6. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  7. Study on control information network and its real-time property

    Institute of Scientific and Technical Information of China (English)

    吴转峰; 刘卫国; 骆光照; 吴浦升

    2008-01-01

    The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the in...

  8. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  9. Controlling edge dynamics in complex networks

    OpenAIRE

    Nepusz, Tamás; Vicsek, Tamás

    2012-01-01

    The interaction of distinct units in physical, social, biological and technological systems naturally gives rise to complex network structures. Networks have constantly been in the focus of research for the last decade, with considerable advances in the description of their structural and dynamical properties. However, much less effort has been devoted to studying the controllability of the dynamics taking place on them. Here we introduce and evaluate a dynamical process defined on the edges ...

  10. Technology of Endpoint Admission Control in Computer Networks%计算机网络终端准入控制技术

    Institute of Scientific and Technical Information of China (English)

    周超; 周城; 丁晨路

    2011-01-01

    终端准入控制根据预定安全策略,对接入网络的终端进行身份认证和安全性检查,确保可信、安全的终端访问网络,拒绝或限制不安全终端的接入,体现了终端安全与准入控制的结合,可以有效提高网络对安全威胁的主动防御能力.现行部署的解决方案在身份认证、安全状态检查中存在缺陷,容易受到中间人攻击、会话劫持攻击等,并且对虚拟化应用适应性不足.可考虑通过完善认证过程、改善交互机制等方法加以改进.%Endpoint Admission Control technology takes authentication and security state checking on endpoints accessing to network on the basis of pre-determinate security policies. It makes sure that only the trustworthy and secure endpoints could access to networks while rejects or limits the accessing of insecure endpoints. It' s exemplification of the combination of Endpoint Security and Access Control, which can efficiently improve the active defense ability against security threaten of networks. However, the existing solution has shortages in authentication and security state checking that it could easily attacked by Man-in-the-Middle Attack and Session Hijack. What's more, it also has limitation in Virtualization appliance as well. It's considerable to consummate the mechanism of authentication and communication processes for improvement.

  11. Neural Networks in Control Applications

    DEFF Research Database (Denmark)

    Sørensen, O.

    examined, and it appears that considering 'normal' neural network models with, say, 500 samples, the problem of over-fitting is neglible, and therefore it is not taken into consideration afterwards. Numerous model types, often met in control applications, are implemented as neural network models....... - Control concepts including parameter estimation - Control concepts including inverse modelling - Control concepts including optimal control For each of the three groups, different control concepts and specific training methods are detailed described.Further, all control concepts are tested on the same......The intention of this report is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...

  12. Chaotic Control of Network Traffic

    Institute of Scientific and Technical Information of China (English)

    YANG Tan; CUI Yi-Dong; JIN Yue-Hui; CHENG Shi-Duan

    2009-01-01

    A method of chaotic control on network traffic is presented.By this method,the chaotic network traffic can be controlled to a pre-assigned equilibrium point according to chaotic prediction and the largest Lyapunov exponent of the traffic on congested link is reduced,thereby the probability of traffic burst and network congestion can be reduced.Numerical examples show that this method is effective.

  13. Next generation network management technology

    Science.gov (United States)

    Baras, John S.; Atallah, George C.; Ball, Mike; Goli, Shravan; Karne, Ramesh K.; Kelley, Steve; Kumar, Harsha; Plaisant, Catherine; Roussopoulos, Nick; Schneiderman, Ben; Srinivasarao, Mulugu; Stathatos, Kosta; Teittinen, Marko; Whitefield, David

    1995-01-01

    Today's telecommunications networks are becoming increasingly large, complex, mission critical and heterogeneous in several dimensions. For example, the underlying physical transmission facilities of a given network may be ``mixed media'' (copper, fiber-optic, radio, and satellite); the subnetworks may be acquired from different vendors due to economic, performance, or general availability reasons; the information being transmitted over the network may be ``multimedia'' (video, data, voice, and images) and, finally, varying performance criteria may be imposed e.g., data transfer may require high throughput while the others, whose concern is voice communications, may require low call blocking probability. For these reasons, future telecommunications networks are expected to be highly complex in their services and operations. Due to this growing complexity and the disparity among management systems for individual sub-networks, efficient network management systems have become critical to the current and future success of telecommunications companies. This paper addresses a research and development effort which focuses on prototyping configuration management, since that is the central process of network management and all other network management functions must be built upon it. Our prototype incorporates ergonomically designed graphical user interfaces tailored to the network configuration management subsystem and to the proposed advanced object-oriented database structure. The resulting design concept follows open standards such as Open Systems Interconnection (OSI) and incorporates object oriented programming methodology to associate data with functions, permit customization, and provide an open architecture environment.

  14. Networking Technologies for Future Home Networks Using 60 GHz Radio

    NARCIS (Netherlands)

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity wit

  15. Networking Technologies for Future Home Networks Using 60 GHz Radio

    NARCIS (Netherlands)

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity

  16. HSUPA Transport Network Congestion Control

    Directory of Open Access Journals (Sweden)

    Szilveszter Nádas

    2009-01-01

    Full Text Available The introduction of High Speed Uplink Packet Access (HSUPA greatly improves achievable uplink bitrate but it presents new challenges to be solved in the WCDMA radio access network. In the transport network, bandwidth reservation for HSUPA is not efficient and TCP cannot efficiently resolve congestion because of lower layer retransmissions. This paper proposes an HSUPA transport network flow control algorithm that handles congestion situations efficiently and supports Quality of Service differentiation. In the Radio Network Controller (RNC, transport network congestion is detected. Relying on the standardized control frame, the RNC notifies the Node B about transport network congestion. In case of transport network congestion, the Node B part of the HSUPA flow control instructs the air interface scheduler to reduce the bitrate of the flow to eliminate congestion. The performance analysis concentrates on transport network limited scenarios. It is shown that TCP cannot provide efficient congestion control. The proposed algorithm can achieve high end-user perceived throughput, while maintaining low delay, loss, and good fairness in the transport network.

  17. Discovering Mobile Social Networks by Semantic Technologies

    Science.gov (United States)

    Jung, Jason J.; Choi, Kwang Sun; Park, Sung Hyuk

    It has been important for telecommunication companies to discover social networks from mobile subscribers. They have attempted to provide a number of recommendation services, but they realized that the services were not successful. In this chapter, we present semantic technologies for discovering social networks. The process is mainly composed of two steps; (1) profile identification and (2) context understanding. Through developing a Next generation Contents dElivery (NICE) platform, we were able to generate various services based on the discovered social networks.

  18. Physical controllability of complex networks

    Science.gov (United States)

    Wang, Le-Zhi; Chen, Yu-Zhong; Wang, Wen-Xu; Lai, Ying-Cheng

    2017-01-01

    A challenging problem in network science is to control complex networks. In existing frameworks of structural or exact controllability, the ability to steer a complex network toward any desired state is measured by the minimum number of required driver nodes. However, if we implement actual control by imposing input signals on the minimum set of driver nodes, an unexpected phenomenon arises: due to computational or experimental error there is a great probability that convergence to the final state cannot be achieved. In fact, the associated control cost can become unbearably large, effectively preventing actual control from being realized physically. The difficulty is particularly severe when the network is deemed controllable with a small number of drivers. Here we develop a physical controllability framework based on the probability of achieving actual control. Using a recently identified fundamental chain structure underlying the control energy, we offer strategies to turn physically uncontrollable networks into physically controllable ones by imposing slightly augmented set of input signals on properly chosen nodes. Our findings indicate that, although full control can be theoretically guaranteed by the prevailing structural controllability theory, it is necessary to balance the number of driver nodes and control cost to achieve physical control. PMID:28074900

  19. Physical controllability of complex networks

    Science.gov (United States)

    Wang, Le-Zhi; Chen, Yu-Zhong; Wang, Wen-Xu; Lai, Ying-Cheng

    2017-01-01

    A challenging problem in network science is to control complex networks. In existing frameworks of structural or exact controllability, the ability to steer a complex network toward any desired state is measured by the minimum number of required driver nodes. However, if we implement actual control by imposing input signals on the minimum set of driver nodes, an unexpected phenomenon arises: due to computational or experimental error there is a great probability that convergence to the final state cannot be achieved. In fact, the associated control cost can become unbearably large, effectively preventing actual control from being realized physically. The difficulty is particularly severe when the network is deemed controllable with a small number of drivers. Here we develop a physical controllability framework based on the probability of achieving actual control. Using a recently identified fundamental chain structure underlying the control energy, we offer strategies to turn physically uncontrollable networks into physically controllable ones by imposing slightly augmented set of input signals on properly chosen nodes. Our findings indicate that, although full control can be theoretically guaranteed by the prevailing structural controllability theory, it is necessary to balance the number of driver nodes and control cost to achieve physical control.

  20. Neural Networks for Modeling and Control of Particle Accelerators

    CERN Document Server

    Edelen, A.L.; Chase, B.E.; Edstrom, D.; Milton, S.V.; Stabile, P.

    2016-01-01

    We describe some of the challenges of particle accelerator control, highlight recent advances in neural network techniques, discuss some promising avenues for incorporating neural networks into particle accelerator control systems, and describe a neural network-based control system that is being developed for resonance control of an RF electron gun at the Fermilab Accelerator Science and Technology (FAST) facility, including initial experimental results from a benchmark controller.

  1. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  2. Neural Networks in Control Applications

    DEFF Research Database (Denmark)

    Sørensen, O.

    The intention of this report is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...... study of the networks themselves. With this end in view the following restrictions have been made: - Amongst numerous neural network structures, only the Multi Layer Perceptron (a feed-forward network) is applied. - Amongst numerous training algorithms, only four algorithms are examined, all...... in a recursive form (sample updating). The simplest is the Back Probagation Error Algorithm, and the most complex is the recursive Prediction Error Method using a Gauss-Newton search direction. - Over-fitting is often considered to be a serious problem when training neural networks. This problem is specifically...

  3. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  4. Control of collective network chaos

    Energy Technology Data Exchange (ETDEWEB)

    Wagemakers, Alexandre, E-mail: alexandre.wagemakers@urjc.es; Sanjuán, Miguel A. F., E-mail: miguel.sanjuan@urjc.es [Departamento de Física, Universidad Rey Juan Carlos, Tulipán s/n, 28933 Móstoles, Madrid (Spain); Barreto, Ernest, E-mail: ebarreto@gmu.edu; So, Paul, E-mail: paso@gmu.edu [School of Physics, Astronomy, and Computational Sciences and The Krasnow Institute for Advanced Study, George Mason University, Fairfax, Virginia 22030 (United States)

    2014-06-01

    Under certain conditions, the collective behavior of a large globally-coupled heterogeneous network of coupled oscillators, as quantified by the macroscopic mean field or order parameter, can exhibit low-dimensional chaotic behavior. Recent advances describe how a small set of “reduced” ordinary differential equations can be derived that captures this mean field behavior. Here, we show that chaos control algorithms designed using the reduced equations can be successfully applied to imperfect realizations of the full network. To systematically study the effectiveness of this technique, we measure the quality of control as we relax conditions that are required for the strict accuracy of the reduced equations, and hence, the controller. Although the effects are network-dependent, we show that the method is effective for surprisingly small networks, for modest departures from global coupling, and even with mild inaccuracy in the estimate of network heterogeneity.

  5. Control of collective network chaos

    Science.gov (United States)

    Wagemakers, Alexandre; Barreto, Ernest; Sanjuán, Miguel A. F.; So, Paul

    2014-06-01

    Under certain conditions, the collective behavior of a large globally-coupled heterogeneous network of coupled oscillators, as quantified by the macroscopic mean field or order parameter, can exhibit low-dimensional chaotic behavior. Recent advances describe how a small set of "reduced" ordinary differential equations can be derived that captures this mean field behavior. Here, we show that chaos control algorithms designed using the reduced equations can be successfully applied to imperfect realizations of the full network. To systematically study the effectiveness of this technique, we measure the quality of control as we relax conditions that are required for the strict accuracy of the reduced equations, and hence, the controller. Although the effects are network-dependent, we show that the method is effective for surprisingly small networks, for modest departures from global coupling, and even with mild inaccuracy in the estimate of network heterogeneity.

  6. Control and Optimization of Network in Networked Control System

    Directory of Open Access Journals (Sweden)

    Wang Zhiwen

    2014-01-01

    Full Text Available In order to avoid quality of performance (QoP degradation resulting from quality of service (QoS, the solution to network congestion from the point of control theory, which marks departure of our results from the existing methods, is proposed in this paper. The congestion and bandwidth are regarded as state and control variables, respectively; then, the linear time-invariant (LTI model between congestion state and bandwidth of network is established. Consequently, linear quadratic method is used to eliminate the network congestion by allocating bandwidth dynamically. At last, numerical simulation results are given to illustrate the effectiveness of this modeling approach.

  7. Ultra wideband technology for wireless sensor networks

    Science.gov (United States)

    Wang, Yue; Xiong, Weiming

    2011-08-01

    Wireless sensor networks (WSNs) have emerged as an important method for planetary surface exploration. To investigate the optimized wireless technology for WSNs, we summarized the key requirements of WSNs and justified ultra wideband (UWB) technology by comparing with other competitive wireless technologies. We also analyzed network topologies as well as physical and MAC layer designs of IEEE 802.15.4a standard, which adopted impulse radio UWB (IR-UWB) technology. Our analysis showed that IR-UWB-based 802.15.4a standard could enable robust communication, precise ranging, and heterogeneous networking for WSNs applications. The result of our present work implies that UWB-based WSNs can be applied to future planetary surface exploration.

  8. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  9. Network Speech Systems Technology Program.

    Science.gov (United States)

    1980-09-30

    that this algorithm offers a high degree of adaptability in the face of severe congestion or network damage, coupled with fast and effective performance...shown in 1, ig. 111-7. It ut i’lies thle sane equipment as the speech concent rator: a PI)l’-1 t/44 minicort puter; two I %I( -/ 5g .s (Zho5 in ic ro

  10. Network operating system focus technology

    Science.gov (United States)

    1985-01-01

    An activity structured to provide specific design requirements and specifications for the Space Station Data Management System (DMS) Network Operating System (NOS) is outlined. Examples are given of the types of supporting studies and implementation tasks presently underway to realize a DMS test bed capability to develop hands-on understanding of NOS requirements as driven by actual subsystem test beds participating in the overall Johnson Space Center test bed program. Classical operating system elements and principal NOS functions are listed.

  11. Optical Network Technologies for Future Digital Cinema

    Directory of Open Access Journals (Sweden)

    Sajid Nazir

    2016-01-01

    Full Text Available Digital technology has transformed the information flow and support infrastructure for numerous application domains, such as cellular communications. Cinematography, traditionally, a film based medium, has embraced digital technology leading to innovative transformations in its work flow. Digital cinema supports transmission of high resolution content enabled by the latest advancements in optical communications and video compression. In this paper we provide a survey of the optical network technologies for supporting this bandwidth intensive traffic class. We also highlight the significance and benefits of the state of the art in optical technologies that support the digital cinema work flow.

  12. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... award under the Rural Health Information Technology Network Development Grant (RHITND) to Grace... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development... HUMAN SERVICES Health Resources and Services Administration Rural Health Information Technology...

  13. Organizing for Networked Information Technologies

    DEFF Research Database (Denmark)

    The book provides seven practical examples of how Danish companies implemented new information technology in order to transform their internal and external business processes. The purpose is to share some of the companies' concerns and hopes during this implementation process, with each case...

  14. Controllability of asynchronous Boolean multiplex control networks.

    Science.gov (United States)

    Luo, Chao; Wang, Xingyuan; Liu, Hong

    2014-09-01

    In this article, the controllability of asynchronous Boolean multiplex control networks (ABMCNs) is studied. First, the model of Boolean multiplex control networks under Harvey' asynchronous update is presented. By means of semi-tensor product approach, the logical dynamics is converted into linear representation, and a generalized formula of control-depending network transition matrices is achieved. Second, a necessary and sufficient condition is proposed to verify that only control-depending fixed points of ABMCNs can be controlled with probability one. Third, using two types of controls, the controllability of system is studied and formulae are given to show: (a) when an initial state is given, the reachable set at time s under a group of specified controls; (b) the reachable set at time s under arbitrary controls; (c) the specific probability values from a given initial state to destination states. Based on the above formulae, an algorithm to calculate overall reachable states from a specified initial state is presented. Moreover, we also discuss an approach to find the particular control sequence which steers the system between two states with maximum probability. Examples are shown to illustrate the feasibility of the proposed scheme.

  15. Controllability of asynchronous Boolean multiplex control networks

    Science.gov (United States)

    Luo, Chao; Wang, Xingyuan; Liu, Hong

    2014-09-01

    In this article, the controllability of asynchronous Boolean multiplex control networks (ABMCNs) is studied. First, the model of Boolean multiplex control networks under Harvey' asynchronous update is presented. By means of semi-tensor product approach, the logical dynamics is converted into linear representation, and a generalized formula of control-depending network transition matrices is achieved. Second, a necessary and sufficient condition is proposed to verify that only control-depending fixed points of ABMCNs can be controlled with probability one. Third, using two types of controls, the controllability of system is studied and formulae are given to show: (a) when an initial state is given, the reachable set at time s under a group of specified controls; (b) the reachable set at time s under arbitrary controls; (c) the specific probability values from a given initial state to destination states. Based on the above formulae, an algorithm to calculate overall reachable states from a specified initial state is presented. Moreover, we also discuss an approach to find the particular control sequence which steers the system between two states with maximum probability. Examples are shown to illustrate the feasibility of the proposed scheme.

  16. Controlling centrality in complex networks

    Science.gov (United States)

    Nicosia, V.; Criado, R.; Romance, M.; Russo, G.; Latora, V.

    2012-01-01

    Spectral centrality measures allow to identify influential individuals in social groups, to rank Web pages by popularity, and even to determine the impact of scientific researches. The centrality score of a node within a network crucially depends on the entire pattern of connections, so that the usual approach is to compute node centralities once the network structure is assigned. We face here with the inverse problem, that is, we study how to modify the centrality scores of the nodes by acting on the structure of a given network. We show that there exist particular subsets of nodes, called controlling sets, which can assign any prescribed set of centrality values to all the nodes of a graph, by cooperatively tuning the weights of their out-going links. We found that many large networks from the real world have surprisingly small controlling sets, containing even less than 5 – 10% of the nodes. PMID:22355732

  17. Controllability in protein interaction networks.

    Science.gov (United States)

    Wuchty, Stefan

    2014-05-13

    Recently, the focus of network research shifted to network controllability, prompting us to determine proteins that are important for the control of the underlying interaction webs. In particular, we determined minimum dominating sets of proteins (MDSets) in human and yeast protein interaction networks. Such groups of proteins were defined as optimized subsets where each non-MDSet protein can be reached by an interaction from an MDSet protein. Notably, we found that MDSet proteins were enriched with essential, cancer-related, and virus-targeted genes. Their central position allowed MDSet proteins to connect protein complexes and to have a higher impact on network resilience than hub proteins. As for their involvement in regulatory functions, MDSet proteins were enriched with transcription factors and protein kinases and were significantly involved in bottleneck interactions, regulatory links, phosphorylation events, and genetic interactions.

  18. Insensitive control technology development

    Science.gov (United States)

    Harvey, C. A.; Pope, R. E.

    1978-01-01

    THe investigation of two insensitive controller synthesis techniques was reported. The finite dimensional inverse approach produces a time varying insensitive controller and/or parameter identifier by constructing inverse functions derived from a finite number of input output pair relationships. The MD/IM concept relies on the information matrix theory that was developed in the estimation and identification field. The MD/IM synthesis technique is based on the hypothesis that minimizing the information matrix will reduce system identifiability and consequently system sensitivity to uncertain parameters. The controllers designed with both techniques were evaluated on a realistic C-5A aircraft flight control problem. Results indicate that the FDI controller is more suited to trajectory type problems because of its time varying nature. The MD/IM controller performed as well as the top-rated controllers of the initial effort and has direct application to aircraft flight control problems.

  19. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  20. Neural-networks-based Modelling and a Fuzzy Neural Networks Controller of MCFC

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Molten Carbonate Fuel Cells (MCFC) are produced with a highly efficient and clean power generation technology which will soon be widely utilized. The temperature characters of MCFC stack are briefly analyzed. A radial basis function (RBF) neural networks identification technology is applied to set up the temperature nonlinear model of MCFC stack, and the identification structure, algorithm and modeling training process are given in detail. A fuzzy controller of MCFC stack is designed. In order to improve its online control ability, a neural network trained by the I/O data of a fuzzy controller is designed. The neural networks can memorize and expand the inference rules of the fuzzy controller and substitute for the fuzzy controller to control MCFC stack online. A detailed design of the controller is given. The validity of MCFC stack modelling based on neural networks and the superior performance of the fuzzy neural networks controller are proved by Simulations.

  1. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  2. Communicating Networked Control Systems

    Science.gov (United States)

    2007-03-31

    Bahamas, pages 1010-1015. 64. Carmen Del Vecchio and I.C. Paschalidis, “Supply Contracts with Service Level Requirements”, Proceedings of the IFAC...control using Monte Carlo sensing,” Proc. IEEE International Conference on Robotics and Automation, pp. 3058-3063, 2005. 10. S.B. Andersson, A.A. Handzel, V...Analysis, Madrid Spain. 20. S. Andersson and D. Hristu-Varsakelis, “Language-based feedback control using Monte -Carlo sensing”, to be subm. To IEEE Int’l

  3. Mechatronics control technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1988-03-15

    This book consists six chapters, which are an assembler grammar and practical use on Z801 8041/8048 and kind of assemblers and how to use, control of a microprocessor and mechatro with application of 8255, interface circuit and direction of DA converter, control of stepping motor such as introduction of it, sequence switch, drive program of stepping motor, control for DC motor such as normal rotation and abnormal rotation operation of DC motor by personal computer, control AC motor like PWM inverter and data communication among systems such as RS-232C and INTEL-HEXA format program.

  4. Transport Network Technologies – Study and Testing

    DEFF Research Database (Denmark)

    Bozorgebrahimi, K.; Channegowda, M.; Colmenero, A.

    Following on from the theoretical research into Carrier Class Transport Network Technologies (CCTNTs) documented in DJ1.1.1, this report describes the extensive testing performed by JRA1 Task 1. The tests covered EoMPLS, Ethernet OAM, Synchronous Ethernet, PBB-TE, MPLS-TP, OTN and GMPLS...

  5. Technology network for machine tools in Vietnam

    OpenAIRE

    Mizuno, Junko

    2012-01-01

    When Vietnam joined the WTO, it accepted foreign direct investment and started to grow. Technically, it was then greatly influenced by the enterprises that entered the country through direct investment. This report shows that the technology network for machine tools is formed via direct investment and subcontracting.

  6. Outdoor Lighting Networks: Market, Technologies and Standards

    NARCIS (Netherlands)

    Cavalcanti, D.; Wang, J.; Chen, R.; Jiang , D.; Yang, Y.

    2012-01-01

    Providing the right amount of light where and when it is needed is an opportunity to transform today’s cities into smart and livable urban spaces. New technologies are being introduced, such are adaptivecontrols and outdoor lighting networks, which can deliver energy andcost savings through adaptive

  7. Using Citation Network Analysis in Educational Technology

    Science.gov (United States)

    Cho, Yonjoo; Park, Sunyoung

    2012-01-01

    Previous reviews in the field of Educational Technology (ET) have revealed some publication patterns according to authors, institutions, and affiliations. However, those previous reviews focused only on the rankings of individual authors and institutions, and did not provide qualitative details on relations and networks of scholars and scholarly…

  8. Enabling Technologies for Cognitive Optical Networks

    DEFF Research Database (Denmark)

    Borkowski, Robert

    to technologies required for their implementation. Operation of CON-enabling machine learning methods is tested experimentally and DSP-based OPM techniques for software-defined receivers are introduced and verified. The presented set of technologies forms a foundation, upon which next generation fiber-optic data......Cognition is a new paradigm for optical networking, in which the network has capabilities to observe, plan, decide, and act autonomously in order to optimize the end-to-end performance and minimize the need for human supervision. This PhD thesis expands the state of the art on cognitive optical......, and machine learning algorithms that make cognition possible. Secondly, advanced optical performance monitoring (OPM) capabilities performed via digital signal processing (DSP) that provide CONs with necessary feedback information allowing for autonomous network optimization. The research results presented...

  9. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  10. Emerging Engine Control Technologies

    DEFF Research Database (Denmark)

    Hendricks, Elbert; Chevalier, Alain

    1996-01-01

    In earlier work published by the author and co-authors, a dynamic model called a Mean Value Engine Model (MVEM) was developed. This model is physically based and is intended mainly for control applications. It is especially well suited to embedded model applications in engine controllers, susch...

  11. Site Specific Weed Control Technologies

    DEFF Research Database (Denmark)

    Christensen, Svend; Søgaard, Henning Tangen; Kudsk, Per;

    2009-01-01

    describe the basic parts of site specific weed control technologies, comprising of weed sensing systems, weed management models and precision weed control implements. A review of state-of-the-art technologies shows that several weed sensing systems and precision implements have been developed over the last...... of knowledge about the economic and environmental potential for increasing the resolution of weed control. The integration of site-specific information on weed distribution, weed species composition and density, and the effect on crop yield, is decisive for successful site-specific weed management.   Keywords......Site-specific weed control technologies are defined as machinery or equipment embedded with technologies that detect weeds growing in a crop and, taking into account predefined factors such as economics, takes action to maximise the chances of successfully controlling them. In the article, we...

  12. Guaranteed cost control for networked control systems

    Institute of Scientific and Technical Information of China (English)

    Linbo XIE; Huajing FANG; Ying ZHENG

    2004-01-01

    The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to describe the scheduling approach of system signals in NCSs. Then, based on such a scheme and given sampling method, the design procedure in dynamic output feedback manner is also derived which renders the closed loop system to be asymptotically stable and guarantees an upper bound of the LQ performance cost function.

  13. 基于IA技术双控制器网络化控制系统可靠性%Reliability of Networked Control System Based on IA Technology Double Controller

    Institute of Scientific and Technical Information of China (English)

    程春; 雷根平

    2014-01-01

    Based on the computer network control system where Internet is the main transmission medium, this article proposes a management system based on intelligent agent technology, doing bidirectional control of computer network. In this system, the computers well equipped with rich hardware and software are the key components. After forming the intelligent agent, it can complete the task by multi agent cooperation thus effectively improving the performance of the system.%本文以因特网作为主要传输媒介的计算机网络控制系统为基础,提出了一种以智能代理技术为基础,对计算机网络进行双向控制的管理系统。在本系统中,是将配置了丰富硬件与软件的计算机作为系统的控制关键组件,在将其构成智能代理后,就能够以多个代理相互协作的方式来对我们所需要的任务进行完成,从而对系统的性能进行有效的提高。

  14. Using Technology to Control Costs

    Science.gov (United States)

    Ho, Simon; Schoenberg, Doug; Richards, Dan; Morath, Michael

    2009-01-01

    In this article, the authors examines the use of technology to control costs in the child care industry. One of these technology solutions is Software-as-a-Service (SaaS). SaaS solutions can help child care providers save money in many aspects of center management. In addition to cost savings, SaaS solutions are also particularly appealing to…

  15. Dynamic congestion control mechanisms for MPLS networks

    Science.gov (United States)

    Holness, Felicia; Phillips, Chris I.

    2001-02-01

    Considerable interest has arisen in congestion control through traffic engineering from the knowledge that although sensible provisioning of the network infrastructure is needed, together with sufficient underlying capacity, these are not sufficient to deliver the Quality of Service required for new applications. This is due to dynamic variations in load. In operational Internet Protocol (IP) networks, it has been difficult to incorporate effective traffic engineering due to the limited capabilities of the IP technology. In principle, Multiprotocol Label Switching (MPLS), which is a connection-oriented label swapping technology, offers new possibilities in addressing the limitations by allowing the operator to use sophisticated traffic control mechanisms. This paper presents a novel scheme to dynamically manage traffic flows through the network by re-balancing streams during periods of congestion. It proposes management-based algorithms that will allow label switched routers within the network to utilize mechanisms within MPLS to indicate when flows are starting to experience frame/packet loss and then to react accordingly. Based upon knowledge of the customer's Service Level Agreement, together with instantaneous flow information, the label edge routers can then instigate changes to the LSP route and circumvent congestion that would hitherto violate the customer contacts.

  16. Neural network technologies for image classification

    Science.gov (United States)

    Korikov, A. M.; Tungusova, A. V.

    2015-11-01

    We analyze the classes of problems with an objective necessity to use neural network technologies, i.e. representation and resolution problems in the neural network logical basis. Among these problems, image recognition takes an important place, in particular the classification of multi-dimensional data based on information about textural characteristics. These problems occur in aerospace and seismic monitoring, materials science, medicine and other. We reviewed different approaches for the texture description: statistical, structural, and spectral. We developed a neural network technology for resolving a practical problem of cloud image classification for satellite snapshots from the spectroradiometer MODIS. The cloud texture is described by the statistical characteristics of the GLCM (Gray Level Co- Occurrence Matrix) method. From the range of neural network models that might be applied for image classification, we chose the probabilistic neural network model (PNN) and developed an implementation which performs the classification of the main types and subtypes of clouds. Also, we chose experimentally the optimal architecture and parameters for the PNN model which is used for image classification.

  17. Flow Control Technology

    Science.gov (United States)

    2010-07-01

    downstream of the propeller system. Figure 16 and Figure 17 show the ADV used by Huxley and Hartman [5] as well as a flow diagram for their...Max 17° Figure 23: Power Coefficient of Asymmetric Test Trials vs. Sinusoid pitch schedule. The aim of the work by Huxley and Hartman [5] was...Fagley, Ph.D. candidate, worked with Cadets Thiago Huxley and Christopher Hartman on a feedback controlled cycloidal wave energy converter in

  18. Defense Switched Network Technology and Experiments Program.

    Science.gov (United States)

    2014-09-26

    3) development and test of data communication techniques using DoD-standard data protocols in an integrated voice /data network, and (4) EISN system... communication techniques using DoD-standard data protocols in an integrated voice /data network, and (4) EISN system coordination and experiment planning...control voice trunks that use E&M signaling and go from the RCP switch to the PCI or to another RCP switch; (e) A Dual- Tone Multiple-Frequency (DTMF

  19. Solution Analysis of Universal Wireless Joint Point Technologies for Heterogeneous Tactical Networks

    Science.gov (United States)

    2006-03-01

    NAC Network Admission Control NIC Network Interface Card NM Network Modules NOC Network Operation Centers OFDM Orthogonal Frequency Division...or NOC at a given time. With different wireless technologies having their own advantages and disadvantages, the need for them to transfer data back...mobile NOC Tacticomps (Tactical PDAs) ITT Card Mesh Wireless Technology Diagram (ITT Card) Planned 802.20, 802.16 or 802.11

  20. Virtualized Network Control. Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-02-01

    This document is the final report for the Virtualized Network Control (VNC) project, which was funded by the United States Department of Energy (DOE) Office of Science. This project was also informally referred to as Advanced Resource Computation for Hybrid Service and TOpology NEtworks (ARCHSTONE). This report provides a summary of the project's activities, tasks, deliverable, and accomplishments. It also provides a summary of the documents, software, and presentations generated as part of this projects activities. Namely, the Appendix contains an archive of the deliverables, documents, and presentations generated a part of this project.

  1. The research of controller area network on hybrid electrical vehicle

    Institute of Scientific and Technical Information of China (English)

    Wu Hongxing; Song Liwei; Kou Baoquan; Cheng Shukang

    2006-01-01

    It is of increasing importance to design and implement vehicle networks for transferring information between electrical control units on Hybrid Electrical Vehicle (HEV). This paper presents a scheme of using Controller Area Network (CAN) technology to realize communication and datasharing between the electrical units on the HEV. The principle and communication protocol of Electrical Control Units (ECU) CAN node are introduced. By considering different sensitivity of the devices to the latency of data transportation, a new design procedure is proposed for the purpose of simplifying network codes and wiring harness, reducing assembly space and weight, improving assembly efficiency, and enhancing fault-diagnose in auto networks.

  2. 基于OPC技术的网络控制系统仿真平台设计%Design of a simulation platform of networked control system based on OPC technology

    Institute of Scientific and Technical Information of China (English)

    李二超; 李炜; 李战明; 孙增昌

    2012-01-01

    The networked control system (NCS) is a new kind of computer control systems. Though industrial networks different control parts communicate with each other, which leads new problems to control systems such as time delay and scheduling. Based on Matlab and OPC technology, and mediated by campus LAN, Siemens s7-300 PLC is used as experimental platform of the server, the OPC technology, provided by OPC Toolbox of Matlab, is used to achieve OPC server and client network communication. This method realizes the separation of the plant mndel and controller on two computers, thus obtaining a network control system experiment research platform for the study and validation of the advanced controlling algorithms.%网络控制系统(NCS)是一种新型计算机控制系统,通过工业网络实现控制单元之间的数据交换,但这也给控制系统带来了时延等问题.开发了一种基于Matlab和OPC技术,以校园局域网为媒介的虚拟NCS实验平台,利用西门子S7-300 PLC作为实验平台的服务器,用Matlab OPC Toolbox工具箱提供的OPC技术实现OPC服务器与客户端的网络通信,实现了对象模型和控制器在两台计算机的分离,从而获得网络化控制系统仿真平台,为高级控制算法的研究和验证提供了良好的实验平台.

  3. Controlling centrality in complex networks

    CERN Document Server

    Nicosia, Vincenzo; Romance, Miguel; Russo, Giovanni; Latora, Vito

    2011-01-01

    Spectral centrality measures allow to identify influential individuals in social groups, to rank Web pages by their popularity, and even to determine the impact of scientific researches. The centrality score of a node within a network crucially depends on the entire pattern of connections, so that the usual approach is to compute the node centralities once the network structure is assigned. We face here with the inverse problem, that is, we study how to modify the centrality scores of the nodes by acting on the structure of a given network. We prove that there exist particular subsets of nodes, called controlling sets, which can assign any prescribed set of centrality values to all the nodes of a graph, by cooperatively tuning the weights of their out-going links. We show that many large networks from the real world have surprisingly small controlling sets, containing even less than 5-10% of the nodes. These results suggest that rankings obtained from spectral centrality measures have to be considered with ex...

  4. Pinning-controllability of complex networks

    OpenAIRE

    Sorrentino, Francesco; Di Bernardo, Mario; Garofalo, Franco; Chen, Guanrong

    2007-01-01

    We study the problem of controlling a general complex network towards an assigned synchronous evolution, by means of a pinning control strategy. We define the pinning-controllability of the network in terms of the spectral properties of an extended network topology. The roles of the control and coupling gains as well as of the number of pinned nodes are also discussed.

  5. AN EFFECTIVE NETWORK CONGESTION CONTROL METHOD FOR MULTILAYER NETWORK

    Institute of Scientific and Technical Information of China (English)

    Du Haifeng; Xiao Yang; Lu Lingyun

    2008-01-01

    The congestion control problem in a single node network has been solved by the nonlinear feedback control method, which has been proven to be effective and robust for different router's queue size. However, these control models are based on the single layer network architecture, and the senders and receivers are directly connected by one pair of routers. With the network architecture being more and more complex, it is a serious problem how to cooperate many routers working in the multilayer network simultaneously. In this paper, an effective Active Queue Management (AQM) scheme to guarantee the stability by the nonlinear control of imposing some restrictions on AQM parameter in multilayer network is proposed. The nonlinear control can rely on some heuristics and network traffic controllers that appear to be highly correlated with the multilayer network status. The proposed method is based on the improved classical Random Early Detection (RED) differential equation and a theorem for network congestion control. The theorem proposed in the paper proved that the stability of the fluid model can effectively ensure the convergence of the average rate to its equilibrium point through many routers in multilayer network. Moreover, when the network capacity is larger, the proposed scheme can still approach to the fullest extensibility of utilization and ensure the stability of the fluid model. The paper reveals the reasons of congestion control in multilayer network, provides a theorem for avoiding network congestion, and gives simulations to verify the results.

  6. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  7. Carrier ethernet network control plane based on the Next Generation Network

    DEFF Research Database (Denmark)

    Fu, Rong; Wang, Yanmeng; Berger, Michael Stubert

    2008-01-01

    architecture of the next generation network (NGN). As an essential candidate among the NGN transport technologies, the definition of Carrier Ethernet (CE) is also introduced here. The second part of this paper depicts the contribution on the T-MPLS based Carrier Ethernet network with control plane based on NGN...

  8. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  9. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  10. Flexible Tube-Based Network Control Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Innovation Laboratory, Inc. builds a control system which controls the topology of an air traffic flow network and the network flow properties which enables Air...

  11. Opinion control in complex networks

    Science.gov (United States)

    Masuda, Naoki

    2015-03-01

    In many political elections, the electorate appears to be a composite of partisan and independent voters. Given that partisans are not likely to convert to a different party, an important goal for a political party could be to mobilize independent voters toward the party with the help of strong leadership, mass media, partisans, and the effects of peer-to-peer influence. Based on the exact solution of classical voter model dynamics in the presence of perfectly partisan voters (i.e., zealots), we propose a computational method that uses pinning control strategy to maximize the share of a party in a social network of independent voters. The party, corresponding to the controller or zealots, optimizes the nodes to be controlled given the information about the connectivity of independent voters and the set of nodes that the opposing party controls. We show that controlling hubs is generally a good strategy, but the optimized strategy is even better. The superiority of the optimized strategy is particularly eminent when the independent voters are connected as directed (rather than undirected) networks.

  12. Neural Network Controlled Visual Saccades

    Science.gov (United States)

    Johnson, Jeffrey D.; Grogan, Timothy A.

    1989-03-01

    The paper to be presented will discuss research on a computer vision system controlled by a neural network capable of learning through classical (Pavlovian) conditioning. Through the use of unconditional stimuli (reward and punishment) the system will develop scan patterns of eye saccades necessary to differentiate and recognize members of an input set. By foveating only those portions of the input image that the system has found to be necessary for recognition the drawback of computational explosion as the size of the input image grows is avoided. The model incorporates many features found in animal vision systems, and is governed by understandable and modifiable behavior patterns similar to those reported by Pavlov in his classic study. These behavioral patterns are a result of a neuronal model, used in the network, explicitly designed to reproduce this behavior.

  13. Photonic technology for switched rf avionics networks

    Science.gov (United States)

    Hamilton, Michael C.; Thaniyavarn, Suwat; Abbas, Gregory L.; LaGasse, Michael J.; Traynor, Timothy; Lin, Jack P.

    1997-10-01

    The application of photonics technology in switched RF networks is discussed with emphasis on the benefits for avionics applications. System requirements and performance issues are addressed. A 16 X 16 photonic switch module prototype is described and results for RF fiber-optic links passing through the module are presented. RF channel isolation measured was at least 75 dB. A demonstration is described in which a photonic network using the switch module passed signals from a dynamic electromagnetic environment simulator to two radar warning systems under test. Demonstration modes included simulation of both aperture sharing and processor sharing. Finally, a novel alternative switch module architecture is described that is strictly non-blocking and has inherently better channel isolation.

  14. Security Service Technology for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Aiqun Hu; Tao Li; Mingfu Xue

    2011-01-01

    As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.

  15. Constrained target controllability of complex networks

    Science.gov (United States)

    Guo, Wei-Feng; Zhang, Shao-Wu; Wei, Ze-Gang; Zeng, Tao; Liu, Fei; Zhang, Jingsong; Wu, Fang-Xiang; Chen, Luonan

    2017-06-01

    It is of great theoretical interest and practical significance to study how to control a system by applying perturbations to only a few driver nodes. Recently, a hot topic of modern network researches is how to determine driver nodes that allow the control of an entire network. However, in practice, to control a complex network, especially a biological network, one may know not only the set of nodes which need to be controlled (i.e. target nodes), but also the set of nodes to which only control signals can be applied (i.e. constrained control nodes). Compared to the general concept of controllability, we introduce the concept of constrained target controllability (CTC) of complex networks, which concerns the ability to drive any state of target nodes to their desirable state by applying control signals to the driver nodes from the set of constrained control nodes. To efficiently investigate the CTC of complex networks, we further design a novel graph-theoretic algorithm called CTCA to estimate the ability of a given network to control targets by choosing driver nodes from the set of constrained control nodes. We extensively evaluate the CTC of numerous real complex networks. The results indicate that biological networks with a higher average degree are easier to control than biological networks with a lower average degree, while electronic networks with a lower average degree are easier to control than web networks with a higher average degree. We also show that our CTCA can more efficiently produce driver nodes for target-controlling the networks than existing state-of-the-art methods. Moreover, we use our CTCA to analyze two expert-curated bio-molecular networks and compare to other state-of-the-art methods. The results illustrate that our CTCA can efficiently identify proven drug targets and new potentials, according to the constrained controllability of those biological networks.

  16. Application of UDWDM technology in FTTH networks

    Science.gov (United States)

    Lamperski, Jan; Stepczak, Piotr

    2015-12-01

    In the paper we presented results of investigation of an original ultra dense wavelength division technology based on optical comb generator and its implementation for FTTH networks. The optical comb generator used a ring configuration with an acousto-optic frequency shifter (AOFS) which ensured obtaining very stable optical carrier frequency distances. Properties of an optical comb generator module determined stability of the UDWDM transmitter. Key properties of a selective components based on all fiber Fabry-Perot resonant cavity were presented. Operation of direct and coherent detection DWDM systems were shown. New configurations of FTTH UDWDM architecture have been proposed.

  17. Controlling synchronization in large laser networks using number theory

    CERN Document Server

    Nixon, Micha; Ronen, Eitan; Friesem, Asher A; Davidson, Nir; Kanter, Ido

    2011-01-01

    Synchronization in networks with delayed coupling are ubiquitous in nature and play a key role in almost all fields of science including physics, biology, ecology, climatology and sociology. In general, the published works on network synchronization are based on data analysis and simulations, with little experimental verification. Here we develop and experimentally demonstrate various multi-cluster phase synchronization scenarios within coupled laser networks. Synchronization is controlled by the network connectivity in accordance to number theory, whereby the number of synchronized clusters equals the greatest common divisor of network loops. This dependence enables remote switching mechanisms to control the optical phase coherence among distant lasers by local network connectivity adjustments. Our results serve as a benchmark for a broad range of coupled oscillators in science and technology, and offer feasible routes to achieve multi-user secure protocols in communication networks and parallel distribution...

  18. Study on control information network and its real-time property

    Institute of Scientific and Technical Information of China (English)

    Wu Zhuanfeng; Liu Weiguo; Luo Guangzhao; Wu Pusheng

    2008-01-01

    The control network is an important developmental orientation in the remote control system. As the control network and information network are comparatively alike in the framework and technology, we can build a control network which is similar to the common information network. In the era when the information network is becoming increasingly mature, it is a royal road to construct or rebuild a control information network in the development of the control network by relying on the achievements made in the information network or current information resources. This paper expounds the construction idea of the control information network, gives the idiographic realization method and then researches into the real-time problem encountered in the control information network, and presents a three-closed-loop control system based on virtualized reality. The feasibility of the idea is validated via experiments and simulations separately.

  19. Structural Controllability of Temporal Networks with a Single Switching Controller

    Science.gov (United States)

    Yao, Peng; Hou, Bao-Yu; Pan, Yu-Jian; Li, Xiang

    2017-01-01

    Temporal network, whose topology evolves with time, is an important class of complex networks. Temporal trees of a temporal network describe the necessary edges sustaining the network as well as their active time points. By a switching controller which properly selects its location with time, temporal trees are used to improve the controllability of the network. Therefore, more nodes are controlled within the limited time. Several switching strategies to efficiently select the location of the controller are designed, which are verified with synthetic and empirical temporal networks to achieve better control performance. PMID:28107538

  20. Application of computer technology for control system in distribution network; Haiden keito un`yo seigyo eno denshi gijutsu no tenkai

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, H. [Chubu Electric Power Co. Inc., Nagoya (Japan)

    1996-09-20

    This paper describes the course of history and the future trend in a transmission line automation system. A system to remotely control section switches was begun installation around 1985. The system was intended to reduce number of personnel and amount of time required for works at sites, perform immediate system operation, acquire a real-time site information for a distribution network operation instructor, and have the instructor make quick, proper and accurate determination by using the acquired information. This system remotely monitors and controls section switches in distribution lines, and consists of a `parent station equipment` installed in a sales office, a `child station equipment` installed in combination with the section switches, and a `communications transmission path`. The parent station equipment is a computer system. The child station equipment is installed at every section switch to link the parent station equipment with the section switches. Pair cables are used in signal transmission. A map information indication and automatic execution system of wide area operation handling type has now begun operation. The system is expected of wider use in the future as a system applicable to urban areas where distribution networks are congested. 6 refs., 8 figs.

  1. Synchronizability on complex networks via pinning control

    Indian Academy of Sciences (India)

    Yi Liang; Xingyuan Wang

    2013-04-01

    It is proved that the maximum eigenvalue sequence of the principal submatrices of coupling matrix is decreasing. The method of calculating the number of pinning nodes is given based on this theory. The findings reveal the relationship between the decreasing speed of maximum eigenvalue sequence of the principal submatrices for coupling matrix and the synchronizability on complex networks via pinning control. We discuss the synchronizability on some networks, such as scale-free networks and small-world networks. Numerical simulations show that different pinning strategies have different pinning synchronizability on the same complex network, and the synchronizability with pinning control is consistent with one without pinning control in various complex networks.

  2. Adaptive optimization and control using neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Mead, W.C.; Brown, S.K.; Jones, R.D.; Bowling, P.S.; Barnes, C.W.

    1993-10-22

    Recent work has demonstrated the ability of neural-network-based controllers to optimize and control machines with complex, non-linear, relatively unknown control spaces. We present a brief overview of neural networks via a taxonomy illustrating some capabilities of different kinds of neural networks. We present some successful control examples, particularly the optimization and control of a small-angle negative ion source.

  3. Investigation of Cooperation Technologies in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhuo Sun

    2010-01-01

    Full Text Available Heterogeneous wireless networks based on varieties of radio access technologies (RATs and standards will coexist in the future. In order to exploit this potential multiaccess gain, it is required that different RATs are managed in a cooperative fashion. This paper proposes two advanced functional architecture supporting the functionalities of interworking between WiMAX and 3GPP networks as a specific case: Radio Control Server- (RCS- and Access Point- (AP- based centralized architectures. The key technologies supporting the interworking are then investigated, including proposing the Generic Link Layer (GLL and researching the multiradio resource management (MRRM mechanisms. This paper elaborates on these topics, and the corresponding solutions are proposed with preliminary results.

  4. Broadband access technology for passive optical network

    Science.gov (United States)

    Chi, Sien; Yeh, Chien-Hung; Chow, Chi-Wai

    2009-01-01

    We will introduce four related topics about fiber access network technologies for PONs. First, an upstream signal powerequalizer is proposed and designed using a FP-LD in optical line terminal applied to the TDM-PON, and a 20dB dynamic upstream power range from -5 to -25dBm having a 1.7dB maximal power variation is retrieved. The fiber-fault protection is also an important issue for PON. We investigate a simple and cost-effective TDM/WDM PON system with self-protected function. Next, using RSOA-based colorless WDM-PON is also demonstrated. We propose a costeffective CW light source into RSOA for 2.5Gb/s upstream in WDM-PON together with self-healing mechanism against fiber fault. Finally, we investigate a 4Gb/s OFDM-QAM for both upstream and downstream traffic in long-reach WDM/TDM PON system under 100km transmission without dispersion compensation. As a result, we believe that these key access technologies are emerging and useful for the next generation broadband FTTH networks.

  5. Conference on "Mathematical Technology of Networks"

    CERN Document Server

    2015-01-01

    Bringing together leading researchers in the fields of functional analysis, mathematical physics and graph theory, as well as natural scientists using networks as a tool in their own research fields, such as neuroscience and machine learning, this volume presents recent advances in functional, analytical, probabilistic, and spectral aspects in the study of graphs, quantum graphs, and complex networks. The contributors to this volume explore the interplay between theoretical and applied aspects of discrete and continuous graphs. Their work helps to close the gap between different avenues of research on graphs, including metric graphs and ramified structures. All papers were presented at the conference "Mathematical Technology of Networks," held December 4–7, 2013 at the Zentrum für interdisziplinäre Forschung (ZiF) in Bielefeld, Germany, and are supplemented with detailed figures illustrating both abstract concepts as well as their real-world applications. Dynamical models on graphs or random graphs a...

  6. [New technologies: support opportunities for network research].

    Science.gov (United States)

    Rodríguez-Martín, A; Novalbos Ruiz, J P; Jiménez-Rodríguez, R; Jiménez-Rodríguez, A

    2012-11-01

    The consolidation of a support area for network research, which promotes collaborative research, training and the dissemination of knowledge through the use of ICTs, requires the organization of a work methodology to share and exchange resources in a specific network that is already running. The establishment of communication mechanisms between researchers from different groups will be necessary along with the introduction of the ICTs in the teaching and advanced environments of research training, different inventories of the research resources that are available for exchanges and shared use between groups and laboratories, and finally, a shared scientific documentation system with the appropriate maintenance of the previously listed tools. Large administrative structures and detailed plans are not needed to comply with all of the above functions. The availability of effective tools, however, to combine efforts and search for resources in all of these areas is needed, with the agility and flexibility that allow us to currently use new communication and information technologies. The results of this research support area should lead to an increase in the efficacy and quality of the network by increasing the flow of information and the inter-group collaboration in teaching, research and professional development, along with the transfer and dissemination of research results.

  7. Simplified LQG Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1997-01-01

    A new neural network application for non-linear state control is described. One neural network is modelled to form a Kalmann predictor and trained to act as an optimal state observer for a non-linear process. Another neural network is modelled to form a state controller and trained to produce...

  8. Opinion control in complex networks

    CERN Document Server

    Masuda, Naoki

    2014-01-01

    In many instances of election, the electorate appears to be a composite of partisan and independent voters. Given that partisans are not likely to convert to a different party, a main goal for a party could be to mobilize independent voters toward the party with the help of strong leadership, mass media, partisans, and effects of peer-to-peer influence. Based on the exact solution of the classical voter model dynamics in the presence of perfectly partisan voters (i.e., zealots), we propose a computational method to maximize the share of the party in a social network of independent voters by pinning control strategy. The party, corresponding to the controller or zealots, optimizes the nodes to be controlled given the information about the connectivity of independent voters and the set of nodes that the opponent party controls. We show that controlling hubs is generally a good strategy, whereas the optimized strategy is even better. The superiority of the optimized strategy is particularly eminent when the inde...

  9. Communication and control for networked complex systems

    CERN Document Server

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  10. Corrosion control in mining technology

    Energy Technology Data Exchange (ETDEWEB)

    Telekesi, J.

    1985-01-01

    An overview of corrosion effects in mining technology and the importance of protection is presented. The most common corrosion processes and effects are summarized and the system and criteria of their avoidance are discussed in detail. Preventive measures are recommended to decrease possible corrosion effects including the selection of corrosion-resistive constructions, to use protective coatings and inhibition techniques and some other protection possibilities where applicable. The organization aspects and the economic impact of corrosion control in mining are discussed.

  11. Pinning impulsive control algorithms for complex network.

    Science.gov (United States)

    Sun, Wen; Lü, Jinhu; Chen, Shihua; Yu, Xinghuo

    2014-03-01

    In this paper, we further investigate the synchronization of complex dynamical network via pinning control in which a selection of nodes are controlled at discrete times. Different from most existing work, the pinning control algorithms utilize only the impulsive signals at discrete time instants, which may greatly improve the communication channel efficiency and reduce control cost. Two classes of algorithms are designed, one for strongly connected complex network and another for non-strongly connected complex network. It is suggested that in the strongly connected network with suitable coupling strength, a single controller at any one of the network's nodes can always pin the network to its homogeneous solution. In the non-strongly connected case, the location and minimum number of nodes needed to pin the network are determined by the Frobenius normal form of the coupling matrix. In addition, the coupling matrix is not necessarily symmetric or irreducible. Illustrative examples are then given to validate the proposed pinning impulsive control algorithms.

  12. Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.

  13. Model-based control of networked systems

    CERN Document Server

    Garcia, Eloy; Montestruque, Luis A

    2014-01-01

    This monograph introduces a class of networked control systems (NCS) called model-based networked control systems (MB-NCS) and presents various architectures and control strategies designed to improve the performance of NCS. The overall performance of NCS considers the appropriate use of network resources, particularly network bandwidth, in conjunction with the desired response of the system being controlled.   The book begins with a detailed description of the basic MB-NCS architecture that provides stability conditions in terms of state feedback updates . It also covers typical problems in NCS such as network delays, network scheduling, and data quantization, as well as more general control problems such as output feedback control, nonlinear systems stabilization, and tracking control.   Key features and topics include: Time-triggered and event-triggered feedback updates Stabilization of uncertain systems subject to time delays, quantization, and extended absence of feedback Optimal control analysis and ...

  14. Controlling complex networks with conformity behavior

    Science.gov (United States)

    Wang, Xu-Wen; Nie, Sen; Wang, Wen-Xu; Wang, Bing-Hong

    2015-09-01

    Controlling complex networks accompanied by common conformity behavior is a fundamental problem in social and physical science. Conformity behavior that individuals tend to follow the majority in their neighborhood is common in human society and animal communities. Despite recent progress in understanding controllability of complex networks, the existent controllability theories cannot be directly applied to networks associated with conformity. Here we propose a simple model to incorporate conformity-based decision making into the evolution of a network system, which allows us to employ the exact controllability theory to explore the controllability of such systems. We offer rigorous theoretical results of controllability for representative regular networks. We also explore real networks in different fields and some typical model networks, finding some interesting results that are different from the predictions of structural and exact controllability theory in the absence of conformity. We finally present an example of steering a real social network to some target states to further validate our controllability theory and tools. Our work offers a more realistic understanding of network controllability with conformity behavior and can have potential applications in networked evolutionary games, opinion dynamics and many other complex networked systems.

  15. Stochastic stabilization analysis of networked control systems

    Institute of Scientific and Technical Information of China (English)

    Ma Changlin; Fang Huajing

    2007-01-01

    Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition.

  16. Controlling Complex Systems and Developing Dynamic Technology

    Science.gov (United States)

    Avizienis, Audrius Victor

    In complex systems, control and understanding become intertwined. Following Ilya Prigogine, we define complex systems as having control parameters which mediate transitions between distinct modes of dynamical behavior. From this perspective, determining the nature of control parameters and demonstrating the associated dynamical phase transitions are practically equivalent and fundamental to engaging with complexity. In the first part of this work, a control parameter is determined for a non-equilibrium electrochemical system by studying a transition in the morphology of structures produced by an electroless deposition reaction. Specifically, changing the size of copper posts used as the substrate for growing metallic silver structures by the reduction of Ag+ from solution under diffusion-limited reaction conditions causes a dynamical phase transition in the crystal growth process. For Cu posts with edge lengths on the order of one micron, local forces promoting anisotropic growth predominate, and the reaction produces interconnected networks of Ag nanowires. As the post size is increased above 10 microns, the local interfacial growth reaction dynamics couple with the macroscopic diffusion field, leading to spatially propagating instabilities in the electrochemical potential which induce periodic branching during crystal growth, producing dendritic deposits. This result is interesting both as an example of control and understanding in a complex system, and as a useful combination of top-down lithography with bottom-up electrochemical self-assembly. The second part of this work focuses on the technological development of devices fabricated using this non-equilibrium electrochemical process, towards a goal of integrating a complex network as a dynamic functional component in a neuromorphic computing device. Self-assembled networks of silver nanowires were reacted with sulfur to produce interfacial "atomic switches": silver-silver sulfide junctions, which exhibit

  17. An overview on development of neural network technology

    Science.gov (United States)

    Lin, Chun-Shin

    1993-01-01

    The study has been to obtain a bird's-eye view of the current neural network technology and the neural network research activities in NASA. The purpose was two fold. One was to provide a reference document for NASA researchers who want to apply neural network techniques to solve their problems. Another one was to report out survey results regarding NASA research activities and provide a view on what NASA is doing, what potential difficulty exists and what NASA can/should do. In a ten week study period, we interviewed ten neural network researchers in the Langley Research Center and sent out 36 survey forms to researchers at the Johnson Space Center, Lewis Research Center, Ames Research Center and Jet Propulsion Laboratory. We also sent out 60 similar forms to educators and corporation researchers to collect general opinions regarding this field. Twenty-eight survey forms, 11 from NASA researchers and 17 from outside, were returned. Survey results were reported in our final report. In the final report, we first provided an overview on the neural network technology. We reviewed ten neural network structures, discussed the applications in five major areas, and compared the analog, digital and hybrid electronic implementation of neural networks. In the second part, we summarized known NASA neural network research studies and reported the results of the questionnaire survey. Survey results show that most studies are still in the development and feasibility study stage. We compared the techniques, application areas, researchers' opinions on this technology, and many aspects between NASA and non-NASA groups. We also summarized their opinions on difficulties encountered. Applications are considered the top research priority by most researchers. Hardware development and learning algorithm improvement are the next. The lack of financial and management support is among the difficulties in research study. All researchers agree that the use of neural networks could result in

  18. Ship electric propulsion simulator based on networking technology

    Science.gov (United States)

    Zheng, Huayao; Huang, Xuewu; Chen, Jutao; Lu, Binquan

    2006-11-01

    According the new ship building tense, a novel electric propulsion simulator (EPS) had been developed in Marine Simulation Center of SMU. The architecture, software function and FCS network technology of EPS and integrated power system (IPS) were described. In allusion to the POD propeller in ship, a special physical model was built. The POD power was supplied from the simulative 6.6 kV Medium Voltage Main Switchboard, its control could be realized in local or remote mode. Through LAN, the simulated feature information of EPS will pass to the physical POD model, which would reflect the real thruster working status in different sea conditions. The software includes vessel-propeller math module, thruster control system, distribution and emergency integrated management, double closed loop control system, vessel static water resistance and dynamic software; instructor main control software. The monitor and control system is realized by real time data collection system and CAN bus technology. During the construction, most devices such as monitor panels and intelligent meters, are developed in lab which were based on embedded microcomputer system with CAN interface to link the network. They had also successfully used in practice and would be suitable for the future demands of digitalization ship.

  19. 高速铁路隧道精测控制网布设及控制网平差技术%High-speed Rail Tunnel Measure Control Network Layout and Control Network Adjustment Technology

    Institute of Scientific and Technical Information of China (English)

    李强

    2016-01-01

    本文以中南铁路通道项目实例为载体,阐述了CPⅠ、 CPⅡ与CPⅢ的关系,明确了构网网形、计算精度和数据可靠性对CPⅢ的精度影响,并从GPS观测及导线测量两个方向,就网形设计、数据采集、短边处理及内业数据处理几个方面的注意事项进行阐述。%〔Abstract〕 This article takes Central South railway passage project as the carrier to describe the relation-ship between CPⅠ/CPⅡ with CPⅢ and makes it clear the triangulation network, accuracy and precision data reliability of CPIII. It is also described points for attention about network design, data collection, short side processing, and data processing from GPS observations and traverse survey two directions.

  20. Controlling allosteric networks in proteins

    Science.gov (United States)

    Dokholyan, Nikolay

    2013-03-01

    We present a novel methodology based on graph theory and discrete molecular dynamics simulations for delineating allosteric pathways in proteins. We use this methodology to uncover the structural mechanisms responsible for coupling of distal sites on proteins and utilize it for allosteric modulation of proteins. We will present examples where inference of allosteric networks and its rewiring allows us to ``rescue'' cystic fibrosis transmembrane conductance regulator (CFTR), a protein associated with fatal genetic disease cystic fibrosis. We also use our methodology to control protein function allosterically. We design a novel protein domain that can be inserted into identified allosteric site of target protein. Using a drug that binds to our domain, we alter the function of the target protein. We successfully tested this methodology in vitro, in living cells and in zebrafish. We further demonstrate transferability of our allosteric modulation methodology to other systems and extend it to become ligh-activatable.

  1. 2016 Network Games, Control, and Optimization Conference

    CERN Document Server

    Jimenez, Tania; Solan, Eilon

    2017-01-01

    This contributed volume offers a collection of papers presented at the 2016 Network Games, Control, and Optimization conference (NETGCOOP), held at the University of Avignon in France, November 23-25, 2016. These papers highlight the increasing importance of network control and optimization in many networking application domains, such as mobile and fixed access networks, computer networks, social networks, transportation networks, and, more recently, electricity grids and biological networks. Covering a wide variety of both theoretical and applied topics in the areas listed above, the authors explore several conceptual and algorithmic tools that are needed for efficient and robust control operation, performance optimization, and better understanding the relationships between entities that may be acting cooperatively or selfishly in uncertain and possibly adversarial environments. As such, this volume will be of interest to applied mathematicians, computer scientists, engineers, and researchers in other relate...

  2. Technology for sodium purity control

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Ji Young; Kim, B. H.; Kim, T. J. [Korea Atomic Energy Research Institute, Taejon (Korea)

    1999-10-01

    When sodium is used as heat transfer fluid, the plugging in coolant flow, the corrosion of structure material and the transfer of radioactive material caused by the impurities in sodium are worth considerable. Accordingly, these impurities must be monitored and controlled continuously by sodium purification devices in the heat transfer system which sodium is used as coolant. Sodium purification loop was constructed for the purpose of accumulating the technology for purity control of the coolant, developing and verifying further efficient instruments for sodium purification. The plugging meter and the cold trap is used as the implement for measuring and controlling the oxygen and the hydrogen, the main impurities in sodium coolant. They are capable of excellent performance as the implements which could detect and monitor the impurities to the concentration limit required for nuclear reactor. Sodium purification loop could be used variably according to the experimental purpose. 18 refs., 34 figs., 8 tabs. (Author)

  3. Design and value of service oriented technologies for smart business networking

    NARCIS (Netherlands)

    Alt, R.; Smits, M.T.; Beverungen, D.; Tuunanen, T.; Wijnhoven, F.

    2014-01-01

    Business networks that effectively use technologies and outperform competing networks are known as smart business networks. Theory hypothesizes that smart business networking requires a ‘Networked Business Operating System’ (NBOS), a technological architecture consisting of business logic, that enab

  4. 移动自组网的访问控制技术研究%Research on Access Control Technology on Mobile Ad-hoc Networks

    Institute of Scientific and Technical Information of China (English)

    熊庭刚; 卢正鼎; 张家宏

    2011-01-01

    网络资源的共享与保护是移动自组网需要解决的关键问题之一.运用Voronoi图模型和quorum系统的思想,提出了一种移动自组网的动态路径quorum系统,设计了动态路径quorum的生成算法.基于移动自组网的动态路径quorum系统,提出了基于quorum系统的移动自组网的分布式访问控制机制,详细描述了节点的身份认证、网络资源的访问控制和权限管理协议.与传统的基于单个节点自身的访问控制机制相比,该访问控制机制具有较强的抗攻击能力和较高的可靠性,能够有效地提高移动自组网的资源共享与保护水平.%Resources share and protection are one of key problems needed to solve on mobile ad-hoc networks(MANET). A dynamic paths quorum system on MANET was proposed by making use of the model of voronoi diagram and the idea of quorum system. The construction algorithm of dynamic paths quorum was designed. Based on the dynamic paths quorum system on MANET, a distributed access control mechanism was given and the protocols, such as node authentication, network resources authorization and rights management, were described in detail Compared with traditional access control mechanism grounded on single node in MANET, the distributed access control mechanism grounded on more nodes, i. e. a quorum nodes, has higher availability and greater capability to withstand attack. It can improve the level of resources share and protection on MANET observably.

  5. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  6. Active Noise Feedback Control Using a Neural Network

    OpenAIRE

    Zhang Qizhi; Jia Yongle

    2001-01-01

    The active noise control (ANC) is discussed. Many digital ANC systems often based on the filter-x algorithm for finite impulse response (FIR) filter use adaptive filtering techniques. But if the primary noise path is nonlinear, the control system based on adaptive filter technology will be invalid. In this paper, an adaptive active nonlinear noise feedback control approach using a neural network is derived. The feedback control system drives a secondary signal to destructively interfere with ...

  7. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  8. Control of Large-Scale Boolean Networks via Network Aggregation.

    Science.gov (United States)

    Zhao, Yin; Ghosh, Bijoy K; Cheng, Daizhan

    2016-07-01

    A major challenge to solve problems in control of Boolean networks is that the computational cost increases exponentially when the number of nodes in the network increases. We consider the problem of controllability and stabilizability of Boolean control networks, address the increasing cost problem by partitioning the network graph into several subnetworks, and analyze the subnetworks separately. Easily verifiable necessary conditions for controllability and stabilizability are proposed for a general aggregation structure. For acyclic aggregation, we develop a sufficient condition for stabilizability. It dramatically reduces the computational complexity if the number of nodes in each block of the acyclic aggregation is small enough compared with the number of nodes in the entire Boolean network.

  9. Distributed and Redundant Design of Ship Monitoring and Control Network

    Institute of Scientific and Technical Information of China (English)

    ZHANG; Jun-dong; SUI; Jiang-hua

    2002-01-01

    The world trend in ship automation is to integrate the monitoring, intelligent control and systematic management of the instruments and equipments both on bridge and in engine room. The paper presents a design scheme of the ship integrated monitoring and operating system based on two layers distributed and redundant computer network. The lower layer network is the field bus network connected mainly by CAN bus; the upper one is the PC local network in TCP/IP protocol, which consisted of a database server, monitoring and operating computers, industrial computers and a set of switches. Distributed schemes are fully applied to both software and hardware. This paper specifically describes the composition, software distribution and redundant technology of the upper local network and gives some important sample codes for the implement of the redundant and distributed design. The technologies here have been proved in the many applications and it may be applied to other industrial fields.

  10. Fingerprinting Software Defined Networks and Controllers

    Science.gov (United States)

    2015-03-01

    Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air...Networking Defined Within a computer network, switching devices contain three abstractly organized services known as planes [9]. As shown in Figure 2.1, these...stations that exist within an exploitable network. The final threat vector is the lack of trusted resources for forensics and remediation for when an

  11. Linearizing Control of Induction Motor Based on Networked Control Systems

    Institute of Scientific and Technical Information of China (English)

    Jun Ren; Chun-Wen Li; De-Zong Zhao

    2009-01-01

    A new approach to speed control of induction motors is developed by introducing networked control systems (NCSs) into the induction motor driving system. The control strategy is to stabilize and track the rotor speed of the induction motor when the network time delay occurs in the transport medium of network data. First, a feedback linearization method is used to achieve input-output linearization and decoupling control of the induction motor driving system based on rotor flux model, and then the characteristic of network data is analyzed in terms of the inherent network time delay. A networked control model of an induction motor is established. The sufficient condition of asymptotic stability for the networked induction motor driving system is given, and the state feedback controller is obtained by solving the linear matrix inequalities (LMIs). Simulation results verify the efficiency of the proposed scheme.

  12. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  13. Robust Reachability of Boolean Control Networks.

    Science.gov (United States)

    Li, Fangfei; Tang, Yang

    2016-04-20

    Boolean networks serve a powerful tool in analysis of genetic regulatory networks since it emphasizes the fundamental principles and establishes a nature framework for capturing the dynamics of regulation of cellular states. In this paper, the robust reachability of Boolean control networks is investigated by means of semi-tensor product. Necessary and sufficient conditions for the robust reachability of Boolean control networks are provided, in which control inputs relying on disturbances or not are considered, respectively. Besides, the corresponding control algorithms are developed for these two cases. A reduced model of the lac operon in the Escherichia coli is presented to show the effectiveness of the presented results.

  14. 基于物联网技术的设施农业自动控制系统%Networking technology based automatic control system of agricultural facilities

    Institute of Scientific and Technical Information of China (English)

    李金莹; 张日升; 杨宏业; 宣传忠

    2014-01-01

    针对农户对基于物联网技术农业大棚的迫切需求,通过农业大棚与物联网技术、WIFI与3G等通信技术相互结合的方式,完成了农业大棚系统总体构架设计的每个模块功能与器件选型,实现了设施农业自动控制系统的整体功能,这样既减少了用户的人力与精力投入,又提高了产品的质量与品质,为用户获得了更多的增值创收;同时通过基于物联网技术的设施农业大棚的推广应用,给经销商带来了源源不断的收益;也促使了当地政府更好的服务于三农,很好的塑造了地方农业品牌与产业升级,更大程度的惠及了广大农户。%Aiming at the urgent demand of farmers on the Internet of things technology based agricultural greenhouse, the greenhouse and the technology of the Internet of things, WIFI and 3G communication technology in conjunction with each other, to complete the function of architecture design of agricultural greenhouse system each module and device selection, the facility agriculture overall function of the automatic control system, thus reducing human and energy user input, and improve the quality of products and quality, for the user to gain more value-added income;at the same time, through the promotion of application of the Internet of things technology facilities based on agricultural greenhouse, brought a revenue stream to the dealer; also prompted the local government to better serve the agriculture, good shape. Brand agricultural and industrial upgrading, greater benefit farmers.

  15. Quality of service policy control in virtual private networks

    Science.gov (United States)

    Yu, Yiqing; Wang, Hongbin; Zhou, Zhi; Zhou, Dongru

    2004-04-01

    This paper studies the QoS of VPN in an environment where the public network prices connection-oriented services based on source, destination and grade of service, and advertises these prices to its VPN customers (users). As different QoS technologies can produce different QoS, there are according different traffic classification rules and priority rules. The internet service provider (ISP) may need to build complex mechanisms separately for each node. In order to reduce the burden of network configuration, we need to design policy control technologies. We considers mainly directory server, policy server, policy manager and policy enforcers. Policy decision point (PDP) decide its control according to policy rules. In network, policy enforce point (PEP) decide its network controlled unit. For InterServ and DiffServ, we will adopt different policy control methods as following: (1) In InterServ, traffic uses resource reservation protocol (RSVP) to guarantee the network resource. (2) In DiffServ, policy server controls the DiffServ code points and per hop behavior (PHB), its PDP distributes information to each network node. Policy server will function as following: information searching; decision mechanism; decision delivering; auto-configuration. In order to prove the effectiveness of QoS policy control, we make the corrective simulation.

  16. Additive Feed Forward Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1999-01-01

    This paper demonstrates a method to control a non-linear, multivariable, noisy process using trained neural networks. The basis for the method is a trained neural network controller acting as the inverse process model. A training method for obtaining such an inverse process model is applied....... A suitable 'shaped' (low-pass filtered) reference is used to overcome problems with excessive control action when using a controller acting as the inverse process model. The control concept is Additive Feed Forward Control, where the trained neural network controller, acting as the inverse process model......, is placed in a supplementary pure feed-forward path to an existing feedback controller. This concept benefits from the fact, that an existing, traditional designed, feedback controller can be retained without any modifications, and after training the connection of the neural network feed-forward controller...

  17. Additive Feed Forward Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1999-01-01

    This paper demonstrates a method to control a non-linear, multivariable, noisy process using trained neural networks. The basis for the method is a trained neural network controller acting as the inverse process model. A training method for obtaining such an inverse process model is applied....... A suitable 'shaped' (low-pass filtered) reference is used to overcome problems with excessive control action when using a controller acting as the inverse process model. The control concept is Additive Feed Forward Control, where the trained neural network controller, acting as the inverse process model......, is placed in a supplementary pure feed-forward path to an existing feedback controller. This concept benefits from the fact, that an existing, traditional designed, feedback controller can be retained without any modifications, and after training the connection of the neural network feed-forward controller...

  18. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  19. SKA CSP controls: technological challenges

    Science.gov (United States)

    Baffa, C.; Giani, E.; Vrcic, S.; Vela Nuñez, M.

    2016-07-01

    The Square Kilometer Array (SKA) project is an international effort to build the world's largest radio telescope, with eventually over a square kilometer of collecting area. For SKA Phase 1, Australia will host the low-frequency instrument with more than 500 stations, each containing around 250 individual antennas, whilst South Africa will host an array of close to 200 dishes. The scale of the SKA represents a huge leap forward in both engineering and research and development towards building and delivering a unique instrument, with the detailed design and preparation now well under way. As one of the largest scientific endeavors in history, the SKA will brings together close to 100 organizations from 20 countries. Every aspect of the design and development of such a large and complex instrument requires state-of-the-art technology and innovative approach. This poster (or paper) addresses some aspects of the SKA monitor and control system, and in particular describes the development and test results of the CSP Local Monitoring and Control prototype. At the SKA workshop held in April 2015, the SKA monitor and control community has chosen TANGO Control System as a framework, for the implementation of the SKA monitor and control. This decision will have a large impact on Monitor an Control development of SKA. As work is on the way to incorporate TANGO Control System in SKA is in progress, we started to development a prototype for the SKA Central Signal Processor to mitigate the associated risks. In particular we now have developed a uniform class schema proposal for the sub-Element systems of the SKA-CSP.

  20. Threshold control of chaotic neural network.

    Science.gov (United States)

    He, Guoguang; Shrimali, Manish Dev; Aihara, Kazuyuki

    2008-01-01

    The chaotic neural network constructed with chaotic neurons exhibits rich dynamic behaviour with a nonperiodic associative memory. In the chaotic neural network, however, it is difficult to distinguish the stored patterns in the output patterns because of the chaotic state of the network. In order to apply the nonperiodic associative memory into information search, pattern recognition etc. it is necessary to control chaos in the chaotic neural network. We have studied the chaotic neural network with threshold activated coupling, which provides a controlled network with associative memory dynamics. The network converges to one of its stored patterns or/and reverse patterns which has the smallest Hamming distance from the initial state of the network. The range of the threshold applied to control the neurons in the network depends on the noise level in the initial pattern and decreases with the increase of noise. The chaos control in the chaotic neural network by threshold activated coupling at varying time interval provides controlled output patterns with different temporal periods which depend upon the control parameters.

  1. An improved method for network congestion control

    Science.gov (United States)

    Qiao, Xiaolin

    2013-03-01

    The rapid progress of the wireless network technology has great convenience on the people's life and work. However, because of its openness, the mobility of the terminal and the changing topology, the wireless network is more susceptible to security attacks. Authentication and key agreement is the base of the network security. The authentication and key agreement mechanism can prevent the unauthorized user from accessing the network, resist malicious network to deceive the lawful user, encrypt the session data by using the exchange key and provide the identification of the data origination. Based on characteristics of the wireless network, this paper proposed a key agreement protocol for wireless network. The authentication of protocol is based on Elliptic Curve Cryptosystems and Diffie-Hellman.

  2. Optical coherent technologies in next generation access networks

    Science.gov (United States)

    Iwatsuki, Katsumi; Tsukamoto, Katsutoshi

    2012-01-01

    This paper reviews optical coherent technologies in next generation access networks with the use of radio over fiber (RoF), which offer key enabling technologies of wired and wireless integrated and/or converged broadband access networks to accommodate rapidly widespread cloud computing services. We describe technical issues on conventional RoF based on subcarrier modulation (SCM) and their countermeasures. Two examples of RoF access networks with optical coherent technologies to solve the technical issues are introduced; a video distribution system with FM conversion and wired and wireless integrated wide-area access network with photonic up- and down-conversion.

  3. An Affect Control Theory of Technology

    Science.gov (United States)

    Shank, Daniel B.

    2010-01-01

    Affect control theory is a theory of interaction that takes into account cultural meanings. Affect control research has previously considered interaction with technology, but there remains a lack of theorizing about inclusion of technology within the theory. This paper lays a foundation for an affect control theory of technology by addressing key…

  4. A Control Scheme Based on Online Delay Evaluation for a Class of Networked Control Systems

    Institute of Scientific and Technical Information of China (English)

    马向华; 谢剑英; 魏震

    2004-01-01

    A control scheme that integrates control technology with communication technology to solve the delay problem is introduced for a class of networked control systems: Networked Half-Link Systems (NHLS). Concretely, we use the master-slave clock synchronization technology to evaluate the delays online, and then the LQ optimal control based on delays is adopted to stabilize the controlled plant. During the clock synchronization process, the error of evaluated delays is inevitably induced from the clock synchronization error, which will deteriorate the system performances, and even make system unstable in certain cases. Hence, the discussions about the clock error, and the related control analysis and design are also developed. Specifically, we present the sufficient conditions of controller parameters that guarantee the system stability, and a controller design method based on the error of delays is addressed thereafter. The experiments based on a CANbus platform are fulfilled, and the experimental results verify the previous analytic results finally.

  5. Image Restoration Technology Based on Discrete Neural network

    Directory of Open Access Journals (Sweden)

    Zhou Duoying

    2015-01-01

    Full Text Available With the development of computer science and technology, the development of artificial intelligence advances rapidly in the field of image restoration. Based on the MATLAB platform, this paper constructs a kind of image restoration technology of artificial intelligence based on the discrete neural network and feedforward network, and carries out simulation and contrast of the restoration process by the use of the bionic algorithm. Through the application of simulation restoration technology, this paper verifies that the discrete neural network has a good convergence and identification capability in the image restoration technology with a better effect than that of the feedforward network. The restoration technology based on the discrete neural network can provide a reliable mathematical model for this field.

  6. Trends in Integrated Ship Control Networking

    DEFF Research Database (Denmark)

    Jørgensen, N.; Nielsen, Jens Frederik Dalsgaard

    1997-01-01

    Integrated Ship Control systems can be designed as robust, distributed, autonomous control systems. The EU funded ATOMOS and ATOMOS II projects involves both technical and non technical aspects of this process. A reference modelling concept giving an outline of a generic ISC system covering...... the network and the equipment connected to it, a framework for verification of network functionality and performance by simulation and a general distribution platform for ISC systems, The ATOMOS Network, are results of this work....

  7. Trends in Integrated Ship Control Networking

    OpenAIRE

    Jørgensen, N.; Nielsen, Jens Frederik Dalsgaard

    1997-01-01

    Integrated Ship Control systems can be designed as robust, distributed, autonomous control systems. The EU funded ATOMOS and ATOMOS II projects involves both technical and non technical aspects of this process. A reference modelling concept giving an outline of a generic ISC system covering the network and the equipment connected to it, a framework for verification of network functionality and performance by simulation and a general distribution platform for ISC systems, The ATOMOS Network, a...

  8. Input graph: the hidden geometry in controlling complex networks

    Science.gov (United States)

    Zhang, Xizhe; Lv, Tianyang; Pu, Yuanyuan

    2016-11-01

    The ability to control a complex network towards a desired behavior relies on our understanding of the complex nature of these social and technological networks. The existence of numerous control schemes in a network promotes us to wonder: what is the underlying relationship of all possible input nodes? Here we introduce input graph, a simple geometry that reveals the complex relationship between all control schemes and input nodes. We prove that the node adjacent to an input node in the input graph will appear in another control scheme, and the connected nodes in input graph have the same type in control, which they are either all possible input nodes or not. Furthermore, we find that the giant components emerge in the input graphs of many real networks, which provides a clear topological explanation of bifurcation phenomenon emerging in dense networks and promotes us to design an efficient method to alter the node type in control. The findings provide an insight into control principles of complex networks and offer a general mechanism to design a suitable control scheme for different purposes.

  9. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  10. Neural Networks for Non-linear Control

    DEFF Research Database (Denmark)

    Sørensen, O.

    1994-01-01

    This paper describes how a neural network, structured as a Multi Layer Perceptron, is trained to predict, simulate and control a non-linear process.......This paper describes how a neural network, structured as a Multi Layer Perceptron, is trained to predict, simulate and control a non-linear process....

  11. Neural Networks for Non-linear Control

    DEFF Research Database (Denmark)

    Sørensen, O.

    1994-01-01

    This paper describes how a neural network, structured as a Multi Layer Perceptron, is trained to predict, simulate and control a non-linear process.......This paper describes how a neural network, structured as a Multi Layer Perceptron, is trained to predict, simulate and control a non-linear process....

  12. Stress controls the mechanics of collagen networks.

    Science.gov (United States)

    Licup, Albert James; Münster, Stefan; Sharma, Abhinav; Sheinman, Michael; Jawerth, Louise M; Fabry, Ben; Weitz, David A; MacKintosh, Fred C

    2015-08-04

    Collagen is the main structural and load-bearing element of various connective tissues, where it forms the extracellular matrix that supports cells. It has long been known that collagenous tissues exhibit a highly nonlinear stress-strain relationship, although the origins of this nonlinearity remain unknown. Here, we show that the nonlinear stiffening of reconstituted type I collagen networks is controlled by the applied stress and that the network stiffness becomes surprisingly insensitive to network concentration. We demonstrate how a simple model for networks of elastic fibers can quantitatively account for the mechanics of reconstituted collagen networks. Our model points to the important role of normal stresses in determining the nonlinear shear elastic response, which can explain the approximate exponential relationship between stress and strain reported for collagenous tissues. This further suggests principles for the design of synthetic fiber networks with collagen-like properties, as well as a mechanism for the control of the mechanics of such networks.

  13. Controller Design of Intelligent Lighting Network

    Institute of Scientific and Technical Information of China (English)

    RONG Xue-juan; NIU Ping-juan; XU Xiu-zhi

    2009-01-01

    Studied are the controller design and basic principles of intelligent lighting network. TI's MSP430F123 is used as a main controller.By using the ZigBee modules (Xbee/Xbee-PRO) and the GSM module(SIM300C) for wireless communications,the lighting control is enabled to access wireless network.This system uses a mobile phone to achieve light on-off directly,which can accomplish wireless control of intelligent lighting in families.

  14. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  15. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  16. Modelling, Estimation and Control of Networked Complex Systems

    CERN Document Server

    Chiuso, Alessandro; Frasca, Mattia; Rizzo, Alessandro; Schenato, Luca; Zampieri, Sandro

    2009-01-01

    The paradigm of complexity is pervading both science and engineering, leading to the emergence of novel approaches oriented at the development of a systemic view of the phenomena under study; the definition of powerful tools for modelling, estimation, and control; and the cross-fertilization of different disciplines and approaches. This book is devoted to networked systems which are one of the most promising paradigms of complexity. It is demonstrated that complex, dynamical networks are powerful tools to model, estimate, and control many interesting phenomena, like agent coordination, synchronization, social and economics events, networks of critical infrastructures, resources allocation, information processing, or control over communication networks. Moreover, it is shown how the recent technological advances in wireless communication and decreasing in cost and size of electronic devices are promoting the appearance of large inexpensive interconnected systems, each with computational, sensing and mobile cap...

  17. Modeling, Optimization & Control of Hydraulic Networks

    DEFF Research Database (Denmark)

    Tahavori, Maryamsadat

    2014-01-01

    to check if the network is controllable. Afterward the pressure control problem in water supply systems is formulated as an optimal control problem. The goal is to minimize the power consumption in pumps and also to regulate the pressure drop at the end-users to a desired value. The formulated optimal...... in water network is pressure management. By reducing the pressure in the water network, the leakage can be reduced significantly. Also it reduces the amount of energy consumption in water networks. The primary purpose of this work is to develop control algorithms for pressure control in water supply...... systems. To have better understanding of water leakage, to control pressure and leakage effectively and for optimal design of water supply system, suitable modeling is an important prerequisite. Therefore a model with the main objective of pressure control and consequently leakage reduction is presented...

  18. Modelling and control PEMFC using fuzzy neural networks

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Proton exchange membrane generation technology is highly efficient, clean and considered as the most hopeful "green" power technology. The operating principles of proton exchange membrane fuel cell (PEMFC) system involve thermodynamics, electrochemistry, hydrodynamics and mass transfer theory, which comprise a complex nonlinear system, for which it is difficult to establish a mathematical model and control online. This paper first simply analyzes the characters of the PEMFC; and then uses the approach and self-study ability of artificial neural networks to build the model of the nonlinear system, and uses the adaptive neural-networks fuzzy infer system (ANFIS) to build the temperature model of PEMFC which is used as the reference model of the control system, and adjusts the model parameters to control it online. The model and control are implemented in SIMULINK environment. Simulation results showed that the test data and model agreed well, so it will be very useful for optimal and real-time control of PEMFC system.

  19. Application of generalized predictive control in networked control system

    Institute of Scientific and Technical Information of China (English)

    YANG Can; ZHU Sha-nan; KONG Wan-zeng; LU Li-ming

    2006-01-01

    A new framework for networked control system based on Generalized Predictive Control (GPC) is proposed in this paper. Clock-driven sensors, event-driven controller, and clock-driven actuators are required in this framework. A queuing strategy is proposed to overcome the network induced delay. Without redesigning, the proposed framework enables the existing GPC controller to be used in a network environment. It also does not require clock synchronization and is only slightly affected by bad network condition such as package loss. Various experiments are designed over the real network to test the proposed approach,which verify that the proposed approach can stabilize the Networked Control System (NCS) and is robust.

  20. Network Science Collaborative Technology Alliance: Overview

    Science.gov (United States)

    2010-02-01

    mysterious lives: evolve, change, and behave in little- understood ways • Network science studies fundamental laws of evolution and behaviors of “living...relations of three dissimilar (and most influential) genres of networks: social, information, communications • The most powerful and Army-relevant...centers to balance (a) in-depth expertise in each network genre and (b) relations, dependencies and mutual influences of three genres . Network Science

  1. Enhanced Communication Network Solution for Positive Train Control Implementation

    Science.gov (United States)

    Fatehi, M. T.; Simon, J.; Chang, W.; Chow, E. T.; Burleigh, S. C.

    2011-01-01

    The commuter and freight railroad industry is required to implement Positive Train Control (PTC) by 2015 (2012 for Metrolink), a challenging network communications problem. This paper will discuss present technologies developed by the National Aeronautics and Space Administration (NASA) to overcome comparable communication challenges encountered in deep space mission operations. PTC will be based on a new cellular wireless packet Internet Protocol (IP) network. However, ensuring reliability in such a network is difficult due to the "dead zones" and transient disruptions we commonly experience when we lose calls in commercial cellular networks. These disruptions make it difficult to meet PTC s stringent reliability (99.999%) and safety requirements, deployment deadlines, and budget. This paper proposes innovative solutions based on space-proven technologies that would help meet these challenges: (1) Delay Tolerant Networking (DTN) technology, designed for use in resource-constrained, embedded systems and currently in use on the International Space Station, enables reliable communication over networks in which timely data acknowledgments might not be possible due to transient link outages. (2) Policy-Based Management (PBM) provides dynamic management capabilities, allowing vital data to be exchanged selectively (with priority) by utilizing alternative communication resources. The resulting network may help railroads implement PTC faster, cheaper, and more reliably.

  2. Enhanced Communication Network Solution for Positive Train Control Implementation

    Science.gov (United States)

    Fatehi, M. T.; Simon, J.; Chang, W.; Chow, E. T.; Burleigh, S. C.

    2011-01-01

    The commuter and freight railroad industry is required to implement Positive Train Control (PTC) by 2015 (2012 for Metrolink), a challenging network communications problem. This paper will discuss present technologies developed by the National Aeronautics and Space Administration (NASA) to overcome comparable communication challenges encountered in deep space mission operations. PTC will be based on a new cellular wireless packet Internet Protocol (IP) network. However, ensuring reliability in such a network is difficult due to the "dead zones" and transient disruptions we commonly experience when we lose calls in commercial cellular networks. These disruptions make it difficult to meet PTC s stringent reliability (99.999%) and safety requirements, deployment deadlines, and budget. This paper proposes innovative solutions based on space-proven technologies that would help meet these challenges: (1) Delay Tolerant Networking (DTN) technology, designed for use in resource-constrained, embedded systems and currently in use on the International Space Station, enables reliable communication over networks in which timely data acknowledgments might not be possible due to transient link outages. (2) Policy-Based Management (PBM) provides dynamic management capabilities, allowing vital data to be exchanged selectively (with priority) by utilizing alternative communication resources. The resulting network may help railroads implement PTC faster, cheaper, and more reliably.

  3. Optimal pinning controllability of complex networks: dependence on network structure.

    Science.gov (United States)

    Jalili, Mahdi; Askari Sichani, Omid; Yu, Xinghuo

    2015-01-01

    Controlling networked structures has many applications in science and engineering. In this paper, we consider the problem of pinning control (pinning the dynamics into the reference state), and optimally placing the driver nodes, i.e., the nodes to which the control signal is fed. Considering the local controllability concept, a metric based on the eigenvalues of the Laplacian matrix is taken into account as a measure of controllability. We show that the proposed optimal placement strategy considerably outperforms heuristic methods including choosing hub nodes with high degree or betweenness centrality as drivers. We also study properties of optimal drivers in terms of various centrality measures including degree, betweenness, closeness, and clustering coefficient. The profile of these centrality values depends on the network structure. For homogeneous networks such as random small-world networks, the optimal driver nodes have almost the mean centrality value of the population (much lower than the centrality value of hub nodes), whereas the centrality value of optimal drivers in heterogeneous networks such as scale-free ones is much higher than the average and close to that of hub nodes. However, as the degree of heterogeneity decreases in such networks, the profile of centrality approaches the population mean.

  4. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  5. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  6. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  7. Controlling congestion on complex networks: fairness, efficiency and network structure.

    Science.gov (United States)

    Buzna, Ľuboš; Carvalho, Rui

    2017-08-22

    We consider two elementary (max-flow and uniform-flow) and two realistic (max-min fairness and proportional fairness) congestion control schemes, and analyse how the algorithms and network structure affect throughput, the fairness of flow allocation, and the location of bottleneck edges. The more realistic proportional fairness and max-min fairness algorithms have similar throughput, but path flow allocations are more unequal in scale-free than in random regular networks. Scale-free networks have lower throughput than their random regular counterparts in the uniform-flow algorithm, which is favoured in the complex networks literature. We show, however, that this relation is reversed on all other congestion control algorithms for a region of the parameter space given by the degree exponent γ and average degree 〈k〉. Moreover, the uniform-flow algorithm severely underestimates the network throughput of congested networks, and a rich phenomenology of path flow allocations is only present in the more realistic α-fair family of algorithms. Finally, we show that the number of paths passing through an edge characterises the location of a wide range of bottleneck edges in these algorithms. Such identification of bottlenecks could provide a bridge between the two fields of complex networks and congestion control.

  8. MPC control of water supply networks

    DEFF Research Database (Denmark)

    Baunsgaard, Kenneth Marx Hoe; Ravn, Ole; Kallesoe, Carsten Skovmose;

    2016-01-01

    This paper investigates the modelling and predictive control of a drinking water supply network with the aim of minimising the energy and economic cost. A model predictive controller, MPC, is applied to a nonlinear model of a drinking water network that follows certain constraints to maintain...... consumer pressure desire. A model predictive controller, MPC, is based on a simple model that models the main characteristics of a water distribution network, optimizes a desired cost minimisation, and keeps the system inside specified constraints. In comparison to a logic (on/off) control design......, controlling the drinking water supply network with the MPC showed reduction of the energy and the economic cost of running the system. This has been achieved by minimising actuator control effort and by shifting the actuator use towards the night time, where energy prices are lower. Along with energy cost...

  9. Emergence of bimodality in controlling complex networks

    CERN Document Server

    Jia, Tao; Csóka, Endre; Pósfai, Márton; Slotine, Jean-Jacques; Barabási, Albert-László

    2015-01-01

    Our ability to control complex systems is a fundamental challenge of contemporary science. Recently introduced tools to identify the driver nodes, nodes through which we can achieve full control, predict the existence of multiple control configurations, prompting us to classify each node in a network based on their role in control. Accordingly a node is critical, intermittent or redundant if it acts as a driver node in all, some or none of the control configurations. Here we develop an analytical framework to identify the category of each node, leading to the discovery of two distinct control modes in complex systems: centralized vs distributed control. We predict the control mode for an arbitrary network and show that one can alter it through small structural perturbations. The uncovered bimodality has implications from network security to organizational research and offers new insights into the dynamics and control of complex systems.

  10. Active defense scheme against DDoS based on mobile agent and network control in network confrontation

    Science.gov (United States)

    Luo, Rong; Li, Junshan; Ye, Xia; Wang, Rui

    2013-03-01

    In order to effective defend DDoS attacks in network confrontation, an active defense scheme against DDoS is built based on Mobile Agent and network control. A distributed collaborative active defense model is constructed by using mobile agent technology and encapsulating a variety of DDoS defense techniques. Meanwhile the network control theory is applied to establish a network confrontation's control model for DDoS to control the active defense process. It provides a new idea to solve the DDoS problem.

  11. Key technologies for the novel distributed numerical control integrated system

    Institute of Scientific and Technical Information of China (English)

    TAO Guibao; LlU Fei; WANG Shilong

    2004-01-01

    A novel distributed numerical control (DNC) integrated system based on plug-in software technology is proposed. It connects new or old numerical control (NC) machine tools which haveinhomogeneous numerical control systems with CAD/CAM system by CANbus network. A DNC computer is able to control 15 sets of NC machine tools reliably at the same time. The novel DNC system increases the efficiency of machine tools and improve the production management level by realizing non-paper production, agile manufacturing, networked manufacturing and so on in the near future. Key technologies to construct the novel DNC integrated system include the integration of inhomogeneous numerical control systems, NC program restart, and algorithm for communication competition. Such system has demonstrated successful applications in some corporations that have acquired good economic benefits and social effects.

  12. Advanced mobile networking, sensing, and controls.

    Energy Technology Data Exchange (ETDEWEB)

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  13. The Importance, Design and Implementation of a Middleware for Networked Control Systems

    CERN Document Server

    Kim, Kyoung-Dae

    2009-01-01

    Due to the advancement of computing and communication technology, networked control systems may soon become prevalent in many control applications. While the capability of employing the communication network in the control loop certainly provides many benefits, it also raises several challenges which need to be overcome to utilize the benefits. In this chapter, we focus on one major challenge: a middleware framework that enables a networked control system to be implemented. Indeed our thesis is that a middleware for networked control sys important for the future of networked control systems. We discuss the fundamental issues which need to be considered in the design and development of an appropriate middleware for networked control systems. We describe \\emph{Etherware}, a middleware for networked control system which has been developed at the University of Illinois, as an example of such a middleware framework, to illustrate how these issues can be addressed in the design of a middleware. Using a networked in...

  14. Secure quantum network coding for controlled repeater networks

    Science.gov (United States)

    Shang, Tao; Li, Jiao; Liu, Jian-wei

    2016-07-01

    To realize efficient quantum communication based on quantum repeater, we propose a secure quantum network coding scheme for controlled repeater networks, which adds a controller as a trusted party and is able to control the process of EPR-pair distribution. As the key operations of quantum repeater, local operations and quantum communication are designed to adopt quantum one-time pad to enhance the function of identity authentication instead of local operations and classical communication. Scheme analysis shows that the proposed scheme can defend against active attacks for quantum communication and realize long-distance quantum communication with minimal resource consumption.

  15. Robust Multiobjective Controllability of Complex Neuronal Networks.

    Science.gov (United States)

    Tang, Yang; Gao, Huijun; Du, Wei; Lu, Jianquan; Vasilakos, Athanasios V; Kurths, Jurgen

    2016-01-01

    This paper addresses robust multiobjective identification of driver nodes in the neuronal network of a cat's brain, in which uncertainties in determination of driver nodes and control gains are considered. A framework for robust multiobjective controllability is proposed by introducing interval uncertainties and optimization algorithms. By appropriate definitions of robust multiobjective controllability, a robust nondominated sorting adaptive differential evolution (NSJaDE) is presented by means of the nondominated sorting mechanism and the adaptive differential evolution (JaDE). The simulation experimental results illustrate the satisfactory performance of NSJaDE for robust multiobjective controllability, in comparison with six statistical methods and two multiobjective evolutionary algorithms (MOEAs): nondominated sorting genetic algorithms II (NSGA-II) and nondominated sorting composite differential evolution. It is revealed that the existence of uncertainties in choosing driver nodes and designing control gains heavily affects the controllability of neuronal networks. We also unveil that driver nodes play a more drastic role than control gains in robust controllability. The developed NSJaDE and obtained results will shed light on the understanding of robustness in controlling realistic complex networks such as transportation networks, power grid networks, biological networks, etc.

  16. Effect of correlations on controllability transition in network control.

    Science.gov (United States)

    Nie, Sen; Wang, Xu-Wen; Wang, Bing-Hong; Jiang, Luo-Luo

    2016-04-11

    The network control problem has recently attracted an increasing amount of attention, owing to concerns including the avoidance of cascading failures of power-grids and the management of ecological networks. It has been proven that numerical control can be achieved if the number of control inputs exceeds a certain transition point. In the present study, we investigate the effect of degree correlation on the numerical controllability in networks whose topological structures are reconstructed from both real and modeling systems, and we find that the transition point of the number of control inputs depends strongly on the degree correlation in both undirected and directed networks with moderately sparse links. More interestingly, the effect of the degree correlation on the transition point cannot be observed in dense networks for numerical controllability, which contrasts with the corresponding result for structural controllability. In particular, for directed random networks and scale-free networks, the influence of the degree correlation is determined by the types of correlations. Our approach provides an understanding of control problems in complex sparse networks.

  17. Creation of a European network dedicated to technology transfer

    CERN Multimedia

    2008-01-01

    The CERN Council recently approved the creation of a technology transfer network, whose aim will be to improve European industry’s access to the technologies developed by the particle physics community in the Member States. The gas detectors for the TOTEM experiment (GEM) offer potential for fruitful collaboration within the framework of the TT network. Many other technologies are going down the same road.The desire to set up a technology transfer network follows on from the European Strategy for Particle Physics, approved by the CERN Council on 14 July 2006 in Lisbon. In this context, special emphasis was laid on European industry’s participation in the implementation of particle physics programmes and, in particular, its access to the new technologies developed by the scientific community. It was recognised that effort needs to be put into improving the efficiency of technology transfer...

  18. Congestion control and routing over satellite networks

    Science.gov (United States)

    Cao, Jinhua

    Satellite networks and transmissions find their application in fields of computer communications, telephone communications, television broadcasting, transportation, space situational awareness systems and so on. This thesis mainly focuses on two networking issues affecting satellite networking: network congestion control and network routing optimization. Congestion, which leads to long queueing delays, packet losses or both, is a networking problem that has drawn the attention of many researchers. The goal of congestion control mechanisms is to ensure high bandwidth utilization while avoiding network congestion by regulating the rate at which traffic sources inject packets into a network. In this thesis, we propose a stable congestion controller using data-driven, safe switching control theory to improve the dynamic performance of satellite Transmission Control Protocol/Active Queue Management (TCP/AQM) networks. First, the stable region of the Proportional-Integral (PI) parameters for a nominal model is explored. Then, a PI controller, whose parameters are adaptively tuned by switching among members of a given candidate set, using observed plant data, is presented and compared with some classical AQM policy examples, such as Random Early Detection (RED) and fixed PI control. A new cost detectable switching law with an interval cost function switching algorithm, which improves the performance and also saves the computational cost, is developed and compared with a law commonly used in the switching control literature. Finite-gain stability of the system is proved. A fuzzy logic PI controller is incorporated as a special candidate to achieve good performance at all nominal points with the available set of candidate controllers. Simulations are presented to validate the theory. An effocient routing algorithm plays a key role in optimizing network resources. In this thesis, we briefly analyze Low Earth Orbit (LEO) satellite networks, review the Cross Entropy (CE

  19. Control of autonomous robot using neural networks

    Science.gov (United States)

    Barton, Adam; Volna, Eva

    2017-07-01

    The aim of the article is to design a method of control of an autonomous robot using artificial neural networks. The introductory part describes control issues from the perspective of autonomous robot navigation and the current mobile robots controlled by neural networks. The core of the article is the design of the controlling neural network, and generation and filtration of the training set using ART1 (Adaptive Resonance Theory). The outcome of the practical part is an assembled Lego Mindstorms EV3 robot solving the problem of avoiding obstacles in space. To verify models of an autonomous robot behavior, a set of experiments was created as well as evaluation criteria. The speed of each motor was adjusted by the controlling neural network with respect to the situation in which the robot was found.

  20. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  1. Structure-based control of complex networks with nonlinear dynamics

    CERN Document Server

    Zañudo, Jorge G T; Albert, Réka

    2016-01-01

    Given the network of interactions underlying a complex system, what can we learn about controlling such a system solely from its structure? Over a century of research in control theory has given us tools to answer this question, which were widely applied in science and engineering. Yet the current tools do not always consider the inherently nonlinear dynamics of real systems and the naturally occurring system states in their definition of "control", a term whose interpretation varies across disciplines. Here we use a new mathematical framework for structure-based control of networks governed by a broad class of nonlinear dynamics that includes the major dynamic models of biological, technological, and social processes. This framework provides realizable node overrides that steer a system towards any of its natural long term dynamic behaviors and which are guaranteed to be effective regardless of the dynamic details and parameters of the underlying system. We use this framework on several real networks, compar...

  2. Research on key technology of space laser communication network

    Science.gov (United States)

    Chang, Chengwu; Huang, Huiming; Liu, Hongyang; Gao, Shenghua; Cheng, Liyu

    2016-10-01

    Since the 21st century, Spatial laser communication has made a breakthrough development. Europe, the United States, Japan and other space powers have carried out the test of spatial laser communication technology on-orbit, and put forward a series of plans. In 2011, China made the first technology demonstration of satellite-ground laser communication carried by HY-2 satellite. Nowadays, in order to improve the transmission rate of spatial network, the topic of spatial laser communication network is becoming a research hotspot at home and abroad. This thesis, from the basic problem of spatial laser communication network to solve, analyzes the main difference between spatial network and ground network, which draws forth the key technology of spatial laser communication backbone network, and systematically introduces our research on aggregation, addressing, architecture of spatial network. From the perspective of technology development status and trends, the thesis proposes the development route of spatial laser communication network in stages. So as to provide reference about the development of spatial laser communication network in China.

  3. INL Control System Situational Awareness Technology Annual Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Gordon Rueff; Bryce Wheeler; Todd Vollmer; Tim McJunkin; Robert Erbes

    2012-10-01

    The overall goal of this project is to develop an interoperable set of tools to provide a comprehensive, consistent implementation of cyber security and overall situational awareness of control and sensor network implementations. The operation and interoperability of these tools will fill voids in current technological offerings and address issues that remain an impediment to the security of control systems. This report provides an FY 2012 update on the Sophia, Mesh Mapper, Intelligent Cyber Sensor, and Data Fusion projects with respect to the year-two tasks and annual reporting requirements of the INL Control System Situational Awareness Technology report (July 2010).

  4. Neural PID Control Strategy for Networked Process Control

    Directory of Open Access Journals (Sweden)

    Jianhua Zhang

    2013-01-01

    Full Text Available A new method with a two-layer hierarchy is presented based on a neural proportional-integral-derivative (PID iterative learning method over the communication network for the closed-loop automatic tuning of a PID controller. It can enhance the performance of the well-known simple PID feedback control loop in the local field when real networked process control applied to systems with uncertain factors, such as external disturbance or randomly delayed measurements. The proposed PID iterative learning method is implemented by backpropagation neural networks whose weights are updated via minimizing tracking error entropy of closed-loop systems. The convergence in the mean square sense is analysed for closed-loop networked control systems. To demonstrate the potential applications of the proposed strategies, a pressure-tank experiment is provided to show the usefulness and effectiveness of the proposed design method in network process control systems.

  5. Control Networks and Neuromodulators of Early Development

    Science.gov (United States)

    Posner, Michael I.; Rothbart, Mary K.; Sheese, Brad E.; Voelker, Pascale

    2012-01-01

    In adults, most cognitive and emotional self-regulation is carried out by a network of brain regions, including the anterior cingulate, insula, and areas of the basal ganglia, related to executive attention. We propose that during infancy, control systems depend primarily upon a brain network involved in orienting to sensory events that includes…

  6. Improving network service performance and reliability via links trunking technologies

    Institute of Scientific and Technical Information of China (English)

    GUO Hui; WANG Yun-peng; WANG Zhi-guang; ZHOU Jing-li

    2006-01-01

    With the increase ofhigh-speed network backbones, the performance of server's network interface gradually becomes a pivotal factor. This study provides a method called Ethernet Links Trunking (ELT) technology for achieving efficient connectivity between backbones and servers, which provides higher bandwidth and availability of server network interface. The overview of the ELT technology and the results of performance experiment are presented in this paper. Findings showed that the network bandwidth can be scaled by multiple ELT technologies so that more reliable network connectivity can be guaranteed. Some crucial techniques such as Adapter Load Balancing (ALB) and Adapter Fault Tolerance (AFT) are presented in this paper. Experimental results showed that parallel channels of Fast Ethernet are both necessary and sufficient for supporting the data rates of multiple concurrent file transfers on file server.

  7. WiMAX technology and network evolution

    CERN Document Server

    Etemad, Kamran

    2010-01-01

    WiMAX, the Worldwide Interoperability for Microwave Access, represents a paradigm shift in telecommunications technology. It offers the promise of cheaper, smaller, and simpler technology compared to existing broadband options such as DSL, cable, fiber, and 3G wireless.

  8. Artificial Neural Networks and Instructional Technology.

    Science.gov (United States)

    Carlson, Patricia A.

    1991-01-01

    Artificial neural networks (ANN), part of artificial intelligence, are discussed. Such networks are fed sample cases (training sets), learn how to recognize patterns in the sample data, and use this experience in handling new cases. Two cognitive roles for ANNs (intelligent filters and spreading, associative memories) are examined. Prototypes…

  9. Artificial Neural Networks and Instructional Technology.

    Science.gov (United States)

    Carlson, Patricia A.

    1991-01-01

    Artificial neural networks (ANN), part of artificial intelligence, are discussed. Such networks are fed sample cases (training sets), learn how to recognize patterns in the sample data, and use this experience in handling new cases. Two cognitive roles for ANNs (intelligent filters and spreading, associative memories) are examined. Prototypes…

  10. MSFC institutional area network and ATM technology

    Science.gov (United States)

    Amin, Ashok T.

    1994-10-01

    The New Institutional Area Network (NEWIAN) at Marshall supports over 5000 end users with access to 26 file servers providing work presentation services. It is comprised of some 150 Ethernet LAN's interconnected by bridges/routers which are in turn connected to servers over two dual FDDI rings. The network supports various higher level protocols such as IP, IPX, AppleTalk (AT), and DECNet. At present IPX and AT protocols packets are routed, and IP protocol packets are bridged; however, work is in progress to route all IP packets. The impact of routing IP packets on network operation is examined. Broadband Integrated Services Data Network (BISDN), presently at various stages of development, is intended to provide voice, video, and data transfer services over a single network. BISDN will use asynchronous transfer mode (ATM) as a data transfer technique which provides for transmission, multiplexing, switching, and relaying of small size data units called cells. Limited ATM Wide Area Network (WAN) services are offered by Wiltel, AT&T, Sprint, and others. NASA is testing a pilot ATM WAN with a view to provide Program Support Communication Network services using ATM. ATM supports wide range of data rates and quality of service requirements. It is expected that ATM switches will penetrate campus networks as well. However, presently products in these areas are at various stages of development and standards are not yet complete. We examine development of ATM to help assess its role in the evolution of NEWIAN.

  11. The Importance, Design and Implementation of a Middleware for Networked Control Systems

    OpenAIRE

    Kim, Kyoung-Dae; Kumar, P.R.

    2009-01-01

    Due to the advancement of computing and communication technology, networked control systems may soon become prevalent in many control applications. While the capability of employing the communication network in the control loop certainly provides many benefits, it also raises several challenges which need to be overcome to utilize the benefits. In this chapter, we focus on one major challenge: a middleware framework that enables a networked control system to be implemented. Indeed our thesis ...

  12. A Survey of 5G Network: Architecture and Emerging Technologies

    National Research Council Canada - National Science Library

    Gupta, A; Jha, R. K

    2015-01-01

    .... This paper presents the results of a detailed survey on the fifth generation (5G) cellular network architecture and some of the key emerging technologies that are helpful in improving the architecture and meeting the demands of users...

  13. Cyber-physical system design with sensor networking technologies

    CERN Document Server

    Zeadally, Sherali

    2016-01-01

    This book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems to enable efficient, secure, reliable acquisition, management, and routing of data.

  14. Controllability of multiplex, multi-timescale networks

    CERN Document Server

    Pósfai, Márton; Cornelius, Sean P; Barabási, Albert-László; D'Souza, Raissa M

    2016-01-01

    The paradigm of layered networks is used to describe many real-world systems -- from biological networks, to social organizations and transportation systems. Recently there has been much progress in understanding the general properties of multilayer networks, our understanding of how to control such systems remains limited. One aspect that makes this endeavor challenging is that each layer can operate at a different timescale, thus we cannot directly apply standard ideas from structural control theory of individual networks. Here we address the problem of controlling multilayer and multi-timescale networks focusing on two-layer multiplex networks with one-to-one interlayer coupling. We investigate the case when the control signal is applied to the nodes of one layer. We develop a theory based on disjoint path covers to determine the minimum number of inputs ($N_\\T i$) necessary for full control. We show that if both layers operate on the same timescale then the network structure of both layers equally affect ...

  15. Mobile Network DoS Attack and Detection Technology

    Directory of Open Access Journals (Sweden)

    K. Krishnamoorthy

    2013-09-01

    Full Text Available Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management and mobile network security for various abnormal and malicious traffic technologies was not ready. So Malicious or potentially malicious traffic originating from mobile malware infected smart devices can cause serious problems to the 3G mobile networks, such as DoS and scanning attack in wired networks. This paper describes the DoS security threat in the 3G mobile network and proposes a detection technology.

  16. Application Research on Neural Network Predictive Control Technology in Aluminum Electolysis Process%铝电解过程神经网络预测控制技术应用研究

    Institute of Scientific and Technical Information of China (English)

    李界家; 吴成东; 李颖

    2011-01-01

    铝电解是非线性、时变、大时滞过程,受强电场、强磁场、强热场交互干扰,其控制难度大,耗能高.因此,节约电能,提高电流效率,提高铝的产量和质量是铝电解控制系统研究的热点问题.文中在分析铝电解过程工作特性及存在问题的基础上,提出了小波神经网络预测控制方法,该方法将神经网络控制技术与预测技术有机结合,通过对反映氧化铝浓度的槽电阻参数跟踪,实时调整控制器的控制策略,控制氧化铝下料装置下料量,使氧化铝浓度控制在理想值范围,并对系统的硬件和软件进行了设计.实验结果表明:该方法的有效性,具有良好的控制控制性能和节电效果,对提高铝的产量和质量具有重要意义.%Aluminum electrolysis is a non-linear,time-varying and a large time delay process,which interfered by the interaction of strong electric field,strong magnetic field and strong heat field. So.it is a high energy consumption process and the process control is very difficult. Therefore, the hot issue for the control system is how to save energy, improve the current efficiency, increase the yield and the quality of aluminum electrolysis. A wavelet neural network predictive control method was proposed which based on the analysis of characteristics and problems for the aluminum electrolysis process. The method combined the neural network control technology and forecasting techniques. By tracking the parameter of the cell resistance which reflects the alumina concentration, the controller regulates the control strategy on real-time to make the alumina concentration in an ideal range through controlling the alumina feeding quantity of the feeding device, and the system's hardware and software were designed . The experiment results show that the method has a good effective control performance and an energy-saving effect, and has an important significance of increasing the yield and quality of aluminum.

  17. Network Security in Remote Supervisory Control

    Institute of Scientific and Technical Information of China (English)

    黄振国

    2001-01-01

    After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end processor (FEP), encryption/decryption method and authentication protocol. Some other system-specific security measures are also proposed. Although these are examples only, the techniques discussed can also be used in and provide reference for other remote control systems.

  18. Portable control device for networked mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Feddema, John T. (Albuquerque, NM); Byrne, Raymond H. (Albuquerque, NM); Bryan, Jon R. (Edgewood, NM); Harrington, John J. (Albuquerque, NM); Gladwell, T. Scott (Albuquerque, NM)

    2002-01-01

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  19. Optical network control plane for multi-domain networking

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva

    This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic Engineer......This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic...... process are not enough for efficient TE in mesh multi-domain networks. Enhancing the protocol with multi-path dissemination capability, combined with the employment of an end-to-end TE metric proves to be a highly efficient solution. Simulation results show good performance characteristics of the proposed...... is not as essential for improved network performance as the length of the provided paths. Second, the issue of multi-domain survivability support is analyzed. An AS-disjoint paths is beneficial not only for resilience support, but also for facilitating adequate network reactions to changes in the network, which...

  20. Cognitive Heterogeneous Reconfigurable Optical Networks (CHRON): Enabling Technologies and Techniques

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso; Zibar, Darko; Guerrero Gonzalez, Neil;

    2011-01-01

    We present the approach of cognition applied to heterogeneous optical networks developed in the framework of the EU project CHRON: Cognitive Heterogeneous Reconfigurable Optical Network. We introduce and discuss in particular the technologies and techniques that will enable a cognitive optical ne...

  1. Spectral Control of Mobile Robot Networks

    CERN Document Server

    Zavlanos, Michael M; Jadbabaie, Ali

    2010-01-01

    The eigenvalue spectrum of the adjacency matrix of a network is closely related to the behavior of many dynamical processes run over the network. In the field of robotics, this spectrum has important implications in many problems that require some form of distributed coordination within a team of robots. In this paper, we propose a continuous-time control scheme that modifies the structure of a position-dependent network of mobile robots so that it achieves a desired set of adjacency eigenvalues. For this, we employ a novel abstraction of the eigenvalue spectrum by means of the adjacency matrix spectral moments. Since the eigenvalue spectrum is uniquely determined by its spectral moments, this abstraction provides a way to indirectly control the eigenvalues of the network. Our construction is based on artificial potentials that capture the distance of the network's spectral moments to their desired values. Minimization of these potentials is via a gradient descent closed-loop system that, under certain convex...

  2. Active Noise Feedback Control Using a Neural Network

    Directory of Open Access Journals (Sweden)

    Zhang Qizhi

    2001-01-01

    Full Text Available The active noise control (ANC is discussed. Many digital ANC systems often based on the filter-x algorithm for finite impulse response (FIR filter use adaptive filtering techniques. But if the primary noise path is nonlinear, the control system based on adaptive filter technology will be invalid. In this paper, an adaptive active nonlinear noise feedback control approach using a neural network is derived. The feedback control system drives a secondary signal to destructively interfere with the original noise to cut down the noise power. An on-line learning algorithm based on the error gradient descent method was proposed, and the local stability of closed loop system is proved using the discrete Lyapunov function. A nonlinear simulation example shows that the adaptive active noise feedback control method based on a neural network is very effective to the nonlinear noise control.

  3. Robust adaptive neural network control with supervisory controller

    Institute of Scientific and Technical Information of China (English)

    张天平; 梅建东

    2004-01-01

    The problem of direct adaptive neural network control for a class of uncertain nonlinear systems with unknown constant control gain is studied in this paper. Based on the supervisory control strategy and the approximation capability of multilayer neural networks (MNNs), a novel design scheme of direct adaptive neural network controller is proposed.The adaptive law of the adjustable parameter vector and the matrix of weights in the neural networks and the gain of sliding mode control term to adaptively compensate for the residual and the approximation error of MNNs is determined by using a Lyapunov method. The approach does not require the optimal approximation error to be square-integrable or the supremum of the optimal approximation error to be known. By theoretical analysis, the closed-loop control system is proven to be globally stable in the sense that all signals involved are bounded, with tracking error converging to zero.Simulation results demonstrate the effectiveness of the approach.

  4. A Network Access Control Framework for 6LoWPAN Networks

    Directory of Open Access Journals (Sweden)

    Amaro F. de Sousa

    2013-01-01

    Full Text Available Low power over wireless personal area networks (LoWPAN, in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes.

  5. Satellite Networks: Architectures, Applications, and Technologies

    Science.gov (United States)

    Bhasin, Kul (Compiler)

    1998-01-01

    Since global satellite networks are moving to the forefront in enhancing the national and global information infrastructures due to communication satellites' unique networking characteristics, a workshop was organized to assess the progress made to date and chart the future. This workshop provided the forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. Presentations on overview, state-of-the-art in research, development, deployment and applications and future trends on satellite networks are assembled.

  6. Control of Neuronal Network in Caenorhabditis elegans.

    Directory of Open Access Journals (Sweden)

    Rahul Badhwar

    Full Text Available Caenorhabditis elegans, a soil dwelling nematode, is evolutionarily rudimentary and contains only ∼ 300 neurons which are connected to each other via chemical synapses and gap junctions. This structural connectivity can be perceived as nodes and edges of a graph. Controlling complex networked systems (such as nervous system has been an area of excitement for mankind. Various methods have been developed to identify specific brain regions, which when controlled by external input can lead to achievement of control over the state of the system. But in case of neuronal connectivity network the properties of neurons identified as driver nodes is of much importance because nervous system can produce a variety of states (behaviour of the animal. Hence to gain insight on the type of control achieved in nervous system we implemented the notion of structural control from graph theory to C. elegans neuronal network. We identified 'driver neurons' which can provide full control over the network. We studied phenotypic properties of these neurons which are referred to as 'phenoframe' as well as the 'genoframe' which represents their genetic correlates. We find that the driver neurons are primarily motor neurons located in the ventral nerve cord and contribute to biological reproduction of the animal. Identification of driver neurons and its characterization adds a new dimension in controllability of C. elegans neuronal network. This study suggests the importance of driver neurons and their utility to control the behaviour of the organism.

  7. Advanced technologies for Mission Control Centers

    Science.gov (United States)

    Dalton, John T.; Hughes, Peter M.

    1991-01-01

    Advance technologies for Mission Control Centers are presented in the form of the viewgraphs. The following subject areas are covered: technology needs; current technology efforts at GSFC (human-machine interface development, object oriented software development, expert systems, knowledge-based software engineering environments, and high performance VLSI telemetry systems); and test beds.

  8. Structural controllability and controlling centrality of temporal networks.

    Science.gov (United States)

    Pan, Yujian; Li, Xiang

    2014-01-01

    Temporal networks are such networks where nodes and interactions may appear and disappear at various time scales. With the evidence of ubiquity of temporal networks in our economy, nature and society, it's urgent and significant to focus on its structural controllability as well as the corresponding characteristics, which nowadays is still an untouched topic. We develop graphic tools to study the structural controllability as well as its characteristics, identifying the intrinsic mechanism of the ability of individuals in controlling a dynamic and large-scale temporal network. Classifying temporal trees of a temporal network into different types, we give (both upper and lower) analytical bounds of the controlling centrality, which are verified by numerical simulations of both artificial and empirical temporal networks. We find that the positive relationship between aggregated degree and controlling centrality as well as the scale-free distribution of node's controlling centrality are virtually independent of the time scale and types of datasets, meaning the inherent robustness and heterogeneity of the controlling centrality of nodes within temporal networks.

  9. Trends in Energy Management Technology: BCS Integration Technologies - Open Communications Networking

    Energy Technology Data Exchange (ETDEWEB)

    Webster, Tom

    2002-09-18

    Our overall purpose in writing this series of articles is to provide Federal energy managers some basic informational tools to assist their decision making process relative to energy management systems design, specification, procurement, and energy savings potential. Since Federal buildings rely on energy management systems more than their commercial counterparts, it is important for energy practitioners to have a high level of knowledge and understanding of these complex systems. This is the second article in a series and will focus on building control system (BCS) networking fundamentals and an assessment of current approaches to open communications protocols. This is important because networking is a complex subject and the networks form the basic infrastructure for energy management functions and for integrating a wide variety of OEM equipment into a complete EMCIS. The first article [1] covered enabling technologies for emerging energy management systems. Future topics will concentrate on more practical aspects including applications software, product offerings, networking strategies, and case studies of actual installations. Please refer to the first article for a more complete overview of the purpose and background for this series.

  10. Application of Improved Fuzzy Controller in Networked Control System

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qian; GUO Xi-jin; WANG Zhen; TIAN Xi-lan

    2006-01-01

    Aiming at the problem of network-induced delay and data dropout in networked control system, an improved fuzzy controller is proposed in this paper. Considering the great influence of a controller on the performance of control system, an improved controller with a second order fuzzy controller and network-induced delay compensator being added to the basic fuzzy controller is proposed to realize self-regulation on-line. For this type of controller, neither plant model nor measurement of network delay is required. So it is capable of automatically adjusting quantified factor, proportional factor, and integral factor according to the control system error and its derivative. The design makes full use of the advantages of quickness in operation and reduction of steady state error because of its integral function. The controller has a good control effect on time-delay and can keep a better performance by self-regulation on-line in the network with data dropout and interference. It is good in quickness, adaptability, and robustness, which is favorable for controlling the long time-delay system.

  11. The network of global corporate control

    CERN Document Server

    Vitali, Stefania; Battiston, Stefano

    2011-01-01

    The structure of the control network of transnational corporations affects global market competition and financial stability. So far, only small national samples were studied and there was no appropriate methodology to assess control globally. We present the first investigation of the architecture of the international ownership network, along with the computation of the control held by each global player. We find that transnational corporations form a giant bow-tie structure and that a large portion of control flows to a small tightly-knit core of financial institutions. This core can be seen as an economic "super-entity" that raises new important issues both for researchers and policy makers.

  12. National 2000' GPS control network of China

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    An accurately unified national GPS network with more than 2500 stations, named "National 2000' GPS Control Network", signed the epoch 2000.0, has been established by integrating the existing six nationwide GPS networks of China set up by different departments with different objectives. This paper presents the characteristics of the existing GPS networks, summarizes the strategies in the integrated adjustment of the GPS network, including functional model, stochastic model as well as the adjustment principle modification. By modifying the adjustment strategies according to the characteristics of the existing GPS networks and under the support of the IGS stations, the accuracy of the integrated national GPS network is greatly improved. The datum differences among the sub networks disappear, the systematic error influences are weakened, and the effects of the outliers on the estimated coordinates and their variances are controlled. It is shown that the average standard deviation for the horizontal component is smaller than 1.0 cm, the vertical component is smaller than 2.0 cm, and the three-dimensional (3-D) position of geocenter coordinates is smaller than 3.0 cm. The exterior checking accuracy for the 3-D position is averagely better than 1.0 cm.

  13. Bit by bit control of nonlinear ecological and biological networks using Evolutionary Network Control

    Directory of Open Access Journals (Sweden)

    Alessandro Ferrarini

    2016-06-01

    Full Text Available Evolutionary Network Control (ENC has been first introduced in 2013 to effectively subdue network-like systems. ENC opposes the idea, very common in the scientific literature, that controllability of networks should be based on the identification of the set of driver nodes that can guide the system's dynamics, in other words on the choice of a subset of nodes that should be selected to be permanently controlled. ENC has proven to be effective in the global control (i.e. the focus is on mastery of the final state of network dynamics of linear and nonlinear networks, and in the local (i.e. the focus is on the step-by-step ascendancy of network dynamics control of linear networks. In this work, ENC is applied to the local control of nonlinear networks. Using the Lotka-Volterra model as a case study, I show here that ENC is capable of locally driving nonlinear networks as well, so that also intermediate steps (not only the final state are under our strict control. ENC can be readily applied to any kind of ecological, biological, economic and network-like system.

  14. Social Scholarship: Applying Social Networking Technologies to Research Practices

    Science.gov (United States)

    Greenhow, Christine

    2009-01-01

    Participatory web-based technologies have the potential to change the way scholars engage in scholarship. One reason Web 2.0 technologies, such as online social networking, are not widely integrated in PreK-12 and postsecondary education is the lack of modeling by educators. Their lack of research-based best practices limits the ability to…

  15. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  16. A source-controlled data center network model.

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  17. A source-controlled data center network model

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS. PMID:28328925

  18. Perception Neural Networks for Active Noise Control Systems

    Directory of Open Access Journals (Sweden)

    Wang Xiaoli

    2012-11-01

    Full Text Available In a response to a growing demand for environments of 70dB or less noise levels, many industrial sectors have focused with some form of noise control system. Active noise control (ANC has proven to be the most effective technology. This paper mainly investigates application of neural network on self-adaptation system in active noise control (ANC. An active silencing control system is made which adopts a motional feedback loudspeaker as not a noise controlling source but a detecting sensor. The working fundamentals and the characteristics of the motional feedback loudspeaker are analyzed in detail. By analyzing each acoustical path, identification based adaptive linear neural network is built. This kind of identifying method can be achieved conveniently. The estimated result of each sound channel matches well with its real sound character, respectively.

  19. Selective data collection in vehicular networks for traffic control applications

    CERN Document Server

    Płaczek, Bartłomiej

    2011-01-01

    Vehicular sensor network (VSN) is an emerging technology, which combines wireless communication offered by vehicular ad hoc networks (VANET) with sensing devices installed in vehicles. VSN creates a huge opportunity to extend the road-side sensor infrastructure of existing traffic control systems. The efficient use of the wireless communication medium is one of the basic issues in VSN applications development. This paper introduces a novel method of selective data collection for traffic control applications, which provides a significant reduction in data amounts transmitted through VSN. The underlying idea is to detect the necessity of data transfers on the basis of uncertainty determination of the traffic control decisions. According to the proposed approach, sensor data are transmitted from vehicles to the control node only at selected time moments. Data collected in VSN are processed using on-line traffic simulation technique, which enables traffic flow prediction, performance evaluation of control strateg...

  20. Frequency Transmission Control of Local Networked Control Systems Approach

    Directory of Open Access Journals (Sweden)

    O. Esquivel-Flores

    2012-08-01

    Full Text Available The use of Network Control Systems has been successful in the industry and therefore has opened several lines ofresearch. Control systems over a communication network include two important considerations, control andscheduling. Co-design strategies are focused on maintaining adequate control performance and maximize the level ofservice. Network scheduling is the main objective to resolve because through a balanced data load is possible tomaintain control performance in a desired level. This article reviews a scheduling strategy based on frequencytransition modeled as a linear subsystem, this control reconfigure on line the sensors’ periods. The case of study isthe control of a prototype helicopter and by numerical simulations it shows the effect of changing the transmissionfrequency.

  1. A novel MLP network implementation in CMOL technology

    OpenAIRE

    Abdalhossein Rezai; Parviz Keshavarzi; Reza Mahdiye

    2014-01-01

    Hybrid CMOS/nanodevice technology is a well-known candidate to extend the exponential Moor-Law progress of microelectronics beyond the 10-nm frontier. This paper presents and evaluates a novel method for synaptic weights implementation of artificial neural networks in CMOL technology, a hybrid CMOS/nanodevice technology. In this novel method, the analog property of the I–V characteristic of the nanodevice is utilized to implement each neuromorphic synaptic weight. Each synaptic weight is also...

  2. Digital video technologies and their network requirements

    Energy Technology Data Exchange (ETDEWEB)

    R. P. Tsang; H. Y. Chen; J. M. Brandt; J. A. Hutchins

    1999-11-01

    Coded digital video signals are considered to be one of the most difficult data types to transport due to their real-time requirements and high bit rate variability. In this study, the authors discuss the coding mechanisms incorporated by the major compression standards bodies, i.e., JPEG and MPEG, as well as more advanced coding mechanisms such as wavelet and fractal techniques. The relationship between the applications which use these coding schemes and their network requirements are the major focus of this study. Specifically, the authors relate network latency, channel transmission reliability, random access speed, buffering and network bandwidth with the various coding techniques as a function of the applications which use them. Such applications include High-Definition Television, Video Conferencing, Computer-Supported Collaborative Work (CSCW), and Medical Imaging.

  3. Gigabit network technology. Final technical report

    Energy Technology Data Exchange (ETDEWEB)

    Davenport, C.M.C. [ed.

    1996-10-01

    Current digital networks are evolving toward distributed multimedia with a wide variety of applications with individual data rates ranging from kb/sec to tens and hundreds of Mb/sec. Link speed requirements are pushing into the Gb/sec range and beyond the envelop of electronic networking capabilities. There is a vast amount of untapped bandwidth available in the low-attenuation communication bands of an optical fiber. The capacity in one fiber thread is enough to carry more than two thousand times as much information as all the current radio and microwave frequencies. And while fiber optics has replaced copper wire as the transmission medium of choice, the communication capacity of conventional fiber optic networks is ultimately limited by electronic processing speeds.

  4. Blog and social networks: an analysis from the governmentality technologies and gender

    Directory of Open Access Journals (Sweden)

    Georgina Remondino

    2012-11-01

    Full Text Available Currently, the explosion of personal blogs, social networking and other devices and software show how certain practices that were considered exclusives of intimate and private spheres, are now enrolled in the public space of the screen. Based on this scene, in this article we consider that these technologies work as technologies of the self and as control technologies, in the sense proposed by Foucault (1990. They mediate forms of self government in their public presentation modes, while play as control technologies of the others. Technological conditions also are imposed on the possible interactions and contribute to different modes of governance of feelings and specific forms of gender performativización. In this paper we analyze these categories and share some reflections from a case of study with young women consumers of blogs and social networks in the city of Córdoba.

  5. Model Predictive Control of Sewer Networks

    Science.gov (United States)

    Pedersen, Einar B.; Herbertsson, Hannes R.; Niemann, Henrik; Poulsen, Niels K.; Falk, Anne K. V.

    2017-01-01

    The developments in solutions for management of urban drainage are of vital importance, as the amount of sewer water from urban areas continues to increase due to the increase of the world’s population and the change in the climate conditions. How a sewer network is structured, monitored and controlled have thus become essential factors for effcient performance of waste water treatment plants. This paper examines methods for simplified modelling and controlling a sewer network. A practical approach to the problem is used by analysing simplified design model, which is based on the Barcelona benchmark model. Due to the inherent constraints the applied approach is based on Model Predictive Control.

  6. Nonlinear System Control Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Jaroslava Žilková

    2006-10-01

    Full Text Available The paper is focused especially on presenting possibilities of applying off-linetrained artificial neural networks at creating the system inverse models that are used atdesigning control algorithm for non-linear dynamic system. The ability of cascadefeedforward neural networks to model arbitrary non-linear functions and their inverses isexploited. This paper presents a quasi-inverse neural model, which works as a speedcontroller of an induction motor. The neural speed controller consists of two cascadefeedforward neural networks subsystems. The first subsystem provides desired statorcurrent components for control algorithm and the second subsystem providescorresponding voltage components for PWM converter. The availability of the proposedcontroller is verified through the MATLAB simulation. The effectiveness of the controller isdemonstrated for different operating conditions of the drive system.

  7. Applying Distributed Object Technology to Distributed Embedded Control Systems

    DEFF Research Database (Denmark)

    Jørgensen, Bo Nørregaard; Dalgaard, Lars

    2012-01-01

    In this paper, we describe our Java RMI inspired Object Request Broker architecture MicroRMI for use with networked embedded devices. MicroRMI relieves the software developer from the tedious and error-prone job of writing communication protocols for interacting with such embedded devices. MicroR...... in developing control systems for distributed embedded platforms possessing severe resource restrictions.......RMI supports easy integration of high-level application specific control logic with low-level device specific control logic. Our experience from applying MicroRMI in the context of a distributed robotics control application, clearly demonstrates that it is feasible to use distributed object technology...

  8. 长江干线D级GPS控制网的布设和数据处理%Construction and Data Processing of D-evel Control Network with GPS Technology along Yangtze River Trunk

    Institute of Scientific and Technical Information of China (English)

    张建春

    2009-01-01

    长江沿线的控制测量是进行流域规划和港口建设的基础性工作.由于涉及长距离测量和跨河测量,测量精度要求高,因此,常规的三角网、三边网工作量难以完成长江干线大规模的测量任务.GPS技术具有精度高、测量速度快、进行跨带测量简单的特点,通过实际测量工作,探索GPS技术在长江干线D级控制网建设中的应用及测量布设方案和数据处理方法.实践表明,测量结果完全达到国家标准.%Control surveying along the Yangtze River is a basic work of basin planning and port construction. As it is a long-distance and river-crossing measurement, needing the high precision, the conventional triangulation and trilateration methods can hardly complete the large-scale measurement work along the Yangtze trunk. The GPS technology posseses the characteristics such as high accuracy and fast measuring speed,and is easy and convenient for cross-measurement. Through the actual measurement, the application of GPS technology in D-level control of network along the Yangtze trunk, the proposal of measurement layout and the data processing methods are explored. It is proved by the practice that the measuring results are complying with the national standards completely.

  9. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  10. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  11. Scheduled Controller Design of Congestion Control Considering Network Resource Constraints

    Science.gov (United States)

    Naito, Hiroyuki; Azuma, Takehito; Fujita, Masayuki

    In this paper, we consider a dynamical model of computer networks and derive a synthesis method for congestion control. First, we show a model of TCP/AQM (Transmission Control Protocol/Active Queue Management) as a dynamical model of computer networks. The dynamical model of TCP/AQM networks consists of models of TCP window size, queue length and AQM mechanisms. Second, we propose to describe the dynamical model of TCP/AQM networks as linear systems with self-scheduling parameters, which also depend on information delay. Here we focus on the constraints on the maximum queue length and TCP window-size, which are the network resources in TCP/AQM networks. We derive TCP/AQM networks as the LPV system (linear parameter varying system) with information delay and self-scheduling parameter. We design a memoryless state feedback controller of the LPV system based on a gain-scheduling method. Finally, the effectiveness of the proposed method is evaluated by using MATLAB and the well-known ns-2 (Network Simulator Ver.2) simulator.

  12. Online Delay-Evaluation Control for Networked Control Systems

    Institute of Scientific and Technical Information of China (English)

    马向华; 魏震; 谢剑英

    2003-01-01

    This paper presented an evaluation approach of time delays for networked control systems (NCS). Animproved scheme based on optimal LQG control was designed to achieve desired performance despite the uncertaindelays in the system. The experimental results illustrate the effectiveness of the proposed control design and satis-factory performance of the closed-loop system.

  13. Decentralized control of ecological and biological networks through Evolutionary Network Control

    Directory of Open Access Journals (Sweden)

    Alessandro Ferrarini

    2016-09-01

    Full Text Available Evolutionary Network Control (ENC has been recently introduced to allow the control of any kind of ecological and biological networks, with an arbitrary number of nodes and links, acting from inside and/or outside. To date, ENC has been applied using a centralized approach where an arbitrary number of network nodes and links could be tamed. This approach has shown to be effective in the control of ecological and biological networks. However a decentralized control, where only one node and the correspondent input/output links are controlled, could be more economic from a computational viewpoint, in particular when the network is very large (i.e. big data. In this view, ENC is upgraded here to realize the decentralized control of ecological and biological nets.

  14. Linear control theory for gene network modeling.

    Science.gov (United States)

    Shin, Yong-Jun; Bleris, Leonidas

    2010-09-16

    Systems biology is an interdisciplinary field that aims at understanding complex interactions in cells. Here we demonstrate that linear control theory can provide valuable insight and practical tools for the characterization of complex biological networks. We provide the foundation for such analyses through the study of several case studies including cascade and parallel forms, feedback and feedforward loops. We reproduce experimental results and provide rational analysis of the observed behavior. We demonstrate that methods such as the transfer function (frequency domain) and linear state-space (time domain) can be used to predict reliably the properties and transient behavior of complex network topologies and point to specific design strategies for synthetic networks.

  15. network externalities into the technology acceptance model

    NARCIS (Netherlands)

    Song, Michael; Parry, Mark E.; Kawakami, Tomoko

    2009-01-01

    Research on network externalities has identified a number of product categories in which the market performance of an innovation (e.g., unit sales and revenues) is an increasing function of that innovation's installed base and the availability of complementary products. Innovation scholars have attr

  16. Future networks and technologies supporting innovative communications

    DEFF Research Database (Denmark)

    Prasad, Ramjee

    2012-01-01

    Within a fully interconnected world, the distinct relationship between end users, consumers and providers rapidly changes towards a scenario of collaboration and competition of multiple parties within one system. ‘Convergence’, ‘ubiquitous’ and ‘smart’ are key words describing future networks...

  17. Color control of printers by neural networks

    Science.gov (United States)

    Tominaga, Shoji

    1998-07-01

    A method is proposed for solving the mapping problem from the 3D color space to the 4D CMYK space of printer ink signals by means of a neural network. The CIE-L*a*b* color system is used as the device-independent color space. The color reproduction problem is considered as the problem of controlling an unknown static system with four inputs and three outputs. A controller determines the CMYK signals necessary to produce the desired L*a*b* values with a given printer. Our solution method for this control problem is based on a two-phase procedure which eliminates the need for UCR and GCR. The first phase determines a neural network as a model of the given printer, and the second phase determines the combined neural network system by combining the printer model and the controller in such a way that it represents an identity mapping in the L*a*b* color space. Then the network of the controller part realizes the mapping from the L*a*b* space to the CMYK space. Practical algorithms are presented in the form of multilayer feedforward networks. The feasibility of the proposed method is shown in experiments using a dye sublimation printer and an ink jet printer.

  18. Evolution of Wireless Sensor Networks for Industrial Control

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2013-05-01

    Full Text Available Technologies evolve in a process of gradual scientific change, but the commercial application of technologies is discontinuous. Managers interested in technology evolution can integrate these contrasting ideas using a powerful theoretical framework, based on the concept of punctuated equilibrium from evolutionary biology. The framework, which enables the differentiation of the technical evolution of a technology from its market application, is used in this article to compare the two standards for wireless sensor networks (WSN for industrial instrumentation and control: WirelessHART and ISA100.11a. The two WSN standards are the product of two different market contexts, which have selected different minimum viable technologies for evolution in their respective niches. Network security issues present some important selection criteria. Both WSN standards implement security countermeasures against localized wireless network attacks based on the application of the AES encryption standard, but some specific security threats – some local, others remotely launched – are only well-defended by the adoption of public-key cryptographic (PKC protocols, which only ISA100.11a supports. This article concludes that the mainstream market potential of the Internet has influenced the evolution of ISA100.11a and will continue to demand that each WSN standard evolve in ways that are difficult to predict.

  19. Rethinking agency and medical adherence technology: applying Actor Network Theory to the case study of Digital Pills.

    Science.gov (United States)

    Hurtado-de-Mendoza, Alejandra; Cabling, Mark L; Sheppard, Vanessa B

    2015-12-01

    Much literature surrounding medical technology and adherence posits that technology is a mechanism for social control. This assumes that the medical establishment can take away patients' agency. Although power relationships and social control can play a key role, medical technology can also serve as an agentive tool to be utilized. We (1) offer the alternative framework of Actor Network Theory to view medical technology, (2) discuss the literature on medication adherence and technology, (3) delve into the ramifications of looking at adherence as a network and (4) use Digital Pills as a case study of dispersed agency.

  20. A Network Analysis Model for Selecting Sustainable Technology

    Directory of Open Access Journals (Sweden)

    Sangsung Park

    2015-09-01

    Full Text Available Most companies develop technologies to improve their competitiveness in the marketplace. Typically, they then patent these technologies around the world in order to protect their intellectual property. Other companies may use patented technologies to develop new products, but must pay royalties to the patent holders or owners. Should they fail to do so, this can result in legal disputes in the form of patent infringement actions between companies. To avoid such situations, companies attempt to research and develop necessary technologies before their competitors do so. An important part of this process is analyzing existing patent documents in order to identify emerging technologies. In such analyses, extracting sustainable technology from patent data is important, because sustainable technology drives technological competition among companies and, thus, the development of new technologies. In addition, selecting sustainable technologies makes it possible to plan their R&D (research and development efficiently. In this study, we propose a network model that can be used to select the sustainable technology from patent documents, based on the centrality and degree of a social network analysis. To verify the performance of the proposed model, we carry out a case study using actual patent data from patent databases.

  1. Stability of singular networked control systems with control constraint

    Institute of Scientific and Technical Information of China (English)

    Qiu Zhanzhi; Zhang Qingling; Zhao Zhiwu

    2007-01-01

    Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system.Using the Lyapunov theory and the linear matrix inequality approach, the criteria for delay-independent stability and delay-dependent stability of singular networked control systems are derived and transformed to a feasibility problem of linear matrix inequality formulation, which can be solved by the Matlab LMI toolbox, and the feasible solutions provide the maximum allowable delay bound that makes the system stable.A numerical example is provided, which shows that the analysis method is valid and the stability criteria are feasible.

  2. The APS control system network upgrade.

    Energy Technology Data Exchange (ETDEWEB)

    Sidorowicz, K. v.; Leibfritz, D.; McDowell, W. P.

    1999-10-22

    When it was installed,the Advanced Photon Source (APS) control system network was at the state-of-the-art. Different aspects of the system have been reported at previous meetings [1,2]. As loads on the controls network have increased due to newer and faster workstations and front-end computers, we have found performance of the system declining and have implemented an upgraded network. There have been dramatic advances in networking hardware in the last several years. The upgraded APS controls network replaces the original FDDI backbone and shared Ethernet hubs with redundant gigabit uplinks and fully switched 10/100 Ethernet switches with backplane fabrics in excess of 20 Gbits/s (Gbps). The central collapsed backbone FDDI concentrator has been replaced with a Gigabit Ethernet switch with greater than 30 Gbps backplane fabric. Full redundancy of the system has been maintained. This paper will discuss this upgrade and include performance data and performance comparisons with the original network.

  3. Toward controlling perturbations in robotic sensor networks

    Science.gov (United States)

    Banerjee, Ashis G.; Majumder, Saikat R.

    2014-06-01

    Robotic sensor networks (RSNs), which consist of networks of sensors placed on mobile robots, are being increasingly used for environment monitoring applications. In particular, a lot of work has been done on simultaneous localization and mapping of the robots, and optimal sensor placement for environment state estimation1. The deployment of RSNs, however, remains challenging in harsh environments where the RSNs have to deal with significant perturbations in the forms of wind gusts, turbulent water flows, sand storms, or blizzards that disrupt inter-robot communication and individual robot stability. Hence, there is a need to be able to control such perturbations and bring the networks to desirable states with stable nodes (robots) and minimal operational performance (environment sensing). Recent work has demonstrated the feasibility of controlling the non-linear dynamics in other communication networks like emergency management systems and power grids by introducing compensatory perturbations to restore network stability and operation2. In this paper, we develop a computational framework to investigate the usefulness of this approach for RSNs in marine environments. Preliminary analysis shows promising performance and identifies bounds on the original perturbations within which it is possible to control the networks.

  4. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... FOUNDATION Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010 Strategic Plan--URL Correction AGENCY: The National Coordination Office (NCO) for Networking and Information... Coordination Office for Networking and Information Technology Research and Development (NITRD)...

  5. Networks dynamics in the case of emerging technologies

    Energy Technology Data Exchange (ETDEWEB)

    Rotolo, D

    2016-07-01

    This research in progress aims at increasing our understanding of how collaborative networks form, evolve and are configured in the case of emerging technologies. The architecture of the relationships among the variety of organisational actors involved in the emergence process exerts a significant influence in shaping technological change in certain directions rather than others, especially in the early stage of emergence. As a result, socially optimal or desirable technological trajectories may be ‘opportunistically’ rejected. Our empirical analysis is based on a case-study of an emerging medical technology, namely ‘microneedles’. On the basis of co-authorship data reported in 1,943 publications on the topic from 1990 to 2014, longitudinal collaboration (co-authorship) networks were built at two levels: affiliation and author. We examined the dynamics of co-authorship networks by building on recent methodological advancements in network analysis, i.e. Exponential Random Graph Models (ERGMs). These models enable us to make statistical inferences about on the extent to which a network configuration occurs more than could be expected by chance and to identify which social mechanisms may be shaping the network in certain configurations. The findings of the statistical analyses (currently in progress) combined with the qualitative understanding of the case will increase our understanding of which mechanisms are more likely to drive the network dynamics in the case of emerging technologies. These include evidence of the extent to which the likelihood of forming, maintaining, or terminating ties among actors (authors or affiliations) is affected by actors’ covariates such as types of organisations, diversity/specialisation of the research undertaken, and status. These findings have potential to provide important inputs for policymaking process in the case of emerging technologies. (Author)

  6. Converging Redundant Sensor Network Information for Improved Building Control

    Energy Technology Data Exchange (ETDEWEB)

    Dale Tiller; D. Phil; Gregor Henze; Xin Guo

    2007-09-30

    This project investigated the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point could improve system performance. Phase I of the project focused on instrumentation and data collection. During the initial project phase, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Phase II of the project demonstrated that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. This phase also established that analysis algorithms could be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications. In Phase III of the project, the sensor network from Phase I was complemented by a control strategy developed based on the results from the first two project phases: this controller was implemented in a small sample of work areas, and applied to lighting control. Two additional technologies were developed in the course of completing the project. A prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy was designed and implemented. A new capability that enables occupancy sensors in a sensor network to dynamically set the 'time delay' interval based on ongoing occupant behavior in the space was also designed and implemented.

  7. Home Network Technologies and Automating Demand Response

    Energy Technology Data Exchange (ETDEWEB)

    McParland, Charles

    2009-12-01

    Over the past several years, interest in large-scale control of peak energy demand and total consumption has increased. While motivated by a number of factors, this interest has primarily been spurred on the demand side by the increasing cost of energy and, on the supply side by the limited ability of utilities to build sufficient electricity generation capacity to meet unrestrained future demand. To address peak electricity use Demand Response (DR) systems are being proposed to motivate reductions in electricity use through the use of price incentives. DR systems are also be design to shift or curtail energy demand at critical times when the generation, transmission, and distribution systems (i.e. the 'grid') are threatened with instabilities. To be effectively deployed on a large-scale, these proposed DR systems need to be automated. Automation will require robust and efficient data communications infrastructures across geographically dispersed markets. The present availability of widespread Internet connectivity and inexpensive, reliable computing hardware combined with the growing confidence in the capabilities of distributed, application-level communications protocols suggests that now is the time for designing and deploying practical systems. Centralized computer systems that are capable of providing continuous signals to automate customers reduction of power demand, are known as Demand Response Automation Servers (DRAS). The deployment of prototype DRAS systems has already begun - with most initial deployments targeting large commercial and industrial (C & I) customers. An examination of the current overall energy consumption by economic sector shows that the C & I market is responsible for roughly half of all energy consumption in the US. On a per customer basis, large C & I customers clearly have the most to offer - and to gain - by participating in DR programs to reduce peak demand. And, by concentrating on a small number of relatively

  8. An analysis of communications and networking technologies for the smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Hernandez, Joaquin [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2013-03-01

    The Smart Grid concept has been foreseen as the integration of the electrical generation, transmission and distribution network and the data communications network. Although, traditional communications interfaces, protocols and standards has been used in the electrical grid in an isolated manner, modern communications network is considered as the fundamental enabling technology within the future Smart Grid. Modern communications technologies, protocol architectures and standards can help to build a common communications network infrastructure for data transport between customer premises, power substations, and power distribution systems, utility control centers and utility data centers. The Smart Grid will support traditional applications such as SCADA, distribution automation (DA), energy management systems (EMS), demand site management (DSM) and automatic meter reading (AMR), etc., as well as new applications like advanced metering infrastructure (AMI), substation automation (SA), microgrids, distributed generation, grid monitoring and control, data storage and analysis, among others. To make this possible, the Smart Grid requires a two-way wide area communications network between different dispersed areas, from generation, to distribution to consumer premises. In fact, it will consist of many different types of communications networks such as wide area networks, local area network, home area networks, etc. This requires a new architectural approach to implement a common communications infrastructure that provides the reliability, scalability, security and interoperability to support multiple applications. In addition, open standards addressing interoperability, are key for the development and deployment of the Smart Grid as a true integrated network. A communications backbone is necessary to provide interoperability. To achieve the level of networking, interoperability and security that meets the technical requirements of the Smart Grid, its data communications

  9. Transcriptional network control of normal and leukaemic haematopoiesis.

    Science.gov (United States)

    Sive, Jonathan I; Göttgens, Berthold

    2014-12-10

    Transcription factors (TFs) play a key role in determining the gene expression profiles of stem/progenitor cells, and defining their potential to differentiate into mature cell lineages. TF interactions within gene-regulatory networks are vital to these processes, and dysregulation of these networks by TF overexpression, deletion or abnormal gene fusions have been shown to cause malignancy. While investigation of these processes remains a challenge, advances in genome-wide technologies and growing interactions between laboratory and computational science are starting to produce increasingly accurate network models. The haematopoietic system provides an attractive experimental system to elucidate gene regulatory mechanisms, and allows experimental investigation of both normal and dysregulated networks. In this review we examine the principles of TF-controlled gene regulatory networks and the key experimental techniques used to investigate them. We look in detail at examples of how these approaches can be used to dissect out the regulatory mechanisms controlling normal haematopoiesis, as well as the dysregulated networks associated with haematological malignancies.

  10. Remote controlled gate controller using a GSM network and Arduino platform

    Directory of Open Access Journals (Sweden)

    Pospisilik Martin

    2016-01-01

    Full Text Available Most remote controllers for entrance gates operate on free frequencies 433 or 868 MHz. However, this technology limits the user comfort, as it is usually not common that bi-directional communication is established. A higher comfort of controlling the entrance gates can be achieved by employing the GSM network for transmission of commands and messages between the gate controller and the user. In this case, only a conventional GSM cellular phone is needed to control the gate. A description of such a controller based on the GSM module and Arduino controller is provided in this paper.

  11. Adapting Wireless Technology to Lighting Control and Environmental Sensing

    Energy Technology Data Exchange (ETDEWEB)

    Dana Teasdale; Francis Rubinstein; Dave Watson; Steve Purdy

    2005-10-01

    The high cost of retrofitting buildings with advanced lighting control systems is a barrier to adoption of this energy-saving technology. Wireless technology, however, offers a solution to mounting installation costs since it requires no additional wiring to implement. To demonstrate the feasibility of such a system, a prototype wirelessly-controlled advanced lighting system was designed and built. The system includes the following components: a wirelessly-controllable analog circuit module (ACM), a wirelessly-controllable electronic dimmable ballast, a T8 3-lamp fixture, an environmental multi-sensor, a current transducer, and control software. The ACM, dimmable ballast, multi-sensor, and current transducer were all integrated with SmartMesh{trademark} wireless mesh networking nodes, called motes, enabling wireless communication, sensor monitoring, and actuator control. Each mote-enabled device has a reliable communication path to the SmartMesh Manager, a single board computer that controls network functions and connects the wireless network to a PC running lighting control software. The ACM is capable of locally driving one or more standard 0-10 Volt electronic dimmable ballasts through relay control and a 0-10 Volt controllable output. The mote-integrated electronic dimmable ballast is designed to drive a standard 3-lamp T8 light fixture. The environmental multi-sensor measures occupancy, light level and temperature. The current transducer is used to measure the power consumed by the fixture. Control software was developed to implement advanced lighting algorithms, including daylight ramping, occupancy control, and demand response. Engineering prototypes of each component were fabricated and tested in a bench-scale system. Based on standard industry practices, a cost analysis was conducted. It is estimated that the installation cost of a wireless advanced lighting control system for a retrofit application is at least 30% lower than a comparable wired system for

  12. Model Predictive Control of Sewer Networks

    DEFF Research Database (Denmark)

    Pedersen, Einar B.; Herbertsson, Hannes R.; Niemann, Henrik;

    2016-01-01

    The developments in solutions for management of urban drainage are of vital importance, as the amount of sewer water from urban areas continues to increase due to the increase of the world’s population and the change in the climate conditions. How a sewer network is structured, monitored...... and controlled have thus become essential factors for efficient performance of waste water treatment plants. This paper examines methods for simplified modelling and controlling a sewer network. A practical approach to the problem is used by analysing simplified design model, which is based on the Barcelona...

  13. Stochastic Congestion Control in Wireless Sensor Networks

    Science.gov (United States)

    Kim, Hyung Seok; Lee, Seok; Kim, Namhoon

    In this paper, an effective congestion control algorithm is proposed to increase the end-to-end delivery success ratio of upstream traffic by reduction of buffer drop probabilities and their deviation in wireless sensor networks. According to the queue length of parent and child nodes, each child node chooses one of the parents as the next hop to the sink and controls the delay before transmission begins. It balances traffics among parents and mitigates congestion based on congestion level of a node. Simulation results show that the proposed algorithm reduces buffer drop probabilities and their deviation and increases the end-to-end delivery success ratio in wireless sensor networks.

  14. Networks and network resources in technological innovation systems : Towards a conceptual framework for system building

    NARCIS (Netherlands)

    Musiolik, J.; Markard, J.; Hekkert, M.P.

    2012-01-01

    Previous research has shown that formal networks can play a crucial role in the formation of technological innovation systems (TIS). Firms and other actors collaborate in formal networks not only to generate new knowledge but also to strategically create and shape supportive system resources such as

  15. Technology Licensing Strategy for Network Product in a Service Industry

    Directory of Open Access Journals (Sweden)

    Xianpei Hong

    2015-01-01

    Full Text Available Technology licensing has gained significant attention in literature and practice as a rapid and effective way to improve firm’s capability of technology innovation. In this paper, we investigate a duopolistic service provider competition market, where service providers develop and sell a kind of network product. In this setting, we analyze the innovating service provider’s four licensing strategies: no licensing, fixed fee licensing, royalty licensing, and two-part tariff licensing. The literature suggests that when the network products can be completely substituted, two-part tariff licensing is the optimal strategy of the innovating service provider. We find that when the network products cannot be completely substituted, two-part tariff licensing is not always optimal. The degree of the product differentiation, the intensity of the network effects, and the R&D cost of the potential licensee play a key role in determining the innovating service provider’s optimal licensing strategies.

  16. 76 FR 23812 - Reliability and Continuity of Communications Networks, Including Broadband Technologies; Effects...

    Science.gov (United States)

    2011-04-28

    ... COMMISSION Reliability and Continuity of Communications Networks, Including Broadband Technologies; Effects on Broadband Communications Networks of Damage or Failure of Network Equipment or Severe Overload; Independent Panel Reviewing the Impact of Hurricane Katrina on Communications Networks AGENCY:...

  17. Optimal Control of Gene Regulatory Networks with Effectiveness of Multiple Drugs: A Boolean Network Approach

    Science.gov (United States)

    Kobayashi, Koichi; Hiraishi, Kunihiko

    2013-01-01

    Developing control theory of gene regulatory networks is one of the significant topics in the field of systems biology, and it is expected to apply the obtained results to gene therapy technologies in the future. In this paper, a control method using a Boolean network (BN) is studied. A BN is widely used as a model of gene regulatory networks, and gene expression is expressed by a binary value (0 or 1). In the control problem, we assume that the concentration level of a part of genes is arbitrarily determined as the control input. However, there are cases that no gene satisfying this assumption exists, and it is important to consider structural control via external stimuli. Furthermore, these controls are realized by multiple drugs, and it is also important to consider multiple effects such as duration of effect and side effects. In this paper, we propose a BN model with two types of the control inputs and an optimal control method with duration of drug effectiveness. First, a BN model and duration of drug effectiveness are discussed. Next, the optimal control problem is formulated and is reduced to an integer linear programming problem. Finally, numerical simulations are shown. PMID:24058904

  18. Observability of Boolean multiplex control networks

    Science.gov (United States)

    Wu, Yuhu; Xu, Jingxue; Sun, Xi-Ming; Wang, Wei

    2017-04-01

    Boolean multiplex (multilevel) networks (BMNs) are currently receiving considerable attention as theoretical arguments for modeling of biological systems and system level analysis. Studying control-related problems in BMNs may not only provide new views into the intrinsic control in complex biological systems, but also enable us to develop a method for manipulating biological systems using exogenous inputs. In this article, the observability of the Boolean multiplex control networks (BMCNs) are studied. First, the dynamical model and structure of BMCNs with control inputs and outputs are constructed. By using of Semi-Tensor Product (STP) approach, the logical dynamics of BMCNs is converted into an equivalent algebraic representation. Then, the observability of the BMCNs with two different kinds of control inputs is investigated by giving necessary and sufficient conditions. Finally, examples are given to illustrate the efficiency of the obtained theoretical results.

  19. DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK

    Directory of Open Access Journals (Sweden)

    Sangita Samajpati

    2013-02-01

    Full Text Available This paper is based on Wavelength Division Multiplexing (WDM optical networking. In this optical networking, prior to data transfer, lightpath establishment between source and destination nodes is usually carried out through a wavelength reservation protocol. This wavelength is reserved corresponding to a route between the source and destination and the route is chosen following any standard routing protocol based on shortest path. The backward reservation protocol is implemented initially. A fixed connected and weighted network is considered. The inputs of this implementation are the fixed network itself and its corresponding shortest path matrix. After this initial level of implementation, the average node usage over a time period is calculated and various thresholds for node usage are considered. Above threshold value, request arriving at that path selects its next shortest path. This concept is implemented on various wavelengths. The output represents the performance issues of dynamic congestion control.

  20. The Integrated Control-Mechanism in ATM-Based Networks

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Survivability is one of the important issues in ATM-based networks since even a single network element failure may cause a serious data loss. This paper introduces a new restoration mechanism based on multi-layer ATM survivable network management architecture. This mechanism integrates the general control and restoration control by establishing the Working VPs logical network, Backup VPs logical network and spare logical network in order to optimally utilize the network resources while maintaining the restoration requirements.

  1. [Diesel emission control technologies: a review].

    Science.gov (United States)

    He, Hong; Weng, Duan; Zi, Xin-Yun

    2007-06-01

    The authors reviewed the researches on diesel emission control for both new engine technologies and aftertreatment technologies. Emphases were focused on the recent advancements of the diesel particulate filter (DPF) and the selective catalytic reduction (SCR) of NO(x). In addition, it was explored for the future development in this field.

  2. KEY TECHNOLOGY IN INTELLIGENT CONTROL FOR SHEET METAL DEEP DRAWING

    Institute of Scientific and Technical Information of China (English)

    罗亚军; 赵军; 何丹农; 张永清

    2001-01-01

    Intellectualization of sheet metal in deep drawing is a new combined technology, which is concerned with control science and computer science and sheet metal forming theory. The intelligent control system for sheet metal deep drawing consists of four fundamental factors: real-time measurement, identification, prediction and control. Real-time identification of material properties and friction coefficient is the most important factor in the whole system. An artificial neural network model for identification of the material properties and friction coefficient was established according to deep drawing characteristics and more automation. The identification of the material properties and friction coefficient was realized.

  3. Site-specific weed control technologies

    DEFF Research Database (Denmark)

    Christensen, S; Søgaard, H T; Kudsk, P

    2009-01-01

    Site-specific weed control technologies are defined as machinery or equipment embedded with technologies that detect weeds growing in a crop and, taking into account predefined factors such as economics, takes action to maximise the chances of successfully controlling them. In the article, we...... describe the basic parts of site specific weed control technologies, comprising of weed sensing systems, weed management models and precision weed control implements. A review of state-of-the-art technologies shows that several weed sensing systems and precision implements have been developed over the last...... two decades, though barriers prevent their breakthrough. Most important among these is the lack of a truly robust weed recognition method, owing to mutual shading among plants and limitations in the capacity of highly accurate spraying and weeding apparatuses.   Another barrier is the lack...

  4. TECHNOLOGICAL OPTIONS FOR ACID RAIN CONTROL

    Science.gov (United States)

    Discussed are acid rain control options available to the electric utility industry. They include coal switching, flue gas desulfurization, and such emerging lower cost technologies as Limestone Injection Multistage Burners (LIMB) and Advanced Silicate (ADVACATE), both developed ...

  5. TECHNOLOGICAL OPTIONS FOR ACID RAIN CONTROL

    Science.gov (United States)

    Discussed are acid rain control options available to the electric utility industry. They include coal switching, flue gas desulfurization, and such emerging lower cost technologies as Limestone Injection Multistage Burners (LIMB) and Advanced Silicate (ADVACATE), both developed ...

  6. Current submarine atmosphere control technology.

    Science.gov (United States)

    Mazurek, W

    1998-01-01

    Air purification in submarines was introduced towards the end of World War II and was limited to the use of soda lime for the removal of carbon dioxide and oxygen candles for the regeneration of oxygen. The next major advances came with the advent of nuclear-powered submarines. These included the development of regenerative and, sometimes, energy-intensive processes for comprehensive atmosphere revitalization. With the present development of conventional submarines using air-independent propulsion there is a requirement for air purification similar to that of the nuclear-powered submarines but it is constrained by limited power and space. Some progress has been made in the development of new technology and the adoption of air purification equipment used in the nuclear-powered submarines for this application.

  7. Feedback Controller Design for the Synchronization of Boolean Control Networks.

    Science.gov (United States)

    Liu, Yang; Sun, Liangjie; Lu, Jianquan; Liang, Jinling

    2016-09-01

    This brief investigates the partial and complete synchronization of two Boolean control networks (BCNs). Necessary and sufficient conditions for partial and complete synchronization are established by the algebraic representations of logical dynamics. An algorithm is obtained to construct the feedback controller that guarantees the synchronization of master and slave BCNs. Two biological examples are provided to illustrate the effectiveness of the obtained results.

  8. Disruptive technologies and networking in telecom industries

    OpenAIRE

    Madsen, Erik Strøjer; Hartington, Simon

    2015-01-01

    This article discuss’ how economics of scale in supply and demand in the telecommunication industry has developed and how this has had great effect on the widespread usage and popularity of smart phones. By using this as a theoretical ground the paper looks into technical innovation in the telecommunication industry and finds significant similarities between the industry development and the literature on disruptive technology, which finds that incumbent companies are not able to react in a su...

  9. The Technology of Wireless Local Area Network

    Institute of Scientific and Technical Information of China (English)

    林楠; 李翠霞

    2007-01-01

    This article provides an overview of the Wireless LAN. Firstly, the article introduces the history ofdevelopment of IEEE 802.11.Then, the article will discuss the basic technology of the IEEE 802.11 including IEEE 802.11b, a, and g. The finally, IEEE 802.11 a / b / gComparison and the trend of WLANs will be prospected by this article.

  10. Cognitive wireless networks using the CSS technology

    CERN Document Server

    Li, Meiling; Pan, Jeng-Shyang

    2016-01-01

    The aim of this book is to provide some useful methods to improve the spectrum sensing performance in a systematic way, and point out an effective method for the application of cognitive radio technology in wireless communications. The book gives a state-of-the-art survey and proposes some new cooperative spectrum sensing (CSS) methods attempting to achieve better performance. For each CSS, the main idea and corresponding algorithm design are elaborated in detail. This book covers the fundamental concepts and the core technologies of CSS, especially its latest developments. Each chapter is presented in a self-sufficient and independent way so that the reader can select the chapters interesting to them. The methodologies are described in detail so that the readers can repeat the corresponding experiments easily. It will be a useful book for researchers helping them to understand the classifications of CSS, inspiring new ideas about the novel CSS technology for CR, and learning new ideas from the current status...

  11. Epidemic extinction and control in heterogeneous networks

    CERN Document Server

    Hindes, Jason

    2016-01-01

    We consider epidemic extinction in finite networks with broad variation in local connectivity. Generalizing the theory of large fluctuations to random networks with a given degree distribution, we are able to predict the most probable, or optimal, paths to extinction in various configurations, including truncated power-laws. We find that paths for heterogeneous networks follow a limiting form in which infection first decreases in low-degree nodes, which triggers a rapid extinction in high- degree nodes, and finishes with a residual low-degree extinction. The usefulness of the approach is further demonstrated through optimal control strategies that leverage finite-size fluctuations. Interestingly, we find that the optimal control is a mix of treating both high and low-degree nodes based on large-fluctuation theoretical predictions.

  12. Fractional Power Control for Decentralized Wireless Networks

    CERN Document Server

    Jindal, Nihar; Andrews, Jeffrey G

    2007-01-01

    We propose and analyze a new paradigm for power control in decentralized wireless networks, termed fractional power control. Transmission power is chosen as the current channel quality raised to an exponent -s, where s is a constant between 0 and 1. Choosing s = 1 and s = 0 correspond to the familiar cases of channel inversion and constant power transmission, respectively. Choosing s in (0, 1) allows all intermediate policies between these two extremes to be evaluated, and we see that neither extreme is ideal. We prove that using an exponent of s = 1/2 optimizes the transmission capacity of an ad hoc network, meaning that the inverse square root of the channel strength is the optimal transmit power scaling. Intuitively, this choice achieves the optimal balance between helping disadvantaged users while making sure they do not flood the network with interference.

  13. Social Networking for Botnet Command and Control

    Directory of Open Access Journals (Sweden)

    Ashutosh Singh

    2013-05-01

    Full Text Available A botnet is a group of compromised computers—often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that uses Twitter for command and control. In SocialNetworkingBot, the botmaster tweets commands that are acted on by the individual bots. We discuss the functionality and implementation of SocialNetworkingBot, as well as a small-scale experiment that we have conducted. The botnet presented here is intended to serve as a proof of concept and a platform to facilitate further research.

  14. Electronic control/display interface technology

    Science.gov (United States)

    Parrish, R. V.; Busquets, A. M.; Murray, R. F.; Hatfield, J. J.

    1985-01-01

    An effort to produce a representative workstation for the Space Station Data Management Test Bed that provides man/machine interface design options for consolidating, automating, and integrating the space station work station, and hardware/software technology demonstrations of space station applications is discussed. The workstation will emphasize the technologies of advanced graphics engines, advanced display/control medias, image management techniques, multifunction controls, and video disk utilizations.

  15. A novel MLP network implementation in CMOL technology

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2014-09-01

    Full Text Available Hybrid CMOS/nanodevice technology is a well-known candidate to extend the exponential Moor-Law progress of microelectronics beyond the 10-nm frontier. This paper presents and evaluates a novel method for synaptic weights implementation of artificial neural networks in CMOL technology, a hybrid CMOS/nanodevice technology. In this novel method, the analog property of the I–V characteristic of the nanodevice is utilized to implement each neuromorphic synaptic weight. Each synaptic weight is also implemented by using one nanodevice instead of several nanodevices. Moreover, the proposed method is applied to the multilayer perceptron (MLP network in CMOL technology. Our analysis shows that the power consumption and speed are effectively improved in the proposed method compared to other methods at the expense of a reasonable overhead defect tolerance.

  16. Staying competitive with advanced technologies for closed loop supervisory control

    Energy Technology Data Exchange (ETDEWEB)

    Radl, B.J.; Roland, W.B. [Pegasus Technologies Corp., Painesville, OH (United States); Kish, B. [Penn Power, New Castle, PA (United States)

    1996-05-01

    The following paper discusses the experience gained from installing a neural network-based supervisory control system for selected combustion parameters at Penn Power`s New Castle station. The primary goal of the program was to reduce NO{sub x} emissions, while maintaining or improving unit heat rate. The advanced technologies used to implement supervisory control include: Neural Networks, Genetic Algorithms, Pattern Recognition and Data Visualization. The program was jointly funded by Ohio Edison, U.S. Department of Energy (DOE), Environmental Protection Agency (EPA) and Pegasus Technologies Corporation, under a National Industrial Competitiveness through Energy, Environment and Economics (NICE) grant program. The system is installed on a 1950s vintage Babcock & Wilcox front-fired (four levels) drum unit with a gross generation capacity of 146 MW The program linked a Unix workstation, where the supervisory control system resides, with a Network 90 Digital Control System (DCS). The system uses a neural network-based nonlinear model of the combustion process to interactively adjust setpoints and bias settings in the DCS. The system performs many {open_quotes}what if{close_quotes} simulations to optimize setpoints for the current operating conditions. The neural network model is updated periodically, learning from the most recent data. New setpoints are generated accordingly and downloaded into the DCS. Setpoint and bias adjustments are constrained within the original control system limits. Conditioning algorithms were developed to handle the inherently {open_quote}noisy{close_quote} input data and to provide stable output recommendations. Test results and parameters used for combustion optimization are summarized in this paper.

  17. Plug & Play Control of Hydraulic Networks

    DEFF Research Database (Denmark)

    Jensen, Tom Nørgaard

    2012-01-01

    Process Control research program, which the work presented here is a part of. An industrial case study involving a large-scale hydraulic network with non-linear dynamics is studied. The hydraulic network underlies a district heating system, which provides heating water to a number of end-users in a city...... structure has the additional benefit that structural changes such as the addition or removal of end-users are easily implementable. In this work, the problem of controlling the pressure drop at the end-users to a constant reference value is considered. This is done by the use of pumps located both...... are considered. Some of the work considers control actions which are constrained to non-negative values only. This is due to the fact that the actuators in this type of system typically consist of centrifugal pumps which are only able to deliver non-negative actuation. Other parts of the work consider control...

  18. Controls from remote through Social networks

    Directory of Open Access Journals (Sweden)

    Alessandra Ingrao

    2016-03-01

    Full Text Available The Author focuses on the recently reformed provisions regulating the employer’s power to control from remote the employees’ activities (art. 4 of the Workers Statute, with particular regard to controls performed by means of Social networks.Such controls are in fact extremely powerful due to the versatile and multi-purpose character of Social networks, which may also be used as a working device. A widespread case law shows indeed that employer’s controls may cost a worker his job.Therefore, after the reform, all employees will have to read carefully the employer’s Privacy policies, before accessing socials during the worktime to express opinions and/or frustrations.

  19. Deep networks for motor control functions

    Directory of Open Access Journals (Sweden)

    Max eBerniker

    2015-03-01

    Full Text Available The motor system generates time-varying commands to move our limbs and body. Conventional descriptions of motor control and learning rely on dynamical representations of our body’s state (forward and inverse models, and control policies that must be integrated forward to generate feedforward time-varying commands; thus these are representations across space, but not time. Here we examine a new approach that directly represents both time-varying commands and the resulting state trajectories with a function; a representation across space and time. Since the output of this function includes time, it necessarily requires more parameters than a typical dynamical model. To avoid the problems of local minima these extra parameters introduce, we exploit recent advances in machine learning to build our function using a stacked autoencoder, or deep network. With initial and target states as inputs, this deep network can be trained to output an accurate temporal profile of the optimal command and state trajectory for a point-to-point reach of a nonlinear limb model, even when influenced by varying force fields. In a manner that mirrors motor babble, the network can also teach itself to learn through trial and error. Lastly, we demonstrate how this network can learn to optimize a cost objective. This functional approach to motor control is a sharp departure from the standard dynamical approach, and may offer new insights into the neural implementation of motor control.

  20. Optimizing Dynamical Network Structure for Pinning Control

    Science.gov (United States)

    Orouskhani, Yasin; Jalili, Mahdi; Yu, Xinghuo

    2016-04-01

    Controlling dynamics of a network from any initial state to a final desired state has many applications in different disciplines from engineering to biology and social sciences. In this work, we optimize the network structure for pinning control. The problem is formulated as four optimization tasks: i) optimizing the locations of driver nodes, ii) optimizing the feedback gains, iii) optimizing simultaneously the locations of driver nodes and feedback gains, and iv) optimizing the connection weights. A newly developed population-based optimization technique (cat swarm optimization) is used as the optimization method. In order to verify the methods, we use both real-world networks, and model scale-free and small-world networks. Extensive simulation results show that the optimal placement of driver nodes significantly outperforms heuristic methods including placing drivers based on various centrality measures (degree, betweenness, closeness and clustering coefficient). The pinning controllability is further improved by optimizing the feedback gains. We also show that one can significantly improve the controllability by optimizing the connection weights.

  1. Using home networks to create atmospheres in the home: Technology push or (latent) user need?

    NARCIS (Netherlands)

    Kuiper-Hoyng, L.L.M.L.; Beusmans, J.W.F.

    2004-01-01

    The Atmosphere Controller is an implementation of home networking technology that could make life at home a totally new experience. An atmosphere is created by combining light (intensity and colour), music and wallpaper projection. To find out if is this type of experience fits into everyday life of

  2. Improving new technology venture performance under direct and indirect network externality conditions

    NARCIS (Netherlands)

    Podoynitsyna, Ksenia; Song, Michael; van der Bij, Hans; Weggeman, Mathieu

    2013-01-01

    This study compares the effectiveness of five responses to external uncertainty in markets with network externalities: avoidance, imitation, control, cooperation, and real options reasoning as a form of strategic flexibility. Our analysis of 385 new technology ventures shows that direct and indirect

  3. Using home networks to create atmospheres in the home: Technology push or (latent) user need?

    NARCIS (Netherlands)

    Kuiper-Hoyng, L.L.M.L.; Beusmans, J.W.F.

    2004-01-01

    The Atmosphere Controller is an implementation of home networking technology that could make life at home a totally new experience. An atmosphere is created by combining light (intensity and colour), music and wallpaper projection. To find out if is this type of experience fits into everyday life of

  4. Fuzzy Neural Network Based Traffic Prediction and Congestion Control in High-Speed Networks

    Institute of Scientific and Technical Information of China (English)

    费翔; 何小燕; 罗军舟; 吴介一; 顾冠群

    2000-01-01

    Congestion control is one of the key problems in high-speed networks, such as ATM. In this paper, a kind of traffic prediction and preventive congestion control scheme is proposed using neural network approach. Traditional predictor using BP neural network has suffered from long convergence time and dissatisfying error. Fuzzy neural network developed in this paper can solve these problems satisfactorily. Simulations show the comparison among no-feedback control scheme,reactive control scheme and neural network based control scheme.

  5. Quality control in bio-monitoring networks, Spanish Aerobiology Network.

    Science.gov (United States)

    Oteros, Jose; Galán, Carmen; Alcázar, Purificación; Domínguez-Vilches, Eugenio

    2013-01-15

    Several of the airborne biological particles, such as pollen grains and fungal spores, are known to generate human health problems including allergies and infections. A number of aerobiologists have focused their research on these airborne particles. The Spanish Aerobiology Network (REA) was set up in 1992, and since then dozens of research groups have worked on a range of related topics, including the standardization of study methods and the quality control of data generated by this network. In 2010, the REA started work on an inter-laboratory survey for proficiency testing purposes. The main goal of the study reported in the present paper was to determine the performance of technicians in the REA network using an analytical method that could be implemented by other bio-monitoring networks worldwide. The results recorded by each technician were compared with the scores obtained for a bounded mean of all results. The performance of each technician was expressed in terms of the relative error made in counting each of several pollen types. The method developed and implemented here proved appropriate for proficiency testing in interlaboratory studies involving bio-monitoring networks, and enabled the source of data quality problems to be pinpointed. The test revealed a variation coefficient of 10%. The relative error was significant for 3.5% of observations. In overall terms, the REA staff performed well, in accordance with the REA Management and Quality Manual. These findings serve to guarantee the quality of the data obtained, which can reliably be used for research purposes and published in the media in order to help prevent pollen-related health problems.

  6. Fusion Control of Flexible Logic Control and Neural Network

    Directory of Open Access Journals (Sweden)

    Lihua Fu

    2014-01-01

    Full Text Available Based on the basic physical meaning of error E and error variety EC, this paper analyzes the logical relationship between them and uses Universal Combinatorial Operation Model in Universal Logic to describe it. Accordingly, a flexible logic control method is put forward to realize effective control on multivariable nonlinear system. In order to implement fusion control with artificial neural network, this paper proposes a new neuron model of Zero-level Universal Combinatorial Operation in Universal Logic. And the artificial neural network of flexible logic control model is implemented based on the proposed neuron model. Finally, stability control, anti-interference control of double inverted-pendulum system, and free walking of cart pendulum system on a level track are realized, showing experimentally the feasibility and validity of this method.

  7. Brushless DC Motor Drive during Speed Regulation with Artificial Neural Network Controller

    OpenAIRE

    Sakshi Solanki

    2016-01-01

    Brushless DC motor, at this moment is extensively used being many industrial functions due to the different features like high efficiency and dynamic response and high speed range. This paper is proposing a technology named as Artificial Neural Network controller to control the speed of the brushless DC motor. Here the paper contributes an analysis of performance Artificial Neural Network controller. Because it is difficult to handle by the use of conventional PID controller as BL...

  8. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  9. Projekt "Baltenet - The Baltic Technology Network" / Leonid Pai

    Index Scriptorium Estoniae

    Pai, Leonid

    2005-01-01

    Baltenet - The Baltic Technology Network on projekt, mille alusel teevad koostööd tehniliste erialade koolituse arendamiseks Baltimere äärsetes riikides neli kutseõppeasutust Soomest, Rootsist, Lätis ja Eestist. Projekti rahastab Euroopa Liidu Leonardo da Vinci programm

  10. Strategic Management of Technology and the Structuring of Industrial Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole H.

    The thesis explores the following question: 'How do actants in industrial companies partake in the enactment of locally embedded and globally reaching industrial networks through participation in technology development activities?' It draws on Actor Netwok Theories and analyses three case stories...

  11. Projekt "Baltenet - The Baltic Technology Network" / Leonid Pai

    Index Scriptorium Estoniae

    Pai, Leonid

    2005-01-01

    Baltenet - The Baltic Technology Network on projekt, mille alusel teevad koostööd tehniliste erialade koolituse arendamiseks Baltimere äärsetes riikides neli kutseõppeasutust Soomest, Rootsist, Lätis ja Eestist. Projekti rahastab Euroopa Liidu Leonardo da Vinci programm

  12. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    Science.gov (United States)

    2007-01-01

    society’s essential physical assets and natural resources and to enhance the related social assets of safety and security of individuals in transit...relay chat LTTE Liberation Tigers of Tamil Eelam MIT Massachusetts Institute of Technology MMOG massively multiplayer online game MRTA Movimiento ...Technologies for Networked Terrorists Developing a strategy: Terrorist actions are intended to accomplish political or social goals. To guide its actions, a

  13. Idiotypic Immune Networks in Mobile Robot Control

    CERN Document Server

    Whitbrook, Amanda; Garibaldi, Jonathan

    2008-01-01

    Jerne's idiotypic network theory postulates that the immune response involves inter-antibody stimulation and suppression as well as matching to antigens. The theory has proved the most popular Artificial Immune System (ais) model for incorporation into behavior-based robotics but guidelines for implementing idiotypic selection are scarce. Furthermore, the direct effects of employing the technique have not been demonstrated in the form of a comparison with non-idiotypic systems. This paper aims to address these issues. A method for integrating an idiotypic ais network with a Reinforcement Learning based control system (rl) is described and the mechanisms underlying antibody stimulation and suppression are explained in detail. Some hypotheses that account for the network advantage are put forward and tested using three systems with increasing idiotypic complexity. The basic rl, a simplified hybrid ais-rl that implements idiotypic selection independently of derived concentration levels and a full hybrid ais-rl s...

  14. Evolution of Controllability in Interbank Networks

    Science.gov (United States)

    Delpini, Danilo; Battiston, Stefano; Riccaboni, Massimo; Gabbi, Giampaolo; Pammolli, Fabio; Caldarelli, Guido

    2013-04-01

    The Statistical Physics of Complex Networks has recently provided new theoretical tools for policy makers. Here we extend the notion of network controllability to detect the financial institutions, i.e. the drivers, that are most crucial to the functioning of an interbank market. The system we investigate is a paradigmatic case study for complex networks since it undergoes dramatic structural changes over time and links among nodes can be observed at several time scales. We find a scale-free decay of the fraction of drivers with increasing time resolution, implying that policies have to be adjusted to the time scales in order to be effective. Moreover, drivers are often not the most highly connected ``hub'' institutions, nor the largest lenders, contrary to the results of other studies. Our findings contribute quantitative indicators which can support regulators in developing more effective supervision and intervention policies.

  15. Next Generation Network Routing and Control Plane

    DEFF Research Database (Denmark)

    Fu, Rong

    -constrains). It is shown by the simulation and analysis that the proposed DPV enhanced PCE inter-domain routing architecture improves the performance of BRPC mechanism in terms of reducing the blocking probabilities and increasing the network inter-domain link utilization. The proposed algorithms enable the PCE compute......Concerning the high performance, QoS supported transport services, it is not sufficient that only the traffic transport under a single domain or Autonomous System (AS) is under the consideration. Inter-domain QoS routing is also in a great need. As there has been empirically and theoretically...... proved, the dominating Border Gateway Protocol (BGP) cannot address all the issues that in inter-domain QoS routing. Thus a new protocol or network architecture has to be developed to be able to carry the inter-domain traffic with the QoS and TE consideration. Moreover, the current network control also...

  16. Neural Networks for Signal Processing and Control

    Science.gov (United States)

    Hesselroth, Ted Daniel

    Neural networks are developed for controlling a robot-arm and camera system and for processing images. The networks are based upon computational schemes that may be found in the brain. In the first network, a neural map algorithm is employed to control a five-joint pneumatic robot arm and gripper through feedback from two video cameras. The pneumatically driven robot arm employed shares essential mechanical characteristics with skeletal muscle systems. To control the position of the arm, 200 neurons formed a network representing the three-dimensional workspace embedded in a four-dimensional system of coordinates from the two cameras, and learned a set of pressures corresponding to the end effector positions, as well as a set of Jacobian matrices for interpolating between these positions. Because of the properties of the rubber-tube actuators of the arm, the position as a function of supplied pressure is nonlinear, nonseparable, and exhibits hysteresis. Nevertheless, through the neural network learning algorithm the position could be controlled to an accuracy of about one pixel (~3 mm) after two hundred learning steps. Applications of repeated corrections in each step via the Jacobian matrices leads to a very robust control algorithm since the Jacobians learned by the network have to satisfy the weak requirement that they yield a reduction of the distance between gripper and target. The second network is proposed as a model for the mammalian vision system in which backward connections from the primary visual cortex (V1) to the lateral geniculate nucleus play a key role. The application of hebbian learning to the forward and backward connections causes the formation of receptive fields which are sensitive to edges, bars, and spatial frequencies of preferred orientations. The receptive fields are learned in such a way as to maximize the rate of transfer of information from the LGN to V1. Orientational preferences are organized into a feature map in the primary visual

  17. Networked control of microgrid system of systems

    Science.gov (United States)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  18. Advanced Communication and Networking Technologies for Mars Exploration

    Science.gov (United States)

    Bhasin, Kul; Hayden, Jeff; Agre, Jonathan R.; Clare, Loren P.; Yan, Tsun-Yee

    2001-01-01

    Next-generation Mars communications networks will provide communications and navigation services to a wide variety of Mars science vehicles including: spacecraft that are arriving at Mars, spacecraft that are entering and descending in the Mars atmosphere, scientific orbiter spacecraft, spacecraft that return Mars samples to Earth, landers, rovers, aerobots, airplanes, and sensing pods. In the current architecture plans, the communication services will be provided using capabilities deployed on the science vehicles as well as dedicated communication satellites that will together make up the Mars network. This network will evolve as additional vehicles arrive, depart or end their useful missions. Cost savings and increased reliability will result from the ability to share communication services between missions. This paper discusses the basic architecture that is needed to support the Mars Communications Network part of NASA's Space Science Enterprise (SSE) communications architecture. The network may use various networking technologies such as those employed in the terrestrial Internet, as well as special purpose deep-space protocols to move data and commands autonomously between vehicles, at disparate Mars vicinity sites (on the surface or in near-Mars space) and between Mars vehicles and earthbound users. The architecture of the spacecraft on-board local communications is being reconsidered in light of these new networking requirements. The trend towards increasingly autonomous operation of the spacecraft is aimed at reducing the dependence on resource scheduling provided by Earth-based operators and increasing system fault tolerance. However, these benefits will result in increased communication and software development requirements. As a result, the envisioned Mars communications infrastructure requires both hardware and protocol technology advancements. This paper will describe a number of the critical technology needs and some of the ongoing research

  19. Wireless Industrial Monitoring and Control Networks: The Journey So Far and the Road Ahead

    Directory of Open Access Journals (Sweden)

    Paul Havinga

    2012-08-01

    Full Text Available While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks.

  20. Improving Control Mechanism at Routers in TCP/IP Network

    Directory of Open Access Journals (Sweden)

    Nguyen Kim Quoc

    2014-09-01

    Full Text Available The existing control mechanisms at the network nodes have a good active and very effective at each local router, but they do not still strong enough to control nonlinear and dynamical behaviour of the network. Therefore, the control system requirements must be designed to be flexible to fully grasp the important status information of the variation and intelligent control methods to control network congestion in nonlinear network. To solve this problem, we propose a solution combined fuzzy reasoning with neural network control put on active queue management mechanisms at the network nodes.

  1. Gigabit Satellite Network for NASA's Advanced Communication Technology Satellite (ACTS)

    Science.gov (United States)

    Hoder, Douglas; Bergamo, Marcos

    1996-01-01

    The advanced communication technology satellite (ACTS) gigabit satellite network provides long-haul point-to-point and point-to-multipoint full-duplex SONET services over NASA's ACTS. at rates up to 622 Mbit/s (SONET OC-12), with signal quality comparable to that obtained with terrestrial fiber networks. Data multiplexing over the satellite is accomplished using time-division multiple access (TDMA) techniques coordinated with the switching and beam hopping facilities provided by ACTS. Transmissions through the satellite are protected with Reed-Solomon encoding. providing virtually error-free transmission under most weather conditions. Unique to the system are a TDMA frame structure and satellite synchronization mechanism that allow: (a) very efficient utilization of the satellite capacity: (b) over-the-satellite dosed-loop synchronization of the network in configurations with up to 64 ground stations: and (c) ground station initial acquisition without collisions with existing signalling or data traffic. The user interfaces are compatible with SONET standards, performing the function of conventional SONET multiplexers and. as such. can be: readily integrated with standard SONET fiber-based terrestrial networks. Management of the network is based upon the simple network management protocol (SNMP). and includes an over-the-satellite signalling network and backup terrestrial internet (IP-based) connectivity. A description of the ground stations is also included.

  2. The Application of Multi-Agent Technology on Transient Stability Assessment of Iraqi Super Grid Network

    Directory of Open Access Journals (Sweden)

    Afaneen A. Abood

    2008-01-01

    Full Text Available The aim of this research is improving the Iraqi control center's capabilities for monitoring and controlling the electrical network by adopting the properties of multi-agent technology to enhance power system transient stability. The idea was demonstrated by two agent's strategy, the first agent is a prediction one that will predict power system instability by a transient stability program using the PEBS method, the second strategy agent is a control agent which use the methodology of increasing power transfer through the healthy portion of network during disturbances by a load flow program using fast decoupled method. The proposed strategies are applied to a realistic power system, the Iraqi supper Grid electrical network. Results show that the proposed technique is very powerful for power system instability prediction and control.

  3. Linear programming and algorithms for communication networks a practical guide to network design, control, and management

    CERN Document Server

    Oki, Eiji

    2012-01-01

    Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the basics all the way through to more advanced concepts, its comprehensive coverage provides readers with a solid foundation in mathematical programming for communication networks. Addressing optimization problems for communication networks, including the shortest path problem, max f

  4. Coordinated Voltage Control of Active Distribution Network

    Directory of Open Access Journals (Sweden)

    Xie Jiang

    2016-01-01

    Full Text Available This paper presents a centralized coordinated voltage control method for active distribution network to solve off-limit problem of voltage after incorporation of distributed generation (DG. The proposed method consists of two parts, it coordinated primal-dual interior point method-based voltage regulation schemes of DG reactive powers and capacitors with centralized on-load tap changer (OLTC controlling method which utilizes system’s maximum and minimum voltages, to improve the qualified rate of voltage and reduce the operation numbers of OLTC. The proposed coordination has considered the cost of capacitors. The method is tested using a radial edited IEEE-33 nodes distribution network which is modelled using MATLAB.

  5. Call Admission Control in Mobile Cellular Networks

    CERN Document Server

    Ghosh, Sanchita

    2013-01-01

    Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently.      CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators.  The second approach is concerned with formulation of CAC ...

  6. The nuclear materials control technology briefing book

    Energy Technology Data Exchange (ETDEWEB)

    Hartwell, J.K.; Fernandez, S.J.

    1992-03-01

    As national and international interests in nuclear arms control and non-proliferation of nuclear weapons, intensify, it becomes ever more important that contributors be aware of the technologies available for the measurement and control of the nuclear materials important to nuclear weapons development. This briefing book presents concise, nontechnical summaries of various special nuclear material (SNM) and tritium production monitoring technologies applicable to the control of nuclear materials and their production. Since the International Atomic Energy Agency (IAEA) operates a multinational, on-site-inspector-based safeguards program in support of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), many (but not all) of the technologies reported in this document are in routine use or under development for IAEA safeguards.

  7. Applying Network Technology to Improve TV News Production Mode

    Institute of Scientific and Technical Information of China (English)

    冷劲松; 林成栋

    2003-01-01

    With the development of database and computer network technology, traditional TV news production mode (TVNPM) faces great challenge. Up to now, evolution of TVNPM has experienced two stages: In the beginning, TV news is produced completely by hand, named as pipelining TVNPM in this paper. This production mode is limited to space and time, so its production cycle is very time-consuming, and it requires a lot of harmony in different departments; Subsequently, thanks to applications of database technology, a new TVNPM appears, which is named as pooled information resource TVNPM. Compared with pipelining TVNPM, this mode promotes information sharing. However, with the development of network technology, especially the Intranet and the Internet, the pooled information resource TVNPM receives strong impact, and it is referred to contrive a new TVNPM. This new TVNPM must support information sharing, remote collaboration, and interaction in communications so as to improve group work efficiency. In this paper, we present such a new TVNPM, namely, Network TVNPM, give a suit of system solution to support the new TVNPM, introduce the new workflow, and in the end analyze the advantages of Network TVNPM.

  8. Audio networking at the Center for Art and Media Technology Karlsruhe

    Science.gov (United States)

    Dutilleux, Pierre

    1993-01-01

    The Center for Art and Media Technology is dedicated to art and its relationship to new media. The Center supports music as well as graphic art. It also will house museums. The Center will be fully operational by the middle of 1996. The audio network will interconnect five recording studios and a large theater with three control rooms. With the additional facilities, the number of 40 interconnected rooms is reached. As to the quality and the versatility, the network can be compared, to some extent, to that of a broadcast-building. Traditional networking techniques involve many kilometers of high quality audio-cables and bulky automated patch-bays. Still, we wish even more freedom in the way the rooms are interconnected. Digital audio and computer network technology are promising. Although digital audio technology is spreading, the size of the totally digital systems is still limited. Fiber optic and large capacity optical disks offer attractive alternatives to traditional techniques (cabling, multitrack recorders, sound archives, routing). The digital audio standards are evolving from point to point communication to network communication. A 1 Gbit/s network could be the backbone of a solution.

  9. Test-bed Assessment of Communication Technologies for a Power-Balancing Controller

    DEFF Research Database (Denmark)

    Findrik, Mislav; Pedersen, Rasmus; Hasenleithner, Eduard

    2016-01-01

    Due to growing need for sustainable energy, increasing number of different renewable energy resources are being connected into distribution grids. In order to efficiently manage a decentralized power generation units, the smart grid will rely on communication networks for information exchange...... and control. In this paper, we present a Smart Grid test-bed that integrates various communication technologies and deploys a power balancing controller for LV grids. Control performance of the introduced power balancing controller is subsequently investigated and its robustness to communication network cross......-traffic is evaluated. Various scenarios are demonstrated, assessing impact of communication network performance on quality of control....

  10. P2P Networking and Technology Enablers in Business Applications

    OpenAIRE

    Hariharan, Mahesh

    2006-01-01

    The usage of Peer to Peer Networks over the Internet has been growing by exponentially. Apartbfrom the hype surrounding P2P, it has remarkable ramifications on the way the Internet could be used. This is an area which is not explored as well as we would want to. This thesis examines the architectural differences in P2P networks and generic application domains where the principles of P2P are exploited. The usage of P2P in different business verticals and technology enablers that go along with ...

  11. Privacy and technology challenges for ubiquitous social networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Seet, Boon-Chong

    2015-01-01

    Ubiquitous social networking (USN) can be seen as an evolution of ubiquitous computing supporting the social well–being of people in their everyday lives. The vision of USN focuses on enhancing social interactions among its participants during users' physical meetings. This target is leading...... towards important challenges such as social sensing, enabling social networking and privacy protection. In this paper we firstly investigate the methods and technologies for acquisition of the relevant context for promotion of sociability among inhabitants of USN environments. Afterwards, we review...

  12. Stabilization of model-based networked control systems

    Science.gov (United States)

    Miranda, Francisco; Abreu, Carlos; Mendes, Paulo M.

    2016-06-01

    A class of networked control systems called Model-Based Networked Control Systems (MB-NCSs) is considered. Stabilization of MB-NCSs is studied using feedback controls and simulation of stabilization for different feedbacks is made with the purpose to reduce the network trafic. The feedback control input is applied in a compensated model of the plant that approximates the plant dynamics and stabilizes the plant even under slow network conditions. Conditions for global exponential stabilizability and for the choosing of a feedback control input for a given constant time between the information moments of the network are derived. An optimal control problem to obtain an optimal feedback control is also presented.

  13. Comparison between Networked Control System behaviour based on CAN and Switched Ethernet networks

    OpenAIRE

    Brahimi, Belynda; Rondeau, Eric; Aubrun, Christophe

    2006-01-01

    7 pages; International audience; The distributed control systems are more and more used in many industrial applications. These systems are often referred as “Networked control systems”. The goal of this paper is to show the network influence on feedback control systems. Two networks are considered: Switched Ethernet network and CAN fieldbus. The first one represents the non deterministic network and second one represents the deterministic one. Several scenarii are studied to analyse the stabi...

  14. Stabilization of Networked Control System with Packet-Dropout

    Directory of Open Access Journals (Sweden)

    Hooman Sanatizadeh

    2014-10-01

    Secondly, by above method an inverted pendulum which was controlled in a network with delays, is controlled in a network through packet-dropouts. simulation results show the effectiveness of the above method.

  15. Sleep Control Game for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sang Hoon Lee

    2016-01-01

    Full Text Available In wireless sensor networks (WSNs, each node controls its sleep to reduce energy consumption without sacrificing message latency. In this paper we apply the game theory, which is a powerful tool that explains how each individual acts for his or her own economic benefit, to analyze the optimal sleep schedule for sensor nodes. We redefine this sleep control game as a modified version of the Prisoner’s Dilemma. In the sleep control game, each node decides whether or not it wakes up for the cycle. Payoff functions of the sleep control game consider the expected traffic volume, network conditions, and the expected packet delay. According to the payoff function, each node selects the best wake-up strategy that may minimize the energy consumption and maintain the latency performance. To investigate the performance of our algorithm, we apply the sleep control game to X-MAC, which is one of the recent WSN MAC protocols. Our detailed packet level simulations confirm that the proposed algorithm can effectively reduce the energy consumption by removing unnecessary wake-up operations without loss of the latency performance.

  16. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  17. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-10

    ... Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010 Strategic Plan AGENCY: The National Coordination Office (NCO) for Networking and Information Technology Research.... EDT on October 11, 2010. SUMMARY: With this notice, the National Coordination Office for...

  18. Control of Wireless Networks with Secrecy

    CERN Document Server

    Koksal, C Emre; Sarikaya, Yunus

    2011-01-01

    We consider the problem of cross-layer resource allocation in time-varying cellular wireless networks, and incorporate information theoretic secrecy as a Quality of Service constraint. Specifically, each node in the network injects two types of traffic, private and open, at rates chosen in order to maximize a global utility function, subject to network stability and secrecy constraints. The secrecy constraint enforces an arbitrarily low mutual information leakage from the source to every node in the network, except for the sink node. We first obtain the achievable rate region for the problem for single and multi-user systems assuming that the nodes have full CSI of their neighbors. Then, we provide a joint flow control, scheduling and private encoding scheme, which does not rely on the knowledge of the prior distribution of the gain of any channel. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility. Numerical experiments are performed to verify the analytical resu...

  19. Towards structural controllability of local-world networks

    Energy Technology Data Exchange (ETDEWEB)

    Sun, Shiwen, E-mail: sunsw80@126.com [Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin 300384 (China); Key Laboratory of Computer Vision and System (Tianjin University of Technology), Ministry of Education, Tianjin 300384 (China); Ma, Yilin; Wu, Yafang; Wang, Li; Xia, Chengyi [Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin 300384 (China); Key Laboratory of Computer Vision and System (Tianjin University of Technology), Ministry of Education, Tianjin 300384 (China)

    2016-05-20

    Controlling complex networks is of vital importance in science and engineering. Meanwhile, local-world effect is an important ingredient which should be taken into consideration in the complete description of real-world complex systems. In this letter, structural controllability of a class of local-world networks is investigated. Through extensive numerical simulations, firstly, effects of local world size M and network size N on structural controllability are examined. For local-world networks with sparse topological configuration, compared to network size, local-world size can induce stronger influence on controllability, however, for dense networks, controllability is greatly affected by network size and local-world effect can be neglected. Secondly, relationships between controllability and topological properties are analyzed. Lastly, the robustness of local-world networks under targeted attacks regarding structural controllability is discussed. These results can help to deepen the understanding of structural complexity and connectivity patterns of complex systems. - Highlights: • Structural controllability of a class of local-world networks is investigated. • For sparse local-world networks, compared to network size, local-world size can bring stronger influence on controllability. • For dense networks, controllability is greatly affected by network size and the effect of local-world size can be neglected. • Structural controllability against targeted node attacks is discussed.

  20. Using Internet of Things technologies for wireless sensor networks

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Basford, P. J.; Bragg, G. M.; Ward, T.

    2013-12-01

    Numerous authors have envisioned the future internet where anything will be connected: the Internet of Things (IoT). The idea is an extrapolation of the spread of networked devices such as phones, tablets etc. Each device is expected to have its own Internet address and thus be easy to access. The key building blocks of any IoT system are networking, hardware platforms and node software - so they are similar to wireless sensor network requirements. Most existing IoT demonstrators and applications have been gadget-style objects where power and connectivity problems are not too restricting. Environmental sensor networks can benefit from using some of the technologies involved in IoT development. However it is expected that tuning the networking and power management will be necessary to make them as efficient as state of the art wireless sensor networks. Some IoT assumptions such as always-connected nodes and full IP capability need to be considered. This paper will illustrate the advantages and disadvantages of IoT techniques for environment sensing drawing on a range of employment scenarios. We also describe a glacial 'Internet of things' project, which aims to monitor glacial processes. In particular we describe the IoT developments in a deployment in Iceland to examine glacier seismicity, velocity and provide camera images.

  1. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  2. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  3. The research of security and real-time based on the control information network

    Science.gov (United States)

    Su, Xiao-hui; Xu, Shu-Ping

    2013-03-01

    Aiming at the security issues, the construction of the remote motor control server based on the Web is studied, the scheme of two server programs based on the virtual server technology is proposed. The safety and application occasion of the scheme are described respectively, and the encryption algorithm which Improve certification accuracy is proposed. Aiming at the real-time problem, a new control method is proposed, which is based on neural network predictive control to solve the existing closed-loop network control system random delay. The experiment verification and system simulated are completed. These methods provide a new way to integrate the control network and information network, and to lay a solid foundation for the development of the control network.

  4. Discussion on the Method of Building Urban GPS Control Network Based on GPS Technology%利用GPS技术建立城市GPS控制网的方法探讨

    Institute of Scientific and Technical Information of China (English)

    乔丽华; 冯军

    2012-01-01

    Based on years of production experience of the author, this paper introduces the solution to the usual problems we will meet with when building city GPS control network using GPS technique, taking the GPS control network of Ledong County in Hainan as an example. It ensures through total quality control that the survey result of the city four - level GPS control network is in accordance with the current survey standard. It also discusses the accuracy of GPS control surveying.%笔者结合多年生产经验,以海南省乐东县GPS控制网为例,介绍了利用GPS技术建立城市GPS控制网时一些常见的问题及处理办法。通过全面的质量控制以确保城市D级GPS控制网测量成果符合现行测量规范的要求,讨论了GPS控制测量的精度等问题。

  5. Online industrial process broadcast and control based on IP and serial networks

    Directory of Open Access Journals (Sweden)

    Nicolae PARASCHIV

    2007-12-01

    Full Text Available The Internet network in conjunction with a strong security policy can be an ideal online broadcast system for the industrial processes monitoring and control. Because the distributed controllers are connected through industrial serial connection, the network between controllers cannot be extended very much. The problem appears when the plant is away and cannot be accessed via a serial connection. For administrative and control purposes the serial network can be interconnected with an IP network. In this case the operator can be anywhere in the world and can interact via an interface with the process. This paper will describe flow process remote controlled using a mixture of two communication technologies: RS485 and TCP/IP. The junction between these technologies is transparent and the operator is able to monitor the process using an interface console.

  6. A reconfigurable optoelectronic interconnect technology for multi-processor networks

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Y.C.; Cheng, J. [Univ. of New Mexico, Albuquerque, NM (United States). Center for High Technology Materials; Zolper, J.C.; Klem, J. [Sandia National Labs., Albuquerque, NM (United States)

    1995-05-01

    This paper describes a new optical interconnect architecture and the integrated optoelectronic circuit technology for implementing a parallel, reconfigurable, multiprocessor network. The technology consists of monolithic array`s of optoelectronic switches that integrate vertical-cavity surface-emitting lasers with three-terminal heterojunction phototransistors, which effectively combined the functions of an optical transceiver and an optical spatial routing switch. These switches have demonstrated optical switching at 200 Mb/s, and electrical-to-optical data conversion at > 500 Mb/s, with a small-signal electrical-to-optical modulation bandwidth of {approximately} 4 GHz.

  7. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  8. A Programmable Controller for Unified Management of Virtualized Network Infrastructures

    OpenAIRE

    Yassin, Mohamad; GUILLOUARD, Karine; Ouzzif, Meryem; Picard, Roland; Aluze, Denis

    2017-01-01

    International audience; We are currently witnessing an evolution towards network virtualization and Software Defined Networking (SDN) paradigm. SDN permits the decoupling of the control and data planes of traditional networks, and offers flexible and programmable networks. Besides, the need for dynamic provisioning and composition of networking services leads to the deployment of software components on virtualized network infrastructures. In this paper, we propose a unified management of netw...

  9. Neural Network Based Montioring and Control of Fluidized Bed.

    Energy Technology Data Exchange (ETDEWEB)

    Bodruzzaman, M.; Essawy, M.A.

    1996-04-01

    The goal of this project was to develop chaos analysis and neural network-based modeling techniques and apply them to the pressure-drop data obtained from the Fluid Bed Combustion (FBC) system (a small scale prototype model) located at the Federal Energy Technology Center (FETC)-Morgantown. The second goal was to develop neural network-based chaos control techniques and provide a suggestive prototype for possible real-time application to the FBC system. The experimental pressure data were collected from a cold FBC experimental set-up at the Morgantown Center. We have performed several analysis on these data in order to unveil their dynamical and chaotic characteristics. The phase-space attractors were constructed from the one dimensional time series data, using the time-delay embedding method, for both normal and abnormal conditions. Several identifying parameters were also computed from these attractors such as the correlation dimension, the Kolmogorov entropy, and the Lyapunov exponents. These chaotic attractor parameters can be used to discriminate between the normal and abnormal operating conditions of the FBC system. It was found that, the abnormal data has higher correlation dimension, larger Kolmogorov entropy and larger positive Lyapunov exponents as compared to the normal data. Chaotic system control using neural network based techniques were also investigated and compared to conventional chaotic system control techniques. Both types of chaotic system control techniques were applied to some typical chaotic systems such as the logistic, the Henon, and the Lorenz systems. A prototype model for real-time implementation of these techniques has been suggested to control the FBC system. These models can be implemented for real-time control in a next phase of the project after obtaining further measurements from the experimental model. After testing the control algorithms developed for the FBC model, the next step is to implement them on hardware and link them to

  10. Object-Oriented Bayesian Networks (OOBN) for Aviation Accident Modeling and Technology Portfolio Impact Assessment

    Science.gov (United States)

    Shih, Ann T.; Ancel, Ersin; Jones, Sharon M.

    2012-01-01

    The concern for reducing aviation safety risk is rising as the National Airspace System in the United States transforms to the Next Generation Air Transportation System (NextGen). The NASA Aviation Safety Program is committed to developing an effective aviation safety technology portfolio to meet the challenges of this transformation and to mitigate relevant safety risks. The paper focuses on the reasoning of selecting Object-Oriented Bayesian Networks (OOBN) as the technique and commercial software for the accident modeling and portfolio assessment. To illustrate the benefits of OOBN in a large and complex aviation accident model, the in-flight Loss-of-Control Accident Framework (LOCAF) constructed as an influence diagram is presented. An OOBN approach not only simplifies construction and maintenance of complex causal networks for the modelers, but also offers a well-organized hierarchical network that is easier for decision makers to exploit the model examining the effectiveness of risk mitigation strategies through technology insertions.

  11. Adapting Wireless Technology to Lighting Control and Environmental Sensing

    Energy Technology Data Exchange (ETDEWEB)

    Dana Teasdale; Francis Rubinstein; David S. Watson; Steve Purdy

    2006-04-30

    Although advanced lighting control systems offer significant energy savings, the high cost of retrofitting buildings with advanced lighting control systems is a barrier to adoption of this energy-saving technology. Wireless technology, however, offers a solution to mounting installation costs since it requires no additional wiring to implement. To demonstrate the feasibility of such a system, a prototype wirelessly-controlled advanced lighting system was designed and built. The system includes the following components: a wirelessly-controllable analog circuit module (ACM), a wirelessly-controllable electronic dimmable ballast, a T8 3-lamp fixture, an environmental multi-sensor, a current transducer, and control software. The ACM, dimmable ballast, multi-sensor, and current transducer were all integrated with SmartMesh{trademark} wireless mesh networking nodes, called motes, enabling wireless communication, sensor monitoring, and actuator control. Each mote-enabled device has a reliable communication path to the SmartMesh Manager, a single board computer that controls network functions and connects the wireless network to a PC running lighting control software. The ACM is capable of locally driving one or more standard 0-10 Volt electronic dimmable ballasts through relay control and a 0-10 Volt controllable output, in addition to 0-24 Volt and 0-10 Volt inputs. The mote-integrated electronic dimmable ballast is designed to drive a standard 3-lamp T8 light fixture. The environmental multisensor measures occupancy, light level and temperature. The current transducer is used to measure the power consumed by the fixture. Control software was developed to implement advanced lighting algorithms, including open and closed-loop daylight ramping, occupancy control, and demand response. Engineering prototypes of each component were fabricated and tested in a bench-scale system. Based on standard industry practices, a cost analysis was conducted. It is estimated that the

  12. Implementation of a Prototype Generalized Network Technology for Hospitals *

    OpenAIRE

    Tolchin, S. G.; Stewart, R. L.; Kahn, S. A.; Bergan, E. S.; Gafke, G. P.; Simborg, D.W.; Whiting-O'Keefe, Q. E.; Chadwick, M. G.; McCue, G. E.

    1981-01-01

    A demonstration implementation of a distributed data processing hospital information system using an intelligent local area communications network (LACN) technology is described. This system is operational at the UCSF Medical Center and integrates four heterogeneous, stand-alone minicomputers. The applications systems are PID/Registration, Outpatient Pharmacy, Clinical Laboratory and Radiology/Medical Records. Functional autonomy of these systems has been maintained, and no operating system c...

  13. Strategic Management of Technology and the Structuring of Industrial Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole H.

    The thesis explores the following question: 'How do actants in industrial companies partake in the enactment of locally embedded and globally reaching industrial networks through participation in technology development activities?' It draws on Actor Netwok Theories and analyses three case stories...... from the hearing aid industry. In one of the case stories is shown how three Danish companies became a 'centre of translation' by collaborating on the development of the software standard NOAH....

  14. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  15. Assessment of control technology for stationary sources. Volume II: control technology data tables. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Minicucci, D.; Herther, M.; Babb, L.; Kuby, W.

    1980-02-01

    This report, the Control Technology Data Tables, is the second volume of the three-volume final report for the contract. It presents in tabular format, qualitative descriptions of control options for the various sources and quantitative information on control technology cost, efficiency, reliability, energy consumption, other environmental impacts and application status. Also included is a code list which classifies the stationary sources examined by industry, process, and emission source.

  16. The role of networks in the dissemination of clean technologies

    Energy Technology Data Exchange (ETDEWEB)

    Janssen, M. [KEMA, Arnhem (Netherlands)

    2003-07-01

    Information from scientific research projects is generally disseminated to potential users (Small Medium Enterprises (SME) and industries) through scientific papers and conferences. The author presents a more effective way to disseminate this valuable information to SMEs. The proposed approach was introduced by Thematic Networks within the Fifth Frame Programme of the European Commission (EC). The Network was created to provide a smooth transmission of knowledge from those who generate the information to those who use it. The author discussed the role of Thematic Network in relation to the Consortium entitled Production of Novel Products from Glassy Combustion Residues (PROGRES). The Network resulted in a pan-European discussion platform to study issues associated with advanced uses for combustion residues as secondary raw materials. Emphasis was placed on new advanced technologies for fly ash based products under practical conditions. This topic will be discussed in a book being completed by an International PROGRES Consortium. It will describe new technologies for coal fly ash based products. When launching new products, consideration will be given to all stakeholders, from producers of residues to potential users. 2 figs.

  17. Adaptive control of call acceptance in WCDMA network

    Directory of Open Access Journals (Sweden)

    Milan Manojle Šunjevarić

    2013-10-01

    been devoted to efficient allocation of these codes aiming to maximize system capacity and reduce the probability of rejection of connection requests. OVSF code allocation algorithms are usually designed in association with CAC algorithms in order to perform universal capacity management in access networks. Conclusion Given the great importance of resource management in wireless networks and the importance of a proper choice of the control algorithm, the algorithms for the admission control in mobile wireless networks are analyzed. A special attention is given to the algorithms for the admission control in WCDMA networks. In this regard, the point is made to some of the specifics of the WCDMA technology, which affect the choice of algorithm work modes.

  18. Domestic Technology Transfer versus Technology Export Control - The Emerging National Policies and the Role of the Bench Engineer

    Science.gov (United States)

    1984-01-01

    Defense Technology Transfer Fundamentals 10 B. Governmental Stimuli to Technology Transfer 1. Information Programs 2. Information Analysis Centers 3...networking. II. Domestic Technology Transfer A. Non- Defense Technology Transfer Fundamentals The nation’s technological reservoir is filled by

  19. Design implementation and analysis of wireless model based predictive networked control system over cooperative wireless network

    OpenAIRE

    Ulusoy, Mehmet Alphan

    2009-01-01

    Owing to their distributed architecture, networked control systems are proven to be feasible in scenarios where a spatially distributed control system is required. Traditionally, such networked control systems operate over real-time wired networks over which sensors, controllers and actuators interact with each other. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment and maintainability, wireless networks such as IEEE 802.11 LANs are being preferred over d...

  20. Environmental control technology for biomass flash pyrolysis

    Energy Technology Data Exchange (ETDEWEB)

    Harkness, J.B.L.; Doctor, R.D.; Seward, W.H.

    1980-01-01

    The rapid commercialization of biomass gasification and pyrolysis technologies will raise questions concerning the environmental impacts of these systems and the associated costs for appropriate control technologies. This study concentrates on characterizing the effluent emissions and control technologies for a dual fluid-bed pyrolysis unit run by Arizona State University, Tempe, Arizona. The ASU system produces a raw product gas that is passed through a catalytic liquefaction system to produce a fuel comparable to No. 2 fuel oil. Argonne National Laboratory is conducting a program that will survey several biomass systems to standardize the sampling techniques, prioritize standard analyses and develop a data base so that environmental issues later may be addressed before they limit or impede the commercialization of biomass gasification and pyrolysis technologies. Emissions will be related to both the current and anticipated emissions standards to generate material balances and set design parameters for effluent treatment systems. This will permit an estimate to be made of the capital and operating costs associated with these technologies.

  1. CONVERGING REDUNDANT SENSOR NETWORK INFORMATION FOR IMPROVED BUILDING CONTROL

    Energy Technology Data Exchange (ETDEWEB)

    Dale K. Tiller; Gregor P. Henze

    2004-11-01

    Knowing how many people occupy a building, and where they are located, is a key component of building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, however, current sensor technology and control algorithms limit the effectiveness of both energy management and security systems. This topical report describes results from the first phase of a project to design, implement, validate, and prototype new technologies to monitor occupancy, control indoor environment services, and promote security in buildings. Phase I of the project focused on instrumentation and data collection. In this project phase a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Analysis tools based on Bayesian probability theory were applied to the occupancy data generated by the sensor network. The inference of primary importance is a probability distribution over the number of occupants and their locations in a building, given past and present sensor measurements. Inferences were computed for occupancy and its temporal persistence in individual offices as well as the persistence of sensor status. The raw sensor data were also used to calibrate the sensor belief network, including the occupancy transition matrix used in the Markov model, sensor sensitivity, and sensor failure models. This study shows that the belief network framework can be applied to the analysis of data streams from sensor networks, offering significant benefits to building operation compared to current practice.

  2. Minimum energy control and optimal-satisfactory control of Boolean control network

    Energy Technology Data Exchange (ETDEWEB)

    Li, Fangfei, E-mail: li_fangfei@163.com; Lu, Xiwen

    2013-12-09

    In the literatures, to transfer the Boolean control network from the initial state to the desired state, the expenditure of energy has been rarely considered. Motivated by this, this Letter investigates the minimum energy control and optimal-satisfactory control of Boolean control network. Based on the semi-tensor product of matrices and Floyd's algorithm, minimum energy, constrained minimum energy and optimal-satisfactory control design for Boolean control network are given respectively. A numerical example is presented to illustrate the efficiency of the obtained results.

  3. Identification and Position Control of Marine Helm using Artificial Neural Network Neural Network

    Directory of Open Access Journals (Sweden)

    Hui ZHU

    2008-02-01

    Full Text Available If nonlinearities such as saturation of the amplifier gain and motor torque, gear backlash, and shaft compliances- just to name a few - are considered in the position control system of marine helm, traditional control methods are no longer sufficient to be used to improve the performance of the system. In this paper an alternative approach to traditional control methods - a neural network reference controller - is proposed to establish an adaptive control of the position of the marine helm to achieve the controlled variable at the command position. This neural network controller comprises of two neural networks. One is the plant model network used to identify the nonlinear system and the other the controller network used to control the output to follow the reference model. The experimental results demonstrate that this adaptive neural network reference controller has much better control performance than is obtained with traditional controllers.

  4. SOFM Neural Network Based Hierarchical Topology Control for Wireless Sensor Networks

    OpenAIRE

    2014-01-01

    Well-designed network topology provides vital support for routing, data fusion, and target tracking in wireless sensor networks (WSNs). Self-organization feature map (SOFM) neural network is a major branch of artificial neural networks, which has self-organizing and self-learning features. In this paper, we propose a cluster-based topology control algorithm for WSNs, named SOFMHTC, which uses SOFM neural network to form a hierarchical network structure, completes cluster head selection by the...

  5. Optimizing controllability of complex networks by minimum structural perturbations.

    Science.gov (United States)

    Wang, Wen-Xu; Ni, Xuan; Lai, Ying-Cheng; Grebogi, Celso

    2012-02-01

    To drive a large, complex, networked dynamical system toward some desired state using as few external signals as possible is a fundamental issue in the emerging field of controlling complex networks. Optimal control is referred to the situation where such a network can be fully controlled using only one driving signal. We propose a general approach to optimizing the controllability of complex networks by judiciously perturbing the network structure. The principle of our perturbation method is validated theoretically and demonstrated numerically for homogeneous and heterogeneous random networks and for different types of real networks as well. The applicability of our method is discussed in terms of the relative costs of establishing links and imposing external controllers. Besides the practical usage of our approach, its implementation elucidates, interestingly, the intricate relationship between certain structural properties of the network and its controllability.

  6. JPL Advanced Thermal Control Technology Roadmap - 2008

    Science.gov (United States)

    Birur, Gaj

    2008-01-01

    This slide presentation reviews the status of thermal control technology at JPL and NASA.It shows the active spacecraft that are in vairous positions in the solar syatem, and beyond the solar system and the future missions that are under development. It then describes the challenges that the past missions posed with the thermal control systems. The various solutions that were implemented duirng the decades prior to 1990 are outlined. A review of hte thermal challenges of the future misions is also included. The exploration plan for Mars is then reviewed. The thermal challenges of the Mars Rovers are then outlined. Also the challenges of systems that would be able to be used in to explore Venus, and Titan are described. The future space telescope missions will also need thermal control technological advances. Included is a review of the thermal requirements for manned missions to the Moon. Both Active and passive technologies that have been used and will be used are reviewed. Those that are described are Mechanically Pumped Fluid Loops (MPFL), Loop Heat Pipes, an M3 Passive Cooler, Heat Siwtch for Space and Mars surface applications, phase change material (PCM) technology, a Gas Gap Actuateor using ZrNiH(x), the Planck Sorption Cooler (PCS), vapor compression -- Hybrid two phase loops, advanced pumps for two phase cooling loops, and heat pumps that are lightweight and energy efficient.

  7. Congestion Control for ATM Networks Based on Diagonal Recurrent Neural Networks

    Institute of Scientific and Technical Information of China (English)

    HuangYunxian; YanWei

    1997-01-01

    An adaptive control model and its algorithms based on simple diagonal recurrent neural networks are presented for the dynamic congestion control in broadband ATM networks.Two simple dynamic queuing models of real networks are used to test the performance of the suggested control scheme.

  8. How Do Emerging Technologies Conquer the World? An Exploration of Patterns of Diffusion and Network Formation

    CERN Document Server

    Leydesdorff, Loet

    2010-01-01

    Grasping the fruits of "emerging technologies" is an objective of many government priority programs in a knowledge-based and globalizing economy. We use the publication records (in the Science Citation Index) of two emerging technologies to study the mechanisms of diffusion in the case of two innovation trajectories: small interference RNA (siRNA) and nano-crystalline solar cells (NCSC). Methods for analyzing and visualizing geographical and cognitive diffusion are specified as indicators of different dynamics. Geographical diffusion is illustrated with overlays to Google Maps; cognitive diffusion is mapped using an overlay to a map based on the ISI Subject Categories. The evolving geographical networks show both preferential attachment and small-world characteristics. The strength of preferential attachment decreases over time, while the network evolves into an oligopolistic control structure with small-world characteristics. The transferability of the research technology in cognitive terms--that is, the tra...

  9. Neural Network Model Based Cluster Head Selection for Power Control

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2011-01-01

    Full Text Available Mobile ad-hoc network has challenge of the limited power to prolong the lifetime of the network, because power is a valuable resource in mobile ad-hoc network. The status of power consumption should be continuously monitored after network deployment. In this paper, we propose coverage aware neural network based power control routing with the objective of maximizing the network lifetime. Cluster head selection is proposed using adaptive learning in neural networks followed by coverage. The simulation results show that the proposed scheme can be used in wide area of applications in mobile ad-hoc network.

  10. Stochastic methods for measurement-based network control

    NARCIS (Netherlands)

    Ellens, W.

    2015-01-01

    The main task of network administrators is to ensure that their network functions properly. Whether they manage a telecommunication or a road network, they generally base their decisions on the analysis of measurement data. Inspired by such network control applications, this dissertation investigate

  11. Consensus and Stability Analysis of Networked Multiagent Predictive Control Systems.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-04-01

    This paper is concerned with the consensus and stability problem of multiagent control systems via networks with communication delays and data loss. A networked multiagent predictive control scheme is proposed to achieve output consensus and also compensate for the communication delays and data loss actively. The necessary and sufficient conditions of achieving both consensus and stability of the closed-loop networked multiagent control systems are derived. An important result that is obtained is that the consensus and stability of closed-loop networked multiagent predictive control systems are not related to the communication delays and data loss. An example illustrates the performance of the networked multiagent predictive control scheme.

  12. Development of Bioinformatic and Experimental Technologies for Identification of Prokaryotic Regulatory Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence, Charles E; McCue, Lee Ann

    2008-07-31

    The transcription regulatory network is arguably the most important foundation of cellular function, since it exerts the most fundamental control over the abundance of virtually all of a cell’s functional macromolecules. The two major components of a prokaryotic cell’s transcription regulation network are the transcription factors (TFs) and the transcription factor binding sites (TFBS); these components are connected by the binding of TFs to their cognate TFBS under appropriate environmental conditions. Comparative genomics has proven to be a powerful bioinformatics method with which to study transcription regulation on a genome-wide level. We have further extended comparative genomics technologies that we introduced over the last several years. Specifically, we developed and applied statistical approaches to analysis of correlated sequence data (i.e., sequences from closely related species). We also combined these technologies with functional genomic, proteomic and sequence data from multiple species, and developed computational technologies that provide inferences on the regulatory network connections, identifying the cognate transcription factor for predicted regulatory sites. Arguably the most important contribution of this work emerged in the course of the project. Specifically, the development of novel procedures of estimation and prediction in discrete high-D settings has broad implications for biology, genomics and well beyond. We showed that these procedures enjoy advantages over existing technologies in the identification of TBFS. These efforts are aimed toward identifying a cell’s complete transcription regulatory network and underlying molecular mechanisms.

  13. Network Congestion Control with Markovian Multipath Routing

    CERN Document Server

    Cominetti, Roberto

    2011-01-01

    In this paper we consider an integrated model for TCP/IP protocols with multipath routing. The model combines a Network Utility Maximization for rate control based on end-to-end queuing delays, with a Markovian Traffic Equilibrium for routing based on total expected delays. We prove the existence of a unique equilibrium state which is characterized as the solution of an unconstrained strictly convex program. A distributed algorithm for solving this optimization problem is proposed, with a brief discussion of how it can be implemented by adapting the current Internet protocols.

  14. Neural Network Control of a Magnetically Suspended Rotor System

    Science.gov (United States)

    Choi, Benjamin B.

    1998-01-01

    Magnetic bearings offer significant advantages because they do not come into contact with other parts during operation, which can reduce maintenance. Higher speeds, no friction, no lubrication, weight reduction, precise position control, and active damping make them far superior to conventional contact bearings. However, there are technical barriers that limit the application of this technology in industry. One of them is the need for a nonlinear controller that can overcome the system nonlinearity and uncertainty inherent in magnetic bearings. At the NASA Lewis Research Center, a neural network was selected as a nonlinear controller because it generates a neural model without any detailed information regarding the internal working of the magnetic bearing system. It can be used even for systems that are too complex for an accurate system model to be derived. A feed-forward architecture with a back-propagation learning algorithm was selected because of its proven performance, accuracy, and relatively easy implementation.

  15. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  16. Robotics-Control Technology. Technology Learning Activity. Teacher Edition. Technology Education Series.

    Science.gov (United States)

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This document contains the materials required for presenting an 8-day competency-based technology learning activity (TLA) designed to introduce students in grades 6-10 to advances and career opportunities in the field of robotics-control technology. The guide uses hands-on exploratory experiences into which activities to help students develop…

  17. Protection and Control with FPGA technology

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, K. Y.; Yi, W. J. [Korea Reliability Technology and System, Daejeon (Korea, Republic of); Koo, I. S. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-03-15

    To cope with the experiences such as unsatisfied response time of control and protection system, components obsolescence of those systems, and outstanding coercion of system modernization, nuclear society is striving to resolve this issue fundamentally. The reports and standards issued from IAEA and other standard organization like IBC is interested in the FPGA technology, which is fairly mature technology in other fields of industry. Intuitively it is replacing the high level of micro-processor type equipped with various software and hardware, which causes to accelerate the aging and obsolescence, and demands for system modernization in I and C system in Nuclear Power Plant. Thus utility has to spend much time and effort to upgrade I and C system throughout a decease. This paper summarizes the need of FPGA technology in Nuclear Power Plant, describing the characteristics of FPGA, test methodology and design requirements. Also the specific design and implementation experiences brought up in the course of FPGA-based controller, which has been conducted in KoRTS. The certification and verification and validation process to ensure the integrity of FPGA-based controller will be addressed. After that, Diverse Protection System (DPS) for YGN Unit 3 and 4 that is implemented via VHDL through SDLC is loaded on FPGA-based controller for run-time experimentations such as functionality, performance, integrity and reliability. Some of the test data is addressed in this paper.

  18. Converging Redundant Sensor Network Information for Improved Building Control

    Energy Technology Data Exchange (ETDEWEB)

    Dale K. Tiller; Gregor P. Henze

    2005-12-01

    This project is investigating the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point would improve system performance. Phase I of the project focused on instrumentation and data collection. In Phase I, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. In phase II of the project, described in this report, we demonstrate that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. We also establish that analysis algorithms can be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications, and show that it may be possible to use sensor network pulse rate to distinguish the number of occupants in a space. Finally, in this phase of the project we also developed a prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy. This basic capability will be extended in the future by applying an algorithm-based inference to the sensor network data stream, so that the web page displays the likelihood that each monitored office or area is occupied, as a supplement to the actual status of each sensor.

  19. 计算机网络安全技术%Security Technologies of Computer Network

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 卢锡城; 卢泽新; 韩亚欣

    2000-01-01

    With the development of computer network,requirements of computer network security have been more and more urgent. In tills paper, goals of network security are reviewed. Several network attack methods,such as interruption,interception, modification, fabrication,are studied. Network security technologies,such as security mechan!sm,encryption,security detection,firewall,were discussed.

  20. Formal Variability of Terms in the Sphere of Network Technologies

    Directory of Open Access Journals (Sweden)

    Roman Viktorovich Deniko

    2015-09-01

    Full Text Available The article addresses the problem of formal variability of terms in the sphere of network terminology in the Russian language. The research is based on data from the Internet communication in the sphere of network technologies. Such formal variability types as graphical, phonemic, word building and complex (graphic and phonetic, morphologic and accentual are discussed in this article. The authors reveal the reasons for graphic variability of foreign origin terms making up the international terminological fund. These reasons cover such aspects as the use of graphics of source language and recipient language; the presence or absence of hyphenation, etc. It is determined that the phonemic variants of terms appear as a result of oral or written borrowings. The existence of such variants is also connected with the stage of their adaptation in the Russian language after borrowing. In this case the variants are related with soft or hard pronunciation of consonants. There are also some cases of phonemic variability on the graphic level. The complex variability is regarded as a part of active processes taking place in the modern Russian language, and these processes involve both native and foreign origin terms. The particular attention is paid to the word-building variants – word-building affixes the variability of which is peculiar of network technologies. The results of the research show that the variability of professional units belonging to the network technologies sublanguage is caused by the active process of borrowing of specialpurpose vocabulary into the Russian language. The process is due to the intensification of intercultural communication in the professional spheres.

  1. Controllability of deterministic networks with the identical degree sequence.

    Directory of Open Access Journals (Sweden)

    Xiujuan Ma

    Full Text Available Controlling complex network is an essential problem in network science and engineering. Recent advances indicate that the controllability of complex network is dependent on the network's topology. Liu and Barabási, et.al speculated that the degree distribution was one of the most important factors affecting controllability for arbitrary complex directed network with random link weights. In this paper, we analysed the effect of degree distribution to the controllability for the deterministic networks with unweighted and undirected. We introduce a class of deterministic networks with identical degree sequence, called (x,y-flower. We analysed controllability of the two deterministic networks ((1, 3-flower and (2, 2-flower by exact controllability theory in detail and give accurate results of the minimum number of driver nodes for the two networks. In simulation, we compare the controllability of (x,y-flower networks. Our results show that the family of (x,y-flower networks have the same degree sequence, but their controllability is totally different. So the degree distribution itself is not sufficient to characterize the controllability of deterministic networks with unweighted and undirected.

  2. Controllability of deterministic networks with the identical degree sequence.

    Science.gov (United States)

    Ma, Xiujuan; Zhao, Haixing; Wang, Binghong

    2015-01-01

    Controlling complex network is an essential problem in network science and engineering. Recent advances indicate that the controllability of complex network is dependent on the network's topology. Liu and Barabási, et.al speculated that the degree distribution was one of the most important factors affecting controllability for arbitrary complex directed network with random link weights. In this paper, we analysed the effect of degree distribution to the controllability for the deterministic networks with unweighted and undirected. We introduce a class of deterministic networks with identical degree sequence, called (x,y)-flower. We analysed controllability of the two deterministic networks ((1, 3)-flower and (2, 2)-flower) by exact controllability theory in detail and give accurate results of the minimum number of driver nodes for the two networks. In simulation, we compare the controllability of (x,y)-flower networks. Our results show that the family of (x,y)-flower networks have the same degree sequence, but their controllability is totally different. So the degree distribution itself is not sufficient to characterize the controllability of deterministic networks with unweighted and undirected.

  3. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  4. UGV: security analysis of subsystem control network

    Science.gov (United States)

    Abbott-McCune, Sam; Kobezak, Philip; Tront, Joseph; Marchany, Randy; Wicks, Al

    2013-05-01

    Unmanned Ground vehicles (UGVs) are becoming prolific in the heterogeneous superset of robotic platforms. The sensors which provide odometry, localization, perception, and vehicle diagnostics are fused to give the robotic platform a sense of the environment it is traversing. The automotive industry CAN bus has dominated the industry due to the fault tolerance and the message structure allowing high priority messages to reach the desired node in a real time environment. UGVs are being researched and produced at an accelerated rate to preform arduous, repetitive, and dangerous missions that are associated with a military action in a protracted conflict. The technology and applications of the research will inevitably be turned into dual-use platforms to aid civil agencies in the performance of their various operations. Our motivation is security of the holistic system; however as subsystems are outsourced in the design, the overall security of the system may be diminished. We will focus on the CAN bus topology and the vulnerabilities introduced in UGVs and recognizable security vulnerabilities that are inherent in the communications architecture. We will show how data can be extracted from an add-on CAN bus that can be customized to monitor subsystems. The information can be altered or spoofed to force the vehicle to exhibit unwanted actions or render the UGV unusable for the designed mission. The military relies heavily on technology to maintain information dominance, and the security of the information introduced onto the network by UGVs must be safeguarded from vulnerabilities that can be exploited.

  5. The research of laser marking control technology

    Science.gov (United States)

    Zhang, Qiue; Zhang, Rong

    2009-08-01

    In the area of Laser marking, the general control method is insert control card to computer's mother board, it can not support hot swap, it is difficult to assemble or it. Moreover, the one marking system must to equip one computer. In the system marking, the computer can not to do the other things except to transmit marking digital information. Otherwise it can affect marking precision. Based on traditional control methods existed some problems, introduced marking graphic editing and digital processing by the computer finish, high-speed digital signal processor (DSP) control marking the whole process. The laser marking controller is mainly contain DSP2812, digital memorizer, DAC (digital analog converting) transform unit circuit, USB interface control circuit, man-machine interface circuit, and other logic control circuit. Download the marking information which is processed by computer to U disk, DSP read the information by USB interface on time, then processing it, adopt the DSP inter timer control the marking time sequence, output the scanner control signal by D/A parts. Apply the technology can realize marking offline, thereby reduce the product cost, increase the product efficiency. The system have good effect in actual unit markings, the marking speed is more quickly than PCI control card to 20 percent. It has application value in practicality.

  6. 面向智能变电站二次设备的网络报文管控技术%Network Packet Control Technology for Secondary Equipments in Smart Substation

    Institute of Scientific and Technical Information of China (English)

    周华良; 郑玉平; 姚吉文; 姜雷; 谢黎; 王凯

    2015-01-01

    随着智能变电站以太网应用往混合组网、多网共口的方向发展,网络的安全稳定性对于智能变电站设备可靠运行至关重要。文中深入研究了电力二次设备在多种报文共网共口条件下接收与发送的优化处理机制。在接收方向上针对变电站网络风暴条件下的报文特点,提出多级过滤、分组流量控制的方法实现网络风暴抑制,保证了正常报文的接收与处理;在发送方向上提出以优先级划分为前提的优化调度发送策略,保证了报文发送的实时性并充分利用了网络带宽。同时,基于纯硬件片上系统实现了上述机制的实际应用与测试,有效提升了智能变电站二次设备网络通信的稳定性与可靠性。%With the application of the Ethernet tending to be hybridized in networking in smart substation and packets in multiple protocols existing in the same network,the security and stability of the network has become the crucial point for the reliability of smart substation equipments.The optimization of network packets in two directions of sending and receiving is studied.That is,according to the characteristics of packets in smart substation network,packet flow control in groups and the multi-stage filtering in the receiving direction is put forward to suppress network packet storms and processing normal packet effectively;while in the sending direction,an optimization scheduling strategy based on packet priority classification is used to get the real-time performance and make full use of network bandwidth.Meanwhile all the strategies in this paper are implemented on the SoC hardware system,the test results showing that the stability and reliability of network communication in smart substation equipments is effectively improved.

  7. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  8. Predictive Thermal Control Technology for Stable Telescope

    Science.gov (United States)

    Stahl, H. Philip

    Predictive Thermal Control (PTC) project is a multiyear effort to develop, demonstrate, mature towards TRL6, and assess the utility of model based Predictive Thermal Control technology to enable a thermally stable telescope. PTC demonstrates technology maturation by model validation and characterization testing of traceable components in a relevant environment. PTC's efforts are conducted in consultation with the Cosmic Origins Office and NASA Program Analysis Groups. To mature Thermally Stable Telescope technology, PTC has three objectives: • Validate models that predict thermal optical performance of real mirrors and structure based on their designs and constituent material properties, i.e. coefficient of thermal expansion (CTE) distribution, thermal conductivity, thermal mass, etc. • Derive thermal system stability specifications from wavefront stability requirements. • Demonstrate utility of Predictive Thermal Control for achieving thermal stability. To achieve these objectives, PTC has five quantifiable milestones: 1. Develop a high-fidelity model of the AMTD-2 1.5 meter ULE® mirror, including 3D CTE distribution and reflective optical coating, that predicts its optical performance response to steady-state and dynamic thermal gradients under bang/bang and proportional thermal control. 2. Derive specifications for thermal control system as a function of wavefront stability. 3. Design and build a predictive Thermal Control System for a 1.5 meter ULE® mirror using new and existing commercial-off-the-shelf components that sense temperature changes at the 1mK level and actively controls the mirrors thermal environment at the 20mK level. 4. Validate the model by testing a 1.5-m class ULE® mirror in a relevant thermal vacuum environment in the MSFC X-ray and Cryogenic Facility (XRCF) test facility. 5. Use validated model to perform trade studies to optimize thermo-optical performance as a function of mirror design, material selection, mass, etc. PTC advances

  9. Application of wireless sensor networks to aircraft control and health management systems

    Institute of Scientific and Technical Information of China (English)

    Rama; K.; YEDAVALLI; Rohit; K.; BELAPURKAR

    2011-01-01

    Use of fly-by-wire technology for aircraft flight controls have resulted in an improved performance and reliability along with achieving reduction in control system weight. Implementation of full authority digital engine control has also resulted in more intelligent, reliable, light-weight aircraft engine control systems. Greater reduction in weight can be achieved by replacing the wire harness with a wireless communication network. The first step towards fly-by-wireless control systems is likely to be the ...

  10. A Direct Feedback Control Based on Fuzzy Recurrent Neural Network

    Institute of Scientific and Technical Information of China (English)

    李明; 马小平

    2002-01-01

    A direct feedback control system based on fuzzy-recurrent neural network is proposed, and a method of training weights of fuzzy-recurrent neural network was designed by applying modified contract mapping genetic algorithm. Computer simul ation results indicate that fuzzy-recurrent neural network controller has perfect dynamic and static performances .

  11. Prediction based chaos control via a new neural network

    Energy Technology Data Exchange (ETDEWEB)

    Shen Liqun [School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150001 (China)], E-mail: liqunshen@gmail.com; Wang Mao [Space Control and Inertia Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China); Liu Wanyu [School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150001 (China); Sun Guanghui [Space Control and Inertia Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)

    2008-11-17

    In this Letter, a new chaos control scheme based on chaos prediction is proposed. To perform chaos prediction, a new neural network architecture for complex nonlinear approximation is proposed. And the difficulty in building and training the neural network is also reduced. Simulation results of Logistic map and Lorenz system show the effectiveness of the proposed chaos control scheme and the proposed neural network.

  12. Handover Control for WCDMA Femtocell Networks

    CERN Document Server

    Chowdhury, Mostafa Zaman

    2010-01-01

    The ability to seamlessly switch between the macro networks and femtocell networks is a key driver for femtocell network deployment. The handover procedures for the integrated femtocell/macrocell networks differ from the existing handovers. Some modifications of existing network and protocol architecture for the integration of femtocell networks with the existing macrocell networks are also essential. These modifications change the signal flow for handover procedures due to different 2-tier cell (macrocell and femtocell) environment. The handover between two networks should be performed with minimum signaling. A frequent and unnecessary handover is another problem for hierarchical femtocell/macrocell network environment that must be minimized. This work studies the details mobility management schemes for small and medium scale femtocell network deployment. To do that, firstly we present two different network architectures for small scale and medium scale WCDMA femtocell deployment. The details handover call f...

  13. An Overview on Wireless Sensor Networks Technology and Evolution

    Directory of Open Access Journals (Sweden)

    Chiara Buratti

    2009-08-01

    Full Text Available Wireless sensor networks (WSNs enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e., long network lifetime, a proper balance between communication and signal/data processing capabilities must be found. This motivates a huge effort in research activities, standardization process, and industrial investments on this field since the last decade. This survey paper aims at reporting an overview of WSNs technologies, main applications and standards, features in WSNs design, and evolutions. In particular, some peculiar applications, such as those based on environmental monitoring, are discussed and design strategies highlighted; a case study based on a real implementation is also reported. Trends and possible evolutions are traced. Emphasis is given to the IEEE 802.15.4 technology, which enables many applications of WSNs. Some example of performance characteristics of 802.15.4-based networks are shown and discussed as a function of the size of the WSN and the data type to be exchanged among nodes.

  14. Network-based production quality control

    Science.gov (United States)

    Kwon, Yongjin; Tseng, Bill; Chiou, Richard

    2007-09-01

    This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.

  15. Social networking technology, social network composition, and reductions in substance use among homeless adolescents.

    Science.gov (United States)

    Rice, Eric; Milburn, Norweeta G; Monro, William

    2011-03-01

    Peer-based prevention programs for homeless youth are complicated by the potential for reinforcing high-risk behaviors among participants. The goal of this study is to understand how homeless youth could be linked to positive peers in prevention programming by understanding where in social and physical space positive peers for homeless youth are located, how these ties are associated with substance use, and the role of social networking technologies (e.g., internet and cell phones) in this process. Personal social network data were collected from 136 homeless adolescents in Los Angeles, CA. Respondents reported on composition of their social networks with respect to: home-based peers and parents (accessed via social networking technology; e.g., the internet, cell phone, texting), homeless peers and agency staff (accessed face-to-face) and whether or not network members were substance-using or non-substance-using. Associations between respondent's lifetime cocaine, heroin, and methamphetamine use and recent (previous 30 days) alcohol and marijuana use were assessed by the number of non-substance-using versus substance-using ties in multivariate linear regression models. 43% of adolescents reported a non-substance-using home-based tie. More of these ties were associated with less recent alcohol use. 62% of adolescents reported a substance-using homeless tie. More of these ties were associated with more recent marijuana use as well as more lifetime heroin and methamphetamine use. For homeless youth, who are physically disconnected from positive peers, social networking technologies can be used to facilitate the sorts of positive social ties that effective peer-based prevention programs require.

  16. The future for weed control and technology.

    Science.gov (United States)

    Shaner, Dale L; Beckie, Hugh J

    2014-09-01

    This review is both a retrospective (what have we missed?) and prospective (where are we going?) examination of weed control and technology, particularly as it applies to herbicide-resistant weed management (RWM). Major obstacles to RWM are discussed, including lack of diversity in weed management, unwillingness of many weed researchers to conduct real integrated weed management research or growers to accept recommendations, influence or role of agrichemical marketing and governmental policy and lack of multidisciplinary research. We then look ahead to new technologies that are needed for future weed control in general and RWM in particular, in areas such as non-chemical and chemical weed management, novel herbicides, site-specific weed management, drones for monitoring large areas, wider application of 'omics' and simulation model development. Finally, we discuss implementation strategies for integrated weed management to achieve RWM, development of RWM for developing countries, a new classification of herbicides based on mode of metabolism to facilitate greater stewardship and greater global exchange of information to focus efforts on areas that maximize progress in weed control and RWM. There is little doubt that new or emerging technologies will provide novel tools for RMW in the future, but will they arrive in time? © 2013 Her Majesty the Queen in Right of Canada Pest Management Science © 2013 Society of Chemical Industry.

  17. Effective Utilization of Commercial Wireless Networking Technology in Planetary Environments

    Science.gov (United States)

    Caulev, Michael (Technical Monitor); Phillip, DeLeon; Horan, Stephen; Borah, Deva; Lyman, Ray

    2005-01-01

    The purpose of this research is to investigate the use of commercial, off-the-shelf wireless networking technology in planetary exploration applications involving rovers and sensor webs. The three objectives of this research project are to: 1) simulate the radio frequency environment of proposed landing sites on Mars using actual topographic data, 2) analyze the performance of current wireless networking standards in the simulated radio frequency environment, and 3) propose modifications to the standards for more efficient utilization. In this annual report, we present our results for the second year of research. During this year, the effort has focussed on the second objective of analyzing the performance of the IEEE 802.11a and IEEE 802.1lb wireless networking standards in the simulated radio frequency environment of Mars. The approach builds upon our previous results which deterministically modelled the RF environment at selected sites on Mars using high-resolution topographical data. These results provide critical information regarding antenna coverage patterns, maximum link distances, effects of surface clutter, and multipath effects. Using these previous results, the physical layer of these wireless networking standards has now been simulated and analyzed in the Martian environment. We are looking to extending these results to the and medium access layer next. Our results give us critical information regarding the performance (data rates, packet error rates, link distances, etc.) of IEEE 802.1 la/b wireless networks. This information enables a critical examination of how these wireless networks may be utilized in future Mars missions and how they may be possibly modified for more optimal usage.

  18. Research on fault-tolerant control of networked control systems based on information scheduling

    Institute of Scientific and Technical Information of China (English)

    Huo Zhihong; Zhang Zhixue; Fang Huajing

    2008-01-01

    A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design.Augmented state matrix analysis method is introduced,and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied.The parametric expression of the controller under actuator failures is given.Furthermore,the result is analyzed by simulation tests,which not only satisfies the networked control systems stability,but also decreases the data information number in network channel and makes full use of the network resources.

  19. Optimization-Based Approaches to Control of Probabilistic Boolean Networks

    Directory of Open Access Journals (Sweden)

    Koichi Kobayashi

    2017-02-01

    Full Text Available Control of gene regulatory networks is one of the fundamental topics in systems biology. In the last decade, control theory of Boolean networks (BNs, which is well known as a model of gene regulatory networks, has been widely studied. In this review paper, our previously proposed methods on optimal control of probabilistic Boolean networks (PBNs are introduced. First, the outline of PBNs is explained. Next, an optimal control method using polynomial optimization is explained. The finite-time optimal control problem is reduced to a polynomial optimization problem. Furthermore, another finite-time optimal control problem, which can be reduced to an integer programming problem, is also explained.

  20. Uniformed model of networked control systems with long time delay

    Institute of Scientific and Technical Information of China (English)

    Zhu Qixin; Liu Hongli; Hu Shousong

    2008-01-01

    Feedback control systems wherein the control loops are closed through a real-time network are called networked control systems (NCS). The defining feature of an NCS is that information is exchanged using a network among control system components. Two new concepts including long time delay and short time delay are proposed.The sensor is almost always clock driven. The controller or the actuator is either clock driven or event driven. Four possible driving modes of networked control systems are presented. The open loop mathematic models of networked control systems with long time delay are developed when the system is driven by anyone of the four different modes.The uniformed modeling method of networked control systems with long time delay is proposed. The simulation results are given in the end.

  1. Intelligent Joint Admission Control for Next Generation Wireless Networks

    OpenAIRE

    Mohsen, Abdulqader M.; Al-Akwaa, Fadhl M.; Mohammed M. Alkhawlani

    2012-01-01

    The Heterogeneous Wireless Network (HWN) integrates different wireless networks into one common network. The integrated networks often overlap coverage in the same wireless service areas, leading to the availability of a great variety of innovative services based on user demands in a cost-efficient manner. Joint Admission Control (JAC) handles all new or handoff service requests in the HWN. It checks whether the incoming service request to the selected Radio Access Network (RAN) by the initia...

  2. Switzerland Committed to Innovation. The Swiss Network of Technology

    Directory of Open Access Journals (Sweden)

    Konrade von Bremen

    2005-06-01

    Full Text Available

    Switzerland showed its commitment to innovation in health care since the early 80th, implementing agencies and government units with the mission to promote and to appropriately govern innovation. The Swiss Network of Technology Assessment (SNHTA was founded in 1998.

    The aim is the promotion and implementation of Health Technology Assessment projects in Switzerland by providing a neutral forum for the identification and the pursuit of common interests. This includes the coordination, exchange and dissemination of experiences of HTA projects and the implementation of the results. The collaboration in international projects is a priority. Ultimately SNHTA has the goal to improve efficacy, cost effectiveness and social accountability. An inventory survey amongst the members confirmed a high level of diverse specialised competencies, mainly employed within the institution. Only 20% of the HTA specific competencies are used for external activities.

    The need for integration of all partners in the field of innovation in a network has been recognised by the Swiss government. This lead to the creation of a webplatform in which all players involved in the business of medical technologies are involved.

    This platform (swiss medtech, includes patients, insurers, industry, universities and professional organisations. The joined activities include agreements on intellectual property and the integrated patient care chain. New ways to connect players in innovation are needed to face the challenge of increasing costs and diminishing resources.

  3. Neural Networks Control of a Magnetic Levitation System

    Science.gov (United States)

    2001-04-17

    investigation of the use of artificial neural networks (ANN) in conjunction of proportional-integral-derivative ( PID ) controllers in control of non...neural networks in controlling closed-loop active magnetic bearing and comparison with the use of PID controllers . The obtained results should create a

  4. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  5. Home medical monitoring network based on embedded technology

    Science.gov (United States)

    Liu, Guozhong; Deng, Wenyi; Yan, Bixi; Lv, Naiguang

    2006-11-01

    Remote medical monitoring network for long-term monitoring of physiological variables would be helpful for recovery of patients as people are monitored at more comfortable conditions. Furthermore, long-term monitoring would be beneficial to investigate slowly developing deterioration in wellness status of a subject and provide medical treatment as soon as possible. The home monitor runs on an embedded microcomputer Rabbit3000 and interfaces with different medical monitoring module through serial ports. The network based on asymmetric digital subscriber line (ADSL) or local area network (LAN) is established and a client - server model, each embedded home medical monitor is client and the monitoring center is the server, is applied to the system design. The client is able to provide its information to the server when client's request of connection to the server is permitted. The monitoring center focuses on the management of the communications, the acquisition of medical data, and the visualization and analysis of the data, etc. Diagnosing model of sleep apnea syndrome is built basing on ECG, heart rate, respiration wave, blood pressure, oxygen saturation, air temperature of mouth cavity or nasal cavity, so sleep status can be analyzed by physiological data acquired as people in sleep. Remote medical monitoring network based on embedded micro Internetworking technology have advantages of lower price, convenience and feasibility, which have been tested by the prototype.

  6. Network Distributed Monitoring System Based on Robot Technology Middleware

    Directory of Open Access Journals (Sweden)

    Kunikatsu Takase

    2008-11-01

    Full Text Available In this paper, a network distributed monitoring system for human assistance robot system was developed to improve the interaction among the users and local service robotic system and enable a remote user to get a better understanding of what is going on in the local environment. Home integration robot system and network monitoring system using QuickCam Orbit cameras were developed and demonstrated from June 9 to June 19 at the 2005 World Exposition, Aichi, Japan. Improvements of network distributed monitoring system using IEEE1394 cameras with high performance and high resolution have been done in order to extend the application of system. Robot Technology Middleware (RTM was used in the developed system. By using RTM, we can develop cameras functional elements as RT software components that can be implemented by different programming languages, run in different operating system, or connected in different networks to interoperate.It is also easy to create comprehensive robot system application by reusing existing modules thus facilitating networkdistributed software sharing and improving the cost of writing and maintaining software.

  7. Network resource control for grid workflow management systems

    NARCIS (Netherlands)

    Strijkers, R.J.; Cristea, M.; Korkhov, V.; Marchal, D.; Belloum, A.; Laat, C.de; Meijer, R.J.

    2010-01-01

    Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network

  8. Networked Control System Simulation Design and Its Application

    Institute of Scientific and Technical Information of China (English)

    A. B. Soglo; YANG Xianhui

    2006-01-01

    This paper presents a framework for networked control system simulation (NCSS) to enable the analysis of the influence of network transmissions on the performance of control systems. The simulation is composed of the network environment simulated using the network simulator, the control system component simulation using Matlab or C/C++, and an external application programming interface. To implement the plant (sensor), controller, and actuator nodes, an agent-based design is introduced, and a multi-agent networked control system is constructed. Therefore, the network simulator 2-26 (NS-2.26) release is extended by modifying the user data protocol (UDP) common header in order to support application data transmission between network nodes. Then, modifying the network topology parameters, networked control system simulations are analyzed for different parameter changes, such as the network bandwidth, the number of plant nodes, and the sampling period. An analysis of the influence of these parameters on network-induced delays and packet drop is made. The results show that the simulation system is an effective tool for the study of networked control systems.

  9. Pinning control of complex networked systems synchronization, consensus and flocking of networked systems via pinning

    CERN Document Server

    Su, Housheng

    2013-01-01

    Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering.   Housheng Su is an Associate Professor at the Department of Contro...

  10. Examining Engineering & Technology Students' Acceptance of Network Virtualization Technology Using the Technology Acceptance Model

    Science.gov (United States)

    Yousif, Wael K.

    2010-01-01

    This causal and correlational study was designed to extend the Technology Acceptance Model (TAM) and to test its applicability to Valencia Community College (VCC) Engineering and Technology students as the target user group when investigating the factors influencing their decision to adopt and to utilize VMware as the target technology. In…

  11. Integrating Space Communication Network Capabilities via Web Portal Technologies

    Science.gov (United States)

    Johnston, Mark D.; Lee, Carlyn-Ann; Lau, Chi-Wung; Cheung, Kar-Ming; Levesque, Michael; Carruth, Butch; Coffman, Adam; Wallace, Mike

    2014-01-01

    We have developed a service portal prototype as part of an investigation into the feasibility of using Java portlet technology as a means of providing integrated access to NASA communications network services. Portal servers provide an attractive platform for this role due to the various built-in collaboration applications they can provide, combined with the possibility to develop custom inter-operating portlets to extent their functionality while preserving common presentation and behavior. This paper describes various options for integration of network services related to planning and scheduling, and results based on use of a popular open-source portal framework. Plans are underway to develop an operational SCaN Service Portal, building on the experiences reported here.

  12. Adaptive Sampling for WSAN Control Applications Using Artificial Neural Networks

    OpenAIRE

    2012-01-01

    Wireless sensor actuator networks are becoming a solution for control applications. Reliable data transmission and real time constraints are the most significant challenges. Control applications will have some Quality of Service (QoS) requirements from the sensor network, such as minimum delay and guaranteed delivery of packets. We investigate variable sampling method to mitigate the effects of time delays in wireless networked control systems using an observer based control system model. Our...

  13. Survey on the information network for environmental technology transfer; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    In order to promote the interchange of environmental technologies mainly with developing countries (APEC countries), the concrete survey on construction of the information network for technology transfer was carried out. The useful information about environmental technologies for developing countries are not the latest Japanese information but actual field information in practical use which have been developed on the basis of constant improvements. Developing countries want clean technologies with less environmental burden, and difficult-to-obtain information for small and medium-sized businesses. Data were thus collected mainly in the Chubu district, and the information system was composed of an Internet server and in-house LAN. The system featured by easy retrieval and maintenance of the database was adopted. In addition, Internet connection environment and information needs in developing countries were surveyed. Expansion of the database and information supply, and constant addition of fresh information by continuous maintenance are essential in the future. 6 figs.

  14. Control and understanding: owning your home network

    OpenAIRE

    Mortier, R.; Rodden, T.; Lodge, T.; McAuley, D; Rotsos, C.; Moore, A. W.; Koliousis, A.; Sventek, J.

    2012-01-01

    Wireless home networks are increasingly deployed i people’s homes worldwide. Unfortunately, home networks have\\ud evolved using protocols designed for backbone and enterprise\\ud networks, which are quite different in scale and character to home networks. We believe this evolution is at the heart of widely observed problems experienced by users managing and using their home networks. In this paper we investigate redesign of the home router to exploit the distinct social and physical characteri...

  15. Control and estimation methods over communication networks

    CERN Document Server

    Mahmoud, Magdi S

    2014-01-01

    This book provides a rigorous framework in which to study problems in the analysis, stability and design of networked control systems. Four dominant sources of difficulty are considered: packet dropouts, communication bandwidth constraints, parametric uncertainty, and time delays. Past methods and results are reviewed from a contemporary perspective, present trends are examined, and future possibilities proposed. Emphasis is placed on robust and reliable design methods. New control strategies for improving the efficiency of sensor data processing and reducing associated time delay are presented. The coverage provided features: ·        an overall assessment of recent and current fault-tolerant control algorithms; ·        treatment of several issues arising at the junction of control and communications; ·        key concepts followed by their proofs and efficient computational methods for their implementation; and ·        simulation examples (including TrueTime simulations) to...

  16. Model of Controlling the Hubs in P2P Networks

    Directory of Open Access Journals (Sweden)

    Yuhua Liu

    2009-06-01

    Full Text Available Research into the hubs in Peer-to-Peer (P2P networks, and present a new method to avoid generating the hubs in the networks by controlling the logical topology structure of P2P networks. We firstly introduce the controlling ideas about hierarchizing the hubs. Then, we disclose and interpret the controlling model, and give out the concrete method to carry it out. Finally, we validate our controlling model via simulations and the simulation results demonstrate that our work is effective to control the hubs in P2P networks. Thus, this model can improve the network competence to defend against coordinated attacks, promote the network robustness, and ensure the network would develop continually and healthily.

  17. Review and evaluation of the Office of Science and Technology`s Community Leaders Network

    Energy Technology Data Exchange (ETDEWEB)

    Carnes, S.A.; Schweitzer, M.; Peelle, E.R.

    1997-08-01

    This report constitutes a review and evaluation of the Community Leaders Network (CLN), an informally structured national stakeholder group sponsored by the Department of Energy (DOE) Environmental Management (EM) Program`s Office of Science and Technology (OST) to obtain citizen input into the technology research and development programs of the OST. Since the CLN`s inception in 1993, its participants, currently numbering about 35 members mostly from jurisdictions hosting DOE waste management and environmental remediation sites, and its clients (i.e., OST) have invested substantial resources to develop the capability to enhance technology development and deployment activities through proactive stakeholder involvement. The specific objectives of the CLN are to: provide feedback and input to OST on technology development activities; provide information on OST ideas and approaches to key stakeholder groups, and provide input to OST on stakeholder concerns and involvement.

  18. Technology and knowledge flow the power of networks

    CERN Document Server

    Trentin, Guglielmo

    2011-01-01

    This book outlines how network technology can support, foster and enhance the Knowledge Management, Sharing and Development (KMSD) processes in professional environments through the activation of both formal and informal knowledge flows. Understanding how ICT can be made available to such flows in the knowledge society is a factor that cannot be disregarded and is confirmed by the increasing interest of companies in new forms of software-mediated social interaction. The latter factor is in relation both to the possibility of accelerating internal communication and problem solving processes, an

  19. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  20. Wireless body area networks technology, implementation, and applications

    CERN Document Server

    Yuce, Mehmet R

    2011-01-01

    The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli

  1. An analysis of communications and networking technologies for the smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Hernandez, Joaquin [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2013-03-01

    The Smart Grid concept has been foreseen as the integration of the electrical generation, transmission and distribution network and the data communications network. Although, traditional communications interfaces, protocols and standards has been used in the electrical grid in an isolated manner, modern communications network is considered as the fundamental enabling technology within the future Smart Grid. Modern communications technologies, protocol architectures and standards can help to build a common communications network infrastructure for data transport between customer premises, power substations, and power distribution systems, utility control centers and utility data centers. The Smart Grid will support traditional applications such as SCADA, distribution automation (DA), energy management systems (EMS), demand site management (DSM) and automatic meter reading (AMR), etc., as well as new applications like advanced metering infrastructure (AMI), substation automation (SA), microgrids, distributed generation, grid monitoring and control, data storage and analysis, among others. To make this possible, the Smart Grid requires a two-way wide area communications network between different dispersed areas, from generation, to distribution to consumer premises. In fact, it will consist of many different types of communications networks such as wide area networks, local area network, home area networks, etc. This requires a new architectural approach to implement a common communications infrastructure that provides the reliability, scalability, security and interoperability to support multiple applications. In addition, open standards addressing interoperability, are key for the development and deployment of the Smart Grid as a true integrated network. A communications backbone is necessary to provide interoperability. To achieve the level of networking, interoperability and security that meets the technical requirements of the Smart Grid, its data communications

  2. Performance of Networked DC Motor with Fuzzy Logic Controller

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2010-07-01

    Full Text Available In the recent years the usage of data networks has been increased due to its cost effective and flexible applications. A shared data network can effectively reduce complicated wiring connections, installation and maintenance for connecting a complex control system with various sensors, actuators, and controllers as a networked control system. For the time-sensitive application with networked control system the remote dc motor actuation control has been chosen. Due to time-varying network traffic demands and disturbances, the guarantee of transmitting signals without any delays or data losses plays a vital role for the performances in using networked control systems. This paper proposes Fuzzy Logic Controller methodology in the networked dc motor control and the results are compared with the performance of the system with Ziegler-Nichols Tuned Proportional-Integral-Derivative Controller and Fuzzy Modulated Proportional-Integral-Derivative Controller. Simulations results are presented to demonstrate the proposed schemes in a closed loop control. The effective results show that the performance of networked control dc motor is improved by using Fuzzy Logic Controller than the other controllers.

  3. Estimation of Network Delay in Control Systems and Reducing Network's Effects by Using Data Sending Management

    Directory of Open Access Journals (Sweden)

    Naser Pariz

    2007-06-01

    Full Text Available This paper opens with introducing the structure of the network control systems and then the impact of the network on the system equations is simultaneously modeled and the factors affecting the network control systems, due to the existence of the network in the system, are examined.Next, a instantaneous approximation based on Kalman filter design is obtained, by considering the delay as random variable and by an appropriate modeling of network control system dynamics. For doing this, the impact of the network on the main system is modeled in a way that can be used for Kalman filter. Then, the impact of the network on the system performance is approximated based on the model and the Kalman filter. At last by using data sending management network's effect on control system is reduced.

  4. Utilizing HPC Network Technologies in High Energy Physics Experiments

    CERN Document Server

    AUTHOR|(CDS)2088631; The ATLAS collaboration

    2017-01-01

    Because of their performance characteristics high-performance fabrics like Infiniband or OmniPath are interesting technologies for many local area network applications, including data acquisition systems for high-energy physics experiments like the ATLAS experiment at CERN. This paper analyzes existing APIs for high-performance fabrics and evaluates their suitability for data acquisition systems in terms of performance and domain applicability. The study finds that existing software APIs for high-performance interconnects are focused on applications in high-performance computing with specific workloads and are not compatible with the requirements of data acquisition systems. To evaluate the use of high-performance interconnects in data acquisition systems a custom library, NetIO, is presented and compared against existing technologies. NetIO has a message queue-like interface which matches the ATLAS use case better than traditional HPC APIs like MPI. The architecture of NetIO is based on a interchangeable bac...

  5. Accelerator and feedback control simulation using neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, D.; Lee, M.; Sass, R.; Shoaee, H.

    1991-05-01

    Unlike present constant model feedback system, neural networks can adapt as the dynamics of the process changes with time. Using a process model, the Accelerator'' network is first trained to simulate the dynamics of the beam for a given beam line. This Accelerator'' network is then used to train a second Controller'' network which performs the control function. In simulation, the networks are used to adjust corrector magnetics to control the launch angle and position of the beam to keep it on the desired trajectory when the incoming beam is perturbed. 4 refs., 3 figs.

  6. Edge orientation for optimizing controllability of complex networks.

    Science.gov (United States)

    Xiao, Yan-Dong; Lao, Song-Yang; Hou, Lv-Lin; Bai, Liang

    2014-10-01

    Recently, as the controllability of complex networks attracts much attention, how to design and optimize the controllability of networks has become a common and urgent problem in the field of controlling complex networks. Previous work focused on the structural perturbation and neglected the role of edge direction to optimize the network controllability. In a recent work [Phys. Rev. Lett. 103, 228702 (2009)], the authors proposed a simple method to enhance the synchronizability of networks by assignment of link direction while keeping network topology unchanged. However, the controllability is fundamentally different from synchronization. In this work, we systematically propose the definition of assigning direction to optimize controllability, which is called the edge orientation for optimal controllability problem (EOOC). To solve the EOOC problem, we construct a switching network and transfer the EOOC problem to find the maximum independent set of the switching network. We prove that the principle of our optimization method meets the sense of unambiguity and optimum simultaneously. Furthermore, the relationship between the degree-degree correlations and EOOC are investigated by experiments. The results show that the disassortativity pattern could weaken the orientation for optimal controllability, while the assortativity pattern has no correlation with EOOC. All the experimental results of this work verify that the network structure determines the network controllability and the optimization effects.

  7. Controllability of Weighted and Directed Networks with Nonidentical Node Dynamics

    Directory of Open Access Journals (Sweden)

    Linying Xiang

    2013-01-01

    Full Text Available The concept of controllability from control theory is applied to weighted and directed networks with heterogenous linear or linearized node dynamics subject to exogenous inputs, where the nodes are grouped into leaders and followers. Under this framework, the controllability of the controlled network can be decomposed into two independent problems: the controllability of the isolated leader subsystem and the controllability of the extended follower subsystem. Some necessary and/or sufficient conditions for the controllability of the leader-follower network are derived based on matrix theory and graph theory. In particular, it is shown that a single-leader network is controllable if it is a directed path or cycle, but it is uncontrollable for a complete digraph or a star digraph in general. Furthermore, some approaches to improving the controllability of a heterogenous network are presented. Some simulation examples are given for illustration and verification.

  8. Urgent epidemic control mechanism for aviation networks

    KAUST Repository

    Peng, Chengbin

    2011-01-01

    In the current century, the highly developed transportation system can not only boost the economy, but also greatly accelerate the spreading of epidemics. While some epidemic diseases may infect quite a number of people ahead of our awareness, the health care resources such as vaccines and the medical staff are usually locally or even globally insufficient. In this research, with the network of major aviation routes as an example, we present a method to determine the optimal locations to allocate the medical service in order to minimize the impact of the infectious disease with limited resources. Specifically, we demonstrate that when the medical resources are insufficient, we should concentrate our efforts on the travelers with the objective of effectively controlling the spreading rate of the epidemic diseases. © 2011 Springer-Verlag Berlin Heidelberg.

  9. A wireless solution for greenhouse monitoring and control system based on ZigBee technology

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    With the rapid development of wireless technologies, it is possible for Chinese greenhouses to be equipped with wireless sensor networks due to their low-cost, simplicity and mobility. In the current study, we compared the advantages of ZigBee with other two similar wireless networking protocols, Wi-Fi and Bluetooth, and proposed a wireless solution for greenhouse monitoring and control system based on ZigBee technology. As an explorative application of ZigBee technology in Chinese greenhouse, it may promote Chinese protected agriculture.

  10. An Industrial Control System for the Supervision of the CERN Electrical Distribution Network

    CERN Document Server

    Poulsen, S

    1999-01-01

    CERN operates a large distribution network for the supply of electricity to the particle accelerators, experiments and the associated infrastructure. The distribution network operates on voltage levels from 400 V to 400 kV with a total yearly consumption of near to 1000 GWh. In the past, the laboratory has developed an in-house control system for this network, using the technologies applied to the accelerator control system. However, CERN is now working on a project to purchase, configure and install an industrial Electrical Network Supervisor (ENS). This is a state-of-the-art industrial control system completely developed and supported by an external contractor. The system - based on a scalable and distributed architecture - will allow the installation to be performed gradually, and will be tested while the existing system is fully operational. Ultimately, the complete electrical distribution network will be supervised with this new system, the maintenance and further development of which will be the complet...

  11. Avionics and ATC Technology for Mission Control

    Directory of Open Access Journals (Sweden)

    Elena BALMUS

    2015-09-01

    Full Text Available This paper presents a review of the old-fashioned communication and radio navigation techniques as a starting point for the development of new technologies for the Air Traffic Control based on 1940’s era radar. Current research tendencies focus on the reduction of delays and overload in a congested airspace. A key step in providing increased situational awareness for controllers and pilots is sharing operational information to improve access and flexibility. Communication between cockpit and controller through audio channels has become insufficient with the growing number of flights that take to skies every day and every year; therefore the need for alternative solutions to meet that demand has appeared. New technologies use messaging to deliver clearances, coordinates and commands determining the operators of aircraft to see the information, acknowledge, and act. Besides the new means of communication, precision navigation guidance based on GPS signals has been developed for exact alignment and descent of aircraft on approach to land on a runway.

  12. Divison of Environmental Control Technology program, 1978

    Energy Technology Data Exchange (ETDEWEB)

    Mott, William E.

    1979-06-01

    This report covers Division of Environmental Control Technology projects in progress during FY 1978, within the Office of the Assistant Secretary for Environment, Department of Energy. It is the second in a planned series of annual reports. The Division of Environmental Control Technology (ECT) continues to support the Assistant Secretary for Environment (EV) in discharging two primary responsibilities: (1) under the Environmental Engineering (EE) Program, the independent overview and assessment of environmental control aspects of both the U.S. Department of Energy's (DOE) research, development, and demonstration (RD and D) programs and the Nation's energy policies, and (2) under the Decontamination and Decommissioning Program, the reduction of potential environmental hazards at the radioactively contaminated sites that are presently owned or were formerly used by the Government. This report presents a short summary of objectives, approach, progress and results, future plans, and a reference bibliography for each research, development, or assessment project within the program areas described above.

  13. Optimizing controllability of edge dynamics in complex networks by perturbing network structure

    Science.gov (United States)

    Pang, Shaopeng; Hao, Fei

    2017-03-01

    Using the minimum input signals to drive the dynamics in complex networks toward some desired state is a fundamental issue in the field of network controllability. For a complex network with the dynamical process defined on its edges, the controllability of this network is optimal if it can be fully controlled by applying one input signal to an arbitrary non-isolated vertex of it. In this paper, the adding-edge strategy and turning-edge strategy are proposed to optimize the controllability by minimum structural perturbations. Simulations and analyses indicate that the minimum number of adding-edges required for the optimal controllability is equal to the minimum number of turning-edges, and networks with positively correlated in- and out-degrees are easier to achieve optimal controllability. Furthermore, both the strategies have the capacity to reveal the relationship between certain structural properties of a complex network and its controllability of edge dynamics.

  14. Mesh Networking in the Tactical Environment Using White Space Technolog

    Science.gov (United States)

    2015-12-01

    Simulating Channel Metrics via NS-3 Wifi Module Critical to the return of realistic results for a multi-hop network via simulation was the accu- rate...Telecommunications Information Administration SATCOM Satellite Communications xiii SINCGARS Single Channel Ground and Airborne Radio System Transmission Control...to transmit voice and data traffic. 6 The Army field manual that covers tactical radio operations extensively covers the Single Channel Ground and

  15. Master station control and capacity assignment for Italsat network

    Science.gov (United States)

    Morris, Adrian; Sampson, Nicholas; Lopes, Antonino; di Martino, Roberto; Saitto, Antonio

    1990-11-01

    The design approach to developing a network-controller and capacity-assignment software package for the Italsat satellite switched/time division multiple-access (SS/TDMA) network is covered. The network consists of TDMA traffic stations (TS) allowing a full mesh connectivity between all sites; one of the TSs is designated as a control station (CS). The major processing elements of the network, the functions of the master station, and database configurations are discussed, along with TDMA-station control and traffic reconfiguration, the assignment of satellite capacity on demand, and interactions among these network elements. Emphasis is placed on the traffic reconfiguration process, and it is pointed out that the satellite network control processor and the CS overhead burst processor work together to provide the system with the necessary support to operate the network.

  16. Situation awareness of active distribution network: roadmap, technologies, and bottlenecks

    DEFF Research Database (Denmark)

    Lin, Jin; Wan, Can; Song, Yonghua

    2016-01-01

    that operators are aware of operation states and potential risks. Current solutions in distribution supervisory control and data acquisition (DSCADA) as well as the distribution automation system (DAS) generally are not able to meet the technology requirements of SA. In this paper, the authors’ participation...

  17. Controlled stochastic networks in heavy traffic: Convergence of value functions

    CERN Document Server

    Budhiraja, Amarjit; 10.1214/11-AAP784

    2012-01-01

    Scheduling control problems for a family of unitary networks under heavy traffic with general interarrival and service times, probabilistic routing and an infinite horizon discounted linear holding cost are studied. Diffusion control problems, that have been proposed as approximate models for the study of these critically loaded controlled stochastic networks, can be regarded as formal scaling limits of such stochastic systems. However, to date, a rigorous limit theory that justifies the use of such approximations for a general family of controlled networks has been lacking. It is shown that, under broad conditions, the value function of the suitably scaled network control problem converges to that of the associated diffusion control problem. This scaling limit result, in addition to giving a precise mathematical basis for the above approximation approach, suggests a general strategy for constructing near optimal controls for the physical stochastic networks by solving the associated diffusion control problem...

  18. Guaranteeing Isochronous Control of Networked Motion Control Systems Using Phase Offset Adjustment

    Directory of Open Access Journals (Sweden)

    Ikhwan Kim

    2015-06-01

    Full Text Available Guaranteeing isochronous transfer of control commands is an essential function for networked motion control systems. The adoption of real-time Ethernet (RTE technologies may be profitable in guaranteeing deterministic transfer of control messages. However, unpredictable behavior of software in the motion controller often results in unexpectedly large deviation in control message transmission intervals, and thus leads to imprecise motion. This paper presents a simple and efficient heuristic to guarantee the end-to-end isochronous control with very small jitter. The key idea of our approach is to adjust the phase offset of control message transmission time in the motion controller by investigating the behavior of motion control task. In realizing the idea, we performed a pre-runtime analysis to determine a safe and reliable phase offset and applied the phase offset to the runtime code of motion controller by customizing an open-source based integrated development environment (IDE. We also constructed an EtherCAT-based motion control system testbed and performed extensive experiments on the testbed to verify the effectiveness of our approach. The experimental results show that our heuristic is highly effective even for low-end embedded controller implemented in open-source software components under various configurations of control period and the number of motor drives.

  19. An Artificial Neural Network Control System for Spacecraft Attitude Stabilization

    Science.gov (United States)

    1990-06-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California ’-DTIC 0 ELECT f NMARO 5 191 N S, U, THESIS B . AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR...NO. NO. NO ACCESSION NO 11. TITLE (Include Security Classification) AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR SPACECRAFT ATTITUDE STABILIZATION...obsolete a U.S. G v pi.. iim n P.. oiice! toog-eo.5s43 i Approved for public release; distribution is unlimited. AN ARTIFICIAL NEURAL NETWORK CONTROL

  20. Decoupling Control Method Based on Neural Network for Missiles

    Institute of Scientific and Technical Information of China (English)

    ZHAN Li; LUO Xi-shuang; ZHANG Tian-qiao

    2005-01-01

    In order to make the static state feedback nonlinear decoupling control law for a kind of missile to be easy for implementation in practice, an improvement is discussed. The improvement method is to introduce a BP neural network to approximate the decoupling control laws which are designed for different aerodynamic characteristic points, so a new decoupling control law based on BP neural network is produced after the network training. The simulation results on an example illustrate the approach obtained feasible and effective.

  1. Application framework for programmable network control

    NARCIS (Netherlands)

    Strijkers, R.; Cristea, M.; de Laat, C.; Meijer, R.; Clemm, A.; Wolter, R.

    2011-01-01

    We present a framework that enables application developers to create complex and application specific network services. The essence of our approach is to utilize programmable network elements to create a software representation of network elements in the application. We show that the typical pattern

  2. 虚拟仿真技术在网络闭环控制中的应用%Application of virtual simulation technology in network closed-loop control

    Institute of Scientific and Technical Information of China (English)

    徐淑萍

    2012-01-01

    Internet上数据传输的不确定延时妨碍了远程被控对象和操作者之间迅捷而透明的交互,严重限制了网络远程控制系统的性能和应用.为了解决网络延时问题,提出一种基于虚拟仿真的网络三闭环控制结构.该方法依照开环系统实现闭环控制的思想,在客户端构造虚拟被控对象模型,使虚拟仿真系统与实际系统的运行状态相似甚至相同,同时又使操作者能依据虚拟仿真系统一端的运行情况决定下一步的控制指令,从而准确地对实际系统发出所需的控制指令,最终达到远程实时控制的目的.仿真结果证明了所提方法的有效性和可行性.%It is very hard to have a transparent and prompt interaction between user and remote controlled object due to uncertain time delay over the Internet, which severely limits the performance of network control systems. In order to solve the problem of random delay, a kind of three closed-loop network control structure based on virtual simulation was proposed. In accordance with the idea of open-loop system to achieve closed-loop control, this method constructed the virtual controlled object model in the client, made the operation states of virtual simulation system be similar or even identical to those of actual system, while allowing the operator to decide the next control instruction according to the operation of the virtual simulation system, so as to accurately give the required control instructions to the actual system, which ultimately achieved the purpose of remote real-time control. The simulation results show the validity and feasibility of the proposed method.

  3. GMPLS: IP-Centric Control Protocols for Optical Networks(Tutorial)

    Institute of Scientific and Technical Information of China (English)

    Yaohui Jin; Weisheng Hu

    2003-01-01

    Recent advances in optical networking technologies, particularly DWDM and MEMS, promise the transmission and switching of huge bandwidth capacity. The carriers have convinced of that their revenue must be earned from efficient bandwidth management instead of unsophisticated increase in capacity. The distributed control plane can offer more flexibility, reliability and scalability, whose functions include addressing, resource and topology discovery, route computation, provisioning and restoration. Generalized Multi-Protocol Label Switching (GMPLS), an IP-centric control plane, inherit the best features of IP and ATM technologies in terms of QoS and traffic engineering. Besides,GMPLS introduces enhancements to the existing IP routing and signaling protocols by supporting not only packet switching networks (IP) and frame/cell switching networks (ATM), but also networks that perform switching in time (e.g. SDH/SONET, PDH, G.709), wavelength (lambdas), and space (fiber) domain.

  4. CFO finance network centrality, errors and internal control material weaknessess

    NARCIS (Netherlands)

    Schabus, M.

    2015-01-01

    CFOs finance networks matter in determining certain accounting and reporting outcomes. Drawing on social network theory, this study shows that CFO centrality in a network of financial experts is inversely related to the occurrence of restatements due to errors and disclosure of internal control mate

  5. Controlled synchronization of complex network with different kinds of nodes

    Institute of Scientific and Technical Information of China (English)

    Zhengquan YANG; Zhongxin LIU; Zengqiang CHEN; Zhuzhi YUAN

    2008-01-01

    In this paper, a new dynamical network model is introduced, in which the nodes of the network are different. It is shown that by the designed controllers, the state of the network can exponentially synchronize onto a homogeneous stationary state. Some criteria are derived and some examples are presented. The numerical simulations coincide with theoretical analysis.

  6. Gate-controlled rectifying behavior in C70@SWNT networks.

    Science.gov (United States)

    Guo, Ao; Fu, Yunyi; Liu, Jia; Guan, Lunhui; Shi, Zujin; Gu, Zhennan; Huang, Ru; Zhang, Xing

    2006-05-25

    We report the gate-controlled rectification behavior in C(70)@SWNT networks at room temperature in air. The electrical transport characteristics can be fitted well with the conventional Schottky diode model. The origin of the rectifying behavior in fullerene peapod networks device is qualitatively discussed. This paper demonstrates a strategy for diode fabrication based on peapod networks.

  7. CFO finance network centrality, errors and internal control material weaknessess

    NARCIS (Netherlands)

    Schabus, M.

    2015-01-01

    CFOs finance networks matter in determining certain accounting and reporting outcomes. Drawing on social network theory, this study shows that CFO centrality in a network of financial experts is inversely related to the occurrence of restatements due to errors and disclosure of internal control mate

  8. 校园网安全之ACL技术%ACL Technology of Campus Network Security

    Institute of Scientific and Technical Information of China (English)

    高琳

    2013-01-01

    With the development of large-scale open campus network, campus network is facing more and more threat. On the one hand, in order to develop the foreign exchange in college and universities, we must allow access to network resources development, on the other hand, we must ensure the safety of the campus network data and resources. Network security adopts a lot of technology, and through the access control list (ACL), it can filter the data flow, is a basic one of the campus network security means.%随着大规模开放式校园网络的开发,校园网面临的威胁也越来越多。一方面为了高校对外交流的开展,必须允许对网络资源的开发访问,另一方面,又必须确保校园网数据和资源的尽可能安全。网络安全采用的技术很多,而通过访问控制列表(ACL)可以对数据流进行过滤,是实现基本的校园网安全手段之一。

  9. A geometrical approach to control and controllability of nonlinear dynamical networks.

    Science.gov (United States)

    Wang, Le-Zhi; Su, Ri-Qi; Huang, Zi-Gang; Wang, Xiao; Wang, Wen-Xu; Grebogi, Celso; Lai, Ying-Cheng

    2016-04-14

    In spite of the recent interest and advances in linear controllability of complex networks, controlling nonlinear network dynamics remains an outstanding problem. Here we develop an experimentally feasible control framework for nonlinear dynamical networks that exhibit multistability. The control objective is to apply parameter perturbation to drive the system from one attractor to another, assuming that the former is undesired and the latter is desired. To make our framework practically meaningful, we consider restricted parameter perturbation by imposing two constraints: it must be experimentally realizable and applied only temporarily. We introduce the concept of attractor network, which allows us to formulate a quantifiable controllability framework for nonlinear dynamical networks: a network is more controllable if the attractor network is more strongly connected. We test our control framework using examples from various models of experimental gene regulatory networks and demonstrate the beneficial role of noise in facilitating control.

  10. Economics of selected water control technologies and their ...

    African Journals Online (AJOL)

    Economics of selected water control technologies and their successful use: The case of Ethiopia. ... of these controls technologies and institutionalizing some sort of cost recovery schemes. ... DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  11. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  12. Implementing controlled-unitary operations over the butterfly network

    Science.gov (United States)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2014-12-01

    We introduce a multiparty quantum computation task over a network in a situation where the capacities of both the quantum and classical communication channels of the network are limited and a bottleneck occurs. Using a resource setting introduced by Hayashi [1], we present an efficient protocol for performing controlled-unitary operations between two input nodes and two output nodes over the butterfly network, one of the most fundamental networks exhibiting the bottleneck problem. This result opens the possibility of developing a theory of quantum network coding for multiparty quantum computation, whereas the conventional network coding only treats multiparty quantum communication.

  13. Implementing controlled-unitary operations over the butterfly network

    Energy Technology Data Exchange (ETDEWEB)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S. [Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo (Japan); Murao, Mio [Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo, Japan and NanoQuine, The University of Tokyo, Tokyo (Japan)

    2014-12-04

    We introduce a multiparty quantum computation task over a network in a situation where the capacities of both the quantum and classical communication channels of the network are limited and a bottleneck occurs. Using a resource setting introduced by Hayashi [1], we present an efficient protocol for performing controlled-unitary operations between two input nodes and two output nodes over the butterfly network, one of the most fundamental networks exhibiting the bottleneck problem. This result opens the possibility of developing a theory of quantum network coding for multiparty quantum computation, whereas the conventional network coding only treats multiparty quantum communication.

  14. Hierarchical hybrid control network design based on LON and master-slave RS-422/485 protocol

    Institute of Scientific and Technical Information of China (English)

    彭可; 陈际达; 陈岚

    2002-01-01

    Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu-ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON and master-slave RS-422/485 protocol. This design adopts LON as the trunk, master-slave RS-422/485 control networks are connected to LON as special subnets by dedicated gateways. It is an implementation method for isomerous control network integration. Data management is ranked according to real-time requirements for different network data. The core components, such as control network nodes, router and gateway, are detailed in the paper. The design utilizes both communication advantage of LonWorks technology and the more powerful control ability of universal MCUs or PLCs, thus it greatly increases system response speed and performance-cost ratio.

  15. Automated Service Discovery using Autonomous Control Technologies Project

    Data.gov (United States)

    National Aeronautics and Space Administration — With the advent of mobile commerce technologies, the realization of pervasive computing and the formation of ad-hoc networks can be leveraged to the benefit of the...

  16. Network on science and technology for the conservation of cultural heritage.

    OpenAIRE

    Sáiz-Jiménez, Cesáreo; Rogerio Candelera, Miguel A.

    2011-01-01

    Electronic Newsletter. CSIC Thematic Network on Cultural Heritage and Network on Science and Technology for the Conservation of Cultural Heritage Instituto de Recursos Naturales y Agrobiología de Sevilla, CSIC, Apartado de Correos 1052, 41080 Sevilla (Spain)

  17. Guaranteed Cost Fault-Tolerant Control for Networked Control Systems with Sensor Faults

    OpenAIRE

    Qixin Zhu; Kaihong Lu; Guangming Xie; Yonghong Zhu

    2015-01-01

    For the large scale and complicated structure of networked control systems, time-varying sensor faults could inevitably occur when the system works in a poor environment. Guaranteed cost fault-tolerant controller for the new networked control systems with time-varying sensor faults is designed in this paper. Based on time delay of the network transmission environment, the networked control systems with sensor faults are modeled as a discrete-time system with uncertain parameters. And the mode...

  18. Dynamic Security and Robustness of Networked Systems: Random Graphs, Algebraic Graph Theory, and Control over Networks

    Science.gov (United States)

    2012-02-28

    IEEE Transactions on Automatic Control (to appear). • A. Chapman and M. Mesbahi, Influence models for consensus-type networks, IEEE Transactions on Automatic Control (to...analysis and synthesis of relative sensing networks, IEEE Transactions on Automatic control , 56 (5): 971-982, 2011. • D. Zelazo and M. Mesbahi, Edge...agreement: graph-theoretic performance bounds and passivity anal- ysis, IEEE

  19. Minimizing communication cost among distributed controllers in software defined networks

    Science.gov (United States)

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  20. Control Loop Sensor Calibration Using Neural Networks for Robotic Control

    Directory of Open Access Journals (Sweden)

    Kathleen A. Kramer

    2011-01-01

    Full Text Available Whether sensor model’s inaccuracies are a result of poor initial modeling or from sensor damage or drift, the effects can be just as detrimental. Sensor modeling errors result in poor state estimation. This, in turn, can cause a control system relying upon the sensor’s measurements to become unstable, such as in robotics where the control system is applied to allow autonomous navigation. A technique referred to as a neural extended Kalman filter (NEKF is developed to provide both state estimation in a control loop and to learn the difference between the true sensor dynamics and the sensor model. The technique requires multiple sensors on the control system so that the properly operating and modeled sensors can be used as truth. The NEKF trains a neural network on-line using the same residuals as the state estimation. The resulting sensor model can then be reincorporated fully into the system to provide the added estimation capability and redundancy.

  1. Application of neural networks to unsteady aerodynamic control

    Science.gov (United States)

    Faller, William E.; Schreck, Scott J.; Luttges, Marvin W.

    1994-01-01

    The problem under consideration in this viewgraph presentation is to understand, predict, and control the fluid mechanics of dynamic maneuvers, unsteady boundary layers, and vortex dominated flows. One solution is the application of neural networks demonstrating closed-loop control. Neural networks offer unique opportunities: simplify modeling of three dimensional, vortex dominated, unsteady separated flow fields; are effective means for controlling unsteady aerodynamics; and address integration of sensors, controllers, and time lags into adaptive control systems.

  2. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  3. Scalable Approaches to Control Network Dynamics: Prospects for City Networks

    Science.gov (United States)

    Motter, Adilson E.; Gray, Kimberly A.

    2014-07-01

    A city is a complex, emergent system and as such can be conveniently represented as a network of interacting components. A fundamental aspect of networks is that the systemic properties can depend as much on the interactions as they depend on the properties of the individual components themselves. Another fundamental aspect is that changes to one component can affect other components, in a process that may cause the entire or a substantial part of the system to change behavior. Over the past 2 decades, much research has been done on the modeling of large and complex networks involved in communication and transportation, disease propagation, and supply chains, as well as emergent phenomena, robustness and optimization in such systems...

  4. Control technology in supply systems. Regelungstechnik in der Versorgungstechnik

    Energy Technology Data Exchange (ETDEWEB)

    Bach, H.; Baumgarth, S.; Forsch, K.; Reeker, J.; Krinninger, H.; Ruosch, E.; Schaefer, A.; Schiele, J.; Schroeder, H.; Treusch, W.

    1983-01-01

    The textbook presents the theoretical fundamentals and practical examples of control technology in supply systems. Practical examples of the fields of heating, air conditioning, and gas supply are presented in detail. The book comprises the following chapters: 1. Introduction to control technology; 2. steady state and time behaviour of control loop elements; 3. controlled systems; 4. control equipment; 5. control elements; 6. closed loops; 7. preset control; 8. meshed control loops; 9. digital control technology; 10. central control systems for supply systems of buildings; 11. examples of supply systems control.

  5. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Call interception additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Call interception additional network feature

  6. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

  7. Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

  8. Web based educational tool for neural network robot control

    Directory of Open Access Journals (Sweden)

    Jure Čas

    2007-05-01

    Full Text Available Abstract— This paper describes the application for teleoperations of the SCARA robot via the internet. The SCARA robot is used by students of mehatronics at the University of Maribor as a remote educational tool. The developed software consists of two parts i.e. the continuous neural network sliding mode controller (CNNSMC and the graphical user interface (GUI. Application is based on two well-known commercially available software packages i.e. MATLAB/Simulink and LabVIEW. Matlab/Simulink and the DSP2 Library for Simulink are used for control algorithm development, simulation and executable code generation. While this code is executing on the DSP-2 Roby controller and through the analog and digital I/O lines drives the real process, LabVIEW virtual instrument (VI, running on the PC, is used as a user front end. LabVIEW VI provides the ability for on-line parameter tuning, signal monitoring, on-line analysis and via Remote Panels technology also teleoperation. The main advantage of a CNNSMC is the exploitation of its self-learning capability. When friction or an unexpected impediment occurs for example, the user of a remote application has no information about any changed robot dynamic and thus is unable to dispatch it manually. This is not a control problem anymore because, when a CNNSMC is used, any approximation of changed robot dynamic is estimated independently of the remote’s user. Index Terms—LabVIEW; Matlab/Simulink; Neural network control; remote educational tool; robotics

  9. Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges

    CERN Document Server

    Fang, Xi; Xue, Guoliang

    2011-01-01

    Smart grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this work we present our vision on smart grid from the perspective of wireless communications and networking technologies. We present wireless communication and networking paradigms for four typical scenarios in the future smart grid and also point out the research challenges of the wireless communication and networking technologies used in smart grid

  10. Evolutionary Network Control also holds for nonlinear networks: Ruling the Lotka-Volterra model

    Directory of Open Access Journals (Sweden)

    Alessandro Ferrarini

    2015-09-01

    Full Text Available The proof of our understanding of ecological and biological systems is measured by our skill to rule them, i.e. to channelize them towards a desired state. Control is a cardinal issue in most complex systems, but because a general theory to apply it in a quantitative manner has been absent so far, little was known about how we can rule weighted, directed networks that represent the most common configuration of real systems. To this purpose, Evolutionary Network Control (ENC has been developed as a theoretical and methodological framework aimed to the control of ecological and biological networks by coupling network dynamics and evolutionary modelling. ENC is a tools to address controllability for arbitrary network topologies and sizes. ENC has proven to cover several topics of network control, e.g. a the global control from inside and b from outside, c the local (step-by-step control, and the computation of: d control success, e feasibility, and f degree of uncertainty. Taken together, these results indicate that many aspects of controllability can be explored exactly and analytically for arbitrary networks, opening new avenues to deepening our understanding of complex systems. As yet, I have applied ENC only to linear ecological and biological networks. In this work, I show that ENC also holds for any kind of nonlinear networks, and provide an applicative example based on the nonlinear, widely-used, Lotka-Volterra model.

  11. Distributed Network Control for Mobile Multi-Modal Wireless Sensor Networks

    Science.gov (United States)

    2010-08-19

    Distributed Network Control for Mobile Multi-Modal Wireless Sensor Networks Doina Bein , Yicheng Wen, Shashi Phoha1, Bharat B. Madan, and Asok Ray The...Journal of High Perfor- mance Computing Applications, Special Issue on Sensor Networks 16 (3) (2002) 235–241. [30] Y. Wen, D. Bein , S. Phoha

  12. Technology standards battles and networks during the technology life cycle: The battle between HD DVD and Blu-ray

    NARCIS (Netherlands)

    Den Hartigh, E.; Ortt, R.; Van de Kaa, G.; Stolwijk, C.

    2009-01-01

    In this article we explore the changes in the structure and composition of networks supporting technologies during the phases of the technology life cycle. We conceptualize the technology life cycle phases by integrating two existing frameworks of Ortt and Schoormans (2004) and Suarez (2004). Based

  13. What are the Controls Requirements for the Global Accelerator Network?

    CERN Document Server

    Bacher, R; Herb, S; Bacher, Reinhard; Duval, Philip; Herb, Stephen

    2001-01-01

    The Global Accelerator Network is a proposed model for remote operation of a future large accelerator by the partners of an international collaboration. The remote functionality would include not only routine operation and machine studies, but also hardware diagnostic tests and software maintenance and development, so the control system must offer both high and low level remote access to the accelerator and its components. We discuss in this paper some of the special requirements, and how they might be satisfied using current or developing technology, such as web-based applications and industrial automation standards. The choices made must be acceptable to the collaboration, but will also have a strong influence on its effectiveness. The biggest technical challenge is likely to be the middle layer software which is responsible for system integration, automation, and presentation of the machine state to the operating staff.

  14. Logistics Cost Perspective Car Networking Technology Application Projects Based on Risk control%基于物流成本视角的车联网技术应用项目风险及控制研究

    Institute of Scientific and Technical Information of China (English)

    王爱晶

    2014-01-01

    车联网是物联网最具发展前景的应用之一,因其可有效缓解城市交通拥堵、加快运输和配送速度、优化车辆行驶路线、减少运输和配送成本,使生产和销售更有可预测性等优势而受到运输和配送成本居高不下的物流行业高度重视。但由于前期投入较大,技术标准存在差异,网络安全、市场需求还需培育等因素,使得车联网技术应用项目存在一定的风险。国家应加强统筹规划,避免重复建设、减少社会投入总成本;积极推广多元化的投资主体,提高企业参与积极性;创新商业模式,发展专业细分市场。%Vehicle network is one of the things the most promising application ,because it can effectively ease urban traffic congestion,speed up transport and delivery speed ,optimizing vehicle routes,reduce transportation and distribution costs ,so that the production and sale of more there are predictable ,such as transportation and distribution costs by the stubbornly high logistics industry attention.But because of a larger initial investment , there are differences of technical standards , network security , the need to cultivate the market demand and other factors ,making the car networking technology application projects there are certain risk.Countries should strengthen overall planning , to avoid duplication and reduce the total cost of social investment;actively promote the diversification of investors ,and improving participation enthusiasm;innovative business models ,Innovative business models,development of professional market segments.

  15. Controllability analysis of transcriptional regulatory networks reveals circular control patterns among transcription factors

    DEFF Research Database (Denmark)

    Österlund, Tobias; Bordel, Sergio; Nielsen, Jens

    2015-01-01

    Transcriptional regulation is the most committed type of regulation in living cells where transcription factors (TFs) control the expression of their target genes and TF expression is controlled by other TFs forming complex transcriptional regulatory networks that can be highly interconnected. Here...... we analyze the topology and organization of nine transcriptional regulatory networks for E. coli, yeast, mouse and human, and we evaluate how the structure of these networks influences two of their key properties, namely controllability and stability. We calculate the controllability for each network...... as a measure of the organization and interconnectivity of the network. We find that the number of driver nodes n(D) needed to control the whole network is 64% of the TFs in the E. coli transcriptional regulatory network in contrast to only 17% for the yeast network, 4% for the mouse network and 8...

  16. Control of Boolean networks: hardness results and algorithms for tree structured networks.

    Science.gov (United States)

    Akutsu, Tatsuya; Hayashida, Morihiro; Ching, Wai-Ki; Ng, Michael K

    2007-02-21

    Finding control strategies of cells is a challenging and important problem in the post-genomic era. This paper considers theoretical aspects of the control problem using the Boolean network (BN), which is a simplified model of genetic networks. It is shown that finding a control strategy leading to the desired global state is computationally intractable (NP-hard) in general. Furthermore, this hardness result is extended for BNs with considerably restricted network structures. These results justify existing exponential time algorithms for finding control strategies for probabilistic Boolean networks (PBNs). On the other hand, this paper shows that the control problem can be solved in polynomial time if the network has a tree structure. Then, this algorithm is extended for the case where the network has a few loops and the number of time steps is small. Though this paper focuses on theoretical aspects, biological implications of the theoretical results are also discussed.

  17. Network device interface for digitally interfacing data channels to a controller a via network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2006-01-01

    The present invention provides a network device interface and method for digitally connecting a plurality of data channels to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. In one embodiment, the bus controller transmits messages to the network device interface containing a plurality of bits having a value defined by a transition between first and second states in the bits. The network device interface determines timing of the data sequence of the message and uses the determined timing to communicate with the bus controller.

  18. Temporal network structures controlling disease spreading

    CERN Document Server

    Holme, Petter

    2016-01-01

    We investigate disease spreading on eight empirical data sets of human contacts (mostly proximity networks recording who is close to whom, at what time). We compare three levels of representations of these data sets: temporal networks, static networks and a fully connected topology. We notice that the difference between the static and fully-connected networks -- with respect to time to extinction and average outbreak size -- is smaller than between the temporal and static topologies. This suggests that, for these data sets, temporal structures influence disease spreading more than static network structures. To explain the details in the differences between the representations, we use 32 network measures. This study concur that long-time temporal structures, like the turnover of nodes and links, are the most important for the spreading dynamics.

  19. Adaptive Control for Robotic Manipulators Base on RBF Neural Network

    Directory of Open Access Journals (Sweden)

    MA Jing

    2013-09-01

    Full Text Available An adaptive neural network controller is brought forward by the paper to solve trajectory tracking problems of robotic manipulators with uncertainties. The first scheme consists of a PD feedback and a dynamic compensator which is composed by neural network controller and variable structure controller. Neutral network controller is designed to adaptive learn and compensate the unknown uncertainties, variable structure controller is designed to eliminate approach errors of neutral network. The adaptive weight learning algorithm of neural network is designed to ensure online real-time adjustment, offline learning phase is not need; Global asymptotic stability (GAS of system base on Lyapunov theory is analysised to ensure the convergence of the algorithm. The simulation result s show that the kind of the control scheme is effective and has good robustness.

  20. Controlling Contagion Processes in Time-Varying Networks

    CERN Document Server

    Liu, Suyu; Karsai, Marton; Vespignani, Alessandro

    2013-01-01

    The vast majority of strategies aimed at controlling contagion processes on networks considers the connectivity pattern of the system as either quenched or annealed. However, in the real world many networks are highly dynamical and evolve in time concurrently to the contagion process. Here, we derive an analytical framework for the study of control strategies specifically devised for time-varying networks. We consider the removal/immunization of individual nodes according the their activity in the network and develop a block variable mean-field approach that allows the derivation of the equations describing the evolution of the contagion process concurrently to the network dynamic. We derive the critical immunization threshold and assess the effectiveness of the control strategies. Finally, we validate the theoretical picture by simulating numerically the information spreading process and control strategies in both synthetic networks and a large-scale, real-world mobile telephone call dataset