WorldWideScience

Sample records for vm showed networks

  1. CernVM - a virtual software appliance for LHC applications

    International Nuclear Information System (INIS)

    Buncic, P; Sanchez, C Aguado; Blomer, J; Franco, L; Mato, P; Harutyunian, A; Yao, Y

    2010-01-01

    CernVM is a Virtual Software Appliance capable of running physics applications from the LHC experiments at CERN. It aims to provide a complete and portable environment for developing and running LHC data analysis on any end-user computer (laptop, desktop) as well as on the Grid, independently of Operating System platforms (Linux, Windows, MacOS). The experiment application software and its specific dependencies are built independently from CernVM and delivered to the appliance just in time by means of a CernVM File System (CVMFS) specifically designed for efficient software distribution. The procedures for building, installing and validating software releases remains under the control and responsibility of each user community. We provide a mechanism to publish pre-built and configured experiment software releases to a central distribution point from where it finds its way to the running CernVM instances via the hierarchy of proxy servers or content delivery networks. In this paper, we present current state of CernVM project and compare performance of CVMFS to performance of traditional network file system like AFS and discuss possible scenarios that could further improve its performance and scalability.

  2. CernVM Online and Cloud Gateway: a uniform interface for CernVM contextualization and deployment

    International Nuclear Information System (INIS)

    Lestaris, G; Charalampidis, I; Berzano, D; Blomer, J; Buncic, P; Ganis, G; Meusel, R

    2014-01-01

    In a virtualized environment, contextualization is the process of configuring a VM instance for the needs of various deployment use cases. Contextualization in CernVM can be done by passing a handwritten context to the user data field of cloud APIs, when running CernVM on the cloud, or by using CernVM web interface when running the VM locally. CernVM Online is a publicly accessible web interface that unifies these two procedures. A user is able to define, store and share CernVM contexts using CernVM Online and then apply them either in a cloud by using CernVM Cloud Gateway or on a local VM with the single-step pairing mechanism. CernVM Cloud Gateway is a distributed system that provides a single interface to use multiple and different clouds (by location or type, private or public). Cloud gateway has been so far integrated with OpenNebula, CloudStack and EC2 tools interfaces. A user, with access to a number of clouds, can run CernVM cloud agents that will communicate with these clouds using their interfaces, and then use one single interface to deploy and scale CernVM clusters. CernVM clusters are defined in CernVM Online and consist of a set of CernVM instances that are contextualized and can communicate with each other.

  3. Enabling μCernVM for the Interactive Use Case

    CERN Document Server

    Nicolaou, Vasilis

    2013-01-01

    The $\\mu$CernVM will be the successor of the CernVM as a new appliance to help with accessing LHC for data analysis and development. CernVM has a web appliance agent that facilitates user interaction with the virtual machine and reduces the need for executing shell commands or installing graphical applications for displaying basic information such as memory usage or performing simple tasks such as updating the operating system. The updates are done differently in the $\\mu$CernVM than mainstream Linux distributions. Its filesystem is a composition of a read-only layer that exists in the network and a read/write layer that is initilised on first boot and keeps the user changes afterwards. Thus, means are provided to avoid loss of user data and system instabilities when the operating system is updated by fetching a new read-only layer.

  4. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  5. Status and Roadmap of CernVM

    Science.gov (United States)

    Berzano, D.; Blomer, J.; Buncic, P.; Charalampidis, I.; Ganis, G.; Meusel, R.

    2015-12-01

    Cloud resources nowadays contribute an essential share of resources for computing in high-energy physics. Such resources can be either provided by private or public IaaS clouds (e.g. OpenStack, Amazon EC2, Google Compute Engine) or by volunteers computers (e.g. LHC@Home 2.0). In any case, experiments need to prepare a virtual machine image that provides the execution environment for the physics application at hand. The CernVM virtual machine since version 3 is a minimal and versatile virtual machine image capable of booting different operating systems. The virtual machine image is less than 20 megabyte in size. The actual operating system is delivered on demand by the CernVM File System. CernVM 3 has matured from a prototype to a production environment. It is used, for instance, to run LHC applications in the cloud, to tune event generators using a network of volunteer computers, and as a container for the historic Scientific Linux 5 and Scientific Linux 4 based software environments in the course of long-term data preservation efforts of the ALICE, CMS, and ALEPH experiments. We present experience and lessons learned from the use of CernVM at scale. We also provide an outlook on the upcoming developments. These developments include adding support for Scientific Linux 7, the use of container virtualization, such as provided by Docker, and the streamlining of virtual machine contextualization towards the cloud-init industry standard.

  6. Micro-CernVM: slashing the cost of building and deploying virtual machines

    International Nuclear Information System (INIS)

    Blomer, J; Berzano, D; Buncic, P; Charalampidis, I; Ganis, G; Lestaris, G; Meusel, R; Nicolaou, V

    2014-01-01

    The traditional virtual machine (VM) building and and deployment process is centered around the virtual machine hard disk image. The packages comprising the VM operating system are carefully selected, hard disk images are built for a variety of different hypervisors, and images have to be distributed and decompressed in order to instantiate a virtual machine. Within the HEP community, the CernVM File System (CernVM-FS) has been established in order to decouple the distribution from the experiment software from the building and distribution of the VM hard disk images. We show how to get rid of such pre-built hard disk images altogether. Due to the high requirements on POSIX compliance imposed by HEP application software, CernVM-FS can also be used to host and boot a Linux operating system. This allows the use of a tiny bootable CD image that comprises only a Linux kernel while the rest of the operating system is provided on demand by CernVM-FS. This approach speeds up the initial instantiation time and reduces virtual machine image sizes by an order of magnitude. Furthermore, security updates can be distributed instantaneously through CernVM-FS. By leveraging the fact that CernVM-FS is a versioning file system, a historic analysis environment can be easily re-spawned by selecting the corresponding CernVM-FS file system snapshot.

  7. Developing the Value Management Maturity Model (VM

    Directory of Open Access Journals (Sweden)

    Saipol Bari Abd Karim

    2013-06-01

    Full Text Available Value management (VM practices have been expanded and became a well-received technique globally. Organisations are now progressing towards a better implementation of VM and should be assessing their strengths and weaknesses in order to move forward competitively. There is a need to benchmark the existing VM practices to reflect their maturing levels which is currently not available. This paper outlines the concept of Value Management Maturity Model (VM3' as a structured plan of maturity and performance growth for businesses. It proposes five levels of maturity and each level has its own criteria or attributes to be achieved before progressing to a higher level. The framework for VM3' has been developed based on the review of literatures related to VM and maturity models (MM. Data is collected through questionnaire surveys to organisations that have implemented VM methodology. Additionally, semi-structured interviews were conducted to select individuals involved in implementing VM. The questions were developed to achieve the research objectives; investigating the current implementation of VM and, exploring the organisation's MM knowledge and practices. However, this research was limited to VM implementation in the Malaysian government's projects and programmes. VM3' introduces a new paradigm in VM as it provides a rating method for capabilities or performance. It is advocated that this VM3' framework is still being refined in the advance stage in order to provide a comprehensive and well accepted method to provide ratings for organisations' maturity.

  8. Diffusion bonding of IN 718 to VM 350 grade maraging steel

    Science.gov (United States)

    Crosby, S. R.; Biederman, R. R.; Reynolds, C. C.

    1972-01-01

    Diffusion bonding studies have been conducted on IN 718, VM 350 and the dissimilar alloy couple, IN 718 to maraging steel. The experimental processing parameters critical to obtaining consistently good diffusion bonds between IN 718 and VM 350 were determined. Interrelationships between temperature, pressure and surface preparation were explored for short bending intervals under vacuum conditions. Successful joining was achieved for a range of bonding cycle temperatures, pressures and surface preparations. The strength of the weaker parent material was used as a criterion for a successful tensile test of the heat treated bond. Studies of VM-350/VM-350 couples in the as-bonded condition showed a greater yielding and failure outside the bond region.

  9. Research and Implementation of Software Used for the Remote Control for VM700T Video Measuring Instrument

    Directory of Open Access Journals (Sweden)

    Song Wenjie

    2015-01-01

    Full Text Available In this paper, the measurement software which can be used to realize remote control of the VM700T video measuring instrument is introduced. The authors can operate VM700T by a virtual panel on the client computer, select the results that the measuring equipment displayed to transmit it, and then display the image on the VM700T virtual panel in real time. The system does have some practical values and play an important role in distance learning. The functions that the system realized mainly includes four aspects: the real-time transmission of message based on the socket technology, the serial connection between server PC and VM700T measuring equipment, the image acquisition based on VFW technology and JPEG compression and decompression, and the network transmission of image files. The actual network transmission test is shown that the data acquisition method of this thesis is flexible and convenient, and the system is of extraordinary stability. It can display the measurement results in real time and basically realize the requirements of remote control. In the content, this paper includes a summary of principle, the detailed introduction of the system realization process and some related technology.

  10. A VM-shared desktop virtualization system based on OpenStack

    Science.gov (United States)

    Liu, Xi; Zhu, Mingfa; Xiao, Limin; Jiang, Yuanjie

    2018-04-01

    With the increasing popularity of cloud computing, desktop virtualization is rising in recent years as a branch of virtualization technology. However, existing desktop virtualization systems are mostly designed as a one-to-one mode, which one VM can only be accessed by one user. Meanwhile, previous desktop virtualization systems perform weakly in terms of response time and cost saving. This paper proposes a novel VM-Shared desktop virtualization system based on OpenStack platform. The paper modified the connecting process and the display data transmission process of the remote display protocol SPICE to support VM-Shared function. On the other hand, we propose a server-push display mode to improve user interactive experience. The experimental results show that our system performs well in response time and achieves a low CPU consumption.

  11. Biological effects of 60Co γ-irradiation on Laiwu ginger VM1 growth

    International Nuclear Information System (INIS)

    Zhou Ming; Huang Jinli; Wei Yuxia; Guan Qiuzhu; Zhang Zhenxian

    2008-01-01

    Rhizome of Laiwu ginger were treated with γ-irradiation at the doses of 0, 20, 40 and 60 Gy. The results showed that 60 Co γ-irradiation inhibited the rhizome burgeoning, and decreased the survival rate of the seedlings, rate of leaf- expansion and the growth of plants (VM 1 ). The inhibition effects became stronger with the increase of the irradiation dose. Different bands were found through the analysis of POD, EST isozymes and RAPD of VM 1 plants, which showed that variation on molecular level occurred in VM 1 plants. LD 30-40 was appropriate for the irradiation of rhizomes of Laiwu ginger and the optimal irradiation dose was about 20- 30 Gy. (authors)

  12. Porting of $\\mu$CernVM to AArch64

    CERN Document Server

    Scheffler, Felix

    2016-01-01

    $\\mu$CernVM is a virtual appliance that contains a stripped-down Linux OS connecting to a CernVM-Filesystem (CVMFS) repository that resides on a dedicated web server. In contrast to “usual” VMs, anything that is needed from this repository is only downloaded on demand, aggressively cached and eventually released again. Currently, $\\mu$CernVM is only distributed for x86-64. Recently, ARM (market leader in mobile computing) has started to enter the server market, which is still dominated by x86-64 infrastructure. However, in terms of performance/watt, AArch64 (latest ARM 64bit architecture) is a promising alternative. Facing millions of jobs to compute every day, it is thus desirable to have an HEP virtualisation solution for AArch64. In this project, $\\mu$CernVM was successfully ported to AArch64. Native and virtualised runtime performance was evaluated using ROOT6 and CMS benchmarks. It was found that VM performance is inferior to host performance across all tests. Respective numbers greatly vary between...

  13. PEMILIHAN DAN MIGRASI VM MENGGUNAKAN MCDM UNTUK PENINGKATAN KINERJA LAYANAN PADA CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Abdullah Fadil

    2016-08-01

    Full Text Available Komputasi awan atau cloud computing merupakan lingkungan yang heterogen dan terdistribusi, tersusun atas gugusan jaringan server dengan berbagai kapasitas sumber daya komputasi yang berbeda-beda guna menopang model layanan yang ada di atasnya. Virtual machine (VM dijadikan sebagai representasi dari ketersediaan sumber daya komputasi dinamis yang dapat dialokasikan dan direalokasikan sesuai dengan permintaan. Mekanisme live migration VM di antara server fisik yang terdapat di dalam data center cloud digunakan untuk mencapai konsolidasi dan memaksimalkan utilisasi VM. Pada prosedur konsoidasi vm, pemilihan dan penempatan VM sering kali menggunakan kriteria tunggal dan statis. Dalam penelitian ini diusulkan pemilihan dan penempatan VM menggunakan multi-criteria decision making (MCDM pada prosedur konsolidasi VM dinamis di lingkungan cloud data center guna meningkatkan layanan cloud computing. Pendekatan praktis digunakan dalam mengembangkan lingkungan cloud computing berbasis OpenStack Cloud dengan mengintegrasikan VM selection dan VM Placement pada prosedur konsolidasi VM menggunakan OpenStack-Neat. Hasil penelitian menunjukkan bahwa metode pemilihan dan penempatan VM melalui live migration mampu menggantikan kerugian yang disebabkan oleh down-times sebesar 11,994 detik dari waktu responnya. Peningkatan response times terjadi sebesar 6 ms ketika terjadi proses live migration VM dari host asal ke host tujuan. Response times rata-rata setiap vm yang tersebar pada compute node setelah terjadi proses live migration sebesar 67 ms yang menunjukkan keseimbangan beban pada sistem cloud computing.

  14. Anger Modulates Influence Hierarchies Within and Between Emotional Reactivity and Regulation Networks

    Science.gov (United States)

    Jacob, Yael; Gilam, Gadi; Lin, Tamar; Raz, Gal; Hendler, Talma

    2018-01-01

    Emotion regulation is hypothesized to be mediated by the interactions between emotional reactivity and regulation networks during the dynamic unfolding of the emotional episode. Yet, it remains unclear how to delineate the effective relationships between these networks. In this study, we examined the aforementioned networks’ information flow hierarchy during viewing of an anger provoking movie excerpt. Anger regulation is particularly essential for averting individuals from aggression and violence, thus improving prosocial behavior. Using subjective ratings of anger intensity we differentiated between low and high anger periods of the film. We then applied the Dependency Network Analysis (DEPNA), a newly developed graph theory method to quantify networks’ node importance during the two anger periods. The DEPNA analysis revealed that the impact of the ventromedial prefrontal cortex (vmPFC) was higher in the high anger condition, particularly within the regulation network and on the connections between the reactivity and regulation networks. We further showed that higher levels of vmPFC impact on the regulation network were associated with lower subjective anger intensity during the high-anger cinematic period, and lower trait anger levels. Supporting and replicating previous findings, these results emphasize the previously acknowledged central role of vmPFC in modulating negative affect. We further show that the impact of the vmPFC relies on its correlational influence on the connectivity between reactivity and regulation networks. More importantly, the hierarchy network analysis revealed a link between connectivity patterns of the vmPFC and individual differences in anger reactivity and trait, suggesting its potential therapeutic role. PMID:29681803

  15. Overhead-Aware-Best-Fit (OABF) Resource Allocation Algorithm for Minimizing VM Launching Overhead

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Hao [IIT; Garzoglio, Gabriele [Fermilab; Ren, Shangping [IIT, Chicago; Timm, Steven [Fermilab; Noh, Seo Young [KISTI, Daejeon

    2014-11-11

    FermiCloud is a private cloud developed in Fermi National Accelerator Laboratory to provide elastic and on-demand resources for different scientific research experiments. The design goal of the FermiCloud is to automatically allocate resources for different scientific applications so that the QoS required by these applications is met and the operational cost of the FermiCloud is minimized. Our earlier research shows that VM launching overhead has large variations. If such variations are not taken into consideration when making resource allocation decisions, it may lead to poor performance and resource waste. In this paper, we show how we may use an VM launching overhead reference model to minimize VM launching overhead. In particular, we first present a training algorithm that automatically tunes a given refer- ence model to accurately reflect FermiCloud environment. Based on the tuned reference model for virtual machine launching overhead, we develop an overhead-aware-best-fit resource allocation algorithm that decides where and when to allocate resources so that the average virtual machine launching overhead is minimized. The experimental results indicate that the developed overhead-aware-best-fit resource allocation algorithm can significantly improved the VM launching time when large number of VMs are simultaneously launched.

  16. Optimization of CernVM early boot process

    CERN Document Server

    Mazdin, Petra

    2015-01-01

    CernVM virtual machine is a Linux based virtual appliance optimized for High Energy Physics experiments. It is used for cloud computing, volunteer computing, and software development by the four large LHC experiments. The goal of this project is proling and optimizing the boot process of the CernVM. A key part was the development of a performance profiler for shell scripts as an extension to the popular BusyBox open source UNIX tool suite. Based on the measurements, costly shell code was replaced by more efficient, custom C programs. The results are compared to the original ones and successful optimization is proven.

  17. Toxicity and medical countermeasure studies on the organophosphorus nerve agents VM and VX.

    Science.gov (United States)

    Rice, Helen; Dalton, Christopher H; Price, Matthew E; Graham, Stuart J; Green, A Christopher; Jenner, John; Groombridge, Helen J; Timperley, Christopher M

    2015-04-08

    To support the effort to eliminate the Syrian Arab Republic chemical weapons stockpile safely, there was a requirement to provide scientific advice based on experimentally derived information on both toxicity and medical countermeasures (MedCM) in the event of exposure to VM, VX or VM-VX mixtures. Complementary in vitro and in vivo studies were undertaken to inform that advice. The penetration rate of neat VM was not significantly different from that of neat VX, through either guinea pig or pig skin in vitro . The presence of VX did not affect the penetration rate of VM in mixtures of various proportions. A lethal dose of VM was approximately twice that of VX in guinea pigs poisoned via the percutaneous route. There was no interaction in mixed agent solutions which altered the in vivo toxicity of the agents. Percutaneous poisoning by VM responded to treatment with standard MedCM, although complete protection was not achieved.

  18. The Conserved Spore Coat Protein SpoVM Is Largely Dispensable in Clostridium difficile Spore Formation.

    Science.gov (United States)

    Ribis, John W; Ravichandran, Priyanka; Putnam, Emily E; Pishdadian, Keyan; Shen, Aimee

    2017-01-01

    The spore-forming bacterial pathogen Clostridium difficile is a leading cause of health care-associated infections in the United States. In order for this obligate anaerobe to transmit infection, it must form metabolically dormant spores prior to exiting the host. A key step during this process is the assembly of a protective, multilayered proteinaceous coat around the spore. Coat assembly depends on coat morphogenetic proteins recruiting distinct subsets of coat proteins to the developing spore. While 10 coat morphogenetic proteins have been identified in Bacillus subtilis , only two of these morphogenetic proteins have homologs in the Clostridia : SpoIVA and SpoVM. C. difficile SpoIVA is critical for proper coat assembly and functional spore formation, but the requirement for SpoVM during this process was unknown. Here, we show that SpoVM is largely dispensable for C. difficile spore formation, in contrast with B. subtilis . Loss of C. difficile SpoVM resulted in modest decreases (~3-fold) in heat- and chloroform-resistant spore formation, while morphological defects such as coat detachment from the forespore and abnormal cortex thickness were observed in ~30% of spoVM mutant cells. Biochemical analyses revealed that C. difficile SpoIVA and SpoVM directly interact, similarly to their B. subtilis counterparts. However, in contrast with B. subtilis , C. difficile SpoVM was not essential for SpoIVA to encase the forespore. Since C. difficile coat morphogenesis requires SpoIVA-interacting protein L (SipL), which is conserved exclusively in the Clostridia , but not the more broadly conserved SpoVM, our results reveal another key difference between C. difficile and B. subtilis spore assembly pathways. IMPORTANCE The spore-forming obligate anaerobe Clostridium difficile is the leading cause of antibiotic-associated diarrheal disease in the United States. When C. difficile spores are ingested by susceptible individuals, they germinate within the gut and

  19. Investigating the role of the ventromedial prefrontal cortex (vmPFC in the assessment of brands

    Directory of Open Access Journals (Sweden)

    Jose Paulo eSantos

    2011-06-01

    Full Text Available The ventromedial prefrontal cortex (vmPFC is believed to be important in everyday preference judgments, processing emotions during decision-making. However, there is still controversy in the literature regarding the participation of the vmPFC. To further elucidate the contribution of the vmPFC in brand preference, we designed a functional magnetic resonance imaging (fMRI study where 18 subjects assessed positive, indifferent and fictitious brands. Also, both the period during and after the decision process were analyzed, hoping to unravel temporally the role of the vmPFC, using modeled and model-free fMRI analysis. Considering together the period before and after decision-making, there was activation of the vmPFC when comparing positive with indifferent or fictitious brands. However, when the decision-making period was separated from the moment after the response, and especially for positive brands, the vmPFC was more active after the choice than during the decision process itself, challenging some of the existing literature. The results of the present study support the notion that the vmPFC may be unimportant in the decision stage of brand preference, questioning theories that postulate that the vmPFC is in the origin of such a choice. Further studies are needed to investigate in detail why the vmPFC seems to be involved in brand preference only after the decision process.

  20. cernatschool.org's use of CVMFS and the CernVM

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    cernatschool.org is a very small Virtual Organisation made up of secondary school and university students, and participating organisations in the Institute for Research in Schools. We use CVMFS to delpoy dependencies and Python 3 itself for custom software used for analysing radiation data from Medipix detectors. This software is designed for running on GridPP worker nodes, part of the UK based distributed computing grid. The cernatschool.org VO also uses the CernVM, for job submission and interacting with the grid. The current use for both CVMFS and the CernVM is for facilitating analysis of 3 years worth of data from the LUCID payload on TechDemoSat-1. The CernVM looks like it could be particularly useful in the future for a standard system for students to use to program and analyse data themselves with, allowing easy access to any software they might need (not necessarily using GridPP compute resources at all).

  1. Security model for VM in cloud

    Science.gov (United States)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  2. 3D-e-Chem-VM: Structural Cheminformatics Research Infrastructure in a Freely Available Virtual Machine

    NARCIS (Netherlands)

    McGuire, R.; Verhoeven, S.; Vass, M.; Vriend, G.; Esch, I.J. de; Lusher, S.J.; Leurs, R.; Ridder, L.; Kooistra, A.J.; Ritschel, T.; Graaf, C. de

    2017-01-01

    3D-e-Chem-VM is an open source, freely available Virtual Machine ( http://3d-e-chem.github.io/3D-e-Chem-VM/ ) that integrates cheminformatics and bioinformatics tools for the analysis of protein-ligand interaction data. 3D-e-Chem-VM consists of software libraries, and database and workflow tools

  3. 3D-e-Chem-VM : Structural Cheminformatics Research Infrastructure in a Freely Available Virtual Machine

    NARCIS (Netherlands)

    McGuire, Ross; Verhoeven, Stefan; Vass, Márton; Vriend, Gerrit; De Esch, Iwan J P; Lusher, Scott J.; Leurs, Rob; Ridder, Lars; Kooistra, Albert J.; Ritschel, Tina; de Graaf, C.

    2017-01-01

    3D-e-Chem-VM is an open source, freely available Virtual Machine ( http://3d-e-chem.github.io/3D-e-Chem-VM/ ) that integrates cheminformatics and bioinformatics tools for the analysis of protein-ligand interaction data. 3D-e-Chem-VM consists of software libraries, and database and workflow tools

  4. Calorie restriction as an anti-invasive therapy for malignant brain cancer in the VM mouse.

    Science.gov (United States)

    Shelton, Laura M; Huysentruyt, Leanne C; Mukherjee, Purna; Seyfried, Thomas N

    2010-07-23

    GBM (glioblastoma multiforme) is the most aggressive and invasive form of primary human brain cancer. We recently developed a novel brain cancer model in the inbred VM mouse strain that shares several characteristics with human GBM. Using bioluminescence imaging, we tested the efficacy of CR (calorie restriction) for its ability to reduce tumour size and invasion. CR targets glycolysis and rapid tumour cell growth in part by lowering circulating glucose levels. The VM-M3 tumour cells were implanted intracerebrally in the syngeneic VM mouse host. Approx. 12-15 days post-implantation, brains were removed and both ipsilateral and contralateral hemispheres were imaged to measure bioluminescence of invading tumour cells. CR significantly reduced the invasion of tumour cells from the implanted ipsilateral hemisphere into the contralateral hemisphere. The total percentage of Ki-67-stained cells within the primary tumour and the total number of blood vessels was also significantly lower in the CR-treated mice than in the mice fed ad libitum, suggesting that CR is anti-proliferative and anti-angiogenic. Our findings indicate that the VM-M3 GBM model is a valuable tool for studying brain tumour cell invasion and for evaluating potential therapeutic approaches for managing invasive brain cancer. In addition, we show that CR can be effective in reducing malignant brain tumour growth and invasion.

  5. Calorie Restriction as an Anti-Invasive Therapy for Malignant Brain Cancer in the VM Mouse

    Directory of Open Access Journals (Sweden)

    Laura M Shelton

    2010-07-01

    Full Text Available GBM (glioblastoma multiforme is the most aggressive and invasive form of primary human brain cancer. We recently developed a novel brain cancer model in the inbred VM mouse strain that shares several characteristics with human GBM. Using bioluminescence imaging, we tested the efficacy of CR (calorie restriction for its ability to reduce tumour size and invasion. CR targets glycolysis and rapid tumour cell growth in part by lowering circulating glucose levels. The VM-M3 tumour cells were implanted intracerebrally in the syngeneic VM mouse host. Approx. 12-15 days post-implantation, brains were removed and both ipsilateral and contralateral hemispheres were imaged to measure bioluminescence of invading tumour cells. CR significantly reduced the invasion of tumour cells from the implanted ipsilateral hemisphere into the contralateral hemisphere. The total percentage of Ki-67-stained cells within the primary tumour and the total number of blood vessels was also significantly lower in the CR-treated mice than in the mice fed ad libitum, suggesting that CR is anti-proliferative and anti-angiogenic. Our findings indicate that the VM-M3 GBM model is a valuable tool for studying brain tumour cell invasion and for evaluating potential therapeutic approaches for managing invasive brain cancer. In addition, we show that CR can be effective in reducing malignant brain tumour growth and invasion.

  6. Properties and Microstructure of Laser Welded VM12-SHC Steel Pipes Joints

    Directory of Open Access Journals (Sweden)

    Skrzypczyk A.

    2016-06-01

    Full Text Available Paper presents results of microstructure and tests of welded joints of new generation VM12-SHC martensitic steel using high power CO2 laser (LBW method with bifocal welding head. VM12-SHC is dedicated to energetic installation material, designed to replace currently used. High content of chromium and others alloying elements improve its resistance and strength characteristic. Use of VM12-SHC steel for production of the superheaters, heating chambers and walls in steam boilers resulted in various weldability researches. In article are presented results of destructive and non-destructive tests. For destructive: static bending and Vickers hardness tests, and for non-destructive: VT, RT, UT, micro and macroscopic tests were performed.

  7. Optimizing VM allocation and data placement for data-intensive applications in cloud using ACO metaheuristic algorithm

    Directory of Open Access Journals (Sweden)

    T.P. Shabeera

    2017-04-01

    Full Text Available Nowadays data-intensive applications for processing big data are being hosted in the cloud. Since the cloud environment provides virtualized resources for computation, and data-intensive applications require communication between the computing nodes, the placement of Virtual Machines (VMs and location of data affect the overall computation time. Majority of the research work reported in the current literature consider the selection of physical nodes for placing data and VMs as independent problems. This paper proposes an approach which considers VM placement and data placement hand in hand. The primary objective is to reduce cross network traffic and bandwidth usage, by placing required number of VMs and data in Physical Machines (PMs which are physically closer. The VM and data placement problem (referred as MinDistVMDataPlacement problem is defined in this paper and has been proved to be NP- Hard. This paper presents and evaluates a metaheuristic algorithm based on Ant Colony Optimization (ACO, which selects a set of adjacent PMs for placing data and VMs. Data is distributed in the physical storage devices of the selected PMs. According to the processing capacity of each PM, a set of VMs are placed on these PMs to process data stored in them. We use simulation to evaluate our algorithm. The results show that the proposed algorithm selects PMs in close proximity and the jobs executed in the VMs allocated by the proposed scheme outperforms other allocation schemes.

  8. Radiation-induced conduction under high electric field (1 x 106 to 1 x 108 V/m) in polyethylene-terephthalate

    International Nuclear Information System (INIS)

    Maeda, H.; Kurashige, M.; Ito, D.; Nakakita, T.

    1978-01-01

    Radiation-induced conduction in polyethylene-terephthalate (PET) has been measured under high electric field (1.0 x 10 6 to 1.6 x 10 8 V/m). In a 6-μm-thick PET film, saturation of the radiation-induced current occurs at field strengths above 1.2 x 10 8 V/m. This has been demonstrated by the thickness and dose rate dependence of the induced current. Radiation-induced conductivity increases monotonically with field strength, then shows a saturation tendency. This may be explained by geminate recombination. Above 1 x 10 8 V/m, slowly increasing radiation-induced current appears. This may be caused by electron injection from the cathode, enhanced by the accumulation of the hetero space charges near it

  9. Cocaine craving during protracted withdrawal requires PKCε priming within vmPFC.

    Science.gov (United States)

    Miller, Bailey W; Wroten, Melissa G; Sacramento, Arianne D; Silva, Hannah E; Shin, Christina B; Vieira, Philip A; Ben-Shahar, Osnat; Kippin, Tod E; Szumlinski, Karen K

    2017-05-01

    In individuals with a history of drug taking, the capacity of drug-associated cues to elicit indices of drug craving intensifies or incubates with the passage of time during drug abstinence. This incubation of cocaine craving, as well as difficulties with learning to suppress drug-seeking behavior during protracted withdrawal, are associated with a time-dependent deregulation of ventromedial prefrontal cortex (vmPFC) function. As the molecular bases for cocaine-related vmPFC deregulation remain elusive, the present study assayed the consequences of extended access to intravenous cocaine (6 hours/day; 0.25 mg/infusion for 10 day) on the activational state of protein kinase C epsilon (PKCε), an enzyme highly implicated in drug-induced neuroplasticity. The opportunity to engage in cocaine seeking during cocaine abstinence time-dependently altered PKCε phosphorylation within vmPFC, with reduced and increased p-PKCε expression observed in early (3 days) and protracted (30 days) withdrawal, respectively. This effect was more robust within the ventromedial versus dorsomedial PFC, was not observed in comparable cocaine-experienced rats not tested for drug-seeking behavior and was distinct from the rise in phosphorylated extracellular signal-regulated kinase observed in cocaine-seeking rats. Further, the impact of inhibiting PKCε translocation within the vmPFC using TAT infusion proteins upon cue-elicited responding was determined and inhibition coinciding with the period of testing attenuated cocaine-seeking behavior, with an effect also apparent the next day. In contrast, inhibitor pretreatment prior to testing during early withdrawal was without effect. Thus, a history of excessive cocaine taking influences the cue reactivity of important intracellular signaling molecules within the vmPFC, with PKCε playing a critical role in the manifestation of cue-elicited cocaine seeking during protracted drug withdrawal. © 2016 Society for the Study of Addiction.

  10. SIMPLE HEURISTIC ALGORITHM FOR DYNAMIC VM REALLOCATION IN IAAS CLOUDS

    Directory of Open Access Journals (Sweden)

    Nikita A. Balashov

    2018-03-01

    Full Text Available The rapid development of cloud technologies and its high prevalence in both commercial and academic areas have stimulated active research in the domain of optimal cloud resource management. One of the most active research directions is dynamic virtual machine (VM placement optimization in clouds build on Infrastructure-as-a-Service model. This kind of research may pursue different goals with energy-aware optimization being the most common goal as it aims at a urgent problem of green cloud computing - reducing energy consumption by data centers. In this paper we present a new heuristic algorithm of dynamic reallocation of VMs based on an approach presented in one of our previous works. In the algorithm we apply a 2-rank strategy to classify VMs and servers corresponding to the highly and lowly active VMs and solve four tasks: VM classification, host classification, forming a VM migration map and VMs migration. Dividing all of the VMs and servers into two classes we attempt to implement the possibility of risk reduction in case of hardware overloads under overcommitment conditions and to reduce the influence of the occurring overloads on the performance of the cloud VMs. Presented algorithm was developed based on the workload profile of the JINR cloud (a scientific private cloud with the goal of maximizing its usage, but it can also be applied in both public and private commercial clouds to organize the simultaneous use of different SLA and QoS levels in the same cloud environment by giving each VM rank its own level of overcommitment.

  11. Constraining models of postglacial rebound using space geodesy: a detailed assessment of model ICE-5G (VM2) and its relatives

    Science.gov (United States)

    Argus, Donald F.; Peltier, W. Richard

    2010-05-01

    Using global positioning system, very long baseline interferometry, satellite laser ranging and Doppler Orbitography and Radiopositioning Integrated by Satellite observations, including the Canadian Base Network and Fennoscandian BIFROST array, we constrain, in models of postglacial rebound, the thickness of the ice sheets as a function of position and time and the viscosity of the mantle as a function of depth. We test model ICE-5G VM2 T90 Rot, which well fits many hundred Holocene relative sea level histories in North America, Europe and worldwide. ICE-5G is the deglaciation history having more ice in western Canada than ICE-4G; VM2 is the mantle viscosity profile having a mean upper mantle viscosity of 0.5 × 1021Pas and a mean uppermost-lower mantle viscosity of 1.6 × 1021Pas T90 is an elastic lithosphere thickness of 90 km; and Rot designates that the model includes (rotational feedback) Earth's response to the wander of the North Pole of Earth's spin axis towards Canada at a speed of ~1° Myr-1. The vertical observations in North America show that, relative to ICE-5G, the Laurentide ice sheet at last glacial maximum (LGM) at ~26 ka was (1) much thinner in southern Manitoba, (2) thinner near Yellowknife (Northwest Territories), (3) thicker in eastern and southern Quebec and (4) thicker along the northern British Columbia-Alberta border, or that ice was unloaded from these areas later (thicker) or earlier (thinner) than in ICE-5G. The data indicate that the western Laurentide ice sheet was intermediate in mass between ICE-5G and ICE-4G. The vertical observations and GRACE gravity data together suggest that the western Laurentide ice sheet was nearly as massive as that in ICE-5G but distributed more broadly across northwestern Canada. VM2 poorly fits the horizontal observations in North America, predicting places along the margins of the Laurentide ice sheet to be moving laterally away from the ice centre at 2 mm yr-1 in ICE-4G and 3 mm yr-1 in ICE-5G, in

  12. On Use of the Variable Zagreb vM2 Index in QSPR: Boiling Points of Benzenoid Hydrocarbons

    Directory of Open Access Journals (Sweden)

    Albin Jurić

    2004-12-01

    Full Text Available The variable Zagreb vM2 index is introduced and applied to the structure-boiling point modeling of benzenoid hydrocarbons. The linear model obtained (thestandard error of estimate for the fit model Sfit=6.8 oC is much better than thecorresponding model based on the original Zagreb M2 index (Sfit=16.4 oC. Surprisingly,the model based on the variable vertex-connectivity index (Sfit=6.8 oC is comparable tothe model based on vM2 index. A comparative study with models based on the vertex-connectivity index, edge-connectivity index and several distance indices favours modelsbased on the variable Zagreb vM2 index and variable vertex-connectivity index.However, the multivariate regression with two-, three- and four-descriptors givesimproved models, the best being the model with four-descriptors (but vM2 index is notamong them with Sfit=5 oC, though the four-descriptor model contaning vM2 index isonly slightly inferior (Sfit=5.3 oC.

  13. HotpathVM: An Effective JIT for Resource-constrained Devices

    DEFF Research Database (Denmark)

    Gal, Andreas; Franz, Michael; Probst, Christian

    2006-01-01

    We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet surprisingly effective. Our system dynamically identifies traces of frequently executed bytecode instructions (which may span several basic blocks across several methods) and compiles...

  14. 3D-e-Chem-VM: Structural Cheminformatics Research Infrastructure in a Freely Available Virtual Machine.

    Science.gov (United States)

    McGuire, Ross; Verhoeven, Stefan; Vass, Márton; Vriend, Gerrit; de Esch, Iwan J P; Lusher, Scott J; Leurs, Rob; Ridder, Lars; Kooistra, Albert J; Ritschel, Tina; de Graaf, Chris

    2017-02-27

    3D-e-Chem-VM is an open source, freely available Virtual Machine ( http://3d-e-chem.github.io/3D-e-Chem-VM/ ) that integrates cheminformatics and bioinformatics tools for the analysis of protein-ligand interaction data. 3D-e-Chem-VM consists of software libraries, and database and workflow tools that can analyze and combine small molecule and protein structural information in a graphical programming environment. New chemical and biological data analytics tools and workflows have been developed for the efficient exploitation of structural and pharmacological protein-ligand interaction data from proteomewide databases (e.g., ChEMBLdb and PDB), as well as customized information systems focused on, e.g., G protein-coupled receptors (GPCRdb) and protein kinases (KLIFS). The integrated structural cheminformatics research infrastructure compiled in the 3D-e-Chem-VM enables the design of new approaches in virtual ligand screening (Chemdb4VS), ligand-based metabolism prediction (SyGMa), and structure-based protein binding site comparison and bioisosteric replacement for ligand design (KRIPOdb).

  15. Non-Toxic Metabolic Management of Metastatic Cancer in VM Mice: Novel Combination of Ketogenic Diet, Ketone Supplementation, and Hyperbaric Oxygen Therapy.

    Directory of Open Access Journals (Sweden)

    A M Poff

    Full Text Available The Warburg effect and tumor hypoxia underlie a unique cancer metabolic phenotype characterized by glucose dependency and aerobic fermentation. We previously showed that two non-toxic metabolic therapies - the ketogenic diet with concurrent hyperbaric oxygen (KD+HBOT and dietary ketone supplementation - could increase survival time in the VM-M3 mouse model of metastatic cancer. We hypothesized that combining these therapies could provide an even greater therapeutic benefit in this model. Mice receiving the combination therapy demonstrated a marked reduction in tumor growth rate and metastatic spread, and lived twice as long as control animals. To further understand the effects of these metabolic therapies, we characterized the effects of high glucose (control, low glucose (LG, ketone supplementation (βHB, hyperbaric oxygen (HBOT, or combination therapy (LG+βHB+HBOT on VM-M3 cells. Individually and combined, these metabolic therapies significantly decreased VM-M3 cell proliferation and viability. HBOT, alone or in combination with LG and βHB, increased ROS production in VM-M3 cells. This study strongly supports further investigation into this metabolic therapy as a potential non-toxic treatment for late-stage metastatic cancers.

  16. Fast-Solving Quasi-Optimal LS-S3VM Based on an Extended Candidate Set.

    Science.gov (United States)

    Ma, Yuefeng; Liang, Xun; Kwok, James T; Li, Jianping; Zhou, Xiaoping; Zhang, Haiyan

    2018-04-01

    The semisupervised least squares support vector machine (LS-S 3 VM) is an important enhancement of least squares support vector machines in semisupervised learning. Given that most data collected from the real world are without labels, semisupervised approaches are more applicable than standard supervised approaches. Although a few training methods for LS-S 3 VM exist, the problem of deriving the optimal decision hyperplane efficiently and effectually has not been solved. In this paper, a fully weighted model of LS-S 3 VM is proposed, and a simple integer programming (IP) model is introduced through an equivalent transformation to solve the model. Based on the distances between the unlabeled data and the decision hyperplane, a new indicator is designed to represent the possibility that the label of an unlabeled datum should be reversed in each iteration during training. Using the indicator, we construct an extended candidate set consisting of the indices of unlabeled data with high possibilities, which integrates more information from unlabeled data. Our algorithm is degenerated into a special scenario of the previous algorithm when the extended candidate set is reduced into a set with only one element. Two strategies are utilized to determine the descent directions based on the extended candidate set. Furthermore, we developed a novel method for locating a good starting point based on the properties of the equivalent IP model. Combined with the extended candidate set and the carefully computed starting point, a fast algorithm to solve LS-S 3 VM quasi-optimally is proposed. The choice of quasi-optimal solutions results in low computational cost and avoidance of overfitting. Experiments show that our algorithm equipped with the two designed strategies is more effective than other algorithms in at least one of the following three aspects: 1) computational complexity; 2) generalization ability; and 3) flexibility. However, our algorithm and other algorithms have

  17. Risk factors associated with cognitions for late-onset depression based on anterior and posterior default mode sub-networks.

    Science.gov (United States)

    Liu, Rui; Yue, Yingying; Hou, Zhenghua; Yuan, Yonggui; Wang, Qiao

    2018-08-01

    Abnormal functional connectivity (FC) in the default mode network (DMN) plays an important role in late-onset depression (LOD) patients. In this study, the risk predictors of LOD based on anterior and posterior DMN are explored. A total of 27 LOD patients and 40 healthy controls (HC) underwent resting-state functional magnetic resonance imaging and cognitive assessments. Firstly, FCs within DMN sub-networks were determined by placing seeds in the ventral medial prefrontal cortex (vmPFC) and posterior cingulate cortex (PCC). Secondly, multivariable logistic regression was used to identify risk factors for LOD patients. Finally, correlation analysis was performed to investigate the relationship between risk factors and the cognitive value. Multivariable logistic regression showed that the FCs between the vmPFC and right middle temporal gyrus (MTG) (vmPFC-MTG_R), FCs between the vmPFC and left precuneus (PCu), and FCs between the PCC and left PCu (PCC-PCu_L) were the risk factors for LOD. Furthermore, FCs of the vmPFC-MTG_R and PCC-PCu_L correlated with processing speed (R = 0.35, P = 0.002; R = 0.32, P = 0.009), and FCs of the vmPFC-MTG_R correlated with semantic memory (R = 0.41, P = 0.001). The study was a cross-sectional study. The results may be potentially biased because of a small sample. In this study, we confirmed that LOD patients mainly present cognitive deficits in processing speed and semantic memory. Moreover, our findings further suggested that FCs within DMN sub-networks associated with cognitions were risk factors, which may be used for the prediction of LOD. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Aging-related changes in the default mode network and its anti-correlated networks: a resting-state fMRI study.

    Science.gov (United States)

    Wu, Jing-Tao; Wu, Hui-Zhen; Yan, Chao-Gan; Chen, Wen-Xin; Zhang, Hong-Ying; He, Yong; Yang, Hai-Shan

    2011-10-17

    Intrinsic brain activity in a resting state incorporates components of the task negative network called default mode network (DMN) and task-positive networks called attentional networks. In the present study, the reciprocal neuronal networks in the elder group were compared with the young group to investigate the differences of the intrinsic brain activity using a method of temporal correlation analysis based on seed regions of posterior cingulate cortex (PCC) and ventromedial prefrontal cortex (vmPFC). We found significant decreased positive correlations and negative correlations with the seeds of PCC and vmPFC in the old group. The decreased coactivations in the DMN network components and their negative networks in the old group may reflect age-related alterations in various brain functions such as attention, motor control and inhibition modulation in cognitive processing. These alterations in the resting state anti-correlative networks could provide neuronal substrates for the aging brain. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  19. Studying VM-1 molybdenum alloy workability at high current density. II

    Energy Technology Data Exchange (ETDEWEB)

    Tatarinova, O M; Amirkhanova, N A; Zaripov, R A

    1976-01-01

    Under galvanostatic conditions, voltampere characteristics have been taken off for VM-1 alloy; determined are also the selective effect of electrolytes and the influence of hydrodynamical conditions on the rate of anodic dissolution in the electrolytes containing 15% NaNO/sub 3/; 15% NaNO/sub 3/ + 5% NaOH, and 15 % NaOH. In a composite electrolyte, the quality of the surface is improved, and higher current densities have been attained as compared with those for pure 15% NaNO/sub 3/. The process of dissolution in the above electrolytes is effected with diffuse limitations. For the electrochemical treatment of the VM-1 alloy under production conditions, a composite electrolyte containing 15% NaNO/sub 3/ and 5% NaOH has been suggested and tested.

  20. Investigation into electrochemical behavior of molybdenum VM-1 alloy at high current density

    Energy Technology Data Exchange (ETDEWEB)

    Tatarinova, O M; Amirkhanova, N A; Akhmadiev, A G

    1975-01-01

    The effect of the composition and concentration of electrolyte on the workability of the molybdenum VM-1 alloy has been studied and a number of anions has been determined relative to their activation capacity. The best workability of the alloy is achieved in a 15% NaOH solution and a composite electrolyte 15% NaNO/sub 3/+5%NaOH. It is shown that in polarization of the VM-1 alloy both in alkali- and salt solutions a film of oxides of different valence molybdenum is formed: Mo/sub 2/O/sub 3/, Mo/sub 4/O/sub 11/, Mo/sub 9/O/sub 26/, MoO/sub 3/, but molybdenum gets dissolved only in a hexavalent form, its content in a solution being in conformity with the polarizing current densities. Using a temperature-kinetic technique it has been found that the concentrational polarization is the limiting stage in the reaction of molybdenum and VM-1 alloy anodic dissolution in 15% NaNO/sub 3/ solution and in the composite electrolyte 15%NaNO/sub 3/+5%NaOH.

  1. The effect of future time perspective on delay discounting is mediated by the gray matter volume of vmPFC.

    Science.gov (United States)

    Guo, Yiqun; Chen, Zhiyi; Feng, Tingyong

    2017-07-28

    Although several previous studies have shown that individuals' attitude towards time could affect their intertemporal preference, little is known about the neural basis of the relation between time perspective (TP) and delay discounting. In the present study, we quantified the gray matter (GM) cortical volume using voxel-based morphometry (VBM) methods to investigate the effect of TP on delay discounting (DD) across two independent samples. For group 1 (102 healthy college students; 46 male; 20.40 ± 1.87 years), behavioral results showed that only Future TP was a significant predictor of DD, and higher scores on Future TP were related to lower discounting rates. Whole-brain analysis revealed that steeper discounting correlated with greater GM volume in the ventromedial prefrontal cortex (vmPFC) and ventral part of posterior cingulate cortex (vPCC). Also, GM volume of a cluster in the vmPFC was correlated with Future TP. Interestingly, there was an overlapping region in vmPFC that was correlated with both DD and Future TP. Region-of-interest analysis further indicated that the overlapping region of vmPFC played a partially mediating role in the relation between Future TP and DD in the other independent dataset (Group 2, 36 healthy college students; 14 male; 20.18±1.80 years). Taken together, our results provide a new perspective from neural basis for explaining the relation between DD and future TP. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. vmPFC activation during a stressor predicts positive emotions during stress recovery

    Science.gov (United States)

    Yang, Xi; Garcia, Katelyn M; Jung, Youngkyoo; Whitlow, Christopher T; McRae, Kateri; Waugh, Christian E

    2018-01-01

    Abstract Despite accruing evidence showing that positive emotions facilitate stress recovery, the neural basis for this effect remains unclear. To identify the underlying mechanism, we compared stress recovery for people reflecting on a stressor while in a positive emotional context with that for people in a neutral context. While blood–oxygen-level dependent data were being collected, participants (N = 43) performed a stressful anagram task, which was followed by a recovery period during which they reflected on the stressor while watching a positive or neutral video. Participants also reported positive and negative emotions throughout the task as well as retrospective thoughts about the task. Although there was no effect of experimental context on emotional recovery, we found that ventromedial prefrontal cortex (vmPFC) activation during the stressor predicted more positive emotions during recovery, which in turn predicted less negative emotions during recovery. In addition, the relationship between vmPFC activation and positive emotions during recovery was mediated by decentering—the meta-cognitive detachment of oneself from one’s feelings. In sum, successful recovery from a stressor seems to be due to activation of positive emotion-related regions during the stressor itself as well as to their downstream effects on certain cognitive forms of emotion regulation. PMID:29462404

  3. Autosomal dominant inheritance of brain cardiolipin fatty acid abnormality in VM/DK mice: association with hypoxic-induced cognitive insensitivity.

    Science.gov (United States)

    Ta, Nathan L; Jia, Xibei; Kiebish, Michael; Seyfried, Thomas N

    2014-01-01

    Cardiolipin is a complex polyglycerol phospholipid found almost exclusively in the inner mitochondrial membrane and regulates numerous enzyme activities especially those related to oxidative phosphorylation and coupled respiration. Abnormalities in cardiolipin can impair mitochondrial function and bioenergetics. We recently demonstrated that the ratio of shorter chain saturated and monounsaturated fatty acids (C16:0; C18:0; C18:1) to longer chain polyunsaturated fatty acids (C18:2; C20:4; C22:6) was significantly greater in the brains of adult VM/DK (VM) inbred mice than in the brains of C57BL/6 J (B6) mice. The cardiolipin fatty acid abnormalities in VM mice are also associated with alterations in the activity of mitochondrial respiratory complexes. In this study we found that the abnormal brain fatty acid ratio in the VM strain was inherited as an autosomal dominant trait in reciprocal B6 × VM F1 hybrids. To evaluate the potential influence of brain cardiolipin fatty acid composition on cognitive sensitivity, we placed the parental B6 and VM mice and their reciprocal male and female B6VMF1 hybrid mice (3-month-old) in a hypoxic chamber (5 % O2). Cognitive awareness (conscientiousness) under hypoxia was significantly lower in the VM parental mice and F1 hybrid mice (11.4 ± 0.4  and 11.0 ± 0.4 min, respectively) than in the parental B6 mice (15.3 ± 1.4 min), indicating an autosomal dominant inheritance like that of the brain cardiolipin abnormalities. These findings suggest that impaired cognitive awareness under hypoxia is associated with abnormalities in neural lipid composition.

  4. Network-state modulation of power-law frequency-scaling in visual cortical neurons.

    Science.gov (United States)

    El Boustani, Sami; Marre, Olivier; Béhuret, Sébastien; Baudot, Pierre; Yger, Pierre; Bal, Thierry; Destexhe, Alain; Frégnac, Yves

    2009-09-01

    Various types of neural-based signals, such as EEG, local field potentials and intracellular synaptic potentials, integrate multiple sources of activity distributed across large assemblies. They have in common a power-law frequency-scaling structure at high frequencies, but it is still unclear whether this scaling property is dominated by intrinsic neuronal properties or by network activity. The latter case is particularly interesting because if frequency-scaling reflects the network state it could be used to characterize the functional impact of the connectivity. In intracellularly recorded neurons of cat primary visual cortex in vivo, the power spectral density of V(m) activity displays a power-law structure at high frequencies with a fractional scaling exponent. We show that this exponent is not constant, but depends on the visual statistics used to drive the network. To investigate the determinants of this frequency-scaling, we considered a generic recurrent model of cortex receiving a retinotopically organized external input. Similarly to the in vivo case, our in computo simulations show that the scaling exponent reflects the correlation level imposed in the input. This systematic dependence was also replicated at the single cell level, by controlling independently, in a parametric way, the strength and the temporal decay of the pairwise correlation between presynaptic inputs. This last model was implemented in vitro by imposing the correlation control in artificial presynaptic spike trains through dynamic-clamp techniques. These in vitro manipulations induced a modulation of the scaling exponent, similar to that observed in vivo and predicted in computo. We conclude that the frequency-scaling exponent of the V(m) reflects stimulus-driven correlations in the cortical network activity. Therefore, we propose that the scaling exponent could be used to read-out the "effective" connectivity responsible for the dynamical signature of the population signals measured

  5. Barbröstade grabbar, med färgat hår och litervis med öl : En analys av Aftonbladets skildring av herr- och damfotboll i Herr-VM 2006 och Dam-VM 2007

    OpenAIRE

    Mårtensson, Henning

    2012-01-01

    I den här uppsatsen har jag undersökt hur män och kvinnor framställs i bild och text i Aftonbladets rapportering från herrarnas fotbolls-VM i Tyskland 2006 och damernas fotbolls-VM i Kina 2007. Mitt syfte var att titta på hur konstrueringen av en nationell diskurs skiljer sig åt i texterna om dam- och herrfotboll, om det finns någon tydlig manlig och kvinnlig diskurs på bilderna, samt hur väl min undersökning stämmer in på beprövade genusteorier. För att kunna besvara mitt syfte använde jag m...

  6. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Directory of Open Access Journals (Sweden)

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  7. Can recurrence networks show small-world property?

    International Nuclear Information System (INIS)

    Jacob, Rinku; Harikrishnan, K.P.; Misra, R.; Ambika, G.

    2016-01-01

    Recurrence networks are complex networks, constructed from time series data, having several practical applications. Though their properties when constructed with the threshold value ϵ chosen at or just above the percolation threshold of the network are quite well understood, what happens as the threshold increases beyond the usual operational window is still not clear from a complex network perspective. The present Letter is focused mainly on the network properties at intermediate-to-large values of the recurrence threshold, for which no systematic study has been performed so far. We argue, with numerical support, that recurrence networks constructed from chaotic attractors with ϵ equal to the usual recurrence threshold or slightly above cannot, in general, show small-world property. However, if the threshold is further increased, the recurrence network topology initially changes to a small-world structure and finally to that of a classical random graph as the threshold approaches the size of the strange attractor. - Highlights: • Properties of recurrence networks at intermediate-to-large values of recurrence threshold are analyzed from a complex network perspective. • Using a combined plot of characteristic path length and clustering coefficient, it is shown that the recurrence network constructed with recurrence threshold equal to or just above the percolation threshold cannot, in general, display small-world property. • As the recurrence threshold is increased from its usual operational window, the resulting network makes a smooth transition initially to a small-world network for an intermediate range of thresholds and finally to the classical random graph as the threshold becomes comparable to the size of the attractor.

  8. Can recurrence networks show small-world property?

    Energy Technology Data Exchange (ETDEWEB)

    Jacob, Rinku, E-mail: rinku.jacob.vallanat@gmail.com [Department of Physics, The Cochin College, Cochin, 682002 (India); Harikrishnan, K.P., E-mail: kp_hk2002@yahoo.co.in [Department of Physics, The Cochin College, Cochin, 682002 (India); Misra, R., E-mail: rmisra@iucaa.in [Inter University Centre for Astronomy and Astrophysics, Pune, 411007 (India); Ambika, G., E-mail: g.ambika@iiserpune.ac.in [Indian Institute of Science Education and Research, Pune, 411008 (India)

    2016-08-12

    Recurrence networks are complex networks, constructed from time series data, having several practical applications. Though their properties when constructed with the threshold value ϵ chosen at or just above the percolation threshold of the network are quite well understood, what happens as the threshold increases beyond the usual operational window is still not clear from a complex network perspective. The present Letter is focused mainly on the network properties at intermediate-to-large values of the recurrence threshold, for which no systematic study has been performed so far. We argue, with numerical support, that recurrence networks constructed from chaotic attractors with ϵ equal to the usual recurrence threshold or slightly above cannot, in general, show small-world property. However, if the threshold is further increased, the recurrence network topology initially changes to a small-world structure and finally to that of a classical random graph as the threshold approaches the size of the strange attractor. - Highlights: • Properties of recurrence networks at intermediate-to-large values of recurrence threshold are analyzed from a complex network perspective. • Using a combined plot of characteristic path length and clustering coefficient, it is shown that the recurrence network constructed with recurrence threshold equal to or just above the percolation threshold cannot, in general, display small-world property. • As the recurrence threshold is increased from its usual operational window, the resulting network makes a smooth transition initially to a small-world network for an intermediate range of thresholds and finally to the classical random graph as the threshold becomes comparable to the size of the attractor.

  9. vlPFC-vmPFC-Amygdala Interactions Underlie Age-Related Differences in Cognitive Regulation of Emotion.

    Science.gov (United States)

    Silvers, Jennifer A; Insel, Catherine; Powers, Alisa; Franz, Peter; Helion, Chelsea; Martin, Rebecca E; Weber, Jochen; Mischel, Walter; Casey, B J; Ochsner, Kevin N

    2017-07-01

    Emotion regulation is a critical life skill that develops throughout childhood and adolescence. Despite this development in emotional processes, little is known about how the underlying brain systems develop with age. This study examined emotion regulation in 112 individuals (aged 6-23 years) as they viewed aversive and neutral images using a reappraisal task. On "reappraisal" trials, participants were instructed to view the images as distant, a strategy that has been previously shown to reduce negative affect. On "reactivity" trials, participants were instructed to view the images without regulating emotions to assess baseline emotional responding. During reappraisal, age predicted less negative affect, reduced amygdala responses and inverse coupling between the ventromedial prefrontal cortex (vmPFC) and amygdala. Moreover, left ventrolateral prefrontal (vlPFC) recruitment mediated the relationship between increasing age and diminishing amygdala responses. This negative vlPFC-amygdala association was stronger for individuals with inverse coupling between the amygdala and vmPFC. These data provide evidence that vmPFC-amygdala connectivity facilitates vlPFC-related amygdala modulation across development. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  10. Ventral medial prefrontal cortex (vmPFC) as a target of the dorsolateral prefrontal modulation by transcranial direct current stimulation (tDCS) in drug addiction.

    Science.gov (United States)

    Nakamura-Palacios, Ester Miyuki; Lopes, Isabela Bittencourt Coutinho; Souza, Rodolpho Albuquerque; Klauss, Jaisa; Batista, Edson Kruger; Conti, Catarine Lima; Moscon, Janine Andrade; de Souza, Rodrigo Stênio Moll

    2016-10-01

    Here, we report some electrophysiologic and imaging effects of the transcranial direct current stimulation (tDCS) over the dorsolateral prefrontal cortex (dlPFC) in drug addiction, notably in alcohol and crack-cocaine dependence. The low resolution electromagnetic tomography (LORETA) analysis obtained through event-related potentials (ERPs) under drug-related cues, more specifically in its P3 segment (300-500 ms) in both, alcoholics and crack-cocaine users, showed that the ventral medial prefrontal cortex (vmPFC) was the brain area with the largest change towards increasing activation under drug-related cues in those subjects that kept abstinence during and after the treatment with bilateral tDCS (2 mA, 35 cm(2), cathodal left and anodal right) over dlPFC, applied repetitively (five daily sessions). In an additional study in crack-cocaine, which showed craving decreases after repetitive bilateral tDCS, we examined data originating from diffusion tensor imaging (DTI), and we found increased DTI parameters in the left connection between vmPFC and nucleus accumbens (NAcc), such as the number of voxels, fractional anisotropy (FA) and apparent diffusion coefficient (ADC), in tDCS-treated crack-cocaine users when compared to the sham-tDCS group. This increasing of DTI parameters was significantly correlated with craving decreasing after the repetitive tDCS. The vmPFC relates to the control of drug seeking, possibly by extinguishing this behavior. In our studies, the bilateral dlPFC tDCS reduced relapses and craving to the drug use, and increased the vmPFC activation under drug cues, which may be of a great importance in the control of drug use in drug addiction.

  11. Network-state modulation of power-law frequency-scaling in visual cortical neurons.

    Directory of Open Access Journals (Sweden)

    Sami El Boustani

    2009-09-01

    Full Text Available Various types of neural-based signals, such as EEG, local field potentials and intracellular synaptic potentials, integrate multiple sources of activity distributed across large assemblies. They have in common a power-law frequency-scaling structure at high frequencies, but it is still unclear whether this scaling property is dominated by intrinsic neuronal properties or by network activity. The latter case is particularly interesting because if frequency-scaling reflects the network state it could be used to characterize the functional impact of the connectivity. In intracellularly recorded neurons of cat primary visual cortex in vivo, the power spectral density of V(m activity displays a power-law structure at high frequencies with a fractional scaling exponent. We show that this exponent is not constant, but depends on the visual statistics used to drive the network. To investigate the determinants of this frequency-scaling, we considered a generic recurrent model of cortex receiving a retinotopically organized external input. Similarly to the in vivo case, our in computo simulations show that the scaling exponent reflects the correlation level imposed in the input. This systematic dependence was also replicated at the single cell level, by controlling independently, in a parametric way, the strength and the temporal decay of the pairwise correlation between presynaptic inputs. This last model was implemented in vitro by imposing the correlation control in artificial presynaptic spike trains through dynamic-clamp techniques. These in vitro manipulations induced a modulation of the scaling exponent, similar to that observed in vivo and predicted in computo. We conclude that the frequency-scaling exponent of the V(m reflects stimulus-driven correlations in the cortical network activity. Therefore, we propose that the scaling exponent could be used to read-out the "effective" connectivity responsible for the dynamical signature of the population

  12. Managing the Virtual Machine Lifecycle of the CernVM Project

    International Nuclear Information System (INIS)

    Charalampidis, I; Blomer, J; Buncic, P; Harutyunyan, A; Larsen, D

    2012-01-01

    CernVM is a virtual software appliance designed to support the development cycle and provide a runtime environment for LHC applications. It consists of a minimal Linux distribution, a specially tuned file system designed to deliver application software on demand, and contextualization tools. The maintenance of these components involves a variety of different procedures and tools that cannot always connect with each other. Additionally, most of these procedures need to be performed frequently. Currently, in the CernVM project, every time we build a new virtual machine image, we have to perform the whole process manually, because of the heterogeneity of the tools involved. The overall process is error-prone and time-consuming. Therefore, to simplify and aid this continuous maintenance process, we are developing a framework that combines these virtually unrelated tools with a single, coherent interface. To do so, we identified all the involved procedures and their tools, tracked their dependencies and organized them into logical groups (e.g. build, test, instantiate). These groups define the procedures that are performed throughout the lifetime of a virtual machine. In this paper we describe the Virtual Machine Lifecycle and the framework we developed (iAgent) in order to simplify the maintenance process.

  13. Universal Voltage Conveyor and its Novel Dual-Output Fully-Cascadable VM APF Application

    Directory of Open Access Journals (Sweden)

    Norbert Herencsar

    2017-03-01

    Full Text Available This letter presents a novel realization of a voltage-mode (VM first-order all-pass filter (APF with attractive features. The proposed circuit employs a single readily available six-terminal active device called as universal voltage conveyor (UVC and only grounded passive components, which predict its easy monolithic integration with desired circuit simplicity. The auxiliary voltage input (W and output (ZP, ZN terminals of the device fully ensure easy cascadability of VM APF, since the input and output terminal impedances are theoretically infinitely high and zero, respectively. Moreover, thanks to mutually inverse outputs of the UVC, the proposed filter simultaneously provides both inverting and non-inverting outputs from the same configuration. All of these features make the UVC a unique active device currently available in the literature. The behavior of the filter was experimentally measured using the readily available UVC-N1C 0520 chip, which was produced in cooperation with ON Semiconductor Czech Republic, Ltd.

  14. CernVM Co-Pilot: an Extensible Framework for Building Scalable Cloud Computing Infrastructures

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    CernVM Co-Pilot is a framework for instantiating an ad-hoc computing infrastructure on top of distributed computing resources. Such resources include commercial computing clouds (e.g. Amazon EC2), scientific computing clouds (e.g. CERN lxcloud), as well as the machines of users participating in volunteer computing projects (e.g. BOINC). The framework consists of components that communicate using the Extensible Messaging and Presence protocol (XMPP), allowing for new components to be developed in virtually any programming language and interfaced to existing Grid and batch computing infrastructures exploited by the High Energy Physics community. Co-Pilot has been used to execute jobs for both the ALICE and ATLAS experiments at CERN. CernVM Co-Pilot is also one of the enabling technologies behind the LHC@home 2.0 volunteer computing project, which is the first such project that exploits virtual machine technology. The use of virtual machines eliminates the necessity of modifying existing applications and adapt...

  15. NMDA antagonist, but not nNOS inhibitor, requires AMPA receptors in the ventromedial prefrontal cortex (vmPFC) to induce antidepressant-like effects

    DEFF Research Database (Denmark)

    Pereira, V. S.; Wegener, Gregers; Joca, S. R.

    2013-01-01

    of the glutamatergic and nitrergic systems of the vmPFC on the behavioral consequences induced by forced swimming (FS), an animal model of depression. Male Wistar rats (230-260g) with guide cannulas aimed at the prelimbic (PL) region of vmPFC were submitted to a 15min session of FS and, 24h later, they were submitted...

  16. Physical metallurgy: Scientific school of the Academician V.M. Schastlivtsev

    Science.gov (United States)

    Tabatchikova, T. I.

    2016-04-01

    This paper is to honor Academician Vadim Mikhailovich Schastlivtsev, a prominent scientist in the field of metal physics and materials science. The article comprises an analysis of the topical issues of the physical metallurgy of the early 21st century and of the contribution of V.M. Schastlivtsev and of his school to the science of phase and structural transformations in steels. In 2015, Vadim Mikhailovich celebrates his 80th birthday, and this paper is timed to this honorable date. The list of his main publications is given in it.

  17. Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2014-01-01

    Full Text Available In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM migration detection algorithm based on the cellular neural networks (CNNs, is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, in which improved particle swarm optimization algorithm based on bubble sort is used to solve the problem. Experimental results demonstrate that the proposed method can display the VM migration processing intuitively. Compared with the best fit heuristic algorithm, this approach reduces the processing time, and emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation allowing the VM migration detection to be performed better.

  18. Global detection of live virtual machine migration based on cellular neural networks.

    Science.gov (United States)

    Xie, Kang; Yang, Yixian; Zhang, Ling; Jing, Maohua; Xin, Yang; Li, Zhongxian

    2014-01-01

    In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM) migration detection algorithm based on the cellular neural networks (CNNs), is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, in which improved particle swarm optimization algorithm based on bubble sort is used to solve the problem. Experimental results demonstrate that the proposed method can display the VM migration processing intuitively. Compared with the best fit heuristic algorithm, this approach reduces the processing time, and emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI) implementation allowing the VM migration detection to be performed better.

  19. Using XRootD to provide caches for CernVM-FS

    CERN Document Server

    Domenighini, Matteo

    2017-01-01

    CernVM-FS recently added the possibility of using plugin for cache management. In order to investigate the capabilities and limits of such possibility, an XRootD plugin was written and benchmarked; as a byproduct, a POSIX plugin was also generated. The tests revealed that the plugin interface introduces no signicant performance over- head; moreover, the XRootD plugin performance was discovered to be worse than the ones of the built-in cache manager and the POSIX plugin. Further test of the XRootD component revealed that its per- formance is dependent on the server disk speed.

  20. Dynamic virtual AliEn Grid sites on Nimbus with CernVM

    International Nuclear Information System (INIS)

    Harutyunyan, A; Buncic, P; Freeman, T; Keahey, K

    2010-01-01

    We describe the work on enabling one click deployment of Grid sites of AliEn Grid framework on the Nimbus 'science cloud' at the University of Chicago. The integration of computing resources of the cloud with the resource pool of AliEn Grid is achieved by leveraging two mechanisms: the Nimbus Context Broker developed at Argonne National Laboratory and the University of Chicago, and CernVM - a baseline virtual software appliance for LHC experiments developed at CERN. Two approaches of dynamic virtual AliEn Grid site deployment are presented.

  1. Neuroanatomy of the vmPFC and dlPFC predicts individual differences in cognitive regulation during dietary self-control across regulation strategies.

    Science.gov (United States)

    Schmidt, Liane; Tusche, Anita; Manoharan, Nicolas; Hutcherson, Cendri; Hare, Todd; Plassmann, Hilke

    2018-06-04

    Making healthy food choices is challenging for many people. Individuals differ greatly in their ability to follow health goals in the face of temptation, but it is unclear what underlies such differences. Using voxel-based morphometry (VBM), we investigated in healthy humans (i.e., men and women) links between structural variation in gray matter volume and individuals' level of success in shifting toward healthier food choices. We combined MRI and choice data into a joint dataset by pooling across three independent studies that employed a task prompting participants to explicitly focus on the healthiness of food items before making their food choices. Within this dataset, we found that individual differences in gray matter volume in the ventromedial prefrontal cortex (vmPFC) and dorsolateral prefrontal cortex (dlPFC) predicted regulatory success. We extended and confirmed these initial findings by predicting regulatory success out of sample and across tasks in a second dataset requiring participants to apply a different regulation strategy that entailed distancing from cravings for unhealthy, appetitive foods. Our findings suggest that neuroanatomical markers in the vmPFC and dlPFC generalized to different forms of dietary regulation strategies across participant groups. They provide novel evidence that structural differences in neuroanatomy of two key regions for valuation and its control, the vmPFC and dlPFC, predict an individual's ability to exert control in dietary choices. SIGNIFICANCE STATEMENT Dieting involves regulating food choices in order to eat healthier foods and fewer unhealthy foods. People differ dramatically in their ability to achieve or maintain this regulation, but it is unclear why. Here, we show that individuals with more gray matter volume in the dorsolateral and ventromedial prefrontal cortex are better at exercising dietary self-control. This relationship was observed across four different studies examining two different forms of dietary

  2. Motor units in vastus lateralis and in different vastus medialis regions show different firing properties during low-level, isometric knee extension contraction.

    Science.gov (United States)

    de Souza, Leonardo Mendes Leal; Cabral, Hélio Veiga; de Oliveira, Liliam Fernandes; Vieira, Taian Martins

    2018-04-01

    Architectural differences along vastus medialis (VM) and between VM and vastus lateralis (VL) are considered functionally important for the patellar tracking, knee joint stability and knee joint extension. Whether these functional differences are associated with a differential activity of motor units between VM and VL is however unknown. In the present study, we, therefore, investigate neuroanatomical differences in the activity of motor units detected proximo-distally from VM and from the VL muscle. Nine healthy volunteers performed low-level isometric knee extension contractions (20% of their maximum voluntary contraction) following a trapezoidal trajectory. Surface electromyograms (EMGs) were recorded from VM proximal and distal regions and from VL using three linear adhesive arrays of eight electrodes. The firing rate and recruitment threshold of motor units decomposed from EMGs were then compared among muscle regions. Results show that VL motor units reached lower mean firing rates in comparison with VM motor units, regardless of their position within VM (P motor units (P = .997). Furthermore, no significant differences in the recruitment threshold were observed for all motor units analysed (P = .108). Our findings possibly suggest the greater potential of VL to generate force, due to its fibres arrangement, may account for the lower discharge rate observed for VL then either proximally or distally detected motor units in VM. Additionally, the present study opens new perspectives on the importance of considering muscle architecture in investigations of the neural aspects of motor behaviour. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Optimized Virtual Machine Placement with Traffic-Aware Balancing in Data Center Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2016-01-01

    Full Text Available Virtualization has been an efficient method to fully utilize computing resources such as servers. The way of placing virtual machines (VMs among a large pool of servers greatly affects the performance of data center networks (DCNs. As network resources have become a main bottleneck of the performance of DCNs, we concentrate on VM placement with Traffic-Aware Balancing to evenly utilize the links in DCNs. In this paper, we first proposed a Virtual Machine Placement Problem with Traffic-Aware Balancing (VMPPTB and then proved it to be NP-hard and designed a Longest Processing Time Based Placement algorithm (LPTBP algorithm to solve it. To take advantage of the communication locality, we proposed Locality-Aware Virtual Machine Placement Problem with Traffic-Aware Balancing (LVMPPTB, which is a multiobjective optimization problem of simultaneously minimizing the maximum number of VM partitions of requests and minimizing the maximum bandwidth occupancy on uplinks of Top of Rack (ToR switches. We also proved it to be NP-hard and designed a heuristic algorithm (Least-Load First Based Placement algorithm, LLBP algorithm to solve it. Through extensive simulations, the proposed heuristic algorithm is proven to significantly balance the bandwidth occupancy on uplinks of ToR switches, while keeping the number of VM partitions of each request small enough.

  4. Development of a Temperature Controller for a Vuilleumier (VM) Cycle Power Cylinder

    Science.gov (United States)

    1975-10-01

    the system in the event of a shorted sensor; both of these actions turn the power section of the controller "off," and it cannot be repowered until...400-Hz power to a low-level DC with the attendant necessity of using a 400-Hz power transformer . Thus use of DC will allow a less compli- cated...N AFFDL.TR-75-99 7? ^0 00 o o o CQ DEVELOPMENT OF A TEMPERATURE CONTROLLER FOR A VUILLEUMIER (VM) CYCLE POWER CYLINDER i ■ L RTHUR D

  5. Acupuncture analgesia involves modulation of pain-induced gamma oscillations and cortical network connectivity.

    Science.gov (United States)

    Hauck, Michael; Schröder, Sven; Meyer-Hamme, Gesa; Lorenz, Jürgen; Friedrichs, Sunja; Nolte, Guido; Gerloff, Christian; Engel, Andreas K

    2017-11-24

    Recent studies support the view that cortical sensory, limbic and executive networks and the autonomic nervous system might interact in distinct manners under the influence of acupuncture to modulate pain. We performed a double-blind crossover design study to investigate subjective ratings, EEG and ECG following experimental laser pain under the influence of sham and verum acupuncture in 26 healthy volunteers. We analyzed neuronal oscillations and inter-regional coherence in the gamma band of 128-channel-EEG recordings as well as heart rate variability (HRV) on two experimental days. Pain ratings and pain-induced gamma oscillations together with vagally-mediated power in the high-frequency bandwidth (vmHF) of HRV decreased significantly stronger during verum than sham acupuncture. Gamma oscillations were localized in the prefrontal cortex (PFC), mid-cingulate cortex (MCC), primary somatosensory cortex and insula. Reductions of pain ratings and vmHF-power were significantly correlated with increase of connectivity between the insula and MCC. In contrast, connectivity between left and right PFC and between PFC and insula correlated positively with vmHF-power without a relationship to acupuncture analgesia. Overall, these findings highlight the influence of the insula in integrating activity in limbic-saliency networks with vagally mediated homeostatic control to mediate antinociception under the influence of acupuncture.

  6. sRNAtoolboxVM: Small RNA Analysis in a Virtual Machine.

    Science.gov (United States)

    Gómez-Martín, Cristina; Lebrón, Ricardo; Rueda, Antonio; Oliver, José L; Hackenberg, Michael

    2017-01-01

    High-throughput sequencing (HTS) data for small RNAs (noncoding RNA molecules that are 20-250 nucleotides in length) can now be routinely generated by minimally equipped wet laboratories; however, the bottleneck in HTS-based research has shifted now to the analysis of such huge amount of data. One of the reasons is that many analysis types require a Linux environment but computers, system administrators, and bioinformaticians suppose additional costs that often cannot be afforded by small to mid-sized groups or laboratories. Web servers are an alternative that can be used if the data is not subjected to privacy issues (what very often is an important issue with medical data). However, in any case they are less flexible than stand-alone programs limiting the number of workflows and analysis types that can be carried out.We show in this protocol how virtual machines can be used to overcome those problems and limitations. sRNAtoolboxVM is a virtual machine that can be executed on all common operating systems through virtualization programs like VirtualBox or VMware, providing the user with a high number of preinstalled programs like sRNAbench for small RNA analysis without the need to maintain additional servers and/or operating systems.

  7. Experience on QA in the CernVM File System

    CERN Multimedia

    CERN. Geneva; MEUSEL, Rene

    2015-01-01

    The CernVM-File System (CVMFS) delivers experiment software installations to thousands of globally distributed nodes in the WLCG and beyond. In recent years it became a mission-critical component for offline data processing of the LHC experiments and many other collaborations. From a software engineering perspective, CVMFS is a medium-sized C++ system-level project. Following the growth of the project, we introduced a number of measures to improve the code quality, testability, and maintainability. In particular, we found very useful code reviews through github pull requests and automated unit- and integration testing. We are also transitioning to a test-driven development for new features and bug fixes. These processes are supported by a number of tools, such as Google Test, Jenkins, Docker, and others. We would like to share our experience on problems we encountered and on which processes and tools worked well for us.

  8. Inhibition of Information Flow to the Default Mode Network During Self-Reference Versus Reference to Others.

    Science.gov (United States)

    Soch, Joram; Deserno, Lorenz; Assmann, Anne; Barman, Adriana; Walter, Henrik; Richardson-Klavehn, Alan; Schott, Björn H

    2017-08-01

    The default mode network (DMN), a network centered around the cortical midline, shows deactivation during most cognitive tasks and pronounced resting-state connectivity, but is actively engaged in self-reference and social cognition. It is, however, yet unclear how information reaches the DMN during social cognitive processing. Here, we addressed this question using dynamic causal modeling (DCM) of functional magnetic resonance imaging (fMRI) data acquired during self-reference (SR) and reference to others (OR). Both conditions engaged the left inferior frontal gyrus (LIFG), most likely reflecting semantic processing. Within the DMN, self-reference preferentially elicited rostral anterior cingulate and ventromedial prefrontal cortex (rACC/vmPFC) activity, whereas OR engaged posterior cingulate and precuneus (PCC/PreCun). DCM revealed that the regulation of information flow to the DMN was primarily inhibitory. Most prominently, SR elicited inhibited information flow from the LIFG to the PCC/PreCun, while OR was associated with suppression of the connectivity from the LIFG to the rACC/vmPFC. These results suggest that task-related DMN activation is enabled by inhibitory down-regulation of task-irrelevant information flow when switching from rest to stimulus-specific processing. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  9. Altered Behavioral and Autonomic Pain Responses in Alzheimer’s Disease Are Associated with Dysfunctional Affective, Self-Reflective and Salience Network Resting-State Connectivity

    Directory of Open Access Journals (Sweden)

    Paul A. Beach

    2017-09-01

    Full Text Available While pain behaviors are increased in Alzheimer’s disease (AD patients compared to healthy seniors (HS across multiple disease stages, autonomic responses are reduced with advancing AD. To better understand the neural mechanisms underlying these phenomena, we undertook a controlled cross-sectional study examining behavioral (Pain Assessment in Advanced Dementia, PAINAD scores and autonomic (heart rate, HR pain responses in 24 HS and 20 AD subjects using acute pressure stimuli. Resting-state fMRI was utilized to investigate how group connectivity differences were related to altered pain responses. Pain behaviors (slope of PAINAD score change and mean PAINAD score were increased in patients vs. controls. Autonomic measures (HR change intercept and mean HR change were reduced in severe vs. mildly affected AD patients. Group functional connectivity differences associated with greater pain behavior reactivity in patients included: connectivity within a temporal limbic network (TLN and between the TLN and ventromedial prefrontal cortex (vmPFC; between default mode network (DMN subcomponents; between the DMN and ventral salience network (vSN. Reduced HR responses within the AD group were associated with connectivity changes within the DMN and vSN—specifically the precuneus and vmPFC. Discriminant classification indicated HR-related connectivity within the vSN to the vmPFC best distinguished AD severity. Thus, altered behavioral and autonomic pain responses in AD reflects dysfunction of networks and structures subserving affective, self-reflective, salience and autonomic regulation.

  10. Moving to a total VM environment

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1981-01-01

    The Stanford Linear Accelerator Center is a single purpose laboratory operated by Stanford University for the Department of Energy. Its mission is to do research in High Energy (particle) physics. This research involves the use of large and complex electronic detectors. Each of these detectors is a multi-million dollar device. A part of each detector is a computer for process control and data logging. Most detectors at SLAC now use VAX 11/780s for this purpose. Most detectors record digital data via this process control computer. Consequently, physics today is not bounded by the cost of analog to digital conversion as it was in the past, and the physicist is able to run larger experiments than were feasible a decade ago. Today a medium sized experiment will produce several hundred full reels of 6250 BPI tape whereas a large experiment is a couple of thousand reels. The raw data must first be transformed into physics events using data transformation programs. The physicists then use subsets of the data to understand what went on. The subset may be anywhere from a few megabytes to 5 or 6 gigabytes of data (30 or 40 full reels of tape). This searching would be best solved interactively (if computers and I/0 devices were fast enough). Instead what we find are very dynamic batch programs that are generally changed every run. The result is that on any day there are probably around 50 to 100 physicists interacting with a half dozen different experiments who are causing us to mount around 750 to 1000 tapes a day. This has been the style of computing for the last decade. Our going to VM is part of our effort to change this style of computing and to make physics computing more effective

  11. Security in the CernVM File System and the Frontier Distributed Database Caching System

    International Nuclear Information System (INIS)

    Dykstra, D; Blomer, J

    2014-01-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  12. Security in the CernVM File System and the Frontier Distributed Database Caching System

    Science.gov (United States)

    Dykstra, D.; Blomer, J.

    2014-06-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  13. Multiple organ gigantism caused by mutation in VmPPD gene in blackgram (Vigna mungo).

    Science.gov (United States)

    Naito, Ken; Takahashi, Yu; Chaitieng, Bubpa; Hirano, Kumi; Kaga, Akito; Takagi, Kyoko; Ogiso-Tanaka, Eri; Thavarasook, Charaspon; Ishimoto, Masao; Tomooka, Norihiko

    2017-03-01

    Seed size is one of the most important traits in leguminous crops. We obtained a recessive mutant of blackgram that had greatly enlarged leaves, stems and seeds. The mutant produced 100% bigger leaves, 50% more biomass and 70% larger seeds though it produced 40% less number of seeds. We designated the mutant as multiple-organ-gigantism ( mog ) and found the mog phenotype was due to increase in cell numbers but not in cell size. We also found the mog mutant showed a rippled leaf ( rl ) phenotype, which was probably caused by a pleiotropic effect of the mutation. We performed a map-based cloning and successfully identified an 8 bp deletion in the coding sequence of VmPPD gene, an orthologue of Arabidopsis PEAPOD ( PPD ) that regulates arrest of cell divisions in meristematic cells . We found no other mutations in the neighboring genes between the mutant and the wild type. We also knocked down GmPPD genes and reproduced both the mog and rl phenotypes in soybean. Controlling PPD genes to produce the mog phenotype is highly valuable for breeding since larger seed size could directly increase the commercial values of grain legumes.

  14. Persistent schema-dependent hippocampal-neocortical connectivity during memory encoding and postencoding rest in humans.

    Science.gov (United States)

    van Kesteren, Marlieke T R; Fernández, Guillén; Norris, David G; Hermans, Erno J

    2010-04-20

    The hippocampus is thought to promote gradual incorporation of novel information into long-term memory by binding, reactivating, and strengthening distributed cortical-cortical connections. Recent studies implicate a key role in this process for hippocampally driven crosstalk with the (ventro)medial prefrontal cortex (vmPFC), which is proposed to become a central node in such representational networks over time. The existence of a relevant prior associative network, or schema, may moreover facilitate this process. Thus, hippocampal-vmPFC crosstalk may support integration of new memories, particularly in the absence of a relevant prior schema. To address this issue, we used functional magnetic resonance imaging (fMRI) and prior schema manipulation to track hippocampal-vmPFC connectivity during encoding and postencoding rest. We manipulated prior schema knowledge by exposing 30 participants to the first part of a movie that was temporally scrambled for 15 participants. The next day, participants underwent fMRI while encoding the movie's final 15 min in original order and, subsequently, while resting. Schema knowledge and item recognition performance show that prior schema was successfully and selectively manipulated. Intersubject synchronization (ISS) and interregional partial correlation analyses furthermore show that stronger prior schema was associated with more vmPFC ISS and less hippocampal-vmPFC interregional connectivity during encoding. Notably, this connectivity pattern persisted during postencoding rest. These findings suggest that additional crosstalk between hippocampus and vmPFC is required to compensate for difficulty integrating novel information during encoding and provide tentative support for the notion that functionally relevant hippocampal-neocortical crosstalk persists during off-line periods after learning.

  15. PROOF as a Service on the Cloud: a Virtual Analysis Facility based on the CernVM ecosystem

    CERN Document Server

    Berzano, Dario; Buncic, Predrag; Charalampidis, Ioannis; Ganis, Gerardo; Lestaris, Georgios; Meusel, René

    2014-01-01

    PROOF, the Parallel ROOT Facility, is a ROOT-based framework which enables interactive parallelism for event-based tasks on a cluster of computing nodes. Although PROOF can be used simply from within a ROOT session with no additional requirements, deploying and configuring a PROOF cluster used to be not as straightforward. Recently great efforts have been spent to make the provisioning of generic PROOF analysis facilities with zero configuration, with the added advantages of positively affecting both stability and scalability, making the deployment operations feasible even for the end user. Since a growing amount of large-scale computing resources are nowadays made available by Cloud providers in a virtualized form, we have developed the Virtual PROOF-based Analysis Facility: a cluster appliance combining the solid CernVM ecosystem and PoD (PROOF on Demand), ready to be deployed on the Cloud and leveraging some peculiar Cloud features such as elasticity. We will show how this approach is effective both for sy...

  16. A New Resources Provisioning Method Based on QoS Differentiation and VM Resizing in IaaS

    Directory of Open Access Journals (Sweden)

    Rongdong Hu

    2015-01-01

    Full Text Available In order to improve the host energy efficiency in IaaS, we proposed an adaptive host resource provisioning method, CoST, which is based on QoS differentiation and VM resizing. The control model can adaptively adjust control parameters according to real time application performance, in order to cope with changes in load. CoST takes advantage of the fact that different types of applications have different sensitivity degrees to performance and cost. It places two different types of VMs on the same host and dynamically adjusts their sizes based on the load forecasting and QoS feedback. It not only guarantees the performance defined in SLA, but also keeps the host running in energy-efficient state. Real Google cluster trace and host power data are used to evaluate the proposed method. Experimental results show that CoST can provide performance-sensitive application with a steady QoS and simultaneously speed up the overall processing of performance-tolerant application by 20~66%. The host energy efficiency is significantly improved by 7~23%.

  17. State-dependent compound inhibition of Nav1.2 sodium channels using the FLIPR Vm dye: on-target and off-target effects of diverse pharmacological agents.

    Science.gov (United States)

    Benjamin, Elfrida R; Pruthi, Farhana; Olanrewaju, Shakira; Ilyin, Victor I; Crumley, Gregg; Kutlina, Elena; Valenzano, Kenneth J; Woodward, Richard M

    2006-02-01

    Voltage-gated sodium channels (NaChs) are relevant targets for pain, epilepsy, and a variety of neurological and cardiac disorders. Traditionally, it has been difficult to develop structure-activity relationships for NaCh inhibitors due to rapid channel kinetics and state-dependent compound interactions. Membrane potential (Vm) dyes in conjunction with a high-throughput fluorescence imaging plate reader (FLIPR) offer a satisfactory 1st-tier solution. Thus, the authors have developed a FLIPR Vm assay of rat Nav1.2 NaCh. Channels were opened by addition of veratridine, and Vm dye responses were measured. The IC50 values from various structural classes of compounds were compared to the resting state binding constant (Kr)and inactivated state binding constant (Ki)obtained using patch-clamp electrophysiology (EP). The FLIPR values correlated with Ki but not Kr. FLIPRIC50 values fell within 0.1-to 1.5-fold of EP Ki values, indicating that the assay generally reports use-dependent inhibition rather than resting state block. The Library of Pharmacologically Active Compounds (LOPAC, Sigma) was screened. Confirmed hits arose from diverse classes such as dopamine receptor antagonists, serotonin transport inhibitors, and kinase inhibitors. These data suggest that NaCh inhibition is inherent in a diverse set of biologically active molecules and may warrant counterscreening NaChs to avoid unwanted secondary pharmacology.

  18. A human protein interaction network shows conservation of aging processes between human and invertebrate species.

    Directory of Open Access Journals (Sweden)

    Russell Bell

    2009-03-01

    Full Text Available We have mapped a protein interaction network of human homologs of proteins that modify longevity in invertebrate species. This network is derived from a proteome-scale human protein interaction Core Network generated through unbiased high-throughput yeast two-hybrid searches. The longevity network is composed of 175 human homologs of proteins known to confer increased longevity through loss of function in yeast, nematode, or fly, and 2,163 additional human proteins that interact with these homologs. Overall, the network consists of 3,271 binary interactions among 2,338 unique proteins. A comparison of the average node degree of the human longevity homologs with random sets of proteins in the Core Network indicates that human homologs of longevity proteins are highly connected hubs with a mean node degree of 18.8 partners. Shortest path length analysis shows that proteins in this network are significantly more connected than would be expected by chance. To examine the relationship of this network to human aging phenotypes, we compared the genes encoding longevity network proteins to genes known to be changed transcriptionally during aging in human muscle. In the case of both the longevity protein homologs and their interactors, we observed enrichments for differentially expressed genes in the network. To determine whether homologs of human longevity interacting proteins can modulate life span in invertebrates, homologs of 18 human FRAP1 interacting proteins showing significant changes in human aging muscle were tested for effects on nematode life span using RNAi. Of 18 genes tested, 33% extended life span when knocked-down in Caenorhabditis elegans. These observations indicate that a broad class of longevity genes identified in invertebrate models of aging have relevance to human aging. They also indicate that the longevity protein interaction network presented here is enriched for novel conserved longevity proteins.

  19. Postglacial Rebound and Current Ice Loss Estimates from Space Geodesy: The New ICE-6G (VM5a) Global Model

    Science.gov (United States)

    Peltier, W. R.; Argus, D.; Drummond, R.; Moore, A. W.

    2012-12-01

    We compare, on a global basis, estimates of site velocity against predictions of the newly constructed postglacial rebound model ICE-6G (VM5a). This model is fit to observations of North American postglacial rebound thereby demonstrating that the ice sheet at last glacial maximum must have been, relative to ICE-5G,thinner in southern Manitoba, thinner near Yellowknife (northwest Territories), thicker in eastern and southern Quebec, and thicker along the British Columbia-Alberta border. The GPS based estimates of site velocity that we employ are more accurate than were previously available because they are based on GPS estimates of position as a function of time determined by incorporating satellite phase center variations [Desai et al. 2011]. These GPS estimates are constraining postglacial rebound in North America and Europe more tightly than ever before. In particular, given the high density of GPS sites in North America, and the fact that the velocity of the mass center (CM) of Earth is also more tightly constrained, the new model much more strongly constrains both the lateral extent of the proglacial forebulge and the rate at which this peripheral bulge (that was emplaced peripheral to the late Pleistocence Laurentia ice sheet) is presently collapsing. This fact proves to be important to the more accurate inference of the current rate of ice loss from both Greenland and Alaska based upon the time dependent gravity observations being provided by the GRACE satellite system. In West Antarctica we have also been able to significantly revise the previously prevalent ICE-5G deglaciation history so as to enable its predictions to be optimally consistent with GPS site velocities determined by connecting campaign WAGN measurements to those provided by observations from the permanent ANET sites. Ellsworth Land (south of the Antarctic peninsula), is observed to be rising at 6 ±3 mm/yr according to our latest analyses; the Ellsworth mountains themselves are observed to be

  20. Expression of the Components of the Renin-Angiotensin System in Venous Malformation

    Directory of Open Access Journals (Sweden)

    Sam eSiljee

    2016-05-01

    Full Text Available Background Venous malformation (VM is the most common form of vascular malformation, consisting of a network of thin-walled ectatic venous channels with deficient or absent media. This study investigated the expression of the components of the renin-angiotensin system (RAS, namely (prorenin receptor (PRR, angiotensin converting enzyme (ACE, angiotensin II receptor 1 (ATIIR1 and angiotensin II receptor 2 (AIITR2 in subcutaneous (SC and intramuscular (IM VM. Materials and Methods SC (n=7 and IM (n=7 VM were analyzed for the expression of PRR, ACE, ATIIR1, and ATIIR2 using 3,3-diaminobenzidine (DAB and immunofluorescent (IF immunohistochemical (IHC staining and NanoString gene expression analysis. Results IHC staining showed expression of PRR, ACE, ATIIR1 and faint expression of ATIIR2 in the endothelium of SC and IM VM. Furthermore, ATIIR2 was expressed by cells away from the endothelium in both SC and IM VM lesions examined. NanoString analysis demonstrated the presence of PRR, ACE and ATIIR1 but not ATIIR2.Conclusions The presence of PRR, ACE, ATIIR1 and potentially ATIIR2, in both SC and IM VM suggests a role for the RAS in the biology of VM. This novel finding may lead to a mechanism-based therapy for VM.

  1. The Antarctica component of postglacial rebound model ICE-6G_C (VM5a) based on GPS positioning, exposure age dating of ice thicknesses, and relative sea level histories

    Science.gov (United States)

    Argus, Donald F.; Peltier, W. R.; Drummond, R.; Moore, Angelyn W.

    2014-07-01

    A new model of the deglaciation history of Antarctica over the past 25 kyr has been developed, which we refer to herein as ICE-6G_C (VM5a). This revision of its predecessor ICE-5G (VM2) has been constrained to fit all available geological and geodetic observations, consisting of: (1) the present day uplift rates at 42 sites estimated from GPS measurements, (2) ice thickness change at 62 locations estimated from exposure-age dating, (3) Holocene relative sea level histories from 12 locations estimated on the basis of radiocarbon dating and (4) age of the onset of marine sedimentation at nine locations along the Antarctic shelf also estimated on the basis of 14C dating. Our new model fits the totality of these data well. An additional nine GPS-determined site velocities are also estimated for locations known to be influenced by modern ice loss from the Pine Island Bay and Northern Antarctic Peninsula regions. At the 42 locations not influenced by modern ice loss, the quality of the fit of postglacial rebound model ICE-6G_C (VM5A) is characterized by a weighted root mean square residual of 0.9 mm yr-1. The Southern Antarctic Peninsula is inferred to be rising at 2 mm yr-1, requiring there to be less Holocene ice loss there than in the prior model ICE-5G (VM2). The East Antarctica coast is rising at approximately 1 mm yr-1, requiring ice loss from this region to have been small since Last Glacial Maximum. The Ellsworth Mountains, at the base of the Antarctic Peninsula, are inferred to be rising at 5-8 mm yr-1, indicating large ice loss from this area during deglaciation that is poorly sampled by geological data. Horizontal deformation of the Antarctic Plate is minor with two exceptions. First, O'Higgins, at the tip of the Antarctic Peninsula, is moving southeast at a significant 2 mm yr-1 relative to the Antarctic Plate. Secondly, the margins of the Ronne and Ross Ice Shelves are moving horizontally away from the shelf centres at an approximate rate of 0.8 mm yr-1, in

  2. Droplet networks with incorporated protein diodes show collective properties

    Science.gov (United States)

    Maglia, Giovanni; Heron, Andrew J.; Hwang, William L.; Holden, Matthew A.; Mikhailova, Ellina; Li, Qiuhong; Cheley, Stephen; Bayley, Hagan

    2009-07-01

    Recently, we demonstrated that submicrolitre aqueous droplets submerged in an apolar liquid containing lipid can be tightly connected by means of lipid bilayers to form networks. Droplet interface bilayers have been used for rapid screening of membrane proteins and to form asymmetric bilayers with which to examine the fundamental properties of channels and pores. Networks, meanwhile, have been used to form microscale batteries and to detect light. Here, we develop an engineered protein pore with diode-like properties that can be incorporated into droplet interface bilayers in droplet networks to form devices with electrical properties including those of a current limiter, a half-wave rectifier and a full-wave rectifier. The droplet approach, which uses unsophisticated components (oil, lipid, salt water and a simple pore), can therefore be used to create multidroplet networks with collective properties that cannot be produced by droplet pairs.

  3. Antitumor activity of the two epipodophyllotoxin derivatives VP-16 and VM-26 in preclinical systems: a comparison of in vitro and in vivo drug evaluation

    DEFF Research Database (Denmark)

    Jensen, P B; Roed, H; Skovsgaard, T

    1990-01-01

    doses on an optimal schedule in vivo and it has not been clarified as to whether a therapeutic difference exists between them. A prolonged schedule is optimal for both drugs; accordingly we determined the toxicity in mice using a 5-day schedule. The dose killing 10% of the mice (LD10) was 9.4 mg...... the increase in life span and the number of cures. The drugs were also compared in nude mice inoculated with human small-cell lung cancer lines OC-TOL and CPH-SCCL-123; however, they were more toxic to the nude mice and only a limited therapeutic effect was observed. In conclusion, the complete cross......-resistance between the two drugs suggests that they have an identical antineoplastic spectrum. VM-26 was more potent than VP-16 in vitro; however, this was not correlated to a therapeutic advantage for VM-26 over VP-16 in vivo....

  4. Gap junction coupling confers isopotentiality on astrocyte syncytium

    Science.gov (United States)

    Ma, Baofeng; Buckalew, Richard; Du, Yixing; Kiyoshi, Conrad M.; Alford, Catherine C.; Wang, Wei; McTigue, Dana D.; Enyeart, John J.; Terman, David; Zhou, Min

    2015-01-01

    Astrocytes are extensively coupled through gap junctions into a syncytium. However, the basic role of this major brain network remains largely unknown. Using electrophysiological and computational modeling methods, we demonstrate that the membrane potential (VM) of an individual astrocyte in a hippocampal syncytium, but not in a single, freshly isolated cell preparation, can be well-maintained at quasi-physiological levels when recorded with reduced or K+ free pipette solutions that alter the K+ equilibrium potential to non-physiological voltages. We show that an astrocyte’s associated syncytium provides powerful electrical coupling, together with ionic coupling at a lesser extent, that equalizes the astrocyte’s VM to levels comparable to its neighbors. Functionally, this minimizes VM depolarization attributable to elevated levels of local extracellular K+ and thereby maintains a sustained driving force for highly efficient K+ uptake. Thus, gap junction coupling functions to achieve isopotentiality in astrocytic networks, whereby a constant extracellular environment can be powerfully maintained for crucial functions of neural circuits. PMID:26435164

  5. An RTT-Aware Virtual Machine Placement Method

    Directory of Open Access Journals (Sweden)

    Li Quan

    2017-12-01

    Full Text Available Virtualization is a key technology for mobile cloud computing (MCC and the virtual machine (VM is a core component of virtualization. VM provides a relatively independent running environment for different applications. Therefore, the VM placement problem focuses on how to place VMs on optimal physical machines, which ensures efficient use of resources and the quality of service, etc. Most previous work focuses on energy consumption, network traffic between VMs and so on and rarely consider the delay for end users’ requests. In contrast, the latency between requests and VMs is considered in this paper for the scenario of optimal VM placement in MCC. In order to minimize average RTT for all requests, the round-trip time (RTT is first used as the metric for the latency of requests. Based on our proposed RTT metric, an RTT-Aware VM placement algorithm is then proposed to minimize the average RTT. Furthermore, the case in which one of the core switches does not work is considered. A VM rescheduling algorithm is proposed to keep the average RTT lower and reduce the fluctuation of the average RTT. Finally, in the simulation study, our algorithm shows its advantage over existing methods, including random placement, the traffic-aware VM placement algorithm and the remaining utilization-aware algorithm.

  6. Acceptance of the 2014 V.M. Goldschmidt Award of the Gochemical Society by Timothy L. Grove

    Science.gov (United States)

    Grove, Timothy L.

    2015-06-01

    I am deeply honored to be the recipient of the 2014 V.M. Goldschmidt Award. Many of the past recipients of this award have been scientific heroes to me, and it is hard to express how it feels to be included in this distinguished group. My feelings run the full spectrum; from exhilaration and deep personal satisfaction for the recognition of the work that I have done, to humility and anxiety that maybe I am really not good enough to deserve this award. This is called impostor syndrome. You younger scientists should know that many of us, even those who appear very successful, still experience it - don't let it hold you back.

  7. Software-defined optical network for metro-scale geographically distributed data centers.

    Science.gov (United States)

    Samadi, Payman; Wen, Ke; Xu, Junjie; Bergman, Keren

    2016-05-30

    The emergence of cloud computing and big data has rapidly increased the deployment of small and mid-sized data centers. Enterprises and cloud providers require an agile network among these data centers to empower application reliability and flexible scalability. We present a software-defined inter data center network to enable on-demand scale out of data centers on a metro-scale optical network. The architecture consists of a combined space/wavelength switching platform and a Software-Defined Networking (SDN) control plane equipped with a wavelength and routing assignment module. It enables establishing transparent and bandwidth-selective connections from L2/L3 switches, on-demand. The architecture is evaluated in a testbed consisting of 3 data centers, 5-25 km apart. We successfully demonstrated end-to-end bulk data transfer and Virtual Machine (VM) migrations across data centers with less than 100 ms connection setup time and close to full link capacity utilization.

  8. Opposing Effects of Intrinsic Conductance and Correlated Synaptic Input on V-Fluctuations during Network Activity

    DEFF Research Database (Denmark)

    Kolind, Jens; Hounsgaard, Jørn Dybkjær; Berg, Rune W

    2012-01-01

    Neurons often receive massive concurrent bombardment of synaptic inhibition and excitation during functional network activity. This increases membrane conductance and causes fluctuations in membrane potential (V(m)) and spike timing. The conductance increase is commonly attributed to synaptic....... If the spikes arrive at random times the changes in synaptic conductance are therefore stochastic and rapid during intense network activity. In comparison, sub-threshold intrinsic conductances vary smoothly in time. In the present study this discrepancy is investigated using two conductance-based models: a (1...... conductance, but also includes the intrinsic conductances recruited during network activity. These two sources of conductance have contrasting dynamic properties at sub-threshold membrane potentials. Synaptic transmitter gated conductance changes abruptly and briefly with each presynaptic action potential...

  9. PROOF as a service on the cloud: a virtual analysis facility based on the CernVM ecosystem

    International Nuclear Information System (INIS)

    Berzano, D; Blomer, J; Buncic, P; Charalampidis, I; Ganis, G; Lestaris, G; Meusel, R

    2014-01-01

    PROOF, the Parallel ROOT Facility, is a ROOT-based framework which enables interactive parallelism for event-based tasks on a cluster of computing nodes. Although PROOF can be used simply from within a ROOT session with no additional requirements, deploying and configuring a PROOF cluster used to be not as straightforward. Recently great efforts have been spent to make the provisioning of generic PROOF analysis facilities with zero configuration, with the added advantages of positively affecting both stability and scalability, making the deployment operations feasible even for the end user. Since a growing amount of large-scale computing resources are nowadays made available by Cloud providers in a virtualized form, we have developed the Virtual PROOF-based Analysis Facility: a cluster appliance combining the solid CernVM ecosystem and PoD (PROOF on Demand), ready to be deployed on the Cloud and leveraging some peculiar Cloud features such as elasticity. We will show how this approach is effective both for sysadmins, who will have little or no configuration to do to run it on their Clouds, and for the end users, who are ultimately in full control of their PROOF cluster and can even easily restart it by themselves in the unfortunate event of a major failure. We will also show how elasticity leads to a more optimal and uniform usage of Cloud resources.

  10. Efficient Orchestration of Data Centers Via Comprehensive and Application Aware Trade Off Exploration

    Science.gov (United States)

    2016-12-01

    tens of thousands of VM slots. 14. SUBJECT TERMS software-defined networking, network state, data center network, genetic algorithms , virtual machine...perform non-convex SOP optimization, and choose to use genetic algorithms to help overcome the issue of premature algorithm convergence to local...for 1024 VM slots, but may be slowed to the order of hours when other objectives are considered [16]. In [16] a genetic algorithm is used to approximate

  11. Inhibition of tumor vasculogenic mimicry and prolongation of host survival in highly aggressive gallbladder cancers by norcantharidin via blocking the ephrin type a receptor 2/focal adhesion kinase/paxillin signaling pathway.

    Directory of Open Access Journals (Sweden)

    Hui Wang

    Full Text Available Vasculogenic mimicry (VM is a newly-defined tumor microcirculation pattern in highly aggressive malignant tumors. We recently reported tumor growth and VM formation of gallbladder cancers through the contribution of the ephrin type a receptor 2 (EphA2/focal adhesion kinase (FAK/Paxillin signaling pathways. In this study, we further investigated the anti-VM activity of norcantharidin (NCTD as a VM inhibitor for gallbladder cancers and the underlying mechanisms. In vivo and in vitro experiments to determine the effects of NCTD on tumor growth, host survival, VM formation of GBC-SD nude mouse xenografts, and vasculogenic-like networks, malignant phenotypes i.e., proliferation, apoptosis, invasion and migration of GBC-SD cells. Expression of VM signaling-related markers EphA2, FAK and Paxillin in vivo and in vitro were examined by immunofluorescence, western blotting and real-time polymerase chain reaction (RT-PCR, respectively. The results showed that after treatment with NCTD, GBC-SD cells were unable to form VM structures when injecting into nude mouse, growth of the xenograft was inhibited and these observations were confirmed by facts that VM formation by three-dimensional (3-D matrix, proliferation, apoptosis, invasion, migration of GBC-SD cells were affected; and survival time of the xenograft mice was prolonged. Furthermore, expression of EphA2, FAK and Paxillin proteins/mRNAs of the xenografts was downregulated. Thus, we concluded that NCTD has potential anti-VM activity against human gallbladder cancers; one of the underlying mechanisms may be via blocking the EphA2/FAK/Paxillin signaling pathway.

  12. CernVM Co-Pilot: an Extensible Framework for Building Scalable Computing Infrastructures on the Cloud

    Science.gov (United States)

    Harutyunyan, A.; Blomer, J.; Buncic, P.; Charalampidis, I.; Grey, F.; Karneyeu, A.; Larsen, D.; Lombraña González, D.; Lisec, J.; Segal, B.; Skands, P.

    2012-12-01

    CernVM Co-Pilot is a framework for instantiating an ad-hoc computing infrastructure on top of managed or unmanaged computing resources. Co-Pilot can either be used to create a stand-alone computing infrastructure, or to integrate new computing resources into existing infrastructures (such as Grid or batch). Unlike traditional middleware systems, Co-Pilot components communicate using the Extensible Messaging and Presence protocol (XMPP). This allows the system to be easily scaled in case of a high load, and it also simplifies the development of new components. In this contribution we present the latest developments and the current status of the framework, discuss how it can be extended to suit the needs of a particular community, as well as describe the operational experience of using the framework in the LHC@home 2.0 volunteer computing project.

  13. CernVM Co-Pilot: an Extensible Framework for Building Scalable Computing Infrastructures on the Cloud

    International Nuclear Information System (INIS)

    Harutyunyan, A; Blomer, J; Buncic, P; Charalampidis, I; Grey, F; Karneyeu, A; Larsen, D; Lombraña González, D; Lisec, J; Segal, B; Skands, P

    2012-01-01

    CernVM Co-Pilot is a framework for instantiating an ad-hoc computing infrastructure on top of managed or unmanaged computing resources. Co-Pilot can either be used to create a stand-alone computing infrastructure, or to integrate new computing resources into existing infrastructures (such as Grid or batch). Unlike traditional middleware systems, Co-Pilot components communicate using the Extensible Messaging and Presence protocol (XMPP). This allows the system to be easily scaled in case of a high load, and it also simplifies the development of new components. In this contribution we present the latest developments and the current status of the framework, discuss how it can be extended to suit the needs of a particular community, as well as describe the operational experience of using the framework in the LHC at home 2.0 volunteer computing project.

  14. Spatial Disassociation of Disrupted Functional Connectivity for the Default Mode Network in Patients with End-Stage Renal Disease.

    Directory of Open Access Journals (Sweden)

    Xiaofen Ma

    Full Text Available To investigate the aberrant functional connectivity of the default mode network (DMN in patients with end-stage renal disease (ESRD and their clinical relevance.Resting-state functional MRI data were collected from 31 patients with ESRD (24 men, 24-61 years and 31 age- and gender-matched healthy controls (HCs, 21 men, 26-61years. A whole-brain seed-based functional connectivity analysis of these collected R-fMRI data was performed by locating the seeds in the posterior cingulate cortex (PCC and ventromedial prefrontal cortex (vmPFC to investigate the functional connectivity of the posterior and anterior DMN over the whole brain, respectively.Compared to the HCs, the patients exhibited significantly decreased functional connectivity with the PCC in the left middle temporal gyrus, the right anterior cingulate gyrus, and the bilateral medial superior frontal gyrus. For the vmPFC seed, only the right thalamus showed significantly decreased functional connectivity in the patients with ESRD compared to HCs. Interestingly, functional connectivity between the PCC and right medial superior frontal gyrus exhibited a significantly positive correlation with the hemoglobin level in the patients.Our findings suggest a spatially specific disruption of functional connectivity in the DMN in patients with ESRD, thereby providing novel insights into our understanding of the neurophysiology mechanism that underlies the disease.

  15. Resting-state networks associated with cognitive processing show more age-related decline than those associated with emotional processing.

    Science.gov (United States)

    Nashiro, Kaoru; Sakaki, Michiko; Braskie, Meredith N; Mather, Mara

    2017-06-01

    Correlations in activity across disparate brain regions during rest reveal functional networks in the brain. Although previous studies largely agree that there is an age-related decline in the "default mode network," how age affects other resting-state networks, such as emotion-related networks, is still controversial. Here we used a dual-regression approach to investigate age-related alterations in resting-state networks. The results revealed age-related disruptions in functional connectivity in all 5 identified cognitive networks, namely the default mode network, cognitive-auditory, cognitive-speech (or speech-related somatosensory), and right and left frontoparietal networks, whereas such age effects were not observed in the 3 identified emotion networks. In addition, we observed age-related decline in functional connectivity in 3 visual and 3 motor/visuospatial networks. Older adults showed greater functional connectivity in regions outside 4 out of the 5 identified cognitive networks, consistent with the dedifferentiation effect previously observed in task-based functional magnetic resonance imaging studies. Both reduced within-network connectivity and increased out-of-network connectivity were correlated with poor cognitive performance, providing potential biomarkers for cognitive aging. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Algebraic connectivity of brain networks shows patterns of segregation leading to reduced network robustness in Alzheimer's disease

    Science.gov (United States)

    Daianu, Madelaine; Jahanshad, Neda; Nir, Talia M.; Leonardo, Cassandra D.; Jack, Clifford R.; Weiner, Michael W.; Bernstein, Matthew A.; Thompson, Paul M.

    2015-01-01

    Measures of network topology and connectivity aid the understanding of network breakdown as the brain degenerates in Alzheimer's disease (AD). We analyzed 3-Tesla diffusion-weighted images from 202 patients scanned by the Alzheimer's Disease Neuroimaging Initiative – 50 healthy controls, 72 with early- and 38 with late-stage mild cognitive impairment (eMCI/lMCI) and 42 with AD. Using whole-brain tractography, we reconstructed structural connectivity networks representing connections between pairs of cortical regions. We examined, for the first time in this context, the network's Laplacian matrix and its Fiedler value, describing the network's algebraic connectivity, and the Fiedler vector, used to partition a graph. We assessed algebraic connectivity and four additional supporting metrics, revealing a decrease in network robustness and increasing disarray among nodes as dementia progressed. Network components became more disconnected and segregated, and their modularity increased. These measures are sensitive to diagnostic group differences, and may help understand the complex changes in AD. PMID:26640830

  17. CernVM Co-Pilot: a Framework for Orchestrating Virtual Machines Running Applications of LHC Experiments on the Cloud

    International Nuclear Information System (INIS)

    Harutyunyan, A; Sánchez, C Aguado; Blomer, J; Buncic, P

    2011-01-01

    CernVM Co-Pilot is a framework for the delivery and execution of the workload on remote computing resources. It consists of components which are developed to ease the integration of geographically distributed resources (such as commercial or academic computing clouds, or the machines of users participating in volunteer computing projects) into existing computing grid infrastructures. The Co-Pilot framework can also be used to build an ad-hoc computing infrastructure on top of distributed resources. In this paper we present the architecture of the Co-Pilot framework, describe how it is used to execute the jobs of the ALICE and ATLAS experiments, as well as to run the Monte-Carlo simulation application of CERN Theoretical Physics Group.

  18. Comment on "An Assessment of the ICE-6G_C (VM5a) Glacial Isostatic Adjustment Model" by Purcell et al.

    Science.gov (United States)

    Richard Peltier, W.; Argus, Donald F.; Drummond, Rosemarie

    2018-02-01

    The most recently published model of the glacial isostatic adjustment process in the ICE-NG (VMX) sequence from the University of Toronto, denoted ICE-6G_C (VM5a), was originally developed to degree and order 256 in spherical harmonics and has been shown to provide accurate fits to a voluminous database of GPS observations from North America, Eurasia, and Antarctica, to time dependent gravity data being provided by the GRACE satellites, and to radiocarbon-dated relative sea level histories through the Holocene epoch. The authors of the Purcell et al. (2016, https://doi.org/10.1002/2015JB012742) paper have suggested this model to be flawed. We have produced a further version of our model, denoted ICE-6G_D (VM5a), by employing the same BEDMAP2 bathymetry for the Southern Ocean as employed in their analysis which has somewhat reduced the differences between our results. However, significant physically important differences remain, including the magnitude of present-day vertical crustal motion in the embayments and in the spectrum of Stokes coefficients for present-day geoid height time dependence which continues to "flatten" at high spherical harmonic degree. We explore the reasons for these differences and trace them to the use by Purcell et al. of a loading history for the embayments that differs significantly from that tabulated for both the original and modified versions of our model.

  19. Liberating Virtual Machines from Physical Boundaries through Execution Knowledge

    Science.gov (United States)

    2015-12-01

    trivial infrastructures such as VM distribution networks, clients need to wait for an extended period of time before launching a VM. In cloud settings...hardware support. MobiDesk [28] efficiently supports virtual desktops in mobile environments by decou- pling the user’s workload from host systems and...experiment set-up. VMs are migrated between a pair of source and destination hosts, which are connected through a backend 10 Gbps network for

  20. MIPAS temperature from the stratosphere to the lower thermosphere: Comparison of vM21 with ACE-FTS, MLS, OSIRIS, SABER, SOFIE and lidar measurements

    Directory of Open Access Journals (Sweden)

    M. García-Comas

    2014-11-01

    Full Text Available We present vM21 MIPAS temperatures from the lower stratosphere to the lower thermosphere, which cover all optimized resolution measurements performed by MIPAS in the middle-atmosphere, upper-atmosphere and noctilucent-cloud modes during its lifetime, i.e., from January 2005 to April 2012. The main upgrades with respect to the previous version of MIPAS temperatures (vM11 are the update of the spectroscopic database, the use of a different climatology of atomic oxygen and carbon dioxide, and the improvement in important technical aspects of the retrieval setup (temperature gradient along the line of sight and offset regularizations, apodization accuracy. Additionally, an updated version of ESA-calibrated L1b spectra (5.02/5.06 is used. The vM21 temperatures correct the main systematic errors of the previous version because they provide on average a 1–2 K warmer stratopause and middle mesosphere, and a 6–10 K colder mesopause (except in high-latitude summers and lower thermosphere. These lead to a remarkable improvement in MIPAS comparisons with ACE-FTS, MLS, OSIRIS, SABER, SOFIE and the two Rayleigh lidars at Mauna Loa and Table Mountain, which, with a few specific exceptions, typically exhibit differences smaller than 1 K below 50 km and than 2 K at 50–80 km in spring, autumn and winter at all latitudes, and summer at low to midlatitudes. Differences in the high-latitude summers are typically smaller than 1 K below 50 km, smaller than 2 K at 50–65 km and 5 K at 65–80 km. Differences between MIPAS and the other instruments in the mid-mesosphere are generally negative. MIPAS mesopause is within 4 K of the other instruments measurements, except in the high-latitude summers, when it is within 5–10 K, being warmer there than SABER, MLS and OSIRIS and colder than ACE-FTS and SOFIE. The agreement in the lower thermosphere is typically better than 5 K, except for high latitudes during spring and summer, when MIPAS usually exhibits larger

  1. Increased Default Mode Network Connectivity in Obsessive–Compulsive Disorder During Reward Processing

    Directory of Open Access Journals (Sweden)

    Kathrin Koch

    2018-06-01

    Full Text Available Objective: Obsessive-compulsive disorder (OCD is characterized by anxiety-provoking, obsessive thoughts (i.e., obsessions which patients react to with compulsive behaviors (i.e., compulsions. Due to the transient feeling of relief following the reduction of obsession-induced anxiety, compulsions are often described as relieving or even rewarding. Several studies investigated functional activation during reward processing in OCD, but findings are heterogeneous up to now and little is known about potential alterations in functional connectivity.Method: Against this background we studied OCD patients (n = 44 and healthy controls (n = 37 during the receipt of monetary reward by assessing both activation and functional connectivity.Results: Patients showed a decreased activation in several frontal regions and the posterior cingulate (PCC, BA31 together with a stronger connectivity between the PCC and the vmPFC (BA10.Conclusion: Present findings demonstrate an increased connectivity in patients within major nodes of the default mode network (DMN—a network known to be involved in the evaluation of internal mental states. These results may indicate an increased activity of internal, self-related processing at the expense of a normal responsiveness toward external rewards and incentives. This, in turn, may explain the constant urge for additional reinforcement and patients' inability to inhibit their compulsive behaviors.

  2. Systems level analysis of systemic sclerosis shows a network of immune and profibrotic pathways connected with genetic polymorphisms.

    Directory of Open Access Journals (Sweden)

    J Matthew Mahoney

    2015-01-01

    Full Text Available Systemic sclerosis (SSc is a rare systemic autoimmune disease characterized by skin and organ fibrosis. The pathogenesis of SSc and its progression are poorly understood. The SSc intrinsic gene expression subsets (inflammatory, fibroproliferative, normal-like, and limited are observed in multiple clinical cohorts of patients with SSc. Analysis of longitudinal skin biopsies suggests that a patient's subset assignment is stable over 6-12 months. Genetically, SSc is multi-factorial with many genetic risk loci for SSc generally and for specific clinical manifestations. Here we identify the genes consistently associated with the intrinsic subsets across three independent cohorts, show the relationship between these genes using a gene-gene interaction network, and place the genetic risk loci in the context of the intrinsic subsets. To identify gene expression modules common to three independent datasets from three different clinical centers, we developed a consensus clustering procedure based on mutual information of partitions, an information theory concept, and performed a meta-analysis of these genome-wide gene expression datasets. We created a gene-gene interaction network of the conserved molecular features across the intrinsic subsets and analyzed their connections with SSc-associated genetic polymorphisms. The network is composed of distinct, but interconnected, components related to interferon activation, M2 macrophages, adaptive immunity, extracellular matrix remodeling, and cell proliferation. The network shows extensive connections between the inflammatory- and fibroproliferative-specific genes. The network also shows connections between these subset-specific genes and 30 SSc-associated polymorphic genes including STAT4, BLK, IRF7, NOTCH4, PLAUR, CSK, IRAK1, and several human leukocyte antigen (HLA genes. Our analyses suggest that the gene expression changes underlying the SSc subsets may be long-lived, but mechanistically interconnected

  3. False recall is reduced by damage to the ventromedial prefrontal cortex: implications for understanding the neural correlates of schematic memory.

    Science.gov (United States)

    Warren, David E; Jones, Samuel H; Duff, Melissa C; Tranel, Daniel

    2014-05-28

    Schematic memory, or contextual knowledge derived from experience (Bartlett, 1932), benefits memory function by enhancing retention and speeding learning of related information (Bransford and Johnson, 1972; Tse et al., 2007). However, schematic memory can also promote memory errors, producing false memories. One demonstration is the "false memory effect" of the Deese-Roediger-McDermott (DRM) paradigm (Roediger and McDermott, 1995): studying words that fit a common schema (e.g., cold, blizzard, winter) often produces memory for a nonstudied word (e.g., snow). We propose that frontal lobe regions that contribute to complex decision-making processes by weighting various alternatives, such as ventromedial prefrontal cortex (vmPFC), may also contribute to memory processes by weighting the influence of schematic knowledge. We investigated the role of human vmPFC in false memory by combining a neuropsychological approach with the DRM task. Patients with vmPFC lesions (n = 7) and healthy comparison participants (n = 14) studied word lists that excluded a common associate (the critical item). Recall and recognition tests revealed expected high levels of false recall and recognition of critical items by healthy participants. In contrast, vmPFC patients showed consistently reduced false recall, with significantly fewer intrusions of critical items. False recognition was also marginally reduced among vmPFC patients. Our findings suggest that vmPFC increases the influence of schematically congruent memories, a contribution that may be related to the role of the vmPFC in decision making. These novel neuropsychological results highlight a role for the vmPFC as part of a memory network including the medial temporal lobes and hippocampus (Andrews-Hanna et al., 2010). Copyright © 2014 the authors 0270-6474/14/347677-06$15.00/0.

  4. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  5. Age Differences in the Intrinsic Functional Connectivity of Default Network Subsystems

    Directory of Open Access Journals (Sweden)

    Karen eCampbell

    2013-11-01

    Full Text Available Recent work suggests that the default mode network (DMN includes two core regions, the ventromedial prefrontal cortex (vmPFC and posterior cingulate cortex (PCC, and several unique subsystems that are functionally distinct. These include a medial temporal lobe (MTL subsystem, active during remembering and future projection, and a dorsomedial PFC (dmPFC subsystem, active during self-reference. The PCC has been further subdivided into ventral (vPCC and dorsal (dPCC regions that are more strongly connected with the DMN and cognitive control networks, respectively. The goal of this study was to examine age differences in resting state functional connectivity within these subsystems. After applying a rigorous procedure to reduce the effects of head motion, we used a multivariate technique to identify both common and unique patterns of functional connectivity in the MTL vs. the dmPFC, and in vPCC vs. dPCC. All four areas had robust functional connectivity with other DMN regions, and each also showed distinct connectivity patterns in both age groups. Young and older adults had equivalent functional connectivity in the MTL subsystem. Older adults showed weaker connectivity in the vPCC and dmPFC subsystems, particularly with other DMN areas, but stronger connectivity than younger adults in the dPCC subsystem, which included areas involved in cognitive control. Our data provide evidence for distinct subsystems involving DMN nodes, which are maintained with age. Nevertheless, there are age differences in the strength of functional connectivity within these subsystems, supporting prior evidence that DMN connectivity is particularly vulnerable to age, whereas connectivity involving cognitive control regions is relatively maintained. These results suggest an age difference in the integrated activity among brain networks that can have implications for cognition in older adults.

  6. A UV-Induced Genetic Network Links the RSC Complex to Nucleotide Excision Repair and Shows Dose-Dependent Rewiring

    Directory of Open Access Journals (Sweden)

    Rohith Srivas

    2013-12-01

    Full Text Available Efficient repair of UV-induced DNA damage requires the precise coordination of nucleotide excision repair (NER with numerous other biological processes. To map this crosstalk, we generated a differential genetic interaction map centered on quantitative growth measurements of >45,000 double mutants before and after different doses of UV radiation. Integration of genetic data with physical interaction networks identified a global map of 89 UV-induced functional interactions among 62 protein complexes, including a number of links between the RSC complex and several NER factors. We show that RSC is recruited to both silenced and transcribed loci following UV damage where it facilitates efficient repair by promoting nucleosome remodeling. Finally, a comparison of the response to high versus low levels of UV shows that the degree of genetic rewiring correlates with dose of UV and reveals a network of dose-specific interactions. This study makes available a large resource of UV-induced interactions, and it illustrates a methodology for identifying dose-dependent interactions based on quantitative shifts in genetic networks.

  7. Inhibition of xyloglucanase from an alkalothermophilic Thermomonospora sp. by a peptidic aspartic protease inhibitor from Penicillium sp. VM24.

    Science.gov (United States)

    Menon, Vishnu; Rao, Mala

    2012-11-01

    A bifunctional inhibitor from Penicillium sp VM24 causing inactivation of xyloglucanase from Thermomonospora sp and an aspartic protease from Aspergillus saitoi was identified. Steady state kinetics studies of xyloglucanase and the inhibitor revealed an irreversible, non-competitive, two-step inhibition mechanism with IC(50) and K(i) values of 780 and 500nM respectively. The interaction of o-phthalaldehyde (OPTA)-labeled xyloglucanase with the inhibitor revealed that the inhibitor binds to the active site of the enzyme. Far- and near-UV spectrophotometric analysis suggests that the conformational changes induced in xyloglucanase by the inhibitor may be due to irreversible denaturation of enzyme. The bifunctional inhibitor may have potential as a biocontrol agent for the protection of plants against phytopathogenic fungi. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Advanced neuroblastoma: improved response rate using a multiagent regimen (OPEC) including sequential cisplatin and VM-26.

    Science.gov (United States)

    Shafford, E A; Rogers, D W; Pritchard, J

    1984-07-01

    Forty-two children, all over one year of age, were given vincristine, cyclophosphamide, and sequentially timed cisplatin and VM-26 (OPEC) or OPEC and doxorubicin (OPEC-D) as initial treatment for newly diagnosed stage III or IV neuroblastoma. Good partial response was achieved in 31 patients (74%) overall and in 28 (78%) of 36 patients whose treatment adhered to the chemotherapy protocol, compared with a 65% response rate achieved in a previous series of children treated with pulsed cyclophosphamide and vincristine with or without doxorubicin. Only six patients, including two of the six children whose treatment did not adhere to protocol, failed to respond, but there were five early deaths from treatment-related complications. Tumor response to OPEC, which was the less toxic of the two regimens, was at least as good as tumor response to OPEC-D. Cisplatin-induced morbidity was clinically significant in only one patient and was avoided in others by careful monitoring of glomerular filtration rate and hearing. Other centers should test the efficacy of OPEC or equivalent regimens in the treatment of advanced neuroblastoma.

  9. The Multifaceted Role of the Ventromedial Prefrontal Cortex in Emotion, Decision Making, Social Cognition, and Psychopathology.

    Science.gov (United States)

    Hiser, Jaryd; Koenigs, Michael

    2018-04-15

    The ventromedial prefrontal cortex (vmPFC) has been implicated in a variety of social, cognitive, and affective functions that are commonly disrupted in mental illness. In this review, we summarize data from a diverse array of human and animal studies demonstrating that the vmPFC is a key node of cortical and subcortical networks that subserve at least three broad domains of psychological function linked to psychopathology. One track of research indicates that the vmPFC is critical for the representation of reward- and value-based decision making, through interactions with the ventral striatum and amygdala. A second track of research demonstrates that the vmPFC is critical for the generation and regulation of negative emotion, through its interactions with the amygdala, bed nucleus of the stria terminalis, periaqueductal gray, hippocampus, and dorsal anterior cingulate cortex. A third track of research shows the importance of the vmPFC in multiple aspects of social cognition, such as facial emotion recognition, theory-of-mind ability, and processing self-relevant information, through its interactions with the posterior cingulate cortex, precuneus, dorsomedial PFC, and amygdala. We then present meta-analytic data revealing distinct subregions within the vmPFC that correspond to each of these three functions, as well as the associations between these subregions and specific psychiatric disorders (depression, posttraumatic stress disorder, addiction, social anxiety disorder, bipolar disorder, schizophrenia, and attention-deficit/hyperactivity disorder). We conclude by describing several translational possibilities for clinical studies of vmPFC-based circuits, including neuropsychological assessment of transdiagnostic functions, anatomical targets for intervention, predictors of treatment response, markers of treatment efficacy, and subtyping within disorders. Copyright © 2017 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  10. Function of AURKA protein kinase in the formation of vasculogenic mimicry in triple-negative breast cancer stem cells

    Directory of Open Access Journals (Sweden)

    Liu Y

    2016-06-01

    Full Text Available Ying Liu,1,2,* Baocun Sun,1–3,* Tieju Liu,1,2,* Xiulan Zhao,1,2 Xudong Wang,3 Yanlei Li,1,2 Jie Meng,2 Qiang Gu,1,2 Fang Liu,1,2 Xueyi Dong,1,2 Peimei Liu,2 Ran Sun,2 Nan Zhao1 1Department of Pathology, General Hospital of Tianjin Medical University, 2Department of Pathology, Tianjin Medical University, 3Department of Pathology, Cancer Hospital of Tianjin Medical University, Tianjin, People’s Republic of China *These authors contributed equally to this work Abstract: Tumor cell vasculogenic mimicry (VM, a newly defined pattern of tumor blood supply, signifies the functional plasticity of aggressive cancer cells forming vascular networks. VM and cancer stem cells (CSCs have been shown to be associated with tumor growth, local invasion, and distant metastasis. In our previous study, CSCs in triple-negative breast cancer were potential to participate in VM formation. In this study, breast CSCs were isolated from the triple-negative breast cancer cell line MDA-MB-231 by using mammosphere culture. Western blotting and reverse transcription polymerase chain reaction showed that mammosphere cells displayed an increased expression of AURKA protein kinase and stem cell marker c-myc and sox2. The VM formation by mammosphere cells was inhibited by AURKA knockdown or the addition of AURKA inhibitor MLN8237. In the meantime, MLN8237 induced the increased E-cadherin and decreased c-myc, sox2, and β-catenin expressions. The function of AURKA in VM formation was further confirmed using a xenograft-murine model. The results suggested that AURKA protein kinase is involved in VM formation of CSCs and may become a new treatment target in suppressing VM and metastasis of breast cancer. Keywords: AURKA, cancer stem cells, vasculogenic mimicry, breast cancer

  11. Assessment of general public exposure to lte signals compared to other cellular networks present in Thessaloniki, Greece

    International Nuclear Information System (INIS)

    Gkonis, Fotios; Boursianis, Achilles; Samaras, Theodoros

    2017-01-01

    To assess general public exposure to electromagnetic fields from Long Term Evolution (LTE) base stations, measurements at 10 sites in Thessaloniki, Greece were performed. Results are compared with other mobile cellular networks currently in use. All exposure values satisfy the guidelines for general public exposure of the International Commission on Non-Ionizing Radiation Protection (ICNIRP), as well as the reference levels by the Greek legislation at all sites. LTE electric field measurements were recorded up to 0.645 V/m. By applying the ICNIRP guidelines, the exposure ratio for all LTE signals is between 2.9 x 10"-"5 and 2.8 x 10"-"2. From the measurements results it is concluded that the average and maximum power density contribution of LTE down-link signals to the overall cellular networks signals are 7.8% and 36.7%, respectively. (authors)

  12. Construction and comparison of gene co-expression networks shows complex plant immune responses

    Directory of Open Access Journals (Sweden)

    Luis Guillermo Leal

    2014-10-01

    Full Text Available Gene co-expression networks (GCNs are graphic representations that depict the coordinated transcription of genes in response to certain stimuli. GCNs provide functional annotations of genes whose function is unknown and are further used in studies of translational functional genomics among species. In this work, a methodology for the reconstruction and comparison of GCNs is presented. This approach was applied using gene expression data that were obtained from immunity experiments in Arabidopsis thaliana, rice, soybean, tomato and cassava. After the evaluation of diverse similarity metrics for the GCN reconstruction, we recommended the mutual information coefficient measurement and a clustering coefficient-based method for similarity threshold selection. To compare GCNs, we proposed a multivariate approach based on the Principal Component Analysis (PCA. Branches of plant immunity that were exemplified by each experiment were analyzed in conjunction with the PCA results, suggesting both the robustness and the dynamic nature of the cellular responses. The dynamic of molecular plant responses produced networks with different characteristics that are differentiable using our methodology. The comparison of GCNs from plant pathosystems, showed that in response to similar pathogens plants could activate conserved signaling pathways. The results confirmed that the closeness of GCNs projected on the principal component space is an indicative of similarity among GCNs. This also can be used to understand global patterns of events triggered during plant immune responses.

  13. Effective dimension in flocking mechanisms

    International Nuclear Information System (INIS)

    Baglietto, Gabriel; Albano, Ezequiel V.

    2011-01-01

    Even in its minimal representation (Vicsek Model, VM [T. Vicsek, A. Czirok, E. Ben-Jacob, I. Cohen and O. Shochet. Phys. Rev. Lett. 75, 1226 (1995).]), the widespread phenomenon of flocking raises intriguing questions to the statistical physicists. While the VM is very close to the better understood XY Model because they share many symmetry properties, a major difference arises by the fact that the former can sustain long-range order in two dimensions, while the latter can not. Aiming to contribute to the understanding of this feature, by means of extensive numerical simulations of the VM, we study the network structure of clusters showing that they can also sustain purely orientational, mean-field-like, long-range order. We identify the reason of this capability with the key concept of ''effective dimension.'' In fact, by analyzing the behavior of the average path length and the mean degree, we show that this dimension is very close to four, which coincides with the upper critical dimension of the XY Model, where orientational order is also of a mean-field nature. We expect that this methodology could be generalized to other types of dynamical systems.

  14. Research on the Prediction Model of CPU Utilization Based on ARIMA-BP Neural Network

    Directory of Open Access Journals (Sweden)

    Wang Jina

    2016-01-01

    Full Text Available The dynamic deployment technology of the virtual machine is one of the current cloud computing research focuses. The traditional methods mainly work after the degradation of the service performance that usually lag. To solve the problem a new prediction model based on the CPU utilization is constructed in this paper. A reference offered by the new prediction model of the CPU utilization is provided to the VM dynamic deployment process which will speed to finish the deployment process before the degradation of the service performance. By this method it not only ensure the quality of services but also improve the server performance and resource utilization. The new prediction method of the CPU utilization based on the ARIMA-BP neural network mainly include four parts: preprocess the collected data, build the predictive model of ARIMA-BP neural network, modify the nonlinear residuals of the time series by the BP prediction algorithm and obtain the prediction results by analyzing the above data comprehensively.

  15. Activity in dlPFC and its effective connectivity to vmPFC are associated with temporal discounting

    Directory of Open Access Journals (Sweden)

    Todd A Hare

    2014-03-01

    Full Text Available There is widespread interest in identifying computational and neurobiological mechanisms that influence the ability to choose long-term benefits over more proximal and readily available rewards in domains such as dietary and economic choice. We present the results of a human fMRI study that examines how neural activity relates to observed individual differences in the discounting of future rewards during an intertemporal monetary choice task. We found that a region of left dlPFC BA-46 was more active in trials where subjects chose delayed rewards, after controlling for the subjective value of those rewards. We also found that the connectivity from dlPFC BA-46 to a region of vmPFC widely associated with the computational of stimulus values, increased at the time of choice, and especially during trials in which subjects chose delayed rewards. Finally, we found that estimates of effective connectivity between these two regions played a critical role in predicting out-of-sample, between-subject differences in discount rates. Together with previous findings in dietary choice, these results suggest that a common set of computational and neurobiological mechanisms facilitate choices in favor of long- term reward in both settings.

  16. 77 FR 29637 - Game Show Network, LLC v. Cablevision Systems Corp.

    Science.gov (United States)

    2012-05-18

    ... Affairs Bureau at (202) 418-0530 (voice), (202) 418-0432 (TTY). Synopsis of the Order I. Introduction 1... its affiliated cable networks (American Movie Classics (AMC), Fuse, Independent Film Channel, WE tv...

  17. The Small GTPase Rac1 Contributes to Extinction of Aversive Memories of Drug Withdrawal by Facilitating GABAA Receptor Endocytosis in the vmPFC.

    Science.gov (United States)

    Wang, Weisheng; Ju, Yun-Yue; Zhou, Qi-Xin; Tang, Jian-Xin; Li, Meng; Zhang, Lei; Kang, Shuo; Chen, Zhong-Guo; Wang, Yu-Jun; Ji, Hui; Ding, Yu-Qiang; Xu, Lin; Liu, Jing-Gen

    2017-07-26

    Extinction of aversive memories has been a major concern in neuropsychiatric disorders, such as anxiety disorders and drug addiction. However, the mechanisms underlying extinction of aversive memories are not fully understood. Here, we report that extinction of conditioned place aversion (CPA) to naloxone-precipitated opiate withdrawal in male rats activates Rho GTPase Rac1 in the ventromedial prefrontal cortex (vmPFC) in a BDNF-dependent manner, which determines GABA A receptor (GABA A R) endocytosis via triggering synaptic translocation of activity-regulated cytoskeleton-associated protein (Arc) through facilitating actin polymerization. Active Rac1 is essential and sufficient for GABA A R endocytosis and CPA extinction. Knockdown of Rac1 expression within the vmPFC of rats using Rac1-shRNA suppressed GABA A R endocytosis and CPA extinction, whereas expression of a constitutively active form of Rac1 accelerated GABA A R endocytosis and CPA extinction. The crucial role of GABA A R endocytosis in the LTP induction and CPA extinction is evinced by the findings that blockade of GABA A R endocytosis by a dynamin function-blocking peptide (Myr-P4) abolishes LTP induction and CPA extinction. Thus, the present study provides first evidence that Rac1-dependent GABA A R endocytosis plays a crucial role in extinction of aversive memories and reveals the sequence of molecular events that contribute to learning experience modulation of synaptic GABA A R endocytosis. SIGNIFICANCE STATEMENT This study reveals that Rac1-dependent GABA A R endocytosis plays a crucial role in extinction of aversive memories associated with drug withdrawal and identifies Arc as a downstream effector of Rac1 regulations of synaptic plasticity as well as learning and memory, thereby suggesting therapeutic targets to promote extinction of the unwanted memories. Copyright © 2017 the authors 0270-6474/17/377096-15$15.00/0.

  18. An alternative model to distribute VO software to WLCG sites based on CernVM-FS: a prototype at PIC Tier1

    International Nuclear Information System (INIS)

    Lanciotti, E; Merino, G; Blomer, J; Bria, A

    2011-01-01

    In a distributed computing model as WLCG the software of experiment specific application software has to be efficiently distributed to any site of the Grid. Application software is currently installed in a shared area of the site visible for all Worker Nodes (WNs) of the site through some protocol (NFS, AFS or other). The software is installed at the site by jobs which run on a privileged node of the computing farm where the shared area is mounted in write mode. This model presents several drawbacks which cause a non-negligible rate of job failure. An alternative model for software distribution based on the CERN Virtual Machine File System (CernVM-FS) has been tried at PIC, the Spanish Tierl site of WLCG. The test bed used and the results are presented in this paper.

  19. Germinación, microinjertación y cultivo de callos in vitro de Vasconcellea stipulata V.M. Badillo y Vasconcellea pubescens A.DC

    OpenAIRE

    Espinosa Soto, Isabel

    2016-01-01

    En varias poblaciones rurales de regiones andinas y centroamericanas se utilizan con fines etnomédicos las hojas, el látex y el fruto de las plantas de la familia Caricaceae cuyo miembro más representativo es la papaya (Carica papaya L.), la cual produce la fuente comercial más importante de la enzima proteolítica papaína. El presente trabajo estudia las especies Vasconcellea stipulata V.M. Badillo y Vasconcellea pubescens A.DC que pertenecen al género Vasconcellea, miembros de la familia Car...

  20. Response of Cultured Neuronal Network Activity After High-Intensity Power Frequency Magnetic Field Exposure

    Directory of Open Access Journals (Sweden)

    Atsushi Saito

    2018-03-01

    Full Text Available High-intensity and low frequency (1–100 kHz time-varying electromagnetic fields stimulate the human body through excitation of the nervous system. In power frequency range (50/60 Hz, a frequency-dependent threshold of the external electric field-induced neuronal modulation in cultured neuronal networks was used as one of the biological indicator in international guidelines; however, the threshold of the magnetic field-induced neuronal modulation has not been elucidated. In this study, we exposed rat brain-derived neuronal networks to a high-intensity power frequency magnetic field (hPF-MF, and evaluated the modulation of synchronized bursting activity using a multi-electrode array (MEA-based extracellular recording technique. As a result of short-term hPF-MF exposure (50–400 mT root-mean-square (rms, 50 Hz, sinusoidal wave, 6 s, the synchronized bursting activity was increased in the 400 mT-exposed group. On the other hand, no change was observed in the 50–200 mT-exposed groups. In order to clarify the mechanisms of the 400 mT hPF-MF exposure-induced neuronal response, we evaluated it after blocking inhibitory synapses using bicuculline methiodide (BMI; subsequently, increase in bursting activity was observed with BMI application, and the response of 400 mT hPF-MF exposure disappeared. Therefore, it was suggested that the response of hPF-MF exposure was involved in the inhibitory input. Next, we screened the inhibitory pacemaker-like neuronal activity which showed autonomous 4–10 Hz firing with CNQX and D-AP5 application, and it was confirmed that the activity was reduced after 400 mT hPF-MF exposure. Comparison of these experimental results with estimated values of the induced electric field (E-field in the culture medium revealed that the change in synchronized bursting activity occurred over 0.3 V/m, which was equivalent to the findings of a previous study that used the external electric fields. In addition, the results suggested that

  1. The ICE-6G_C (VM5a) Global Model of the GIA Process: Antarctica at High Spatial Resolution

    Science.gov (United States)

    Peltier, W. R.; Drummond, R.; Argus, D. F.

    2016-12-01

    The ICE-6G_C (VM5a) global model of the glacial isostatic adjustment process (Argus et al., 2014 GJI 198, 537-563; Peltier et al. , 2015, JGR 119, doi:10.1002/2014JB011176) is the latest model in the ICE-nG (VMx) sequence. The model continues to be unique in that it is the only model whose properties are made freely available at each iterative step in its development. This latest version, which embodies detailed descriptions of the Laurentide , Fennoscandian/Barents Sea, Greenland and Antarctic ice sheets through the most recent glacial cycle, is a refinement based primarily upon the incorporation of the constraints being provided by GPS measurements of the vertical and horizontal motion of the crust as well as GRACE observations of the time dependent gravity field. The model has been shown to provide exceptionally accurate predictions of these space geodetic observations of the response to the most recent Late Quaternary glacial cycle. Particular attention has been paid to the Antarctic component as it is well known on the basis of analyses of the sedimentary stratigraphy off-shore and geomorphological characteristics of the continental shelf, that the Last Glacial Maximum state of the southern continent was one in which grounded ice extended out to the shelf break in most locations, including significant fractions of the Ross Sea and Weddell Sea embayments. In the latter regions especially, it is expected that grounded ice would have existed below sea level. In ICE-6G_C (VM5a) a grounding line tracking algorithm was employed (Stuhne and Peltier, 2015 JGR 120, 1841-1865) in order to describe the unloading of the solid surface by ice that was initially grounded below sea level, an apparently unique characteristic of this model. In the initially published version, in which the Sea Level Equation (SLE) was inverted on a basis of spherical harmonics truncated at degree and order 256, this led to "ringing" in the embayments when the Stokes coefficients of the model

  2. Assessment of General Public Exposure to LTE signals compared to other Cellular Networks Present in Thessaloniki, Greece.

    Science.gov (United States)

    Gkonis, Fotios; Boursianis, Achilles; Samaras, Theodoros

    2017-07-01

    To assess general public exposure to electromagnetic fields from Long Term Evolution (LTE) base stations, measurements at 10 sites in Thessaloniki, Greece were performed. Results are compared with other mobile cellular networks currently in use. All exposure values satisfy the guidelines for general public exposure of the International Commission on Non-Ionizing Radiation Protection (ICNIRP), as well as the reference levels by the Greek legislation at all sites. LTE electric field measurements were recorded up to 0.645 V/m. By applying the ICNIRP guidelines, the exposure ratio for all LTE signals is between 2.9 × 10-5 and 2.8 × 10-2. From the measurements results it is concluded that the average and maximum power density contribution of LTE downlink signals to the overall cellular networks signals are 7.8% and 36.7%, respectively. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Management of Virtual Machine as an Energy Conservation in Private Cloud Computing System

    Directory of Open Access Journals (Sweden)

    Fauzi Akhmad

    2016-01-01

    Full Text Available Cloud computing is a service model that is packaged in a base computing resources that can be accessed through the Internet on demand and placed in the data center. Data center architecture in cloud computing environments are heterogeneous and distributed, composed of a cluster of network servers with different capacity computing resources in different physical servers. The problems on the demand and availability of cloud services can be solved by fluctuating data center cloud through abstraction with virtualization technology. Virtual machine (VM is a representation of the availability of computing resources that can be dynamically allocated and reallocated on demand. In this study the consolidation of VM as energy conservation in Private Cloud Computing Systems with the target of process optimization selection policy and migration of the VM on the procedure consolidation. VM environment cloud data center to consider hosting a type of service a particular application at the instance VM requires a different level of computing resources. The results of the use of computing resources on a VM that is not balanced in physical servers can be reduced by using a live VM migration to achieve workload balancing. A practical approach used in developing OpenStack-based cloud computing environment by integrating Cloud VM and VM Placement selection procedure using OpenStack Neat VM consolidation. Following the value of CPU Time used as a fill to get the average value in MHz CPU utilization within a specific time period. The average value of a VM’s CPU utilization in getting from the current CPU_time reduced by CPU_time from the previous data retrieval multiplied by the maximum frequency of the CPU. The calculation result is divided by the making time CPU_time when it is reduced to the previous taking time CPU_time multiplied by milliseconds.

  4. Radio-frequency electromagnetic field (RF-EMF) exposure levels in different European outdoor urban environments in comparison with regulatory limits.

    Science.gov (United States)

    Urbinello, Damiano; Joseph, Wout; Huss, Anke; Verloock, Leen; Beekhuizen, Johan; Vermeulen, Roel; Martens, Luc; Röösli, Martin

    2014-07-01

    Concerns of the general public about potential adverse health effects caused by radio-frequency electromagnetic fields (RF-EMFs) led authorities to introduce precautionary exposure limits, which vary considerably between regions. It may be speculated that precautionary limits affect the base station network in a manner that mean population exposure unintentionally increases. The objectives of this multicentre study were to compare mean exposure levels in outdoor areas across four different European cities and to compare with regulatory RF-EMF exposure levels in the corresponding areas. We performed measurements in the cities of Amsterdam (the Netherlands, regulatory limits for mobile phone base station frequency bands: 41-61 V/m), Basel (Switzerland, 4-6 V/m), Ghent (Belgium, 3-4.5 V/m) and Brussels (Belgium, 2.9-4.3 V/m) using a portable measurement device. Measurements were conducted in three different types of outdoor areas (central and non-central residential areas and downtown), between 2011 and 2012 at 12 different days. On each day, measurements were taken every 4s for approximately 15 to 30 min per area. Measurements per urban environment were repeated 12 times during 1 year. Arithmetic mean values for mobile phone base station exposure ranged between 0.22 V/m (Basel) and 0.41 V/m (Amsterdam) in all outdoor areas combined. The 95th percentile for total RF-EMF exposure varied between 0.46 V/m (Basel) and 0.82 V/m (Amsterdam) and the 99th percentile between 0.81 V/m (Basel) and 1.20 V/m (Brussels). All exposure levels were far below international reference levels proposed by ICNIRP (International Commission on Non-Ionizing Radiation Protection). Our study did not find indications that lowering the regulatory limit results in higher mobile phone base station exposure levels. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Utilizing ICN/CCN for service and VM migration support in virtualized LTE systems

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Satria, Triadimas; Karagiannis, Georgios

    2014-01-01

    One of the most important concepts used in mobile networks, like LTE (Long Term Evolution) is service continuity. A mobile user moving from one network to another network should not lose an on-going service. In cloud-based (virtualized) LTE systems, services are hosted on Virtual Machines (VMs) that

  6. Resting-state functional connectivity of antero-medial prefrontal cortex sub-regions in major depression and relationship to emotional intelligence.

    Science.gov (United States)

    Sawaya, Helen; Johnson, Kevin; Schmidt, Matthew; Arana, Ashley; Chahine, George; Atoui, Mia; Pincus, David; George, Mark S; Panksepp, Jaak; Nahas, Ziad

    2015-03-05

    Major depressive disorder has been associated with abnormal resting-state functional connectivity (FC), especially in cognitive processing and emotional regulation networks. Although studies have found abnormal FC in regions of the default mode network (DMN), no study has investigated the FC of specific regions within the anterior DMN based on cytoarchitectonic subdivisions of the antero-medial pre-frontal cortex (PFC). Studies from different areas in the field have shown regions within the anterior DMN to be involved in emotional intelligence. Although abnormalities in this region have been observed in depression, the relationship between the ventromedial PFC (vmPFC) function and emotional intelligence has yet to be investigated in depressed individuals. Twenty-one medication-free, non-treatment resistant, depressed patients and 21 healthy controls underwent a resting state functional magnetic resonance imaging session. The participants also completed an ability-based measure of emotional intelligence: the Mayer-Salovey-Caruso Emotional Intelligence Test. FC maps of Brodmann areas (BA) 25, 10 m, 10r, and 10p were created and compared between the two groups. Mixed-effects analyses showed that the more anterior seeds encompassed larger areas of the DMN. Compared to healthy controls, depressed patients had significantly lower connectivity between BA10p and the right insula and between BA25 and the perigenual anterior cingulate cortex. Exploratory analyses showed an association between vmPFC connectivity and emotional intelligence. These results suggest that individuals with depression have reduced FC between antero-medial PFC regions and regions involved in emotional regulation compared to control subjects. Moreover, vmPFC functional connectivity appears linked to emotional intelligence. © The Author 2015. Published by Oxford University Press on behalf of CINP.

  7. Inferior frontal gyrus links visual and motor cortices during a visuomotor precision grip force task.

    Science.gov (United States)

    Papadelis, Christos; Arfeller, Carola; Erla, Silvia; Nollo, Giandomenico; Cattaneo, Luigi; Braun, Christoph

    2016-11-01

    Coordination between vision and action relies on a fronto-parietal network that receives visual and proprioceptive sensory input in order to compute motor control signals. Here, we investigated with magnetoencephalography (MEG) which cortical areas are functionally coupled on the basis of synchronization during visuomotor integration. MEG signals were recorded from twelve healthy adults while performing a unimanual visuomotor (VM) task and control conditions. The VM task required the integration of pinch motor commands with visual sensory feedback. By using a beamformer, we localized the neural activity in the frequency range of 1-30Hz during the VM compared to rest. Virtual sensors were estimated at the active locations. A multivariate autoregressive model was used to estimate the power and coherence of estimated activity at the virtual sensors. Event-related desynchronisation (ERD) during VM was observed in early visual areas, the rostral part of the left inferior frontal gyrus (IFG), the right IFG, the superior parietal lobules, and the left hand motor cortex (M1). Functional coupling in the alpha frequency band bridged the regional activities observed in motor and visual cortices (the start and the end points in the visuomotor loop) through the left or right IFG. Coherence between the left IFG and left M1 correlated inversely with the task performance. Our results indicate that an occipital-prefrontal-motor functional network facilitates the modulation of instructed motor responses to visual cues. This network may supplement the mechanism for guiding actions that is fully incorporated into the dorsal visual stream. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. A Comprehensive Sensitivity Analysis of a Data Center Network with Server Virtualization for Business Continuity

    Directory of Open Access Journals (Sweden)

    Tuan Anh Nguyen

    2015-01-01

    Full Text Available Sensitivity assessment of availability for data center networks (DCNs is of paramount importance in design and management of cloud computing based businesses. Previous work has presented a performance modeling and analysis of a fat-tree based DCN using queuing theory. In this paper, we present a comprehensive availability modeling and sensitivity analysis of a DCell-based DCN with server virtualization for business continuity using stochastic reward nets (SRN. We use SRN in modeling to capture complex behaviors and dependencies of the system in detail. The models take into account (i two DCell configurations, respectively, composed of two and three physical hosts in a DCell0 unit, (ii failure modes and corresponding recovery behaviors of hosts, switches, and VMs, and VM live migration mechanism within and between DCell0s, and (iii dependencies between subsystems (e.g., between a host and VMs and between switches and VMs in the same DCell0. The constructed SRN models are analyzed in detail with regard to various metrics of interest to investigate system’s characteristics. A comprehensive sensitivity analysis of system availability is carried out in consideration of the major impacting parameters in order to observe the system’s complicated behaviors and find the bottlenecks of system availability. The analysis results show the availability improvement, capability of fault tolerance, and business continuity of the DCNs complying with DCell network topology. This study provides a basis of designing and management of DCNs for business continuity.

  9. Engineering the CernVM-Filesystem as a High Bandwidth Distributed Filesystem for Auxiliary Physics Data

    Energy Technology Data Exchange (ETDEWEB)

    Dykstra, D. [Fermilab; Bockelman, B. [Nebraska U.; Blomer, J. [CERN; Herner, K. [Fermilab; Levshina, T. [Fermilab; Slyz, M. [Fermilab

    2015-12-23

    A common use pattern in the computing models of particle physics experiments is running many distributed applications that read from a shared set of data files. We refer to this data is auxiliary data, to distinguish it from (a) event data from the detector (which tends to be different for every job), and (b) conditions data about the detector (which tends to be the same for each job in a batch of jobs). Relatively speaking, conditions data also tends to be relatively small per job where both event data and auxiliary data are larger per job. Unlike event data, auxiliary data comes from a limited working set of shared files. Since there is spatial locality of the auxiliary data access, the use case appears to be identical to that of the CernVM- Filesystem (CVMFS). However, we show that distributing auxiliary data through CVMFS causes the existing CVMFS infrastructure to perform poorly. We utilize a CVMFS client feature called 'alien cache' to cache data on existing local high-bandwidth data servers that were engineered for storing event data. This cache is shared between the worker nodes at a site and replaces caching CVMFS files on both the worker node local disks and on the site's local squids. We have tested this alien cache with the dCache NFSv4.1 interface, Lustre, and the Hadoop Distributed File System (HDFS) FUSE interface, and measured performance. In addition, we use high-bandwidth data servers at central sites to perform the CVMFS Stratum 1 function instead of the low-bandwidth web servers deployed for the CVMFS software distribution function. We have tested this using the dCache HTTP interface. As a result, we have a design for an end-to-end high-bandwidth distributed caching read-only filesystem, using existing client software already widely deployed to grid worker nodes and existing file servers already widely installed at grid sites. Files are published in a central place and are soon available on demand throughout the grid and cached

  10. Engineering the CernVM-Filesystem as a High Bandwidth Distributed Filesystem for Auxiliary Physics Data

    Science.gov (United States)

    Dykstra, D.; Bockelman, B.; Blomer, J.; Herner, K.; Levshina, T.; Slyz, M.

    2015-12-01

    A common use pattern in the computing models of particle physics experiments is running many distributed applications that read from a shared set of data files. We refer to this data is auxiliary data, to distinguish it from (a) event data from the detector (which tends to be different for every job), and (b) conditions data about the detector (which tends to be the same for each job in a batch of jobs). Relatively speaking, conditions data also tends to be relatively small per job where both event data and auxiliary data are larger per job. Unlike event data, auxiliary data comes from a limited working set of shared files. Since there is spatial locality of the auxiliary data access, the use case appears to be identical to that of the CernVM- Filesystem (CVMFS). However, we show that distributing auxiliary data through CVMFS causes the existing CVMFS infrastructure to perform poorly. We utilize a CVMFS client feature called "alien cache" to cache data on existing local high-bandwidth data servers that were engineered for storing event data. This cache is shared between the worker nodes at a site and replaces caching CVMFS files on both the worker node local disks and on the site's local squids. We have tested this alien cache with the dCache NFSv4.1 interface, Lustre, and the Hadoop Distributed File System (HDFS) FUSE interface, and measured performance. In addition, we use high-bandwidth data servers at central sites to perform the CVMFS Stratum 1 function instead of the low-bandwidth web servers deployed for the CVMFS software distribution function. We have tested this using the dCache HTTP interface. As a result, we have a design for an end-to-end high-bandwidth distributed caching read-only filesystem, using existing client software already widely deployed to grid worker nodes and existing file servers already widely installed at grid sites. Files are published in a central place and are soon available on demand throughout the grid and cached locally on the

  11. The potential inclusion of value management subject for postgraduate programmes in Malaysia

    Science.gov (United States)

    Che Mat, M.; Karim, S. B. Abd; Amran, N. A. E.

    2018-02-01

    The development of construction industry is increasing tremendously. To complement with this scenario, Value Management (VM) is needed to achieve the optimum function by reducing or eliminating the unnecessary cost that does not contribute to the product, system or service. As VM has been increasingly applied to enhance and improve value in construction projects, the purpose of this study is to implement VM as a subject for master’s students at selected public universities in Malaysia. The research is conducted to investigate the potential inclusion of VM as a subject at master degree programmes in Malaysia. Questionnaire survey was designed and delivered to existing master students to explore the current understanding of VM as well as the possibility of introducing VM as a subject. The results showed that the level of awareness on VM is high, yet the understanding of VM is low. This research presents the result of implementing VM as a subject learning for master’s level programme at selected public universities in Malaysia.

  12. New insights into pathophysiology of vestibular migraine

    Directory of Open Access Journals (Sweden)

    Juan Manuel Espinosa-Sanchez

    2015-02-01

    Full Text Available Vestibular migraine (VM is a common disorder in which genetic, epigenetic and environmental factors probably contribute to its development. The pathophysiology of VM is unknown; nevertheless in the last few years, several studies are contributing to understand the neurophysiological pathways involved in VM. The current hypotheses are mostly based on the knowledge of migraine itself. The evidence of trigeminal innervation of the labyrinth vessels and the localization of vasoactive neuropeptides in the perivascular afferent terminals of these trigeminal fibers support the involvement of the trigemino-vascular system. The neurogenic inflammation triggered by activation of the trigeminal-vestibulocochlear reflex, with the subsequent inner ear plasma protein extravasation and the release of inflammatory mediators, can contribute to a sustained activation and sensitization of the trigeminal primary afferent neurons explaining VM symptoms. The reciprocal connections between brainstem vestibular nuclei and the structures that modulate trigeminal nociceptive inputs (rostral ventromedial medulla, ventrolateral periaqueductal grey, locus coeruleus and nucleus raphe magnus are critical to understand the pathophysiology of VM. Although cortical spreading depression can affect cortical areas involved in processing vestibular information, functional neuroimaging techniques suggest a dysmodulation in the multimodal sensory integration and processing of vestibular and nociceptive information, resulting from a vestibulo-thalamo-cortical dysfunction, as the pathogenic mechanism underlying VM. The elevated prevalence of VM suggests that multiple functional variants may confer a genetic susceptibility leading to a dysregulation of excitatory-inhibitory balance in brain structures involved in the processing of sensory information, vestibular inputs and pain. The interactions among several functional and structural neural networks could explain the pathogenic

  13. Altered Communicative Decisions following Ventromedial Prefrontal Lesions

    NARCIS (Netherlands)

    Stolk, A.; D'Imperio, D.; Pellegrino, G. di; Toni, I.

    2015-01-01

    Damage to the human ventromedial prefrontal cortex (vmPFC) leads to profound changes in everyday social interactions [1, 2]. Yet, in the lab, vmPFC patients show surprising proficiency in reasoning about other agents [3-8]. These conflicting observations suggest that what vmPFC patients lack in

  14. Reduced prefrontal connectivity in psychopathy.

    Science.gov (United States)

    Motzkin, Julian C; Newman, Joseph P; Kiehl, Kent A; Koenigs, Michael

    2011-11-30

    Linking psychopathy to a specific brain abnormality could have significant clinical, legal, and scientific implications. Theories on the neurobiological basis of the disorder typically propose dysfunction in a circuit involving ventromedial prefrontal cortex (vmPFC). However, to date there is limited brain imaging data to directly test whether psychopathy may indeed be associated with any structural or functional abnormality within this brain area. In this study, we employ two complementary imaging techniques to assess the structural and functional connectivity of vmPFC in psychopathic and non-psychopathic criminals. Using diffusion tensor imaging, we show that psychopathy is associated with reduced structural integrity in the right uncinate fasciculus, the primary white matter connection between vmPFC and anterior temporal lobe. Using functional magnetic resonance imaging, we show that psychopathy is associated with reduced functional connectivity between vmPFC and amygdala as well as between vmPFC and medial parietal cortex. Together, these data converge to implicate diminished vmPFC connectivity as a characteristic neurobiological feature of psychopathy.

  15. Functional coupling networks inferred from prefrontal cortex activity show experience-related effective plasticity

    Directory of Open Access Journals (Sweden)

    Gaia Tavoni

    2017-10-01

    Full Text Available Functional coupling networks are widely used to characterize collective patterns of activity in neural populations. Here, we ask whether functional couplings reflect the subtle changes, such as in physiological interactions, believed to take place during learning. We infer functional network models reproducing the spiking activity of simultaneously recorded neurons in prefrontal cortex (PFC of rats, during the performance of a cross-modal rule shift task (task epoch, and during preceding and following sleep epochs. A large-scale study of the 96 recorded sessions allows us to detect, in about 20% of sessions, effective plasticity between the sleep epochs. These coupling modifications are correlated with the coupling values in the task epoch, and are supported by a small subset of the recorded neurons, which we identify by means of an automatized procedure. These potentiated groups increase their coativation frequency in the spiking data between the two sleep epochs, and, hence, participate to putative experience-related cell assemblies. Study of the reactivation dynamics of the potentiated groups suggests a possible connection with behavioral learning. Reactivation is largely driven by hippocampal ripple events when the rule is not yet learned, and may be much more autonomous, and presumably sustained by the potentiated PFC network, when learning is consolidated. Cell assemblies coding for memories are widely believed to emerge through synaptic modification resulting from learning, yet their identification from activity is very arduous. We propose a functional-connectivity-based approach to identify experience-related cell assemblies from multielectrode recordings in vivo, and apply it to the prefrontal cortex activity of rats recorded during a task epoch and the preceding and following sleep epochs. We infer functional couplings between the recorded cells in each epoch. Comparisons of the functional coupling networks across the epochs allow us

  16. Relative sea level in the Western Mediterranean basin: A regional test of the ICE-7G_NA (VM7) model and a constraint on late Holocene Antarctic deglaciation

    Science.gov (United States)

    Roy, Keven; Peltier, W. R.

    2018-03-01

    The Mediterranean Basin is a region of special interest in the study of past and present relative sea level evolution, given its location south of the ice sheets that covered large fractions of Northern Europe during the last glaciation, the large number of biological, geological and archaeological sea level indicators that have been retrieved from its coastal regions, as well as its high density of modern coastal infrastructure. Models of the Glacial Isostatic Adjustment (GIA) process provide reconstructions of past relative sea level evolution, and can be tested for validity against past sea level indicators from the region. It is demonstrated herein that the latest ICE-7G_NA (VM7) model of the GIA process, the North American component of which was refined using a full suite of geophysical observables, is able to reconcile the vast majority of uniformly analyzed relative sea level constraints available for the Western part of the Mediterranean basin, a region to which it was not tuned. We also revisit herein the previously published interpretations of relative sea level information obtained from Roman-era coastal Mediterranean "fish tanks", analyze the far-field influence of the rate of late Holocene Antarctic ice sheet melting history on the exceptionally detailed relative sea level history available from southern Tunisia, and extend the analysis to complementary constraints on the history of Antarctic ice-sheet melting available from islands in the equatorial Pacific Ocean. The analyses reported herein provide strong support for the global "exportability" of the ICE-7G_NA (VM7) model, a result that speaks directly to the ability of spherically symmetric models of the internal viscoelastic structure to explain globally distributed observations, while also identifying isolated regions of remaining misfit which will benefit from further study.

  17. Performance Tests of CMSSW on the CernVM

    CERN Document Server

    Petek, Marko

    2012-01-01

    goal of allowing the execution of the experiment's software on different operating systems in an easy way for the users. To achieve this it makes use of Virtual Machine images consisting of a JEOS (Just Enough Operational System) Linux image, bundled with CVMFS, a distributed file system for software. This image can this be run with a proper virtualizer on most of the platforms available. It also aggressively caches data on the local user's machine so that it can operate disconnected from the network. CMS wanted to compare the performance of the CMS Software running in the virtualized environment with the same software running on a native Linux box. To answer this need a series of tests were made on a controlled environment during 2010-2011. This work presents the results of those tests.

  18. Gender differences of brain activity in the conflicts based on implicit self-esteem.

    Science.gov (United States)

    Miyamoto, Reiko; Kikuchi, Yoshiaki

    2012-01-01

    There are gender differences in global and domain-specific self-esteem and the incidence of some psychiatric disorders related to self-esteem, suggesting that there are gender differences in the neural basis underlying one's own self-esteem. We investigated gender differences in the brain activity while subjects (14 males and 12 females) performed an implicit self-esteem task, using fMRI. While ventromedial prefrontal cortex (vmPFC) was significantly activated in females, medial and dorsomedial PFC (dmPFC) were activated in males in the incongruent condition (self = negative) compared with the congruent condition (self = positive). Additionally, scores on the explicit self-esteem test were negatively correlated with vmPFC activity in females and positively correlated with dmPFC activity in males. Furthermore, the functional relationships among the regions found by direct gender comparisons were discussed based on the somatic-marker model. These showed that, compared to males, females more firmly store even the incongruent associations as part of their schematic self-knowledge, and such associations automatically activate the neural networks for emotional response and control, in which vmPFC plays a central role. This may explain female cognitive/behavioral traits; females have more tendency to ruminate more often than males, which sometimes results in a prolonged negative affect.

  19. Gender differences of brain activity in the conflicts based on implicit self-esteem.

    Directory of Open Access Journals (Sweden)

    Reiko Miyamoto

    Full Text Available There are gender differences in global and domain-specific self-esteem and the incidence of some psychiatric disorders related to self-esteem, suggesting that there are gender differences in the neural basis underlying one's own self-esteem. We investigated gender differences in the brain activity while subjects (14 males and 12 females performed an implicit self-esteem task, using fMRI. While ventromedial prefrontal cortex (vmPFC was significantly activated in females, medial and dorsomedial PFC (dmPFC were activated in males in the incongruent condition (self = negative compared with the congruent condition (self = positive. Additionally, scores on the explicit self-esteem test were negatively correlated with vmPFC activity in females and positively correlated with dmPFC activity in males. Furthermore, the functional relationships among the regions found by direct gender comparisons were discussed based on the somatic-marker model. These showed that, compared to males, females more firmly store even the incongruent associations as part of their schematic self-knowledge, and such associations automatically activate the neural networks for emotional response and control, in which vmPFC plays a central role. This may explain female cognitive/behavioral traits; females have more tendency to ruminate more often than males, which sometimes results in a prolonged negative affect.

  20. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  1. Verbal memory impairments in schizophrenia associated with cortical thinning

    Directory of Open Access Journals (Sweden)

    S. Guimond

    2016-01-01

    Full Text Available Verbal memory (VM represents one of the most affected cognitive domains in schizophrenia. Multiple studies have shown that schizophrenia is associated with cortical abnormalities, but it remains unclear whether these are related to VM impairments. Considering the vast literature demonstrating the role of the frontal cortex, the parahippocampal cortex, and the hippocampus in VM, we examined the cortical thickness/volume of these regions. We used a categorical approach whereby 27 schizophrenia patients with ‘moderate to severe’ VM impairments were compared to 23 patients with ‘low to mild’ VM impairments and 23 healthy controls. A series of between-group vertex-wise GLM on cortical thickness were performed for specific regions of interest defining the parahippocampal gyrus and the frontal cortex. When compared to healthy controls, patients with ‘moderate to severe’ VM impairments revealed significantly thinner cortex in the left frontal lobe, and the parahippocampal gyri. When compared to patients with ‘low to mild’ VM impairments, patients with ‘moderate to severe’ VM impairments showed a trend of thinner cortex in similar regions. Virtually no differences were observed in the frontal area of patients with ‘low to mild’ VM impairments relative to controls. No significant group differences were observed in the hippocampus. Our results indicate that patients with greater VM impairments demonstrate significant cortical thinning in regions known to be important in VM performance. Treating VM deficits in schizophrenia could have a positive effect on the brain; thus, subgroups of patients with more severe VM deficits should be a prioritized target in the development of new cognitive treatments.

  2. Metabolic and molecular analyses of white mutant Vaccinium berries show down-regulation of MYBPA1-type R2R3 MYB regulatory factor.

    Science.gov (United States)

    Primetta, Anja K; Karppinen, Katja; Riihinen, Kaisu R; Jaakola, Laura

    2015-09-01

    MYBPA1-type R2R3 MYB transcription factor shows down-regulation in white mutant berries of Vaccinium uliginosum deficient in anthocyanins but not proanthocyanidins suggesting a role in the regulation of anthocyanin biosynthesis. Berries of the genus Vaccinium are among the best natural sources of flavonoids. In this study, the expression of structural and regulatory flavonoid biosynthetic genes and the accumulation of flavonoids in white mutant and blue-colored wild-type bog bilberry (V. uliginosum) fruits were measured at different stages of berry development. In contrast to high contents of anthocyanins in ripe blue-colored berries, only traces were detected by HPLC-ESI-MS in ripe white mutant berries. However, similar profile and high levels of flavonol glycosides and proanthocyanidins were quantified in both ripe white and ripe wild-type berries. Analysis with qRT-PCR showed strong down-regulation of structural genes chalcone synthase (VuCHS), dihydroflavonol 4-reductase (VuDFR) and anthocyanidin synthase (VuANS) as well as MYBPA1-type transcription factor VuMYBPA1 in white berries during ripening compared to wild-type berries. The profiles of transcript accumulation of chalcone isomerase (VuCHI), anthocyanidin reductase (VuANR), leucoanthocyanidin reductase (VuLAR) and flavonoid 3'5' hydroxylase (VuF3'5'H) were more similar between the white and the wild-type berries during fruit development, while expression of UDP-glucose: flavonoid 3-O-glucosyltransferase (VuUFGT) showed similar trend but fourfold lower level in white mutant. VuMYBPA1, the R2R3 MYB family member, is a homologue of VmMYB2 of V. myrtillus and VcMYBPA1 of V. corymbosum and belongs to MYBPA1-type MYB family which members are shown in some species to be related with proanthocyanidin biosynthesis in fruits. Our results combined with earlier data of the role of VmMYB2 in white mutant berries of V. myrtillus suggest that the regulation of anthocyanin biosynthesis in Vaccinium species could differ

  3. Wnt3a Promotes the Vasculogenic Mimicry Formation of Colon Cancer via Wnt/β-Catenin Signaling.

    Science.gov (United States)

    Qi, Lisha; Song, Wangzhao; Liu, Zhiyong; Zhao, Xiulan; Cao, Wenfeng; Sun, Baocun

    2015-08-10

    Our previous study provided evidence that non-canonical Wnt signaling is involved in regulating vasculogenic mimicry (VM) formation. However, the functions of canonical Wnt signaling in VM formation have not yet been explored. In this study, we found the presence of VM was related to colon cancer histological differentiation (p colon cancer samples showed increased Wnt3a expression (p colon cancer cells promoted the capacity to form tube-like structures in the three-dimensional (3-D) culture together with increased expression of endothelial phenotype-associated proteins such as VEGFR2 and VE-cadherin. The mouse xenograft model showed that Wnt3a-overexpressing cells grew into larger tumor masses and formed more VM than the control cells. In addition, the Wnt/β-catenin signaling antagonist Dickkopf-1(Dkk1) can reverse the capacity to form tube-like structures and can decrease the expressions of VEGFR2 and VE-cadherin in Wnt3a-overexpressing cells. Taken together, our results suggest that Wnt/β-catenin signaling is involved in VM formation in colon cancer and might contribute to the development of more accurate treatment modalities aimed at VM.

  4. Neural processing associated with cognitive and affective Theory of Mind in adolescents and adults.

    Science.gov (United States)

    Sebastian, Catherine L; Fontaine, Nathalie M G; Bird, Geoffrey; Blakemore, Sarah-Jayne; Brito, Stephane A De; McCrory, Eamon J P; Viding, Essi

    2012-01-01

    Theory of Mind (ToM) is the ability to attribute thoughts, intentions and beliefs to others. This involves component processes, including cognitive perspective taking (cognitive ToM) and understanding emotions (affective ToM). This study assessed the distinction and overlap of neural processes involved in these respective components, and also investigated their development between adolescence and adulthood. While data suggest that ToM develops between adolescence and adulthood, these populations have not been compared on cognitive and affective ToM domains. Using fMRI with 15 adolescent (aged 11-16 years) and 15 adult (aged 24-40 years) males, we assessed neural responses during cartoon vignettes requiring cognitive ToM, affective ToM or physical causality comprehension (control). An additional aim was to explore relationships between fMRI data and self-reported empathy. Both cognitive and affective ToM conditions were associated with neural responses in the classic ToM network across both groups, although only affective ToM recruited medial/ventromedial PFC (mPFC/vmPFC). Adolescents additionally activated vmPFC more than did adults during affective ToM. The specificity of the mPFC/vmPFC response during affective ToM supports evidence from lesion studies suggesting that vmPFC may integrate affective information during ToM. Furthermore, the differential neural response in vmPFC between adult and adolescent groups indicates developmental changes in affective ToM processing.

  5. The neural basis of trait self-esteem revealed by the amplitude of low-frequency fluctuations and resting state functional connectivity.

    Science.gov (United States)

    Pan, Weigang; Liu, Congcong; Yang, Qian; Gu, Yan; Yin, Shouhang; Chen, Antao

    2016-03-01

    Self-esteem is an affective, self-evaluation of oneself and has a significant effect on mental and behavioral health. Although research has focused on the neural substrates of self-esteem, little is known about the spontaneous brain activity that is associated with trait self-esteem (TSE) during the resting state. In this study, we used the resting-state functional magnetic resonance imaging (fMRI) signal of the amplitude of low-frequency fluctuations (ALFFs) and resting state functional connectivity (RSFC) to identify TSE-related regions and networks. We found that a higher level of TSE was associated with higher ALFFs in the left ventral medial prefrontal cortex (vmPFC) and lower ALFFs in the left cuneus/lingual gyrus and right lingual gyrus. RSFC analyses revealed that the strengths of functional connectivity between the left vmPFC and bilateral hippocampus were positively correlated with TSE; however, the connections between the left vmPFC and right inferior frontal gyrus and posterior superior temporal sulcus were negatively associated with TSE. Furthermore, the strengths of functional connectivity between the left cuneus/lingual gyrus and right dorsolateral prefrontal cortex and anterior cingulate cortex were positively related to TSE. These findings indicate that TSE is linked to core regions in the default mode network and social cognition network, which is involved in self-referential processing, autobiographical memory and social cognition. © The Author (2015). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  6. Susceptibility to social pressure following ventromedial prefrontal cortex damage.

    Science.gov (United States)

    Chen, Kuan-Hua; Rusch, Michelle L; Dawson, Jeffrey D; Rizzo, Matthew; Anderson, Steven W

    2015-11-01

    Social pressure influences human behavior including risk taking, but the psychological and neural underpinnings of this process are not well understood. We used the human lesion method to probe the role of ventromedial prefrontal cortex (vmPFC) in resisting adverse social pressure in the presence of risk. Thirty-seven participants (11 with vmPFC damage, 12 with brain damage outside the vmPFC and 14 without brain damage) were tested in driving simulator scenarios requiring left-turn decisions across oncoming traffic with varying time gaps between the oncoming vehicles. Social pressure was applied by a virtual driver who honked aggressively from behind. Participants with vmPFC damage were more likely to select smaller and potentially unsafe gaps under social pressure, while gap selection by the comparison groups did not change under social pressure. Participants with vmPFC damage also showed prolonged elevated skin conductance responses (SCR) under social pressure. Comparison groups showed similar initial elevated SCR, which then declined prior to making left-turn decisions. The findings suggest that the vmPFC plays an important role in resisting explicit and immediately present social pressure with potentially negative consequences. The vmPFC appears to contribute to the regulation of emotional responses and the modulation of decision making to optimize long-term outcomes. © The Author (2015). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  7. Social network analysis shows direct evidence for social transmission of tool use in wild chimpanzees.

    Directory of Open Access Journals (Sweden)

    Catherine Hobaiter

    2014-09-01

    Full Text Available Social network analysis methods have made it possible to test whether novel behaviors in animals spread through individual or social learning. To date, however, social network analysis of wild populations has been limited to static models that cannot precisely reflect the dynamics of learning, for instance, the impact of multiple observations across time. Here, we present a novel dynamic version of network analysis that is capable of capturing temporal aspects of acquisition--that is, how successive observations by an individual influence its acquisition of the novel behavior. We apply this model to studying the spread of two novel tool-use variants, "moss-sponging" and "leaf-sponge re-use," in the Sonso chimpanzee community of Budongo Forest, Uganda. Chimpanzees are widely considered the most "cultural" of all animal species, with 39 behaviors suspected as socially acquired, most of them in the domain of tool-use. The cultural hypothesis is supported by experimental data from captive chimpanzees and a range of observational data. However, for wild groups, there is still no direct experimental evidence for social learning, nor has there been any direct observation of social diffusion of behavioral innovations. Here, we tested both a static and a dynamic network model and found strong evidence that diffusion patterns of moss-sponging, but not leaf-sponge re-use, were significantly better explained by social than individual learning. The most conservative estimate of social transmission accounted for 85% of observed events, with an estimated 15-fold increase in learning rate for each time a novice observed an informed individual moss-sponging. We conclude that group-specific behavioral variants in wild chimpanzees can be socially learned, adding to the evidence that this prerequisite for culture originated in a common ancestor of great apes and humans, long before the advent of modern humans.

  8. Social network analysis shows direct evidence for social transmission of tool use in wild chimpanzees.

    Science.gov (United States)

    Hobaiter, Catherine; Poisot, Timothée; Zuberbühler, Klaus; Hoppitt, William; Gruber, Thibaud

    2014-09-01

    Social network analysis methods have made it possible to test whether novel behaviors in animals spread through individual or social learning. To date, however, social network analysis of wild populations has been limited to static models that cannot precisely reflect the dynamics of learning, for instance, the impact of multiple observations across time. Here, we present a novel dynamic version of network analysis that is capable of capturing temporal aspects of acquisition--that is, how successive observations by an individual influence its acquisition of the novel behavior. We apply this model to studying the spread of two novel tool-use variants, "moss-sponging" and "leaf-sponge re-use," in the Sonso chimpanzee community of Budongo Forest, Uganda. Chimpanzees are widely considered the most "cultural" of all animal species, with 39 behaviors suspected as socially acquired, most of them in the domain of tool-use. The cultural hypothesis is supported by experimental data from captive chimpanzees and a range of observational data. However, for wild groups, there is still no direct experimental evidence for social learning, nor has there been any direct observation of social diffusion of behavioral innovations. Here, we tested both a static and a dynamic network model and found strong evidence that diffusion patterns of moss-sponging, but not leaf-sponge re-use, were significantly better explained by social than individual learning. The most conservative estimate of social transmission accounted for 85% of observed events, with an estimated 15-fold increase in learning rate for each time a novice observed an informed individual moss-sponging. We conclude that group-specific behavioral variants in wild chimpanzees can be socially learned, adding to the evidence that this prerequisite for culture originated in a common ancestor of great apes and humans, long before the advent of modern humans.

  9. A Virtual Machine Migration Strategy Based on Time Series Workload Prediction Using Cloud Model

    Directory of Open Access Journals (Sweden)

    Yanbing Liu

    2014-01-01

    Full Text Available Aimed at resolving the issues of the imbalance of resources and workloads at data centers and the overhead together with the high cost of virtual machine (VM migrations, this paper proposes a new VM migration strategy which is based on the cloud model time series workload prediction algorithm. By setting the upper and lower workload bounds for host machines, forecasting the tendency of their subsequent workloads by creating a workload time series using the cloud model, and stipulating a general VM migration criterion workload-aware migration (WAM, the proposed strategy selects a source host machine, a destination host machine, and a VM on the source host machine carrying out the task of the VM migration. Experimental results and analyses show, through comparison with other peer research works, that the proposed method can effectively avoid VM migrations caused by momentary peak workload values, significantly lower the number of VM migrations, and dynamically reach and maintain a resource and workload balance for virtual machines promoting an improved utilization of resources in the entire data center.

  10. Effect of Genistein on vasculogenic mimicry formation by human uveal melanoma cells

    Directory of Open Access Journals (Sweden)

    Gu Haijuan

    2009-09-01

    Full Text Available Abstract Background Vasculogenic mimicry (VM was increasingly recognized as a form of aggressive melanoma acquiring blood supply. Genistein had attracted much attention as a potential anticancer agent. Therefore, we examined the effect of Genistein on VM in human uveal melanoma cells. Methods VM structure was detected by periodic acid-Schiff (PAS staining for uveal melanoma C918 cells cultured on the three-dimensional type I collagen gels after exposed to Genistein. We used reverse transcription polymerase chain reaction (RT-PCR and Western Blot analysis to examine the effect of Genistein on vascular endothelial cadherin (VE-cadherin mRNA and protein expression. The nude mice models of human uveal melanoma C918 cells were established to assess the number of VM using immunohistochemical and PAS double-staining. Results Genistein inhibited the survival of C918 cells in vitro. The ectopic model study showed that VM in tumor tissue sections were significantly reduced by Genistein in vivo. In vitro, the VM structure was found in control, 25 and 50 μM Genistein-treatment groups but not in 100 and 200 μM. RT-PCR and Western Blot showed that 100 and 200 μM concentration of Genistein could significantly decrease VE-cadherin mRNA and protein expression of C918 cells compared with control (P 0.05. Conclusion Genistein inhibits VM formation of uveal melanoma cells in vivo and in vitro. One possible underlying molecular mechanism by which Genistein could inhibit VM formation of uveal melanoma is related to down-regulation of VE-cadherin.

  11. A model of amygdala-hippocampal-prefrontal interaction in fear conditioning and extinction in animals

    Science.gov (United States)

    Moustafa, Ahmed A.; Gilbertson, Mark W.; Orr, Scott P.; Herzallah, Mohammad M.; Servatius, Richard. J.; Myers, Catherine E.

    2012-01-01

    Empirical research has shown that the amygdala, hippocampus, and ventromedial prefrontal cortex (vmPFC) are involved in fear conditioning. However, the functional contribution of each brain area and the nature of their interactions are not clearly understood. Here, we extend existing neural network models of the functional roles of the hippocampus in classical conditioning to include interactions with the amygdala and prefrontal cortex. We apply the model to fear conditioning, in which animals learn physiological (e.g. heart rate) and behavioral (e.g. freezing) responses to stimuli that have been paired with a highly aversive event (e.g. electrical shock). The key feature of our model is that learning of these conditioned responses in the central nucleus of the amygdala is modulated by two separate processes, one from basolateral amygdala and signaling a positive prediction error, and one from the vmPFC, via the intercalated cells of the amygdala, and signaling a negative prediction error. In addition, we propose that hippocampal input to both vmPFC and basolateral amygdala is essential for contextual modulation of fear acquisition and extinction. The model is sufficient to account for a body of data from various animal fear conditioning paradigms, including acquisition, extinction, reacquisition, and context specificity effects. Consistent with studies on lesioned animals, our model shows that damage to the vmPFC impairs extinction, while damage to the hippocampus impairs extinction in a different context (e.g., a different conditioning chamber from that used in initial training in animal experiments). We also discuss model limitations and predictions, including the effects of number of training trials on fear conditioning. PMID:23164732

  12. The role of the ventromedial prefrontal cortex in memory consolidation

    NARCIS (Netherlands)

    Nieuwenhuis, I.L.C.; Takashima, A.

    2011-01-01

    System-level memory consolidation theory posits that the hippocampus initially links the neocortical representations, followed by a shift to a hippocampus-independent neocortical network. With consolidation, an increase in activity in the human subgenual ventromedial prefrontal cortex (vmPFC) has

  13. Gene network analysis shows immune-signaling and ERK1/2 as novel genetic markers for multiple addiction phenotypes: alcohol, smoking and opioid addiction.

    Science.gov (United States)

    Reyes-Gibby, Cielito C; Yuan, Christine; Wang, Jian; Yeung, Sai-Ching J; Shete, Sanjay

    2015-06-05

    Addictions to alcohol and tobacco, known risk factors for cancer, are complex heritable disorders. Addictive behaviors have a bidirectional relationship with pain. We hypothesize that the associations between alcohol, smoking, and opioid addiction observed in cancer patients have a genetic basis. Therefore, using bioinformatics tools, we explored the underlying genetic basis and identified new candidate genes and common biological pathways for smoking, alcohol, and opioid addiction. Literature search showed 56 genes associated with alcohol, smoking and opioid addiction. Using Core Analysis function in Ingenuity Pathway Analysis software, we found that ERK1/2 was strongly interconnected across all three addiction networks. Genes involved in immune signaling pathways were shown across all three networks. Connect function from IPA My Pathway toolbox showed that DRD2 is the gene common to both the list of genetic variations associated with all three addiction phenotypes and the components of the brain neuronal signaling network involved in substance addiction. The top canonical pathways associated with the 56 genes were: 1) calcium signaling, 2) GPCR signaling, 3) cAMP-mediated signaling, 4) GABA receptor signaling, and 5) G-alpha i signaling. Cancer patients are often prescribed opioids for cancer pain thus increasing their risk for opioid abuse and addiction. Our findings provide candidate genes and biological pathways underlying addiction phenotypes, which may be future targets for treatment of addiction. Further study of the variations of the candidate genes could allow physicians to make more informed decisions when treating cancer pain with opioid analgesics.

  14. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  15. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  16. PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy

    Science.gov (United States)

    Bruni, Camillo; Verwaest, Toon

    Virtual machines (VMs) emulating hardware devices are generally implemented in low-level languages for performance reasons. This results in unmaintainable systems that are difficult to understand. In this paper we report on our experience using the PyPy toolchain to improve the portability and reduce the complexity of whole-system VM implementations. As a case study we implement a VM prototype for a Nintendo Game Boy, called PyGirl, in which the high-level model is separated from low-level VM implementation issues. We shed light on the process of refactoring from a low-level VM implementation in Java to a high-level model in RPython. We show that our whole-system VM written with PyPy is significantly less complex than standard implementations, without substantial loss in performance.

  17. Weighted Scale-Free Network Properties of Ecological Network

    International Nuclear Information System (INIS)

    Lee, Jae Woo; Maeng, Seong Eun

    2013-01-01

    We investigate the scale-free network properties of the bipartite ecological network, in particular, the plant-pollinator network. In plant-pollinator network, the pollinators visit the plant to get the nectars. In contrast to the other complex network, the plant-pollinator network has not only the trophic relationships among the interacting partners but also the complexities of the coevolutionary effects. The interactions between the plant and pollinators are beneficial relations. The plant-pollinator network is a bipartite and weighted network. The networks have two types of the nodes: plant and pollinator. We consider the visiting frequency of a pollinator to a plant as the weighting value of the link. We defined the strength of a node as the sum of the weighting value of the links. We reported the cumulative distribution function (CDF) of the degree and the strength of the plant-pollinator network. The CDF of the plants followed stretched exponential functions for both degree and strength, but the CDF of the pollinators showed the power law for both degree and strength. The average strength of the links showed the nonlinear dependence on the degree of the networks.

  18. Deterministic bound for avionics switched networks according to networking features using network calculus

    Directory of Open Access Journals (Sweden)

    Feng HE

    2017-12-01

    Full Text Available The state of the art avionics system adopts switched networks for airborne communications. A major concern in the design of the networks is the end-to-end guarantee ability. Analytic methods have been developed to compute the worst-case delays according to the detailed configurations of flows and networks within avionics context, such as network calculus and trajectory approach. It still lacks a relevant method to make a rapid performance estimation according to some typically switched networking features, such as networking scale, bandwidth utilization and average flow rate. The goal of this paper is to establish a deterministic upper bound analysis method by using these networking features instead of the complete network configurations. Two deterministic upper bounds are proposed from network calculus perspective: one is for a basic estimation, and another just shows the benefits from grouping strategy. Besides, a mathematic expression for grouping ability is established based on the concept of network connecting degree, which illustrates the possibly minimal grouping benefit. For a fully connected network with 4 switches and 12 end systems, the grouping ability coming from grouping strategy is 15–20%, which just coincides with the statistical data (18–22% from the actual grouping advantage. Compared with the complete network calculus analysis method for individual flows, the effectiveness of the two deterministic upper bounds is no less than 38% even with remarkably varied packet lengths. Finally, the paper illustrates the design process for an industrial Avionics Full DupleX switched Ethernet (AFDX networking case according to the two deterministic upper bounds and shows that a better control for network connecting, when designing a switched network, can improve the worst-case delays dramatically. Keywords: Deterministic bound, Grouping ability, Network calculus, Networking features, Switched networks

  19. Glacial Isostatic Adjustment Derived Boundary Conditions for Paleoclimate Simulation: the Refined ICE-6G_D (VM5a) Model and the Dansgaard-Oeschger Oscillation

    Science.gov (United States)

    Peltier, W. R.; Vettoretti, G.; Argus, D. F.

    2017-12-01

    Global models of the glacial isostatic adjustment (GIA) process are designed to fit a wide range of geophysical and geomorphological observations that simultaneously constrain the internal viscoelastic structure of Earths interior and the history of grounded ice thickness variations that has occurred over the most recent ice-age cycle of the Late Quaternary interval of time. The most recent refinement of the ICE-NG (VMX) series of such global models from the University of Toronto, ICE-6G_C (VM5a), has recently been slightly modified insofar as its Antarctic component is concerned to produce a "_D" version of the structure. This has been chosen to provide the boundary conditions for the next round of model-data inter-comparisons in the context of the international Paleoclimate Modeling Inter-comparison Project (PMIP). The output of PMIP will contribute to the Sixth Assessment Report (AR6) of the Intergovernmental Panel on Climate Change which is now under way. A highly significant test of the utility of this latest model has recently been performed that is focused upon the Dansgaard-Oeschger oscillation that was the primary source of climate variability during Marine Isotope Stage 3 (MIS3) of the most recent glacial cycle. By introducing the surface boundary conditions for paleotopography and paleobathymetry, land-sea mask and surface albedo into the NCAR CESM1 coupled climate model configured at full one degree by one degree CMIP5 resolution, together with the appropriate trace gas and orbital insolation forcing, we show that the millennium timescale Dansgard-Oeschger oscillation naturally develops following spin- up of the model into the glacial state.

  20. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago V. V.; Giannitsarou, Chryssi; Johnson, Charles R.

    2016-01-01

    This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s00199-016-0992-1 We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and d...

  1. OpenNebula KVM SR-IOV driver

    CSIR Research Space (South Africa)

    Macleod, D

    2013-05-01

    Full Text Available With the recent release of an OFED which supports SR-IOV on Infiniband HCAs it is now possible to use verbs from inside a VM. This VMM driver supports these Infiniband HCAs, and any other SR-IOV network device, in OpenNebula....

  2. Investment and repayment in a trust game after ventromedial prefrontal damage

    Directory of Open Access Journals (Sweden)

    Giovanna eMoretto

    2013-09-01

    Full Text Available Although trust and reciprocity are ubiquitous in social exchange, their neurobiological substrate remains largely unknown. Here, we investigated the effect of damage to the ventromedial prefrontal cortex (vmPFC — a brain region critical for valuing social information — on individuals' decisions in a trust game and in a risk game. In the trust game, one player, the investor, is endowed with a sum of money, which she can keep or invest. The amount she decides to invest is tripled and sent to the other player, the trustee, who then decides what fraction to return to the investor. In separate runs, ten patients with focal bilateral damage to the vmPFC and control participants made decision while playing in the role of either investor or trustee with different anonymous counterparts in each run. A risk game was also included in which the investor faced exactly the same decisions as in the trust Game, but a random device (i.e., a computer, not another player, determined the final payoffs. Results showed that vmPFC patients’ investments were not modulated by the type of opponent player (e.g., human vs. computer present in the environment. Thus, vmPFC patients showed comparable risk-taking preferences both in social (trust game and nonsocial (risk game contexts. In stark contrast, control participants were less willing to take risk and invest when they believed that they were interacting with people than a computer. Furthermore, when acted as trustee, vmPFC patients made lower back transfers toward investors, thereby showing less reciprocity behavior. Taken together, these results indicate that social valuation and emotion subserved by vmPFC have a critical role in trusting and reciprocity decisions. The present findings support the hypothesis that vmPFC damage may impair affective systems specifically designed for mediating social transaction with other individuals.

  3. What are the odds? The neural correlates of active choice during gambling

    Directory of Open Access Journals (Sweden)

    Bettina eStuder

    2012-04-01

    Full Text Available Gambling is a widespread recreational activity and requires pitting the values of potential wins and losses against their probability of occurrence. Neuropsychological research showed that betting behavior on laboratory gambling tasks is highly sensitive to focal lesions to the ventromedial prefrontal cortex (vmPFC and insula. In the current study, we assessed the neural basis of betting choices in healthy participants, using functional magnetic resonance imaging of the Roulette Betting Task. In half of the trials participants actively chose their bets; in the other half the computer dictated the bet size. Our results highlight the impact of volitional choice upon the neural substrates of gambling: Neural activity in a distributed network - including key structures of the reward circuitry (midbrain, striatum - was higher during active compared to computer-dictated bet selection. In line with neuropsychological data, the anterior insula and vmPFC were more activated during self-directed bet selection, and responses in these areas were differentially modulated by the odds of winning in the two choice conditions. In addition, responses in the vmPFC and ventral striatum were modulated by the bet size. Convergent with electrophysiological research in macaques, our results further implicate the inferior parietal cortex (IPC in the processing of the likelihood of potential outcomes: Neural responses in the IPC bilaterally reflected the probability of winning during bet selection. Moreover, the IPC was particularly sensitive to the odds of winning in the active choice condition, where this information was used to guide bet selection. Our results indicate a neglected role of the IPC in human decision-making under risk and help to integrate neuropsychological data of risk-taking following vmPFC and insula damage with models of choice derived from human neuroimaging and monkey electrophysiology.

  4. A nested virtualization tool for information technology practical education.

    Science.gov (United States)

    Pérez, Carlos; Orduña, Juan M; Soriano, Francisco R

    2016-01-01

    A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that would otherwise be unfeasible. Also, its portability allows to reproduce classroom activities, as well as the students' autonomous work.

  5. Integration of genome-scale metabolic networks into whole-body PBPK models shows phenotype-specific cases of drug-induced metabolic perturbation.

    Science.gov (United States)

    Cordes, Henrik; Thiel, Christoph; Baier, Vanessa; Blank, Lars M; Kuepfer, Lars

    2018-01-01

    Drug-induced perturbations of the endogenous metabolic network are a potential root cause of cellular toxicity. A mechanistic understanding of such unwanted side effects during drug therapy is therefore vital for patient safety. The comprehensive assessment of such drug-induced injuries requires the simultaneous consideration of both drug exposure at the whole-body and resulting biochemical responses at the cellular level. We here present a computational multi-scale workflow that combines whole-body physiologically based pharmacokinetic (PBPK) models and organ-specific genome-scale metabolic network (GSMN) models through shared reactions of the xenobiotic metabolism. The applicability of the proposed workflow is illustrated for isoniazid, a first-line antibacterial agent against Mycobacterium tuberculosis , which is known to cause idiosyncratic drug-induced liver injuries (DILI). We combined GSMN models of a human liver with N-acetyl transferase 2 (NAT2)-phenotype-specific PBPK models of isoniazid. The combined PBPK-GSMN models quantitatively describe isoniazid pharmacokinetics, as well as intracellular responses, and changes in the exometabolome in a human liver following isoniazid administration. Notably, intracellular and extracellular responses identified with the PBPK-GSMN models are in line with experimental and clinical findings. Moreover, the drug-induced metabolic perturbations are distributed and attenuated in the metabolic network in a phenotype-dependent manner. Our simulation results show that a simultaneous consideration of both drug pharmacokinetics at the whole-body and metabolism at the cellular level is mandatory to explain drug-induced injuries at the patient level. The proposed workflow extends our mechanistic understanding of the biochemistry underlying adverse events and may be used to prevent drug-induced injuries in the future.

  6. Virtual Machine Logbook - Enabling virtualization for ATLAS

    International Nuclear Information System (INIS)

    Yao Yushu; Calafiura, Paolo; Leggett, Charles; Poffet, Julien; Cavalli, Andrea; Frederic, Bapst

    2010-01-01

    ATLAS software has been developed mostly on CERN linux cluster lxplus or on similar facilities at the experiment Tier 1 centers. The fast rise of virtualization technology has the potential to change this model, turning every laptop or desktop into an ATLAS analysis platform. In the context of the CernVM project we are developing a suite of tools and CernVM plug-in extensions to promote the use of virtualization for ATLAS analysis and software development. The Virtual Machine Logbook (VML), in particular, is an application to organize work of physicists on multiple projects, logging their progress, and speeding up ''context switches'' from one project to another. An important feature of VML is the ability to share with a single 'click' the status of a given project with other colleagues. VML builds upon the save and restore capabilities of mainstream virtualization software like VMware, and provides a technology-independent client interface to them. A lot of emphasis in the design and implementation has gone into optimizing the save and restore process to makepractical to store many VML entries on a typical laptop disk or to share a VML entry over the network. At the same time, taking advantage of CernVM's plugin capabilities, we are extending the CernVM platform to help increase the usability of ATLAS software. For example, we added the ability to start the ATLAS event display on any computer running CernVM simply by clicking a button in a web browser. We want to integrate seamlessly VML with CernVM unique file system design to distribute efficiently ATLAS software on every physicist computer. The CernVM File System (CVMFS) download files on-demand via HTTP, and cache it locally for future use. This reduces by one order of magnitude the download sizes, making practical for a developer to work with multiple software releases on a virtual machine.

  7. CSIR work on improving cybersecurity for the South African industry

    CSIR Research Space (South Africa)

    Taute, Barend JE

    2017-10-01

    Full Text Available Recover Ready to support and collaborate with industry ….. to 11 Early warning detection technology East - west cyberattacks – intranet - anomaly detection – during reconnaissance phase 12 Network Emulation and Simulation Laboratory (NESL... of custom applications • Realistic network traffic generation • Flexibility - client use cases Firewall Host Lightweight Switch OpenVSwitch Router PC Virtual Machine Pentest VM Vulnerable Webserver Eport Ubuntu Repo 14 Cyber Protect - 1 Find...

  8. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  9. The assessment of fetal brain function in fetuses with ventrikulomegaly: the role of the KANET test.

    Science.gov (United States)

    Talic, Amira; Kurjak, Asim; Stanojevic, Milan; Honemeyer, Ulrich; Badreldeen, Ahmed; DiRenzo, Gian Carlo

    2012-08-01

    To assess differences in fetal behavior in both normal fetuses and fetuses with cerebral ventriculomegaly (VM). In a period of eighteen months, in a longitudinal prospective cohort study, Kurjak Antenatal NeuorogicalTest (KANET) was applied to assess fetal behavior in both normal pregnancies and pregnancies with cerebral VM using four-dimensional ultrasound (4D US). According to the degree of enlargement of the ventricles, VM was divided into three groups: mild, moderate and severe. Moreover fetuses with isolated VM were separated from those with additional abnormalities. According to the KANET, fetuses with scores ≥ 14 were considered normal, those with scores 6-13 borderline and abnormal if the score was ≤ 5. Differences between two groups were examined by Fisher's exact test. Differences within the subgroups were examined by Kruskal-Wallis test and contingency table test. KANET scores in normal pregnancies and pregnancies with VM showed statistically significant differences. Most of the abnormal KANET scores as well as most of the borderline-scores were found among the fetuses with severe VM associated with additional abnormalities. There were no statistically significant differences between the control group and the groups with isolated and mild and /or moderate VM. Evaluation of the fetal behavior in fetuses with cerebral VM using KANET test has the potential to detect fetuses with abnormal behavior, and to add the dimension of CNS function to the morphological criteria of VM. Long-term postnatal neurodevelopmental follow-up should confirm the data from prenatal investigation of fetal behavior.

  10. ARC-VM: An architecture real options complexity-based valuation methodology for military systems-of-systems acquisitions

    Science.gov (United States)

    Domercant, Jean Charles

    The combination of today's national security environment and mandated acquisition policies makes it necessary for military systems to interoperate with each other to greater degrees. This growing interdependency results in complex Systems-of-Systems (SoS) that only continue to grow in complexity to meet evolving capability needs. Thus, timely and affordable acquisition becomes more difficult, especially in the face of mounting budgetary pressures. To counter this, architecting principles must be applied to SoS design. The research objective is to develop an Architecture Real Options Complexity-Based Valuation Methodology (ARC-VM) suitable for acquisition-level decision making, where there is a stated desire for more informed tradeoffs between cost, schedule, and performance during the early phases of design. First, a framework is introduced to measure architecture complexity as it directly relates to military SoS. Development of the framework draws upon a diverse set of disciplines, including Complexity Science, software architecting, measurement theory, and utility theory. Next, a Real Options based valuation strategy is developed using techniques established for financial stock options that have recently been adapted for use in business and engineering decisions. The derived complexity measure provides architects with an objective measure of complexity that focuses on relevant complex system attributes. These attributes are related to the organization and distribution of SoS functionality and the sharing and processing of resources. The use of Real Options provides the necessary conceptual and visual framework to quantifiably and traceably combine measured architecture complexity, time-valued performance levels, as well as programmatic risks and uncertainties. An example suppression of enemy air defenses (SEAD) capability demonstrates the development and usefulness of the resulting architecture complexity & Real Options based valuation methodology. Different

  11. Gradient networks on uncorrelated random scale-free networks

    International Nuclear Information System (INIS)

    Pan Guijun; Yan Xiaoqing; Huang Zhongbing; Ma Weichuan

    2011-01-01

    Uncorrelated random scale-free (URSF) networks are useful null models for checking the effects of scale-free topology on network-based dynamical processes. Here, we present a comparative study of the jamming level of gradient networks based on URSF networks and Erdos-Renyi (ER) random networks. We find that the URSF networks are less congested than ER random networks for the average degree (k)>k c (k c ∼ 2 denotes a critical connectivity). In addition, by investigating the topological properties of the two kinds of gradient networks, we discuss the relations between the topological structure and the transport efficiency of the gradient networks. These findings show that the uncorrelated scale-free structure might allow more efficient transport than the random structure.

  12. Differential effects of insular and ventromedial prefrontal cortex lesions on risky decision-making.

    Science.gov (United States)

    Clark, L; Bechara, A; Damasio, H; Aitken, M R F; Sahakian, B J; Robbins, T W

    2008-05-01

    The ventromedial prefrontal cortex (vmPFC) and insular cortex are implicated in distributed neural circuitry that supports emotional decision-making. Previous studies of patients with vmPFC lesions have focused primarily on decision-making under uncertainty, when outcome probabilities are ambiguous (e.g. the Iowa Gambling Task). It remains unclear whether vmPFC is also necessary for decision-making under risk, when outcome probabilities are explicit. It is not known whether the effect of insular damage is analogous to the effect of vmPFC damage, or whether these regions contribute differentially to choice behaviour. Four groups of participants were compared on the Cambridge Gamble Task, a well-characterized measure of risky decision-making where outcome probabilities are presented explicitly, thus minimizing additional learning and working memory demands. Patients with focal, stable lesions to the vmPFC (n = 20) and the insular cortex (n = 13) were compared against healthy subjects (n = 41) and a group of lesion controls (n = 12) with damage predominantly affecting the dorsal and lateral frontal cortex. The vmPFC and insular cortex patients showed selective and distinctive disruptions of betting behaviour. VmPFC damage was associated with increased betting regardless of the odds of winning, consistent with a role of vmPFC in biasing healthy individuals towards conservative options under risk. In contrast, patients with insular cortex lesions failed to adjust their bets by the odds of winning, consistent with a role of the insular cortex in signalling the probability of aversive outcomes. The insular group attained a lower point score on the task and experienced more 'bankruptcies'. There were no group differences in probability judgement. These data confirm the necessary role of the vmPFC and insular regions in decision-making under risk. Poor decision-making in clinical populations can arise via multiple routes, with functionally dissociable effects of vmPFC and

  13. Seamless live migration of virtual machines over the MAN/WAN

    NARCIS (Netherlands)

    Travostino, F.; Daspit, P.; Gommans, L.; Jog, C.; de Laat, C.; Mambretti, J.; Monga, I.; van Oudenaarde, B.; Raghunath, S.; Wang, P.Y.

    2006-01-01

    The “VM Turntable” demonstrator at iGRID 2005 pioneered the integration of Virtual Machines (VMs) with deterministic “lightpath” network services across a MAN/WAN. The results provide for a new stage of virtualization—one for which computation is no longer localized within a data center but rather

  14. Building a Flexible Nework Infrastructure for Moving Target Defense

    Science.gov (United States)

    2017-10-13

    testbed. We have published a paper in the CAN Workshop held in conjunction with the ACM CoNext 2016 conference [3]. ML implementations on OpenNetVM...Artificial Intelligence applications in the network Workshop held in conjunction with IEEE ICNP 2017 [4]. [1] Azeem Aqil, Karim Khalil, Ahmed Atya

  15. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  16. Vestibular migraine: clinical and epidemiological aspects

    Directory of Open Access Journals (Sweden)

    Ligia Oliveira Gonçalves Morganti

    Full Text Available ABSTRACT INTRODUCTION: Vestibular migraine (VM is one of the most often common diagnoses in neurotology, but only recently has been recognized as a disease. OBJECTIVE: To analyze the clinical and epidemiological profile of patients with VM. METHODS: This was a retrospective, observational, and descriptive study, with analysis of patients' records from an outpatient VM clinic. RESULTS: 94.1% of patients were females and 5.9% were males. The mean age was 46.1 years; 65.6% of patients had had headache for a longer period than dizziness. A correlation was detected between VM symptoms and the menstrual period. 61.53% of patients had auditory symptoms, with tinnitus the most common, although tonal audiometry was normal in 68.51%. Vectoelectronystagmography was normal in 67.34%, 10.20% had hyporeflexia, and 22.44% had vestibular hyperreflexia. Electrophysiological assessment showed no abnormalities in most patients. Fasting plasma glucose and glycemic curve were normal in most patients, while the insulin curve was abnormal in 75%. 82% of individuals with MV showed abnormalities on the metabolism of carbohydrates. CONCLUSION: VM affects predominantly middle-aged women, with migraine headache representing the first symptom, several years before vertigo. Physical, auditory, and vestibular evaluations are usually normal. The most frequent vestibular abnormality was hyperreflexia. Most individuals showed abnormality related to carbohydrate metabolism.

  17. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  18. Investigation of the network delay on Profibus-DP based network

    OpenAIRE

    Yılmaz, C.; Gürdal, O.; Sayan, H.H.

    2008-01-01

    The mathematical model of the network-induced delay control systems (NDCS) is given. Also the role of the NDCS’s components such as controller, sensor and network environment on the network-induced delay are included in the mathematical model of the system. The network delay is investigated on Profibus-DP based network application and experimental results obtained are presented graphically. The experimental results obtained show that the network induced delay is randomly changed according to ...

  19. Nicotinamide inhibits vasculogenic mimicry, an alternative vascularization pathway observed in highly aggressive melanoma.

    Directory of Open Access Journals (Sweden)

    Orit Itzhaki

    Full Text Available Vasculogenic mimicry (VM describes functional vascular channels composed only of tumor cells and its presence predicts poor prognosis in melanoma patients. Inhibition of this alternative vascularization pathway might be of clinical importance, especially as several anti-angiogenic therapies targeting endothelial cells are largely ineffective in melanoma. We show the presence of VM structures histologically in a series of human melanoma lesions and demonstrate that cell cultures derived from these lesions form tubes in 3D cultures ex vivo. We tested the ability of nicotinamide, the amide form of vitamin B3 (niacin, which acts as an epigenetic gene regulator through unique cellular pathways, to modify VM. Nicotinamide effectively inhibited the formation of VM structures and destroyed already formed ones, in a dose-dependent manner. Remarkably, VM formation capacity remained suppressed even one month after the complete withdrawal of Nicotimamid. The inhibitory effect of nicotinamide on VM formation could be at least partially explained by a nicotinamide-driven downregulation of vascular endothelial cadherin (VE-Cadherin, which is known to have a central role in VM. Further major changes in the expression profile of hundreds of genes, most of them clustered in biologically-relevant clusters, were observed. In addition, nicotinamide significantly inhibited melanoma cell proliferation, but had an opposite effect on their invasion capacity. Cell cycle analysis indicated moderate changes in apoptotic indices. Therefore, nicotinamide could be further used to unravel new biological mechanisms that drive VM and tumor progression. Targeting VM, especially in combination with anti-angiogenic strategies, is expected to be synergistic and might yield substantial anti neoplastic effects in a variety of malignancies.

  20. Impaired awareness of action-outcome contingency and causality during healthy ageing and following ventromedial prefrontal cortex lesions.

    Science.gov (United States)

    O'Callaghan, Claire; Vaghi, Matilde M; Brummerloh, Berit; Cardinal, Rudolf N; Robbins, Trevor W

    2018-02-02

    Detecting causal relationships between actions and their outcomes is fundamental to guiding goal-directed behaviour. The ventromedial prefrontal cortex (vmPFC) has been extensively implicated in computing these environmental contingencies, via animal lesion models and human neuroimaging. However, whether the vmPFC is critical for contingency learning, and whether it can occur without subjective awareness of those contingencies, has not been established. To address this, we measured response adaption to contingency and subjective awareness of action-outcome relationships in individuals with vmPFC lesions and healthy elderly subjects. We showed that in both vmPFC damage and ageing, successful behavioural adaptation to variations in action-outcome contingencies was maintained, but subjective awareness of these contingencies was reduced. These results highlight two contexts where performance and awareness have been dissociated, and show that learning response-outcome contingencies to guide behaviour can occur without subjective awareness. Preserved responding in the vmPFC group suggests that this region is not critical for computing action-outcome contingencies to guide behaviour. In contrast, our findings highlight a critical role for the vmPFC in supporting awareness, or metacognitive ability, during learning. We further advance the hypothesis that responding to changing environmental contingencies, whilst simultaneously maintaining conscious awareness of those statistical regularities, is a form of dual-tasking that is impaired in ageing due to reduced prefrontal function. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  1. Bibliometric Analyses Reveal Patterns of Collaboration between ASMS Members

    Science.gov (United States)

    Palmblad, Magnus; van Eck, Nees Jan

    2018-03-01

    We have explored the collaborative network of the current American Society for Mass Spectrometry (ASMS) membership using bibliometric methods. The analysis shows that 4249 members are connected in a single, large, co-authorship graph, including the majority of the most published authors in the field of mass spectrometry. The map reveals topographical differences between university groups and national laboratories, and that the co-authors with the strongest links have long worked together at the same location. We have collected and summarized information on the geographical distribution of members, showing a high coverage of active researchers in North America and Western Europe. Looking at research fields, we could also identify a number of new or `hot' topics among ASMS members. Interactive versions of the maps are available on-line at https://goo.gl/UBNFMQ (collaborative network) and https://goo.gl/WV25vm (research topics). [Figure not available: see fulltext.

  2. USE OF APPARATUS OF HYBRID NEURAL NETWORKS FOR EVALUATION OF AN INTELLECTUAL COMPONENT OF THE ENERGY-SAVING POLICY OF THE ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Vyacheslav Dzhedzhula

    2018-01-01

    Full Text Available Intellectual capital has a significant impact on the energy-saving policy, which is an indicator of levels of competitiveness and efficiency of the enterprise. Making decisions on improving the efficiency of energy-saving policies of the enterprise through intellectual capital can be carried out by assessing qualitative, quantitative, and binary parameters of the state of the investigated object. Researchers on energy saving issues are scientists such as A.M. Asaul, O.I. Amosha, V.M. Heiets, Yu.V. Dziadykevych, V.V. Stadnyk, V. Parkhovnyk, R. Toud. Issues related to the definition of the essence of innovation were investigated by O.F. Androsova, T.P. Bubenko, M.P. Voinarenko, V.M. Heiets, G. Mensch, M. Kaletski, S.V. Phillippova, J. Schumpeter, A.V. Cherep. Issues of intellectual capital management were considered in the works of L. Antoniuk, S.V. Zakharinko, A. Kendiukhov, G.R. Natroshvili, V. Tsipuryndа, L. Fedulova. The issue of evaluating the intellectual component of the energy-saving policy, in particular, with the help of the apparatus of hybrid neural networks, remains poorly developed. The purpose of the paper is the determination of factors of intellectual capital that influence the energy-saving policy, the formation of a mathematical model based on the theory of hybrid neural networks to determine the indicator of the intellectual component of the energysaving policy of the enterprise. Methodology. Using the theory of hybrid neural networks, a mathematical model has been formed and the simulation has been carried out to determine the indicator of the intellectual component of the energy-saving policy of the enterprise. Results. The factors influencing the value of this indicator have been determined as linguistic variables. A mathematical model has been formed and the simulation has been carried out to determine the indicator of the intellectual component of the energy-saving policy of the enterprise. Practical implications. If it

  3. The effects of video modeling with voiceover instruction on accurate implementation of discrete-trial instruction.

    Science.gov (United States)

    Vladescu, Jason C; Carroll, Regina; Paden, Amber; Kodak, Tiffany M

    2012-01-01

    The present study replicates and extends previous research on the use of video modeling (VM) with voiceover instruction to train staff to implement discrete-trial instruction (DTI). After staff trainees reached the mastery criterion when teaching an adult confederate with VM, they taught a child with a developmental disability using DTI. The results showed that the staff trainees' accurate implementation of DTI remained high, and both child participants acquired new skills. These findings provide additional support that VM may be an effective method to train staff members to conduct DTI.

  4. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  5. Mobile Edge Computing Empowers Internet of Things

    Science.gov (United States)

    Ansari, Nirwan; Sun, Xiang

    In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods are validated via extensive simulations.

  6. A Model of Amygdala-Hippocampal-Prefrontal Interaction in Fear Conditioning and Extinction in Animals

    Science.gov (United States)

    Moustafa, Ahmed A.; Gilbertson, Mark W.; Orr, Scott P.; Herzallah, Mohammad M.; Servatius, Richard J.; Myers, Catherine E.

    2013-01-01

    Empirical research has shown that the amygdala, hippocampus, and ventromedial prefrontal cortex (vmPFC) are involved in fear conditioning. However, the functional contribution of each brain area and the nature of their interactions are not clearly understood. Here, we extend existing neural network models of the functional roles of the hippocampus…

  7. Social networks in primates: smart and tolerant species have more efficient networks.

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J J; Pelé, Marie; Bergstrom, Mackenzie L; Borgeaud, Christèle; Brosnan, Sarah F; Crofoot, Margaret C; Fedigan, Linda M; Fichtel, Claudia; Hopper, Lydia M; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-12-23

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities.

  8. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  9. Vestibular migraine in multicenter neurology clinics according to the appendix criteria in the third beta edition of the International Classification of Headache Disorders.

    Science.gov (United States)

    Cho, Soo-Jin; Kim, Byung-Kun; Kim, Byung-Su; Kim, Jae-Moon; Kim, Soo-Kyoung; Moon, Heui-Soo; Song, Tae-Jin; Cha, Myoung-Jin; Park, Kwang-Yeol; Sohn, Jong-Hee

    2016-04-01

    Vestibular migraine (VM), the common term for recurrent vestibular symptoms with migraine features, has been recognized in the appendix criteria of the third beta edition of the International Classification of Headache Disorders (ICHD-3β). We applied the criteria for VM in a prospective, multicenter headache registry study. Nine neurologists enrolled consecutive patients visiting outpatient clinics for headache. The presenting headache disorder and additional VM diagnoses were classified according to the ICHD-3β. The rates of patients diagnosed with VM and probable VM using consensus criteria were assessed. A total of 1414 patients were enrolled. Of 631 migraineurs, 65 were classified with VM (10.3%) and 16 with probable VM (2.5%). Accompanying migraine subtypes in VM were migraine without aura (66.2%), chronic migraine (29.2%), and migraine with aura (4.6%). Probable migraine (75%) was common in those with probable VM. The most common vestibular symptom was head motion-induced dizziness with nausea in VM and spontaneous vertigo in probable VM. The clinical characteristics of VM did not differ from those of migraine without VM. We diagnosed VM in 10.3% of first-visit migraineurs in neurology clinics using the ICHD-3β. Applying the diagnosis of probable VM can increase the identification of VM. © International Headache Society 2015.

  10. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  11. Menstrual cycle mediates vastus medialis and vastus medialis oblique muscle activity.

    Science.gov (United States)

    Tenan, Matthew S; Peng, Yi-Ling; Hackney, Anthony C; Griffin, Lisa

    2013-11-01

    Sports medicine professionals commonly describe two functionally different units of the vastus medialis (VM), the VM, and the vastus medialis oblique (VMO), but the anatomical support is equivocal. The functional difference of the VMO is principle to rehabilitation programs designed to alleviate anterior knee pain, a pathology that is known to have a greater occurrence in women. The purpose of this study was to determine whether the motor units of the VM and VMO are differentially recruited and if this recruitment pattern has an effect of sex or menstrual cycle phase. Single motor unit recordings from the VM and VMO were obtained for men and women during an isometric ramp knee extension. Eleven men were tested once. Seven women were tested during five different phases of the menstrual cycle, determined by basal body temperature mapping. The recruitment threshold and the initial firing rate at recruitment were determined from 510 motor unit recordings. The initial firing rate was lower in the VMO than that in the VM in women (P recruitment thresholds for the VM and VMO in either sex or across the menstrual cycle. There was a main effect of menstrual phase on initial firing rate, showing increases from the early follicular to late luteal phase (P = 0.003). The initial firing rate in the VMO was lower than that in the VM during ovulatory (P = 0.009) and midluteal (P = 0.009) phases. The relative control of the VM and VMO changes across the menstrual cycle. This could influence patellar pathologies that have a higher incidence in women.

  12. Virtual machine consolidation enhancement using hybrid regression algorithms

    Directory of Open Access Journals (Sweden)

    Amany Abdelsamea

    2017-11-01

    Full Text Available Cloud computing data centers are growing rapidly in both number and capacity to meet the increasing demands for highly-responsive computing and massive storage. Such data centers consume enormous amounts of electrical energy resulting in high operating costs and carbon dioxide emissions. The reason for this extremely high energy consumption is not just the quantity of computing resources and the power inefficiency of hardware, but rather lies in the inefficient usage of these resources. VM consolidation involves live migration of VMs hence the capability of transferring a VM between physical servers with a close to zero down time. It is an effective way to improve the utilization of resources and increase energy efficiency in cloud data centers. VM consolidation consists of host overload/underload detection, VM selection and VM placement. Most of the current VM consolidation approaches apply either heuristic-based techniques, such as static utilization thresholds, decision-making based on statistical analysis of historical data; or simply periodic adaptation of the VM allocation. Most of those algorithms rely on CPU utilization only for host overload detection. In this paper we propose using hybrid factors to enhance VM consolidation. Specifically we developed a multiple regression algorithm that uses CPU utilization, memory utilization and bandwidth utilization for host overload detection. The proposed algorithm, Multiple Regression Host Overload Detection (MRHOD, significantly reduces energy consumption while ensuring a high level of adherence to Service Level Agreements (SLA since it gives a real indication of host utilization based on three parameters (CPU, Memory, Bandwidth utilizations instead of one parameter only (CPU utilization. Through simulations we show that our approach reduces power consumption by 6 times compared to single factor algorithms using random workload. Also using PlanetLab workload traces we show that MRHOD improves

  13. Stages of functional processing and the bihemispheric recognition of Japanese Kana script.

    Science.gov (United States)

    Yoshizaki, K

    2000-04-01

    Two experiments were carried out in order to examine the effects of functional steps on the benefits of interhemispheric integration. The purpose of Experiment 1 was to investigate the validity of the Banich (1995a) model, where the benefits of interhemispheric processing increase as the task involves more functional steps. The 16 right-handed subjects were given two types of Hiragana-Katakana script matching tasks. One was the Name Identity (NI) task, and the other was the vowel matching (VM) task, which involved more functional steps compared to the NI task. The VM task required subjects to make a decision whether or not a pair of Katakana-Hiragana scripts had a common vowel. In both tasks, a pair of Kana scripts (Katakana-Hiragana scripts) was tachistoscopically presented in the unilateral visual fields or the bilateral visual fields, where each letter was presented in each visual field. A bilateral visual fields advantage (BFA) was found in both tasks, and the size of this did not differ between the tasks, suggesting that these findings did not support the Banich model. The purpose of Experiment 2 was to examine the effects of imbalanced processing load between the hemispheres on the benefits of interhemispheric integration. In order to manipulate the balance of processing load across the hemispheres, the revised vowel matching (r-VM) task was developed by amending the VM task. The r-VM task was the same as the VM task in Experiment 1, except that a script that has only vowel sound was presented as a counterpart of a pair of Kana scripts. The 24 right-handed subjects were given the r-VM and NI tasks. The results showed that although a BFA showed up in the NI task, it did not in the r-VM task. These results suggested that the balance of processing load between hemispheres would have an influence on the bilateral hemispheric processing.

  14. Social networks in primates: smart and tolerant species have more efficient networks

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J. J.; Pelé, Marie; Bergstrom, Mackenzie L.; Borgeaud, Christèle; Brosnan, Sarah F.; Crofoot, Margaret C.; Fedigan, Linda M.; Fichtel, Claudia; Hopper, Lydia M.; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-01-01

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities. PMID:25534964

  15. Lipid-mediated glial cell line-derived neurotrophic factor gene transfer to cultured porcine ventral mesencephalic tissue

    DEFF Research Database (Denmark)

    Bauer, Matthias; Meyer, Morten; Brevig, Thomas

    2002-01-01

    Transplantation of dopaminergic ventral mesencephalic (VM) tissue into the basal ganglia of patients with Parkinson's disease (PD) shows at best moderate symptomatic relief in some of the treated cases. Experimental animal studies and clinical trials with allogenic and xenogenic pig-derived VM...... tissue grafts to PD patients indicate that one reason for the poor outcome of neural transplantation is the low survival and differentiation of grafted dopaminergic neurons. To improve dopaminergic cell survival through a gene-therapeutic approach we have established and report here results of lipid-mediated...... numbers of tyrosine hydroxylase-positive neurons in the cultured VM tissue. We conclude that lipid-mediated gene transfer employed on embryonic pig VM explant cultures is a safe and effective method to improve survival of dopaminergic neurons and may become a valuable tool to improve allo...

  16. Enhanced virtual microscopy for collaborative education

    Directory of Open Access Journals (Sweden)

    Holloway William J

    2011-01-01

    Full Text Available Abstract Background Curricular reform efforts and a desire to use novel educational strategies that foster student collaboration are challenging the traditional microscope-based teaching of histology. Computer-based histology teaching tools and Virtual Microscopes (VM, computer-based digital slide viewers, have been shown to be effective and efficient educational strategies. We developed an open-source VM system based on the Google Maps engine to transform our histology education and introduce new teaching methods. This VM allows students and faculty to collaboratively create content, annotate slides with markers, and it is enhanced with social networking features to give the community of learners more control over the system. Results We currently have 1,037 slides in our VM system comprised of 39,386,941 individual JPEG files that take up 349 gigabytes of server storage space. Of those slides 682 are for general teaching and available to our students and the public; the remaining 355 slides are used for practical exams and have restricted access. The system has seen extensive use with 289,352 unique slide views to date. Students viewed an average of 56.3 slides per month during the histology course and accessed the system at all hours of the day. Of the 621 annotations added to 126 slides 26.2% were added by faculty and 73.8% by students. The use of the VM system reduced the amount of time faculty spent administering the course by 210 hours, but did not reduce the number of laboratory sessions or the number of required faculty. Laboratory sessions were reduced from three hours to two hours each due to the efficiencies in the workflow of the VM system. Conclusions Our virtual microscope system has been an effective solution to the challenges facing traditional histopathology laboratories and the novel needs of our revised curriculum. The web-based system allowed us to empower learners to have greater control over their content, as well as the

  17. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  18. Deep neural networks show an equivalent and often superior performance to dermatologists in onychomycosis diagnosis: Automatic construction of onychomycosis datasets by region-based convolutional deep neural network.

    Directory of Open Access Journals (Sweden)

    Seung Seog Han

    Full Text Available Although there have been reports of the successful diagnosis of skin disorders using deep learning, unrealistically large clinical image datasets are required for artificial intelligence (AI training. We created datasets of standardized nail images using a region-based convolutional neural network (R-CNN trained to distinguish the nail from the background. We used R-CNN to generate training datasets of 49,567 images, which we then used to fine-tune the ResNet-152 and VGG-19 models. The validation datasets comprised 100 and 194 images from Inje University (B1 and B2 datasets, respectively, 125 images from Hallym University (C dataset, and 939 images from Seoul National University (D dataset. The AI (ensemble model; ResNet-152 + VGG-19 + feedforward neural networks results showed test sensitivity/specificity/ area under the curve values of (96.0 / 94.7 / 0.98, (82.7 / 96.7 / 0.95, (92.3 / 79.3 / 0.93, (87.7 / 69.3 / 0.82 for the B1, B2, C, and D datasets. With a combination of the B1 and C datasets, the AI Youden index was significantly (p = 0.01 higher than that of 42 dermatologists doing the same assessment manually. For B1+C and B2+ D dataset combinations, almost none of the dermatologists performed as well as the AI. By training with a dataset comprising 49,567 images, we achieved a diagnostic accuracy for onychomycosis using deep learning that was superior to that of most of the dermatologists who participated in this study.

  19. Deep neural networks show an equivalent and often superior performance to dermatologists in onychomycosis diagnosis: Automatic construction of onychomycosis datasets by region-based convolutional deep neural network.

    Science.gov (United States)

    Han, Seung Seog; Park, Gyeong Hun; Lim, Woohyung; Kim, Myoung Shin; Na, Jung Im; Park, Ilwoo; Chang, Sung Eun

    2018-01-01

    Although there have been reports of the successful diagnosis of skin disorders using deep learning, unrealistically large clinical image datasets are required for artificial intelligence (AI) training. We created datasets of standardized nail images using a region-based convolutional neural network (R-CNN) trained to distinguish the nail from the background. We used R-CNN to generate training datasets of 49,567 images, which we then used to fine-tune the ResNet-152 and VGG-19 models. The validation datasets comprised 100 and 194 images from Inje University (B1 and B2 datasets, respectively), 125 images from Hallym University (C dataset), and 939 images from Seoul National University (D dataset). The AI (ensemble model; ResNet-152 + VGG-19 + feedforward neural networks) results showed test sensitivity/specificity/ area under the curve values of (96.0 / 94.7 / 0.98), (82.7 / 96.7 / 0.95), (92.3 / 79.3 / 0.93), (87.7 / 69.3 / 0.82) for the B1, B2, C, and D datasets. With a combination of the B1 and C datasets, the AI Youden index was significantly (p = 0.01) higher than that of 42 dermatologists doing the same assessment manually. For B1+C and B2+ D dataset combinations, almost none of the dermatologists performed as well as the AI. By training with a dataset comprising 49,567 images, we achieved a diagnostic accuracy for onychomycosis using deep learning that was superior to that of most of the dermatologists who participated in this study.

  20. Network Performance Improvement under Epidemic Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    In this paper we investigate epidemic failure spreading in large- scale GMPLS-controlled transport networks. By evaluating the effect of the epidemic failure spreading on the network, we design several strategies for cost-effective network performance improvement via differentiated repair times....... First we identify the most vulnerable and the most strategic nodes in the network. Then, via extensive simulations we show that strategic placement of resources for improved failure recovery has better performance than randomly assigning lower repair times among the network nodes. Our OPNET simulation...... model can be used during the network planning process for facilitating cost- effective network survivability design....

  1. Anatomical Network Analysis Shows Decoupling of Modular Lability and Complexity in the Evolution of the Primate Skull

    Science.gov (United States)

    Esteve-Altava, Borja; Boughner, Julia C.; Diogo, Rui; Villmoare, Brian A.; Rasskin-Gutman, Diego

    2015-01-01

    Modularity and complexity go hand in hand in the evolution of the skull of primates. Because analyses of these two parameters often use different approaches, we do not know yet how modularity evolves within, or as a consequence of, an also-evolving complex organization. Here we use a novel network theory-based approach (Anatomical Network Analysis) to assess how the organization of skull bones constrains the co-evolution of modularity and complexity among primates. We used the pattern of bone contacts modeled as networks to identify connectivity modules and quantify morphological complexity. We analyzed whether modularity and complexity evolved coordinately in the skull of primates. Specifically, we tested Herbert Simon’s general theory of near-decomposability, which states that modularity promotes the evolution of complexity. We found that the skulls of extant primates divide into one conserved cranial module and up to three labile facial modules, whose composition varies among primates. Despite changes in modularity, statistical analyses reject a positive feedback between modularity and complexity. Our results suggest a decoupling of complexity and modularity that translates to varying levels of constraint on the morphological evolvability of the primate skull. This study has methodological and conceptual implications for grasping the constraints that underlie the developmental and functional integration of the skull of humans and other primates. PMID:25992690

  2. Application of Butterfly Clos-Network in Network-on-Chip

    Directory of Open Access Journals (Sweden)

    Hui Liu

    2014-01-01

    Full Text Available This paper studied the topology of NoC (Network-on-Chip. By combining the characteristics of the Clos network and butterfly network, a new topology named BFC (Butterfly Clos-network network was proposed. This topology integrates several modules, which belongs to the same layer but different dimensions, into a new module. In the BFC network, a bidirectional link is used to complete information exchange, instead of information exchange between different layers in the original network. During the routing period, other nondestination nodes can be used as middle stages to transfer data packets to complete the routing mission. Therefore, this topology has the characteristic of multistage. Simulation analyses show that BFC inherits the rich path diversity of Clos network, and it has a better performance than butterfly network in throughput and delay in a quite congested traffic pattern.

  3. Excito-oscillatory dynamics as a mechanism of ventricular fibrillation.

    Science.gov (United States)

    Gray, Richard A; Huelsing, Delilah J

    2008-04-01

    The instabilities associated with reentrant spiral waves are of paramount importance to the initiation and maintenance of tachyarrhythmias, especially ventricular fibrillation (VF). In addition to tissue heterogeneities, there are only a few basic purported mechanisms of spiral wave breakup, most notably restitution. We test the hypothesis that oscillatory membrane properties act to destabilize spiral waves. We recorded transmembrane potential (V(m)) from isolated rabbit myocytes using a constant current stimulation protocol. We developed a mathematical model that included both the stable excitable equilibrium point at resting V(m) (-80 mV) and the unstable oscillatory equilibrium point at elevated V(m) (-10 mV). Spiral wave dynamics were studied in 2-dimensional grids using variants of the model. All models showed restitution and reproduced the experimental values of transmembrane resistance at rest and during the action potential plateau. Stable spiral waves were observed when the model showed only 1 equilibrium point. However, spatio-temporal complexity was observed if the model showed both excitable and oscillatory equilibrium points (i.e., excito-oscillatory models). The initial wave breaks resulted from oscillatory waves expanding in all directions; after a few beats, the patterns were characterized by a combination of unstable spiral waves and target patterns consistent with the patterns observed on the heart surface during VF. In our model, this VF-like activity only occurred when the single cell period of V(m) oscillations was within a specific range. The VF-like patterns observed in our excito-oscillatory models could not be explained by the existing proposed instability mechanisms. Our results introduce the important suggestion that membrane dynamics responsible for V(m) oscillations at elevated V(m) levels can destabilize spiral waves and thus may be a novel therapeutic target for preventing VF.

  4. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  5. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  6. Effect of shoe heel height on vastus medialis and vastus lateralis electromyographic activity during sit to stand

    Directory of Open Access Journals (Sweden)

    Hodgson David

    2008-01-01

    Full Text Available Abstract Background It has been proposed that high-heeled shoes may contribute to the development and progression of knee pain. However, surprisingly little research has been carried out on how shoe heel height affects muscle activity around the knee joint. The purpose of this study was to investigate the effect of differing heel height on the electromyographic (EMG activity in vastus medialis (VM and vastus lateralis (VL during a sit to stand activity. This was an exploratory study to inform future research. Methods A repeated measures design was used. Twenty five healthy females carried out a standardised sit to stand activity under 4 conditions; barefoot, and with heel wedges of 1, 3, and 5 cm in height. EMG activity was recorded from VM and VL during the activity. Data were analysed using 1 × 4 repeated measures ANOVA. Results Average rectified EMG activity differed with heel height in both VM (F2.2, 51.7 = 5.24, p 3, 72 = 5.32, p 3, 72 = 0.61, p = 0.609. Conclusion We found that as heel height increased, there was an increase in EMG activity in both VM and VL, but no change in the relative EMG intensity of VM and VL as measured by the VM: VL ratio. This showed that no VM: VL imbalance was elicited. This study provides information that will inform future research on how heel height affects muscle activity around the knee joint.

  7. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  8. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  9. CernDOC, a fertile ground for the web’s inception.

    CERN Multimedia

    Jordan Juras

    2010-01-01

    It is widely acknowledged that the World Wide Web took its first steps towards success at CERN. However, lesser well known is that earlier in the 80s, CERN teams had already developed CERNDOC, a very advanced documentation system, and one of the first to implement the client-server model. This same idea was later used in the development of the Web.   The scheme used by Tim Berners-Lee to present the web. In yellow, the CERNDOC box. The CERNDOC initiative was pitched in the early 1980s by the DD division (now the IT division) as a solution for sharing and storing documentation produced by the physicists and engineers at CERN. At this point in time, the central computing facilities were based on IBM mainframes. Although PCs, Macintoshes and laser printers did not yet exist, network development was already active. “BITNET provided the networking capacity necessary for the IBM VM/CMS platform and it was employed by the CERNDOC project. The VM/CMS operating system provided users with private...

  10. Anterior cingulate cortex instigates adaptive switches in choice by integrating immediate and delayed components of value in ventromedial prefrontal cortex.

    Science.gov (United States)

    Economides, Marcos; Guitart-Masip, Marc; Kurth-Nelson, Zeb; Dolan, Raymond J

    2014-02-26

    Actions can lead to an immediate reward or punishment and a complex set of delayed outcomes. Adaptive choice necessitates the brain track and integrate both of these potential consequences. Here, we designed a sequential task whereby the decision to exploit or forego an available offer was contingent on comparing immediate value and a state-dependent future cost of expending a limited resource. Crucially, the dynamics of the task demanded frequent switches in policy based on an online computation of changing delayed consequences. We found that human subjects choose on the basis of a near-optimal integration of immediate reward and delayed consequences, with the latter computed in a prefrontal network. Within this network, anterior cingulate cortex (ACC) was dynamically coupled to ventromedial prefrontal cortex (vmPFC) when adaptive switches in choice were required. Our results suggest a choice architecture whereby interactions between ACC and vmPFC underpin an integration of immediate and delayed components of value to support flexible policy switching that accommodates the potential delayed consequences of an action.

  11. Comparison analysis on vulnerability of metro networks based on complex network

    Science.gov (United States)

    Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan

    2018-04-01

    This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.

  12. Heterogeneity and Networks

    OpenAIRE

    Goyal, S.

    2018-01-01

    This chapter shows that networks can have large and differentiated effects on behavior and then argues that social and economic pressures facilitate the formation of heterogenous networks. Thus networks can play an important role in understanding the wide diversity in human behaviour and in economic outcomes.

  13. Exploring network organization in practice

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    Constructing a network organization for global R&D is presented as a common sense practice in existing literature. However, there are still queries about the network organization, such as the persistence of hierarchies which make a network organization merely a “bureaucracy-lite” organization....... Furthermore, in practice, we rarely see radical organizational change towards a network organization that adopts an internal market. The co-existence of market, hierarchy and network triggered research interest. A multiple case study of three transnational corporations’ global R&D organization shows...... that there are different logical considerations when designing a network organization to facilitate innovation. I identify three types of network organizations: market-led, directed and culture-led network organizations. Different types of network organizations show that organizations are dual and even ternary systems...

  14. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  15. Hippocampal Damage Increases Deontological Responses during Moral Decision Making.

    Science.gov (United States)

    McCormick, Cornelia; Rosenthal, Clive R; Miller, Thomas D; Maguire, Eleanor A

    2016-11-30

    Complex moral decision making is associated with the ventromedial prefrontal cortex (vmPFC) in humans, and damage to this region significantly increases the frequency of utilitarian judgments. Since the vmPFC has strong anatomical and functional links with the hippocampus, here we asked how patients with selective bilateral hippocampal damage would derive moral decisions on a classic moral dilemmas paradigm. We found that the patients approved of the utilitarian options significantly less often than control participants, favoring instead deontological responses-rejecting actions that harm even one person. Thus, patients with hippocampal damage have a strikingly opposite approach to moral decision making than vmPFC-lesioned patients. Skin-conductance data collected during the task showed increased emotional arousal in the hippocampal-damaged patients and they stated that their moral decisions were based on emotional instinct. By contrast, control participants made moral decisions based on the integration of an adverse emotional response to harming others, visualization of the consequences of one's action, and the rational re-evaluation of future benefits. This integration may be disturbed in patients with either hippocampal or vmPFC damage. Hippocampal lesions decreased the ability to visualize a scenario and its future consequences, which seemed to render the adverse emotional response overwhelmingly dominant. In patients with vmPFC damage, visualization might also be reduced alongside an inability to detect the adverse emotional response, leaving only the utilitarian option open. Overall, these results provide insights into the processes involved in moral decision making and highlight the complementary roles played by two closely connected brain regions. The ventromedial prefrontal cortex (vmPFC) is closely associated with the ability to make complex moral judgements. When this area is damaged, patients become more utilitarian (the ends justify the means) and have

  16. Energy-aware virtual network embedding in flexi-grid optical networks

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin

    2018-01-01

    Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.

  17. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  18. Energy-aware virtual network embedding in flexi-grid networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng

    2017-11-27

    Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.

  19. Cellular phone network and health: a pilot study. Design and first results; Mobilfunk und Befinden - eine Pilotstudie. Design und erste Ergebnisse

    Energy Technology Data Exchange (ETDEWEB)

    Spegel, H.; Meyer, N.; Ehrenstein, V.; Heinrich, S.; Schulze, A.; Klein, J.; Praml, G.; Nowak, D.; Radon, K. [Inst. und Poliklinik fuer Arbeits- und Umweltmedizin der Ludwig-Maximilians-Univ., Arbeitsgruppe Arbeits- und Umweltepidemiologie und NetTeaching, Muenchen (Germany); Brix, J. [Bayerisches Staatsministerium fuer Umwelt, Gesundheit und Verbraucherschutz, Muenchen (Germany); Kries, R. von [Inst. fuer Sozialpaediatrie und Jugendmedizin, der Ludwig-Maximilians-Univ., Muenchen (Germany)

    2006-07-01

    Background: we designed a cross-sectional population-based pilot study of possible acute health effects of cellular phone networks. We aimed to examine feasibility of such a study in the field and to assess adequacy of personal dosimetry. Methods: using personal dosimeters, we obtained a 24-hour exposure profile for each study participant. Exposure to frequencies within the mobile communication range (D-net, E-net, universal mobile telecommunications system (UMTS), and wireless local area networks (WLAN)) was measured and recorded every second. Simultaneously we used computer assisted personal interview (CAPI) to collect data on participants' symptoms, socio-demographic characteristics, and potential confounders. The initial results are now available for 42 children (ages 8-12 years), 57 adolescents (ages 13-17 years), and 64 adults (ages 18-65 years), all of them residents of Munich, Germany. Results: personal dosimetry proved to be an adequate and well accepted instrument for the use in the field. The duration of the cumulative exposure to all frequencies in excess of 0.1 V/m ranged from 0.1 to 96.5% of the 24-hour period, and the median daily duration across all age groups was 4.1%. The exposure was dominated by frequencies in the D-net range. Fatigue was the most prevalent symptom, reported by 47% of the children and adolescents and by 44% of the adults. Conclusions: this pilot study shows that both design and the questionnaire instrument are adequate for use in epidemiologic studies of association between exposure to high-frequency electromagnetic fields and health. Personal dosimeters have been optimised and fine-tuned through continuous use. The association between the exposure and health can now be further assessed in a dedicated study. (orig.)

  20. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Donghai Zhu

    2016-01-01

    Full Text Available Wireless Mesh Networks (WMNs have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigms in data transmission for WMNs. In this paper, we develop a novel OpenCoding protocol, which combines the SDN technique with intra-flow network coding for WMNs. Our developed protocol can simplify the deployment and management of the network and improve network performance. In OpenCoding, a controller that works on the control plane makes routing decisions for mesh routers and the hop-by-hop forwarding function is replaced by network coding functions in data plane. We analyze the overhead of OpenCoding. Through a simulation study, we show the effectiveness of the OpenCoding protocol in comparison with existing schemes. Our data shows that OpenCoding outperforms both traditional routing and intra-flow network coding schemes.

  1. Undermining and Strengthening Social Networks through Network Modification

    Science.gov (United States)

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  2. "Homeless Networks: Testing Peer and Homed Networks Against Location Choice"

    OpenAIRE

    Shinichiro Iwata; Koji Karato

    2007-01-01

    This paper examines the location choices of homeless people in Osaka City, and finds them concentrated because of homeless networks. The paper also shows that different types of homeless networks operate in two different homeless groups: (1) peer networks that provide a social tie inside homeless communities are observed in groups that had not had work experience in the day labor market; (2) homed networks that provide a social tie outside homeless communities affect location choice in the ex...

  3. Network Compression as a Quality Measure for Protein Interaction Networks

    Science.gov (United States)

    Royer, Loic; Reimann, Matthias; Stewart, A. Francis; Schroeder, Michael

    2012-01-01

    With the advent of large-scale protein interaction studies, there is much debate about data quality. Can different noise levels in the measurements be assessed by analyzing network structure? Because proteomic regulation is inherently co-operative, modular and redundant, it is inherently compressible when represented as a network. Here we propose that network compression can be used to compare false positive and false negative noise levels in protein interaction networks. We validate this hypothesis by first confirming the detrimental effect of false positives and false negatives. Second, we show that gold standard networks are more compressible. Third, we show that compressibility correlates with co-expression, co-localization, and shared function. Fourth, we also observe correlation with better protein tagging methods, physiological expression in contrast to over-expression of tagged proteins, and smart pooling approaches for yeast two-hybrid screens. Overall, this new measure is a proxy for both sensitivity and specificity and gives complementary information to standard measures such as average degree and clustering coefficients. PMID:22719828

  4. Structural and functional involvement of amygdale in posttraumatic stress disorder

    International Nuclear Information System (INIS)

    Hakamata, Yuko; Matsuoka, Yutaka

    2007-01-01

    Pathophysiological imaging studies of brain neuro-network concerned with posttraumatic stress disorder (PTSD) have given several models, where the interaction in the amygdala-ventral/medial prefrontal cortex-hippocampus (Am-vmPFC-Hp) system is widely noticed. This paper describes the review of the structure, function and functional connectivity of Am in PTSD in relation to the Am-vmPFC-Hp system. For the structure of Am in PTSD, many studies by MRI have shown that its volume is unchanged but, exceptionally, authors have found the significant 6% volume reduction. Increased functional activity of Am has been demonstrated in PTSD by positron emission tomography (PET), but refuting findings are still presented. Studies in a larger scale are awaited for conclusion. The functional connectivity of Am in PTSD seems still controversial in an aspect of its direction in the Am-vmPFC-Hp system and participation of other systems, not studied hitherto, is thought possible. Authors expect further progress of PTSD imaging study not only from its pathophysiologic aspect but also from its therapeutic (mental and medical) view, which can compensate our knowledge of PTSD from both standpoints. (R.T.)

  5. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  6. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  7. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  8. Virtual microscopy system at Chinese medical university: an assisted teaching platform for promoting active learning and problem-solving skills.

    Science.gov (United States)

    Tian, Yanping; Xiao, Wengang; Li, Chengren; Liu, Yunlai; Qin, Maolin; Wu, Yi; Xiao, Lan; Li, Hongli

    2014-04-09

    Chinese medical universities typically have a high number of students, a shortage of teachers and limited equipment, and as such histology courses have been taught using traditional lecture-based formats, with textbooks and conventional microscopy. This method, however, has reduced creativity and problem-solving skills training in the curriculum. The virtual microscope (VM) system has been shown to be an effective and efficient educational strategy. The present study aims to describe a VM system for undergraduates and to evaluate the effects of promoting active learning and problem-solving skills. Two hundred and twenty-nine second-year undergraduate students in the Third Military Medical University were divided into two groups. The VM group contained 115 students and was taught using the VM system. The light microscope (LM) group consisted of 114 students and was taught using the LM system. Post-teaching performances were assessed by multiple-choice questions, short essay questions, case analysis questions and the identification of structure of tissue. Students' teaching preferences and satisfaction were assessed using questionnaires. Test scores in the VM group showed a significant improvement compared with those in the LM group (p 0.05); however, there were notable differences in the mean score rate of case analysis questions and identification of structure of tissue (p effects of the VM system in terms of additional learning resources, critical thinking, ease of communication and confidence. The VM system is an effective tool at Chinese medical university to promote undergraduates' active learning and problem-solving skills as an assisted teaching platform.

  9. Organizational Learning Strategies and Verbal Memory Deficits in Bipolar Disorder.

    Science.gov (United States)

    Nitzburg, George C; Cuesta-Diaz, Armando; Ospina, Luz H; Russo, Manuela; Shanahan, Megan; Perez-Rodriguez, Mercedes; Larsen, Emmett; Mulaimovic, Sandra; Burdick, Katherine E

    2017-04-01

    Verbal memory (VM) impairment is prominent in bipolar disorder (BD) and is linked to functional outcomes. However, the intricacies of VM impairment have not yet been studied in a large sample of BD patients. Moreover, some have proposed VM deficits that may be mediated by organizational strategies, such as semantic or serial clustering. Thus, the exact nature of VM break-down in BD patients is not well understood, limiting remediation efforts. We investigated the intricacies of VM deficits in BD patients versus healthy controls (HCs) and examined whether verbal learning differences were mediated by use of clustering strategies. The California Verbal Learning Test (CVLT) was administered to 113 affectively stable BD patients and 106 HCs. We compared diagnostic groups on all CVLT indices and investigated whether group differences in verbal learning were mediated by clustering strategies. Although BD patients showed significantly poorer attention, learning, and memory, these indices were only mildly impaired. However, BD patients evidenced poorer use of effective learning strategies and lower recall consistency, with these indices falling in the moderately impaired range. Moreover, relative reliance on semantic clustering fully mediated the relationship between diagnostic category and verbal learning, while reliance on serial clustering partially mediated this relationship. VM deficits in affectively stable bipolar patients were widespread but were generally mildly impaired. However, patients displayed inadequate use of organizational strategies with clear separation from HCs on semantic and serial clustering. Remediation efforts may benefit from education about mnemonic devices or "chunking" techniques to attenuate VM deficits in BD. (JINS, 2017, 23, 358-366).

  10. Kinetics of acyl transfer reactions in organic media catalysed by Candida antarctica lipase B.

    Science.gov (United States)

    Martinelle, M; Hult, K

    1995-09-06

    The acyl transfer reactions catalysed by Candida antartica lipase B in organic media followed a bi-bi ping-pong mechanism, with competitive substrate inhibition by the alcohols used as acyl acceptors. The effect of organic solvents on Vm and Km was investigated. The Vm values in acetonitrile was 40-50% of those in heptane. High Km values in acetonitrile compared to those in heptane could partly be explained by an increased solvation of the substrates in acetonitrile. Substrate solvation caused a 10-fold change in substrate specificity, defined as (Vm/Km)ethyl octanoate/(Vm/Km)octanoic acid, going from heptane to acetonitrile. Deacylation was the rate determining step for the acyl transfer in heptane with vinyl- and ethyl octanoate as acyl donors and (R)-2-octanol as acyl acceptor. With 1-octanol, a rate determining deacylation step in heptane was indicated using the same acyl donors. Using 1-octanol as acceptor in heptane, S-ethyl thiooctanoate had a 25- to 30-fold lower Vm/Km value and vinyl octanoate a 4-fold higher Vm/Km value than that for ethyl octanoate. The difference showed to be a Km effect for vinyl octanoate and mainly a Km effect for S-ethyl thiooctanoate. The Vm values of the esterification of octanoic acid with different alcohols was 10-30-times lower than those for the corresponding transesterification of ethyl octanoate. The low activity could be explained by a low pH around the enzyme caused by the acid or a withdrawing of active enzyme by nonproductive binding by the acid.

  11. Driving context influences drivers' decision to engage in visual-manual phone tasks: Evidence from a naturalistic driving study.

    Science.gov (United States)

    Tivesten, Emma; Dozza, Marco

    2015-06-01

    Visual-manual (VM) phone tasks (i.e., texting, dialing, reading) are associated with an increased crash/near-crash risk. This study investigated how the driving context influences drivers' decisions to engage in VM phone tasks in naturalistic driving. Video-recordings of 1,432 car trips were viewed to identify VM phone tasks and passenger presence. Video, vehicle signals, and map data were used to classify driving context (i.e., curvature, other vehicles) before and during the VM phone tasks (N=374). Vehicle signals (i.e., speed, yaw rate, forward radar) were available for all driving. VM phone tasks were more likely to be initiated while standing still, and less likely while driving at high speeds, or when a passenger was present. Lead vehicle presence did not influence how likely it was that a VM phone task was initiated, but the drivers adjusted their task timing to situations when the lead vehicle was increasing speed, resulting in increasing time headway. The drivers adjusted task timing until after making sharp turns and lane change maneuvers. In contrast to previous driving simulator studies, there was no evidence of drivers reducing speed as a consequence of VM phone task engagement. The results show that experienced drivers use information about current and upcoming driving context to decide when to engage in VM phone tasks. However, drivers may fail to sufficiently increase safety margins to allow time to respond to possible unpredictable events (e.g., lead vehicle braking). Advanced driver assistance systems should facilitate and possibly boost drivers' self-regulating behavior. For instance, they might recognize when appropriate adaptive behavior is missing and advise or alert accordingly. The results from this study could also inspire training programs for novice drivers, or locally classify roads in terms of the risk associated with secondary task engagement while driving. Copyright © 2015. Published by Elsevier Ltd.

  12. Resting Heart Rate Variability, Facets of Rumination and Trait Anxiety: Implications for the Perseverative Cognition Hypothesis

    Directory of Open Access Journals (Sweden)

    DeWayne P. Williams

    2017-10-01

    Full Text Available The perseverative cognition hypothesis (PCH posits that perseveration, defined as the repetitive or sustained activation of cognitive representations of a real or imagined stressor, is a primary mechanism linking psychological (or stress vulnerability with poor health and disease. Resting vagally mediated heart rate variability (vmHRV is an important indicator of self-regulatory abilities, stress vulnerability and overall health. Those with lower resting vmHRV are more vulnerable to stress, and thus more likely to engage in perseverative cognition and experience subsequent negative mental health outcomes such as anxiety. Recent research suggests that rumination—one of the core mechanisms underlying perseveration—is a construct containing (at least two maladaptive (depressive and brooding and one adaptive (reflective types of rumination. However, to date, research has not examined how the association between resting vmHRV may differ between these three facets of rumination, in addition to these facets’ mechanistic role in linking lower resting vmHRV with greater trait anxiety. The current cross-sectional study explores these relationships in a sample of 203 participants (112 females, 76 ethnic minorities, mean age = 19.43, standard deviation = 1.87. Resting vmHRV was assessed during a 5-min-resting period using an Electrocardiogram (ECG. Both trait rumination (including the three facets and anxiety were assessed via self-report scales. Significant negative associations were found between resting vmHRV and maladaptive, but not adaptive, forms of perseveration. Similarly, mediation analyses showed a significant indirect relationship between resting vmHRV and anxiety through maladaptive, but not adaptive, facets of rumination. Our findings support the PCH such that those with stress vulnerability, as indexed by lower resting vmHRV, are more likely to engage in maladaptive perseverative cognition and thus experience negative outcomes such as

  13. Resting Heart Rate Variability, Facets of Rumination and Trait Anxiety: Implications for the Perseverative Cognition Hypothesis.

    Science.gov (United States)

    Williams, DeWayne P; Feeling, Nicole R; Hill, LaBarron K; Spangler, Derek P; Koenig, Julian; Thayer, Julian F

    2017-01-01

    The perseverative cognition hypothesis (PCH) posits that perseveration, defined as the repetitive or sustained activation of cognitive representations of a real or imagined stressor, is a primary mechanism linking psychological (or stress) vulnerability with poor health and disease. Resting vagally mediated heart rate variability (vmHRV) is an important indicator of self-regulatory abilities, stress vulnerability and overall health. Those with lower resting vmHRV are more vulnerable to stress, and thus more likely to engage in perseverative cognition and experience subsequent negative mental health outcomes such as anxiety. Recent research suggests that rumination-one of the core mechanisms underlying perseveration-is a construct containing (at least) two maladaptive (depressive and brooding) and one adaptive (reflective) types of rumination. However, to date, research has not examined how the association between resting vmHRV may differ between these three facets of rumination, in addition to these facets' mechanistic role in linking lower resting vmHRV with greater trait anxiety. The current cross-sectional study explores these relationships in a sample of 203 participants (112 females, 76 ethnic minorities, mean age = 19.43, standard deviation = 1.87). Resting vmHRV was assessed during a 5-min-resting period using an Electrocardiogram (ECG). Both trait rumination (including the three facets) and anxiety were assessed via self-report scales. Significant negative associations were found between resting vmHRV and maladaptive, but not adaptive, forms of perseveration. Similarly, mediation analyses showed a significant indirect relationship between resting vmHRV and anxiety through maladaptive, but not adaptive, facets of rumination. Our findings support the PCH such that those with stress vulnerability, as indexed by lower resting vmHRV, are more likely to engage in maladaptive perseverative cognition and thus experience negative outcomes such as anxiety. Our data

  14. Optogenetic modulation of descending prefrontocortical inputs to the dorsal raphe bidirectionally bias socioaffective choices after social defeat

    Directory of Open Access Journals (Sweden)

    Collin eChallis

    2014-02-01

    Full Text Available It has been well established that modulating serotonin (5-HT levels in humans and animals affects perception and response to social threats, however the circuit mechanisms that control 5-HT output during social interaction are not well understood. A better understanding of these systems could provide groundwork for more precise and efficient therapeutic interventions. Here we examined the organization and plasticity of microcircuits implicated in top-down control of 5-HT neurons in the dorsal raphe nucleus (DRN by excitatory inputs from the ventromedial prefrontal cortex (vmPFC and their role in social approach-avoidance decisions. We did this in the context of a social defeat model that induces a long lasting form of social aversion that is reversible by antidepressants. We first used viral tracing and Cre-dependent genetic identification of vmPFC glutamatergic synapses in the DRN to determine their topographic distribution in relation to 5-HT and GABAergic subregions and found that excitatory vmPFC projections primarily localized to GABA-rich areas of the DRN. We then used optogenetics in combination with cFos mapping and slice electrophysiology to establish the functional effects of repeatedly driving vmPFC inputs in DRN. We provide the first direct evidence that vmPFC axons drive synaptic activity and immediate early gene expression in genetically identified DRN GABA neurons through an AMPA receptor-dependent mechanism. In contrast, we did not detect vmPFC-driven synaptic activity in 5-HT neurons and cFos induction in 5-HT neurons was limited. Finally we show that optogenetically increasing or decreasing excitatory vmPFC input to the DRN during sensory exposure to an aggressor’s cues enhances or diminishes avoidance bias, respectively. These results clarify the functional organization of vmPFC-DRN pathways and identify GABAergic neurons as a key cellular element filtering top-down vmPFC influences on affect-regulating 5-HT output.

  15. Maximum entropy networks are more controllable than preferential attachment networks

    International Nuclear Information System (INIS)

    Hou, Lvlin; Small, Michael; Lao, Songyang

    2014-01-01

    A maximum entropy (ME) method to generate typical scale-free networks has been recently introduced. We investigate the controllability of ME networks and Barabási–Albert preferential attachment networks. Our experimental results show that ME networks are significantly more easily controlled than BA networks of the same size and the same degree distribution. Moreover, the control profiles are used to provide insight into control properties of both classes of network. We identify and classify the driver nodes and analyze the connectivity of their neighbors. We find that driver nodes in ME networks have fewer mutual neighbors and that their neighbors have lower average degree. We conclude that the properties of the neighbors of driver node sensitively affect the network controllability. Hence, subtle and important structural differences exist between BA networks and typical scale-free networks of the same degree distribution. - Highlights: • The controllability of maximum entropy (ME) and Barabási–Albert (BA) networks is investigated. • ME networks are significantly more easily controlled than BA networks of the same degree distribution. • The properties of the neighbors of driver node sensitively affect the network controllability. • Subtle and important structural differences exist between BA networks and typical scale-free networks

  16. Performance evaluation of the General Electric eXplore CT 120 micro-CT using the vmCT phantom

    Energy Technology Data Exchange (ETDEWEB)

    Bahri, M.A., E-mail: M.Bahri@ulg.ac.be [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); Warnock, G.; Plenevaux, A. [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); Choquet, P.; Constantinesco, A. [Biophysique et Medecine Nucleaire, Hopitaux universitaires de Strasbourg, Strasbourg (France); Salmon, E.; Luxen, A. [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); Seret, A. [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); ULg-Liege University, Experimental Medical Imaging, Liege (Belgium)

    2011-08-21

    The eXplore CT 120 is the latest generation micro-CT from General Electric. It is equipped with a high-power tube and a flat-panel detector. It allows high resolution and high contrast fast CT scanning of small animals. The aim of this study was to compare the performance of the eXplore CT 120 with that of the eXplore Ultra, its predecessor for which the methodology using the vmCT phantom has already been described . The phantom was imaged using typical a rat (fast scan or F) or mouse (in vivo bone scan or H) scanning protocols. With the slanted edge method, a 10% modulation transfer function (MTF) was observed at 4.4 (F) and 3.9-4.4 (H) mm{sup -1} corresponding to 114 {mu}m resolution. A fairly larger MTF was obtained by the coil method with the MTF for the thinnest coil (3.3 mm{sup -1}) equal to 0.32 (F) and 0.34 (H). The geometric accuracy was better than 0.3%. There was a highly linear (R{sup 2}>0.999) relationship between measured and expected CT numbers for both the CT number accuracy and linearity sections of the phantom. A cupping effect was clearly seen on the uniform slices and the uniformity-to-noise ratio ranged from 0.52 (F) to 0.89 (H). The air CT number depended on the amount of polycarbonate surrounding the area where it was measured; a difference as high as approximately 200 HU was observed. This hindered the calibration of this scanner in HU. This is likely due to the absence of corrections for beam hardening and scatter in the reconstruction software. However in view of the high linearity of the system, the implementation of these corrections would allow a good quality calibration of the scanner in HU. In conclusion, the eXplore CT 120 achieved a better spatial resolution than the eXplore Ultra (based on previously reported specifications) and future software developments will include beam hardening and scatter corrections that will make the new generation CT scanner even more promising.

  17. Optical network control plane for multi-domain networking

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva

    This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic...... process are not enough for efficient TE in mesh multi-domain networks. Enhancing the protocol with multi-path dissemination capability, combined with the employment of an end-to-end TE metric proves to be a highly efficient solution. Simulation results show good performance characteristics of the proposed...... is not as essential for improved network performance as the length of the provided paths. Second, the issue of multi-domain survivability support is analyzed. An AS-disjoint paths is beneficial not only for resilience support, but also for facilitating adequate network reactions to changes in the network, which...

  18. A petrogenetic model of basalts from the Northern Central Indian Ridge: 3-11°S

    Digital Repository Service at National Institute of Oceanography (India)

    Ray, Dwijesh; Iyer, S.D.; Banerjee, R.; Misra, S.; Widdowson, M.

    ) to subhedral (rare) equant grains, which are almost colourless and rarely show zoning. In a few cases, olivine shows alteration along the inherent fracture to reddish- brown iddingsite. Amphiboles occur in the VT as well as in VM basalts but only as poorly... (primitive mantle normalized data from Sun and McDonough, 1989) patterns for selected samples are shown. The basalt samples collected from VT 4, VT 5 and VM 9DG locations characteristically exhibit differential variation in their trace element...

  19. Network Analysis on Attitudes: A Brief Tutorial.

    Science.gov (United States)

    Dalege, Jonas; Borsboom, Denny; van Harreveld, Frenk; van der Maas, Han L J

    2017-07-01

    In this article, we provide a brief tutorial on the estimation, analysis, and simulation on attitude networks using the programming language R. We first discuss what a network is and subsequently show how one can estimate a regularized network on typical attitude data. For this, we use open-access data on the attitudes toward Barack Obama during the 2012 American presidential election. Second, we show how one can calculate standard network measures such as community structure, centrality, and connectivity on this estimated attitude network. Third, we show how one can simulate from an estimated attitude network to derive predictions from attitude networks. By this, we highlight that network theory provides a framework for both testing and developing formalized hypotheses on attitudes and related core social psychological constructs.

  20. Network 'small-world-ness': a quantitative method for determining canonical network equivalence.

    Directory of Open Access Journals (Sweden)

    Mark D Humphries

    Full Text Available BACKGROUND: Many technological, biological, social, and information networks fall into the broad class of 'small-world' networks: they have tightly interconnected clusters of nodes, and a shortest mean path length that is similar to a matched random graph (same number of nodes and edges. This semi-quantitative definition leads to a categorical distinction ('small/not-small' rather than a quantitative, continuous grading of networks, and can lead to uncertainty about a network's small-world status. Moreover, systems described by small-world networks are often studied using an equivalent canonical network model--the Watts-Strogatz (WS model. However, the process of establishing an equivalent WS model is imprecise and there is a pressing need to discover ways in which this equivalence may be quantified. METHODOLOGY/PRINCIPAL FINDINGS: We defined a precise measure of 'small-world-ness' S based on the trade off between high local clustering and short path length. A network is now deemed a 'small-world' if S>1--an assertion which may be tested statistically. We then examined the behavior of S on a large data-set of real-world systems. We found that all these systems were linked by a linear relationship between their S values and the network size n. Moreover, we show a method for assigning a unique Watts-Strogatz (WS model to any real-world network, and show analytically that the WS models associated with our sample of networks also show linearity between S and n. Linearity between S and n is not, however, inevitable, and neither is S maximal for an arbitrary network of given size. Linearity may, however, be explained by a common limiting growth process. CONCLUSIONS/SIGNIFICANCE: We have shown how the notion of a small-world network may be quantified. Several key properties of the metric are described and the use of WS canonical models is placed on a more secure footing.

  1. Resilience of networks to environmental stress: From regular to random networks

    Science.gov (United States)

    Eom, Young-Ho

    2018-04-01

    Despite the huge interest in network resilience to stress, most of the studies have concentrated on internal stress damaging network structure (e.g., node removals). Here we study how networks respond to environmental stress deteriorating their external conditions. We show that, when regular networks gradually disintegrate as environmental stress increases, disordered networks can suddenly collapse at critical stress with hysteresis and vulnerability to perturbations. We demonstrate that this difference results from a trade-off between node resilience and network resilience to environmental stress. The nodes in the disordered networks can suppress their collapses due to the small-world topology of the networks but eventually collapse all together in return. Our findings indicate that some real networks can be highly resilient against environmental stress to a threshold yet extremely vulnerable to the stress above the threshold because of their small-world topology.

  2. QLab 3 show control projects for live performances & installations

    CERN Document Server

    Hopgood, Jeromy

    2013-01-01

    Used from Broadway to Britain's West End, QLab software is the tool of choice for many of the world's most prominent sound, projection, and integrated media designers. QLab 3 Show Control: Projects for Live Performances & Installations is a project-based book on QLab software covering sound, video, and show control. With information on both sound and video system basics and the more advanced functions of QLab such as MIDI show control, new OSC capabilities, networking, video effects, and microphone integration, each chapter's specific projects will allow you to learn the software's capabilitie

  3. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  4. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  5. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  6. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm

    2017-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how such gender......Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how...... such gendering of entrepreneurs’ networks differ between societies and cultures. Research Design: Based on survey data from the Global Entrepreneurships Monitor, a sample of 16,365 entrepreneurs is used to compare the gendering of entrepreneurs’ networks in China, and five countries largely located around...... the Persian Gulf, namely Yemen, Iran, Saudi Arabia, Qatar and United Arab Emirates. Findings: Analyses show that female entrepreneurs tend to have slightly larger private sphere networks than male entrepreneurs. The differences between male and female entrepreneurs’ networking in the public sphere...

  7. Structural network heterogeneities and network dynamics: a possible dynamical mechanism for hippocampal memory reactivation.

    Science.gov (United States)

    Jablonski, Piotr; Poe, Gina; Zochowski, Michal

    2007-03-01

    The hippocampus has the capacity for reactivating recently acquired memories and it is hypothesized that one of the functions of sleep reactivation is the facilitation of consolidation of novel memory traces. The dynamic and network processes underlying such a reactivation remain, however, unknown. We show that such a reactivation characterized by local, self-sustained activity of a network region may be an inherent property of the recurrent excitatory-inhibitory network with a heterogeneous structure. The entry into the reactivation phase is mediated through a physiologically feasible regulation of global excitability and external input sources, while the reactivated component of the network is formed through induced network heterogeneities during learning. We show that structural changes needed for robust reactivation of a given network region are well within known physiological parameters.

  8. Networking activities in technology-based entrepreneurial teams

    DEFF Research Database (Denmark)

    Neergaard, Helle

    2005-01-01

    Based on social network theoy, this article investigates the distribution of networking roles and responsibilities in entrepreneurial founding teams. Its focus is on the team as a collection of individuals, thus allowing the research to address differences in networking patterns. It identifies six...... central networking activities and shows that not all founding team members are equally active 'networkers'. The analyses show that team members prioritize different networking activities and that one member in particular has extensive networking activities whereas other memebrs of the team are more...

  9. Research on Evolutionary Mechanism of Agile Supply Chain Network via Complex Network Theory

    Directory of Open Access Journals (Sweden)

    Nai-Ru Xu

    2016-01-01

    Full Text Available The paper establishes the evolutionary mechanism model of agile supply chain network by means of complex network theory which can be used to describe the growth process of the agile supply chain network and analyze the complexity of the agile supply chain network. After introducing the process and the suitability of taking complex network theory into supply chain network research, the paper applies complex network theory into the agile supply chain network research, analyzes the complexity of agile supply chain network, presents the evolutionary mechanism of agile supply chain network based on complex network theory, and uses Matlab to simulate degree distribution, average path length, clustering coefficient, and node betweenness. Simulation results show that the evolution result displays the scale-free property. It lays the foundations of further research on agile supply chain network based on complex network theory.

  10. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  11. Effects of long-term stimulation of textured insoles on postural control in health elderly.

    Science.gov (United States)

    Annino, Giuseppe; Palazzo, Francesco; Alwardat, Mohammad S; Manzi, Vincenzo; Lebone, Pietro; Tancredi, Virginia; Sinibaldi Salimei, Paola; Caronti, Alfio; Panzarino, Michele; Padua, Elvira

    2018-04-01

    The aim of this study was to confirm the effects of long term (chronic) stimulating surface (textured insole) on body balance of elderly people. Twenty-four healthy elderly individuals were randomly distributed in two groups: control and experimental (67.75±6.04 years, 74.55±12.14 kg, 163.7±8.55 cm, 27.75±3.04 kg/m2). Over one month, control group (CG) used smooth insoles and the experimental group (ExG) used textured insoles every day. Velocity net (Vnet), anteroposterior (VA/P), mediolateral (VM/L) and sway path of CoP were assessed in different eye conditions before and after the experimental procedure. A mixed between-within subject ANOVA was conducted to assess the impact of soft and textured insoles and two visual conditions (vision vs. no vision) across two time periods (α≤0.05). The results showed any statistical difference between groups in each parameter assessed in this study. CoP, Vnet and VM/L in the experimental group showed a statistically significant effect of textured insoles only without vision (CoP: P=0.002; η2=0.35), Vnet P=0.02; η2=0.24, VM/L P=0.04; η2=0.177) whereas VA/P showed no statistically significant effect in the same group and condition. There was no significant effect in Vnet, VA/P, VM/L and COP in control group that used smooth insole for both eye conditions. The results confirm that postural stability improved in healthy elderly individuals, increasing somatosensory information's from feet plantar mechanoreceptors. Long term stimulation with textured insoles decreased CoP, Vnet and VM/L with eyes closed.

  12. Nonbinary Tree-Based Phylogenetic Networks.

    Science.gov (United States)

    Jetten, Laura; van Iersel, Leo

    2018-01-01

    Rooted phylogenetic networks are used to describe evolutionary histories that contain non-treelike evolutionary events such as hybridization and horizontal gene transfer. In some cases, such histories can be described by a phylogenetic base-tree with additional linking arcs, which can, for example, represent gene transfer events. Such phylogenetic networks are called tree-based. Here, we consider two possible generalizations of this concept to nonbinary networks, which we call tree-based and strictly-tree-based nonbinary phylogenetic networks. We give simple graph-theoretic characterizations of tree-based and strictly-tree-based nonbinary phylogenetic networks. Moreover, we show for each of these two classes that it can be decided in polynomial time whether a given network is contained in the class. Our approach also provides a new view on tree-based binary phylogenetic networks. Finally, we discuss two examples of nonbinary phylogenetic networks in biology and show how our results can be applied to them.

  13. Chaotic diagonal recurrent neural network

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos, and its structure and learning algorithm are designed. The multilayer feedforward neural network, diagonal recurrent neural network, and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map. The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks. (interdisciplinary physics and related areas of science and technology)

  14. Maximization Network Throughput Based on Improved Genetic Algorithm and Network Coding for Optical Multicast Networks

    Science.gov (United States)

    Wei, Chengying; Xiong, Cuilian; Liu, Huanlin

    2017-12-01

    Maximal multicast stream algorithm based on network coding (NC) can improve the network's throughput for wavelength-division multiplexing (WDM) networks, which however is far less than the network's maximal throughput in terms of theory. And the existing multicast stream algorithms do not give the information distribution pattern and routing in the meantime. In the paper, an improved genetic algorithm is brought forward to maximize the optical multicast throughput by NC and to determine the multicast stream distribution by hybrid chromosomes construction for multicast with single source and multiple destinations. The proposed hybrid chromosomes are constructed by the binary chromosomes and integer chromosomes, while the binary chromosomes represent optical multicast routing and the integer chromosomes indicate the multicast stream distribution. A fitness function is designed to guarantee that each destination can receive the maximum number of decoding multicast streams. The simulation results showed that the proposed method is far superior over the typical maximal multicast stream algorithms based on NC in terms of network throughput in WDM networks.

  15. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  16. Network connectivity value.

    Science.gov (United States)

    Dragicevic, Arnaud; Boulanger, Vincent; Bruciamacchie, Max; Chauchard, Sandrine; Dupouey, Jean-Luc; Stenger, Anne

    2017-04-21

    In order to unveil the value of network connectivity, we formalize the construction of ecological networks in forest environments as an optimal control dynamic graph-theoretic problem. The network is based on a set of bioreserves and patches linked by ecological corridors. The node dynamics, built upon the consensus protocol, form a time evolutive Mahalanobis distance weighted by the opportunity costs of timber production. We consider a case of complete graph, where the ecological network is fully connected, and a case of incomplete graph, where the ecological network is partially connected. The results show that the network equilibrium depends on the size of the reception zone, while the network connectivity depends on the environmental compatibility between the ecological areas. Through shadow prices, we find that securing connectivity in partially connected networks is more expensive than in fully connected networks, but should be undertaken when the opportunity costs are significant. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Network class superposition analyses.

    Directory of Open Access Journals (Sweden)

    Carl A B Pearson

    Full Text Available Networks are often used to understand a whole system by modeling the interactions among its pieces. Examples include biomolecules in a cell interacting to provide some primary function, or species in an environment forming a stable community. However, these interactions are often unknown; instead, the pieces' dynamic states are known, and network structure must be inferred. Because observed function may be explained by many different networks (e.g., ≈ 10(30 for the yeast cell cycle process, considering dynamics beyond this primary function means picking a single network or suitable sample: measuring over all networks exhibiting the primary function is computationally infeasible. We circumvent that obstacle by calculating the network class ensemble. We represent the ensemble by a stochastic matrix T, which is a transition-by-transition superposition of the system dynamics for each member of the class. We present concrete results for T derived from boolean time series dynamics on networks obeying the Strong Inhibition rule, by applying T to several traditional questions about network dynamics. We show that the distribution of the number of point attractors can be accurately estimated with T. We show how to generate Derrida plots based on T. We show that T-based Shannon entropy outperforms other methods at selecting experiments to further narrow the network structure. We also outline an experimental test of predictions based on T. We motivate all of these results in terms of a popular molecular biology boolean network model for the yeast cell cycle, but the methods and analyses we introduce are general. We conclude with open questions for T, for example, application to other models, computational considerations when scaling up to larger systems, and other potential analyses.

  18. Altered communicative decisions following ventromedial prefrontal lesions.

    Science.gov (United States)

    Stolk, Arjen; D'Imperio, Daniela; di Pellegrino, Giuseppe; Toni, Ivan

    2015-06-01

    Damage to the human ventromedial prefrontal cortex (vmPFC) leads to profound changes in everyday social interactions [1, 2]. Yet, in the lab, vmPFC patients show surprising proficiency in reasoning about other agents [3-8]. These conflicting observations suggest that what vmPFC patients lack in everyday social interactions might be the ability to guide their decisions with knowledge about a social partner [9-13], despite preserved access to that knowledge [2, 14]. Quantification of socially relevant decisions during live interaction with different partners offers the possibility of testing this hypothesis. Eight patients with vmPFC damage, eight patients with brain damage elsewhere, and 15 healthy participants were asked to communicate non-verbally with two different addressees, an adult or a child, in an experimentally controlled interactive setting [15, 16]. In reality, a confederate blindly performed the role of both adult and child addressee, with matched performance and response times, such that the two addressees differed only in terms of the communicator's beliefs. Patients with vmPFC damage were able-and motivated-to generate communicatively effective behaviors. However, unlike patient and healthy controls, vmPFC patients failed to adjust their communicative decisions to the presumed abilities of their addressee. These findings indicate that the human vmPFC is necessarily involved in social interactions, insofar as those interactions need to be tailored toward knowledge about a social partner. In this perspective, the known contribution of this region to disparate domains like value-based decision-making [17-19], schema-based memory-processing [20-22], and person-specific mentalizing [11-13] might be instances of decisions based on contingently updated conceptual knowledge. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. ERNIE performance with TSA portals Initial Results

    Energy Technology Data Exchange (ETDEWEB)

    Labov, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2018-01-05

    This project extends the “Enhanced Radiological Nuclear Inspection and Evaluation” (ERNIE) system developed with CBP and DNDO to improve performance of PVT-based Radiation Portal Monitors (RPMs). ERNIE was designed to be used with any RPM system. The first implementation was with the SAIC (Leidos) RPM-8 systems. In this project, we are demonstrating how effective the ERNIE approach can be when applied to the VM250 TSA portals used in NSDD programs. Part of the challenge in adapting ERNIE to handle VM250 portals is the lack of gamma spectral information. We report here on the first results showing how the ERNIE analysis can improve analysis of measurements with the VM250 RPMs.

  20. Network traffic anomaly prediction using Artificial Neural Network

    Science.gov (United States)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  1. Multilayer Brain Networks

    Science.gov (United States)

    Vaiana, Michael; Muldoon, Sarah Feldt

    2018-01-01

    The field of neuroscience is facing an unprecedented expanse in the volume and diversity of available data. Traditionally, network models have provided key insights into the structure and function of the brain. With the advent of big data in neuroscience, both more sophisticated models capable of characterizing the increasing complexity of the data and novel methods of quantitative analysis are needed. Recently, multilayer networks, a mathematical extension of traditional networks, have gained increasing popularity in neuroscience due to their ability to capture the full information of multi-model, multi-scale, spatiotemporal data sets. Here, we review multilayer networks and their applications in neuroscience, showing how incorporating the multilayer framework into network neuroscience analysis has uncovered previously hidden features of brain networks. We specifically highlight the use of multilayer networks to model disease, structure-function relationships, network evolution, and link multi-scale data. Finally, we close with a discussion of promising new directions of multilayer network neuroscience research and propose a modified definition of multilayer networks designed to unite and clarify the use of the multilayer formalism in describing real-world systems.

  2. Lower Amplitude of the Hoffmann Reflex in Women With Patellofemoral Pain: Thinking Beyond Proximal, Local, and Distal Factors.

    Science.gov (United States)

    de Oliveira Silva, Danilo; Magalhães, Fernando Henrique; Faria, Nathálie Clara; Pazzinatto, Marcella Ferraz; Ferrari, Deisi; Pappas, Evangelos; de Azevedo, Fábio Mícolis

    2016-07-01

    To investigate whether vastus medialis (VM) Hoffmann reflexes (H-reflexes) differ on the basis of the presence or absence of patellofemoral pain (PFP) and to assess the capability of VM H-reflex measurements in accurately discriminating between women with and without PFP. Cross-sectional study. Laboratory of biomechanics and motor control. Women (N=30) aged 18 to 35 years were recruited, consisting of 2 groups: women with PFP (n=15) and asymptomatic controls (n=15). Not applicable. Maximum evoked responses were obtained by electrical stimulation applied to the femoral nerve, and peak-to-peak amplitudes of maximal Hoffmann reflex (Hmax) and maximal motor wave (Mmax) ratios were calculated. Independent samples t tests were performed to identify differences between groups, and a receiver operating characteristic curve was constructed to assess the discriminatory capability of VM H-reflex measurements. VM Hmax/Mmax ratios were significantly lower in participants with PFP than in pain-free participants (P=.007). In addition, the VM Hmax/Mmax ratios presented large and balanced discriminatory capability values (sensitivity, 73%; specificity, 67%). This study is the first to show that VM H-reflexes are lower in women with PFP than in asymptomatic controls. Therefore, increasing the excitation of the spinal cord in PFP participants may be essential to maintaining the gains acquired during the rehabilitation programs. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  3. Long Non-coding RNA LINC00339 Stimulates Glioma Vasculogenic Mimicry Formation by Regulating the miR-539-5p/TWIST1/MMPs Axis

    Directory of Open Access Journals (Sweden)

    Junqing Guo

    2018-03-01

    Full Text Available Glioma is recognized as a highly angiogenic malignant brain tumor. Vasculogenic mimicry (VM greatly restricts the therapeutic effect of anti-angiogenic tumor therapy for glioma patients. However, the molecular mechanisms of VM formation in glioma remain unclear. Here, we demonstrated that LINC00339 was upregulated in glioma tissue as well as in glioma cell lines. The expression of LINC00339 in glioma tissues was positively correlated with glioma VM formation. Knockdown of LINC00339 inhibited glioma cell proliferation, migration, invasion, and tube formation, meanwhile downregulating the expression of VM-related molecular MMP-2 and MMP-14. Furthermore, knockdown of LINC00339 significantly increased the expression of miR-539-5p. Both bioinformatics and luciferase reporter assay revealed that LINC00339 regulated the above effects via binding to miR-539-5p. Besides, overexpression of miR-539-5p resulted in decreased expression of TWIST1, a transcription factor known to play an oncogenic role in glioma and identified as a direct target of miR-539-5p. TWIST1 upregulated the promoter activities of MMP-2 and MMP-14. The in vivo study showed that nude mice carrying tumors with knockdown of LINC00339 and overexpression of miR-539-5p exhibited the smallest tumor volume through inhibiting VM formation. In conclusion, LINC00339 may be used as a novel therapeutic target for VM formation in glioma.

  4. Graphs, Ideal Flow, and the Transportation Network

    OpenAIRE

    Teknomo, Kardi

    2016-01-01

    This lecture discusses the mathematical relationship between network structure and network utilization of transportation network. Network structure means the graph itself. Network utilization represent the aggregation of trajectories of agents in using the network graph. I show the similarity and relationship between the structural pattern of the network and network utilization.

  5. Modeled Urea Distribution Volume and Mortality in the HEMO Study

    Science.gov (United States)

    Greene, Tom; Depner, Thomas A.; Levin, Nathan W.; Chertow, Glenn M.

    2011-01-01

    Summary Background and objectives In the Hemodialysis (HEMO) Study, observed small decreases in achieved equilibrated Kt/Vurea were noncausally associated with markedly increased mortality. Here we examine the association of mortality with modeled volume (Vm), the denominator of equilibrated Kt/Vurea. Design, setting, participants, & measurements Parameters derived from modeled urea kinetics (including Vm) and blood pressure (BP) were obtained monthly in 1846 patients. Case mix–adjusted time-dependent Cox regressions were used to relate the relative mortality hazard at each time point to Vm and to the change in Vm over the preceding 6 months. Mixed effects models were used to relate Vm to changes in intradialytic systolic BP and to other factors at each follow-up visit. Results Mortality was associated with Vm and change in Vm over the preceding 6 months. The association between change in Vm and mortality was independent of vascular access complications. In contrast, mortality was inversely associated with V calculated from anthropometric measurements (Vant). In case mix–adjusted analysis using Vm as a time-dependent covariate, the association of mortality with Vm strengthened after statistical adjustment for Vant. After adjustment for Vant, higher Vm was associated with slightly smaller reductions in intradialytic systolic BP and with risk factors for mortality including recent hospitalization and reductions in serum albumin concentration and body weight. Conclusions An increase in Vm is a marker for illness and mortality risk in hemodialysis patients. PMID:21511841

  6. Novel method of finding extreme edges in a convex set of N-dimension vectors

    Science.gov (United States)

    Hu, Chia-Lun J.

    2001-11-01

    As we published in the last few years, for a binary neural network pattern recognition system to learn a given mapping {Um mapped to Vm, m=1 to M} where um is an N- dimension analog (pattern) vector, Vm is a P-bit binary (classification) vector, the if-and-only-if (IFF) condition that this network can learn this mapping is that each i-set in {Ymi, m=1 to M} (where Ymithere existsVmiUm and Vmi=+1 or -1, is the i-th bit of VR-m).)(i=1 to P and there are P sets included here.) Is POSITIVELY, LINEARLY, INDEPENDENT or PLI. We have shown that this PLI condition is MORE GENERAL than the convexity condition applied to a set of N-vectors. In the design of old learning machines, we know that if a set of N-dimension analog vectors form a convex set, and if the machine can learn the boundary vectors (or extreme edges) of this set, then it can definitely learn the inside vectors contained in this POLYHEDRON CONE. This paper reports a new method and new algorithm to find the boundary vectors of a convex set of ND analog vectors.

  7. Neural and morphological adaptations of vastus lateralis and vastus medialis muscles to isokinetic eccentric training

    Directory of Open Access Journals (Sweden)

    Rodrigo de Azevedo Franke

    2014-09-01

    Full Text Available Vastus lateralis (VL and vastus medialis (VM are frequently targeted in conditioning/rehabilitation programs due to their role in patellar stabilization during knee extension. This study assessed neural and muscular adaptations in these two muscles after an isokinetic eccentric training program. Twenty healthy men underwent a four-week control period followed by a 12-week period of isokinetic eccentric training. Ultrasound evaluations of VL and VM muscle thickness at rest and electromyographic evaluations during maximal isometric tests were used to assess the morphological and neural properties, respectively. No morphological and neural changes were found throughout the control period, whereas both muscles showed significant increases in thickness (VL = 6.9%; p .05 post-training. Isokinetic eccentric training produces neural and greater morphological adaptations in VM compared to VL, which shows that synergistic muscles respond differently to an eccentric isokinetic strength training program

  8. Basketball teams as strategic networks.

    Science.gov (United States)

    Fewell, Jennifer H; Armbruster, Dieter; Ingraham, John; Petersen, Alexander; Waters, James S

    2012-01-01

    We asked how team dynamics can be captured in relation to function by considering games in the first round of the NBA 2010 play-offs as networks. Defining players as nodes and ball movements as links, we analyzed the network properties of degree centrality, clustering, entropy and flow centrality across teams and positions, to characterize the game from a network perspective and to determine whether we can assess differences in team offensive strategy by their network properties. The compiled network structure across teams reflected a fundamental attribute of basketball strategy. They primarily showed a centralized ball distribution pattern with the point guard in a leadership role. However, individual play-off teams showed variation in their relative involvement of other players/positions in ball distribution, reflected quantitatively by differences in clustering and degree centrality. We also characterized two potential alternate offensive strategies by associated variation in network structure: (1) whether teams consistently moved the ball towards their shooting specialists, measured as "uphill/downhill" flux, and (2) whether they distributed the ball in a way that reduced predictability, measured as team entropy. These network metrics quantified different aspects of team strategy, with no single metric wholly predictive of success. However, in the context of the 2010 play-offs, the values of clustering (connectedness across players) and network entropy (unpredictability of ball movement) had the most consistent association with team advancement. Our analyses demonstrate the utility of network approaches in quantifying team strategy and show that testable hypotheses can be evaluated using this approach. These analyses also highlight the richness of basketball networks as a dataset for exploring the relationships between network structure and dynamics with team organization and effectiveness.

  9. Correlations in star networks: from Bell inequalities to network inequalities

    International Nuclear Information System (INIS)

    Tavakoli, Armin; Renou, Marc Olivier; Gisin, Nicolas; Brunner, Nicolas

    2017-01-01

    The problem of characterizing classical and quantum correlations in networks is considered. Contrary to the usual Bell scenario, where distant observers share a physical system emitted by one common source, a network features several independent sources, each distributing a physical system to a subset of observers. In the quantum setting, the observers can perform joint measurements on initially independent systems, which may lead to strong correlations across the whole network. In this work, we introduce a technique to systematically map a Bell inequality to a family of Bell-type inequalities bounding classical correlations on networks in a star-configuration. Also, we show that whenever a given Bell inequality can be violated by some entangled state ρ , then all the corresponding network inequalities can be violated by considering many copies of ρ distributed in the star network. The relevance of these ideas is illustrated by applying our method to a specific multi-setting Bell inequality. We derive the corresponding network inequalities, and study their quantum violations. (paper)

  10. Single-shot secure quantum network coding on butterfly network with free public communication

    Science.gov (United States)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  11. An Inter-Networking Mechanism with Stepwise Synchronization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Masayuki Murata

    2011-08-01

    Full Text Available To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other.

  12. Using a TV Game Show to Explain the Concept of a Dominant Strategy.

    Science.gov (United States)

    Trandel, Gregory A.

    1999-01-01

    Illustrates the game-theory concept of a dominant strategy using the MTV-network game show "Singled Out." Describes how the game show works and why this makes it attractive as an example of strategic behavior. Presents examples of how the show is used in class. (DSK)

  13. Identifying the Neural Substrates of Procrastination: a Resting-State fMRI Study.

    Science.gov (United States)

    Zhang, Wenwen; Wang, Xiangpeng; Feng, Tingyong

    2016-09-12

    Procrastination is a prevalent problematic behavior that brings serious consequences to individuals who suffer from it. Although this phenomenon has received increasing attention from researchers, the underpinning neural substrates of it is poorly studied. To examine the neural bases subserving procrastination, the present study employed resting-state fMRI. The main results were as follows: (1) the behavioral procrastination was positively correlated with the regional activity of the ventromedial prefrontal cortex (vmPFC) and the parahippocampal cortex (PHC), while negatively correlated with that of the anterior prefrontal cortex (aPFC). (2) The aPFC-seed connectivity with the anterior medial prefrontal cortex and the posterior cingulate cortex was positively associated with procrastination. (3) The connectivity between vmPFC and several other regions, such as the dorsomedial prefrontal cortex, the bilateral inferior prefrontal cortex showed a negative association with procrastination. These results suggested that procrastination could be attributed to, on the one hand, hyper-activity of the default mode network (DMN) that overrides the prefrontal control signal; while on the other hand, the failure of top-down control exerted by the aPFC on the DMN. Therefore, the present study unravels the biomarkers of procrastination and provides treatment targets for procrastination prevention.

  14. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  15. Network bandwidth utilization forecast model on high bandwidth networks

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wuchert (William) [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sim, Alex [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-03-30

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2%. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  16. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  17. Communication in Animal Social Networks

    NARCIS (Netherlands)

    Snijders, Lysanne; Naguib, Marc

    2017-01-01

    Animal social networks and animal communication networks are key disciplines for understanding animal social behavior, yet these disciplines remain poorly integrated. In this review, we show how communication and social networks are inherently linked, with social signals reflecting and affecting

  18. Collaborative multi-layer network coding for cellular cognitive radio networks

    KAUST Repository

    Sorour, Sameh

    2013-06-01

    In this paper, we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in underlay cellular cognitive radio networks. This scheme allows the collocated primary and cognitive radio base-stations to collaborate with each other, in order to minimize their own and each other\\'s packet recovery overheads, and thus improve their throughput, without any coordination between them. This non-coordinated collaboration is done using a novel multi-layer instantly decodable network coding scheme, which guarantees that each network\\'s help to the other network does not result in any degradation in its own performance. It also does not cause any violation to the primary networks interference thresholds in the same and adjacent cells. Yet, our proposed scheme both guarantees the reduction of the recovery overhead in collocated primary and cognitive radio networks, and allows early recovery of their packets compared to non-collaborative schemes. Simulation results show that a recovery overhead reduction of 15% and 40% can be achieved by our proposed scheme in the primary and cognitive radio networks, respectively, compared to the corresponding non-collaborative scheme. © 2013 IEEE.

  19. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  20. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  1. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  2. Implementability of two-qubit unitary operations over the butterfly network and the ladder network with free classical communication

    Energy Technology Data Exchange (ETDEWEB)

    Akibue, Seiseki [Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo (Japan); Murao, Mio [Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo, Japan and NanoQuine, The University of Tokyo, Tokyo (Japan)

    2014-12-04

    We investigate distributed implementation of two-qubit unitary operations over two primitive networks, the butterfly network and the ladder network, as a first step to apply network coding for quantum computation. By classifying two-qubit unitary operations in terms of the Kraus-Cirac number, the number of non-zero parameters describing the global part of two-qubit unitary operations, we analyze which class of two-qubit unitary operations is implementable over these networks with free classical communication. For the butterfly network, we show that two classes of two-qubit unitary operations, which contain all Clifford, controlled-unitary and matchgate operations, are implementable over the network. For the ladder network, we show that two-qubit unitary operations are implementable over the network if and only if their Kraus-Cirac number do not exceed the number of the bridges of the ladder.

  3. Implementability of two-qubit unitary operations over the butterfly network and the ladder network with free classical communication

    International Nuclear Information System (INIS)

    Akibue, Seiseki; Murao, Mio

    2014-01-01

    We investigate distributed implementation of two-qubit unitary operations over two primitive networks, the butterfly network and the ladder network, as a first step to apply network coding for quantum computation. By classifying two-qubit unitary operations in terms of the Kraus-Cirac number, the number of non-zero parameters describing the global part of two-qubit unitary operations, we analyze which class of two-qubit unitary operations is implementable over these networks with free classical communication. For the butterfly network, we show that two classes of two-qubit unitary operations, which contain all Clifford, controlled-unitary and matchgate operations, are implementable over the network. For the ladder network, we show that two-qubit unitary operations are implementable over the network if and only if their Kraus-Cirac number do not exceed the number of the bridges of the ladder

  4. Properties of four real world collaboration--competition networks

    Science.gov (United States)

    Fu, Chun-Hua; Xu, Xiu-Lian; He, Da-Ren

    2009-03-01

    Our research group has empirically investigated 9 real world collaboration networks and 25 real world cooperation-competition networks. Among the 34 real world systems, all the 9 real world collaboration networks and 6 real world cooperation-competition networks show the unimodal act-size distribution and the shifted power law distribution of degree and act-degree. We have proposed a collaboration network evolution model for an explanation of the rules [1]. The other 14 real world cooperation-competition networks show that the act-size distributions are not unimodal; instead, they take qualitatively the same shifted power law forms as the degree and act-degree distributions. The properties of four systems (the main land movie film network, Beijing restaurant network, 2004 Olympic network, and Tao-Bao notebook computer sale network) are reported in detail as examples. Via a numerical simulation, we show that the new rule can still be explained by the above-mentioned model. [1] H. Chang, B. B. Su, et al. Phsica A, 2007, 383: 687-702.

  5. Pinning Control Strategy of Multicommunity Structure Networks

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available In order to investigate the effects of community structure on synchronization, a pinning control strategy is researched in a class of complex networks with community structure in this paper. A feedback control law is designed based on the network community structure information. The stability condition is given and proved by using Lyapunov stability theory. Our research shows that as to community structure networks, there being a threshold hT≈5, when coupling strength bellows this threshold, the stronger coupling strength corresponds to higher synchronizability; vice versa, the stronger coupling strength brings lower synchronizability. In addition the synchronizability of overlapping and nonoverlapping community structure networks was simulated and analyzed; while the nodes were controlled randomly and intensively, the results show that intensive control strategy is better than the random one. The network will reach synchronization easily when the node with largest betweenness was controlled. Furthermore, four difference networks’ synchronizability, such as Barabási-Albert network, Watts-Strogatz network, Erdös-Rényi network, and community structure network, are simulated; the research shows that the community structure network is more easily synchronized under the same control strength.

  6. Common Sense in Choice: The Effect of Sensory Modality on Neural Value Representations

    Science.gov (United States)

    2018-01-01

    Abstract Although it is well established that the ventromedial prefrontal cortex (vmPFC) represents value using a common currency across categories of rewards, it is unknown whether the vmPFC represents value irrespective of the sensory modality in which alternatives are presented. In the current study, male and female human subjects completed a decision-making task while their neural activity was recorded using functional magnetic resonance imaging. On each trial, subjects chose between a safe alternative and a lottery, which was presented visually or aurally. A univariate conjunction analysis revealed that the anterior portion of the vmPFC tracks subjective value (SV) irrespective of the sensory modality. Using a novel cross-modality multivariate classifier, we were able to decode auditory value based on visual trials and vice versa. In addition, we found that the visual and auditory sensory cortices, which were identified using functional localizers, are also sensitive to the value of stimuli, albeit in a modality-specific manner. Whereas both primary and higher-order auditory cortices represented auditory SV (aSV), only a higher-order visual area represented visual SV (vSV). These findings expand our understanding of the common currency network of the brain and shed a new light on the interplay between sensory and value information processing. PMID:29619408

  7. Offloading Method for Efficient Use of Local Computational Resources in Mobile Location-Based Services Using Clouds

    Directory of Open Access Journals (Sweden)

    Yunsik Son

    2017-01-01

    Full Text Available With the development of mobile computing, location-based services (LBSs have been developed to provide services based on location information through communication networks or the global positioning system. In recent years, LBSs have evolved into smart LBSs, which provide many services using only location information. These include basic services such as traffic, logistic, and entertainment services. However, a smart LBS may require relatively complicated operations, which may not be effectively performed by the mobile computing system. To overcome this problem, a computation offloading technique can be used to perform certain tasks on mobile devices in cloud and fog environments. Furthermore, mobile platforms exist that provide smart LBSs. The smart cross-platform is a solution based on a virtual machine (VM that enables compatibility of content in various mobile and smart device environments. However, owing to the nature of the VM-based execution method, the execution performance is degraded compared to that of the native execution method. In this paper, we introduce a computation offloading technique that utilizes fog computing to improve the performance of VMs running on mobile devices. We applied the proposed method to smart devices with a smart VM (SVM and HTML5 SVM to compare their performances.

  8. Common Sense in Choice: The Effect of Sensory Modality on Neural Value Representations.

    Science.gov (United States)

    Shuster, Anastasia; Levy, Dino J

    2018-01-01

    Although it is well established that the ventromedial prefrontal cortex (vmPFC) represents value using a common currency across categories of rewards, it is unknown whether the vmPFC represents value irrespective of the sensory modality in which alternatives are presented. In the current study, male and female human subjects completed a decision-making task while their neural activity was recorded using functional magnetic resonance imaging. On each trial, subjects chose between a safe alternative and a lottery, which was presented visually or aurally. A univariate conjunction analysis revealed that the anterior portion of the vmPFC tracks subjective value (SV) irrespective of the sensory modality. Using a novel cross-modality multivariate classifier, we were able to decode auditory value based on visual trials and vice versa. In addition, we found that the visual and auditory sensory cortices, which were identified using functional localizers, are also sensitive to the value of stimuli, albeit in a modality-specific manner. Whereas both primary and higher-order auditory cortices represented auditory SV (aSV), only a higher-order visual area represented visual SV (vSV). These findings expand our understanding of the common currency network of the brain and shed a new light on the interplay between sensory and value information processing.

  9. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...... from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight...

  10. Optical packet switched networks

    DEFF Research Database (Denmark)

    Hansen, Peter Bukhave

    1999-01-01

    Optical packet switched networks are investigated with emphasis on the performance of the packet switch blocks. Initially, the network context of the optical packet switched network is described showing that a packet network will provide transparency, flexibility and bridge the granularity gap...... in interferometric wavelength converters is investigated showing that a 10 Gbit/s 19 4x4 swich blocks can be cascaded at a BER of 10-14. An analytical traffic model enables the calculation of the traffice performance of a WDM packet network. Hereby the importance of WDM and wavelegth conversion in the switch blocks...... is established as a flexible means to reduce the optical buffer, e.g., the number of fibre delay lines for a 16x16 switch block is reduced from 23 to 6 by going from 2 to 8 wavelength channels pr. inlet. Additionally, a component count analysis is carried out to illustrate the trade-offs in the switch block...

  11. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2015-05-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other\\'s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network\\'s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network\\'s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. © 2015 IEEE.

  12. Basketball Teams as Strategic Networks

    Science.gov (United States)

    Fewell, Jennifer H.; Armbruster, Dieter; Ingraham, John; Petersen, Alexander; Waters, James S.

    2012-01-01

    We asked how team dynamics can be captured in relation to function by considering games in the first round of the NBA 2010 play-offs as networks. Defining players as nodes and ball movements as links, we analyzed the network properties of degree centrality, clustering, entropy and flow centrality across teams and positions, to characterize the game from a network perspective and to determine whether we can assess differences in team offensive strategy by their network properties. The compiled network structure across teams reflected a fundamental attribute of basketball strategy. They primarily showed a centralized ball distribution pattern with the point guard in a leadership role. However, individual play-off teams showed variation in their relative involvement of other players/positions in ball distribution, reflected quantitatively by differences in clustering and degree centrality. We also characterized two potential alternate offensive strategies by associated variation in network structure: (1) whether teams consistently moved the ball towards their shooting specialists, measured as “uphill/downhill” flux, and (2) whether they distributed the ball in a way that reduced predictability, measured as team entropy. These network metrics quantified different aspects of team strategy, with no single metric wholly predictive of success. However, in the context of the 2010 play-offs, the values of clustering (connectedness across players) and network entropy (unpredictability of ball movement) had the most consistent association with team advancement. Our analyses demonstrate the utility of network approaches in quantifying team strategy and show that testable hypotheses can be evaluated using this approach. These analyses also highlight the richness of basketball networks as a dataset for exploring the relationships between network structure and dynamics with team organization and effectiveness. PMID:23139744

  13. Basketball teams as strategic networks.

    Directory of Open Access Journals (Sweden)

    Jennifer H Fewell

    Full Text Available We asked how team dynamics can be captured in relation to function by considering games in the first round of the NBA 2010 play-offs as networks. Defining players as nodes and ball movements as links, we analyzed the network properties of degree centrality, clustering, entropy and flow centrality across teams and positions, to characterize the game from a network perspective and to determine whether we can assess differences in team offensive strategy by their network properties. The compiled network structure across teams reflected a fundamental attribute of basketball strategy. They primarily showed a centralized ball distribution pattern with the point guard in a leadership role. However, individual play-off teams showed variation in their relative involvement of other players/positions in ball distribution, reflected quantitatively by differences in clustering and degree centrality. We also characterized two potential alternate offensive strategies by associated variation in network structure: (1 whether teams consistently moved the ball towards their shooting specialists, measured as "uphill/downhill" flux, and (2 whether they distributed the ball in a way that reduced predictability, measured as team entropy. These network metrics quantified different aspects of team strategy, with no single metric wholly predictive of success. However, in the context of the 2010 play-offs, the values of clustering (connectedness across players and network entropy (unpredictability of ball movement had the most consistent association with team advancement. Our analyses demonstrate the utility of network approaches in quantifying team strategy and show that testable hypotheses can be evaluated using this approach. These analyses also highlight the richness of basketball networks as a dataset for exploring the relationships between network structure and dynamics with team organization and effectiveness.

  14. From Networks to Time Series

    Science.gov (United States)

    Shimada, Yutaka; Ikeguchi, Tohru; Shigehara, Takaomi

    2012-10-01

    In this Letter, we propose a framework to transform a complex network to a time series. The transformation from complex networks to time series is realized by the classical multidimensional scaling. Applying the transformation method to a model proposed by Watts and Strogatz [Nature (London) 393, 440 (1998)], we show that ring lattices are transformed to periodic time series, small-world networks to noisy periodic time series, and random networks to random time series. We also show that these relationships are analytically held by using the circulant-matrix theory and the perturbation theory of linear operators. The results are generalized to several high-dimensional lattices.

  15. Distance metric learning for complex networks: Towards size-independent comparison of network structures

    Science.gov (United States)

    Aliakbary, Sadegh; Motallebi, Sadegh; Rashidian, Sina; Habibi, Jafar; Movaghar, Ali

    2015-02-01

    Real networks show nontrivial topological properties such as community structure and long-tail degree distribution. Moreover, many network analysis applications are based on topological comparison of complex networks. Classification and clustering of networks, model selection, and anomaly detection are just some applications of network comparison. In these applications, an effective similarity metric is needed which, given two complex networks of possibly different sizes, evaluates the amount of similarity between the structural features of the two networks. Traditional graph comparison approaches, such as isomorphism-based methods, are not only too time consuming but also inappropriate to compare networks with different sizes. In this paper, we propose an intelligent method based on the genetic algorithms for integrating, selecting, and weighting the network features in order to develop an effective similarity measure for complex networks. The proposed similarity metric outperforms state of the art methods with respect to different evaluation criteria.

  16. Effect of doxorubicin and daunorubicin on the activity of acetylcholinesterase in acute lymphoblastic leukamia

    International Nuclear Information System (INIS)

    Din, I.U.; Ali, A.

    2011-01-01

    Background: Our study was based on the alteration in the Michaelis Mentin parameters Apparent Michaelis Constant (aKm) and Apparent Maximum Velocity (aVm), which reflects activity of actyl cholinesterase (AChE). This activity decreases in Acute Lymphoblastic Leukaemia (ALL). This decrease in aKm and aVm values shows bad prognosis. Similarly the anticancer drugs like Daunorubicin and Doxorubicin further decreases the aKm and aVm values which worsen the prognosis. The objective of this study was to determine and compare the extent of inhibition of Acetylcholine Esterase by Daunorubicin and Doxorubicin in ALL. Methods: Study of 100 patients including both male and female children who's age ranged from 4 to 8 years and were advised doxorubicin and daunorubicin separately were tested by Ellman's method using acetylcholine iodide as substrate and 5,5-dithiobis 2-nitrobenzine as a colour reagent regardless of dose regimen i.e. (once in 3 week, small dose per week or a continuous infusion for 72 to 96 hours. Results: In this study the Michaelis Mentin parameters Apparent Michaelis Constant (aKm) and Apparent Maximum Velocity (aVm) of the enzyme were estimated both in normal individuals and in the patients and also during treatment with daunorubicin and doxorubicin. The value of Michaelis Mentin parameters, aKm, aVm and percentage activity of the enzyme in normal individual are 23, 70, and 100 respectively. The values of aKm, aVm and percentage activity of the enzyme were also estimated in the patients before and after treatment. The values of aKm and aVm in patients of acute lymphoblastic leukaemia and percentage activity of enzyme is decreased. After the treatment with daunorubicin and doxorubicin the values and activity is further decreased. Conclusion: We conclude that the drugs under study both decrease the enzyme activity but daunorubicin inhibits the enzyme more than doxorubicin. (author)

  17. The incidence of hoarseness after mediastinoscopy and outcome of video-assisted versus conventional mediastinoscopy in lung cancer staging.

    Science.gov (United States)

    Sayar, Adnan; Çitak, Necati; Büyükkale, Songül; Metin, Muzaffer; Kök, Abdulaziz; Çelikten, Alper; Gürses, Atilla

    2016-02-01

    Objectives Theoretically, video-assisted mediastinoscopy (VM) should provide a decrease in the incidence of hoarseness in comparison with conventional mediastinoscopy (CM). Methods An investigation of 448 patients with the NSCLC who underwent mediastinoscopy (n = 261 VM, n = 187 CM) between 2006 and 2010. Results With VM, the mean number of sampled LNs and of stations per case were both significantly higher (n = 7.91 ± 1.97 and n = 4.29 ± 0.81) than they were for CM (n = 6.65 ± 1.79 and n = 4.14 ± 0.84) (p < 0.001 and p = 0.06). Hoarseness was reported in 24 patients (5.4%) with VM procedures resulting in a higher incidence of hoarseness than did CM procedures (6.9% and 3.2%) (p = 0.08). The incidence of hoarseness was observed to be more frequent in patients with left-lung carcinoma who had undergone a mediastinoscopy (p = 0.03). Hoarseness developed in 6% of the patients sampled at station 4L, whereas this ratio was 0% in patients who were not sampled at 4L (p = 0.07). A multivariate analysis showed that the presence of a tumor in the left lung is the only independent risk factor indicating hoarseness (p = 0.09). The sensitivity, NPV, and accuracy of VM were calculated as to be 0.87, 0.95, and 0.96, respectively. The same staging values for CM were 0.83, 0.94, and 0.95, respectively. Conclusion VM, the presence of a tumor in the left-lung, and 4L sampling via mediastinoscopy are risk factors for subsequent hoarseness. Probably due to a wider area of dissection, VM can lead to more frequent hoarseness.

  18. Robustness of airline route networks

    Science.gov (United States)

    Lordan, Oriol; Sallan, Jose M.; Escorihuela, Nuria; Gonzalez-Prieto, David

    2016-03-01

    Airlines shape their route network by defining their routes through supply and demand considerations, paying little attention to network performance indicators, such as network robustness. However, the collapse of an airline network can produce high financial costs for the airline and all its geographical area of influence. The aim of this study is to analyze the topology and robustness of the network route of airlines following Low Cost Carriers (LCCs) and Full Service Carriers (FSCs) business models. Results show that FSC hubs are more central than LCC bases in their route network. As a result, LCC route networks are more robust than FSC networks.

  19. Ecological network analysis for a virtual water network.

    Science.gov (United States)

    Fang, Delin; Chen, Bin

    2015-06-02

    The notions of virtual water flows provide important indicators to manifest the water consumption and allocation between different sectors via product transactions. However, the configuration of virtual water network (VWN) still needs further investigation to identify the water interdependency among different sectors as well as the network efficiency and stability in a socio-economic system. Ecological network analysis is chosen as a useful tool to examine the structure and function of VWN and the interactions among its sectors. A balance analysis of efficiency and redundancy is also conducted to describe the robustness (RVWN) of VWN. Then, network control analysis and network utility analysis are performed to investigate the dominant sectors and pathways for virtual water circulation and the mutual relationships between pairwise sectors. A case study of the Heihe River Basin in China shows that the balance between efficiency and redundancy is situated on the left side of the robustness curve with less efficiency and higher redundancy. The forestation, herding and fishing sectors and industrial sectors are found to be the main controllers. The network tends to be more mutualistic and synergic, though some competitive relationships that weaken the virtual water circulation still exist.

  20. An Improved Car-Following Model in Vehicle Networking Based on Network Control

    Directory of Open Access Journals (Sweden)

    D. Y. Kong

    2014-01-01

    Full Text Available Vehicle networking is a system to realize information interoperability between vehicles and people, vehicles and roads, vehicles and vehicles, and cars and transport facilities, through the network information exchange, in order to achieve the effective monitoring of the vehicle and traffic flow. Realizing information interoperability between vehicles and vehicles, which can affect the traffic flow, is an important application of network control system (NCS. In this paper, a car-following model using vehicle networking theory is established, based on network control principle. The car-following model, which is an improvement of the traditional traffic model, describes the traffic in vehicle networking condition. The impact that vehicle networking has on the traffic flow is quantitatively assessed in a particular scene of one-way, no lane changing highway. The examples show that the capacity of the road is effectively enhanced by using vehicle networking.

  1. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  2. Prophylactic treatment of vestibular migraine

    Directory of Open Access Journals (Sweden)

    Márcio Cavalcante Salmito

    Full Text Available Abstract Introduction: Vestibular migraine (VM is now accepted as a common cause of episodic vertigo. Treatment of VM involves two situations: the vestibular symptom attacks and the period between attacks. For the latter, some prophylaxis methods can be used. The current recommendation is to use the same prophylactic drugs used for migraines, including β-blockers, antidepressants and anticonvulsants. The recent diagnostic definition of vestibular migraine makes the number of studies on its treatment scarce. Objective: To evaluate the efficacy of prophylactic treatment used in patients from a VM outpatient clinic. Methods: Review of medical records from patients with VM according to the criteria of the Bárány Society/International Headache Society of 2012 criteria. The drugs used in the treatment and treatment response obtained through the visual analog scale (VAS for dizziness and headache were assessed. The pre and post-treatment VAS scores were compared (the improvement was evaluated together and individually, per drug used. Associations with clinical subgroups of patients were also assessed. Results: Of the 88 assessed records, 47 were eligible. We included patients that met the diagnostic criteria for VM and excluded those whose medical records were illegible and those of patients with other disorders causing dizziness and/or headache that did not meet the 2012 criteria for VM. 80.9% of the patients showed improvement with prophylaxis (p < 0.001. Amitriptyline, Flunarizine, Propranolol and Topiramate improved vestibular symptoms (p < 0.001 and headache (p < 0.015. The four drugs were effective in a statistically significant manner. There was a positive statistical association between the time of vestibular symptoms and clinical improvement. There was no additional benefit in hypertensive patients who used antihypertensive drugs as prophylaxis or depressed patients who used antidepressants in relation to other prophylactic drugs. Drug

  3. Hardware Assisted Stealthy Diversity (CHECKMATE)

    Science.gov (United States)

    2013-09-01

    applicable across multiple architectures. Figure 29 shows an example an attack against an interpreted environment with a Java executable. CHECKMATE can...Architectures ARM PPCx86 Java VM Java VMJava VM Java Executable Attack APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 33 a user executes “/usr/bin/wget...Server 1 - Administration Server 2 – Database ( mySQL ) Server 3 – Web server (Mongoose) Server 4 – File server (SSH) Server 5 – Email server

  4. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  5. LOGISTIC NETWORK REGRESSION FOR SCALABLE ANALYSIS OF NETWORKS WITH JOINT EDGE/VERTEX DYNAMICS.

    Science.gov (United States)

    Almquist, Zack W; Butts, Carter T

    2014-08-01

    Change in group size and composition has long been an important area of research in the social sciences. Similarly, interest in interaction dynamics has a long history in sociology and social psychology. However, the effects of endogenous group change on interaction dynamics are a surprisingly understudied area. One way to explore these relationships is through social network models. Network dynamics may be viewed as a process of change in the edge structure of a network, in the vertex set on which edges are defined, or in both simultaneously. Although early studies of such processes were primarily descriptive, recent work on this topic has increasingly turned to formal statistical models. Although showing great promise, many of these modern dynamic models are computationally intensive and scale very poorly in the size of the network under study and/or the number of time points considered. Likewise, currently used models focus on edge dynamics, with little support for endogenously changing vertex sets. Here, the authors show how an existing approach based on logistic network regression can be extended to serve as a highly scalable framework for modeling large networks with dynamic vertex sets. The authors place this approach within a general dynamic exponential family (exponential-family random graph modeling) context, clarifying the assumptions underlying the framework (and providing a clear path for extensions), and they show how model assessment methods for cross-sectional networks can be extended to the dynamic case. Finally, the authors illustrate this approach on a classic data set involving interactions among windsurfers on a California beach.

  6. Chimeras in a network of three oscillator populations with varying network topology

    DEFF Research Database (Denmark)

    Martens, Erik Andreas

    2010-01-01

    this system as a model system, we discuss for the first time the influence of network topology on the existence of so-called chimera states. In this context, the network with three populations represents an interesting case because the populations may either be connected as a triangle, or as a chain, thereby......-like. By showing that chimera states only exist for a bounded set of parameter values, we demonstrate that their existence depends strongly on the underlying network structures, and conclude that chimeras exist on networks with a chain-like character....

  7. Individual Search and Social Networks

    OpenAIRE

    Sanjeev Goyal; Stephanie Rosenkranz; Utz Weitzel; Vincent Buskens

    2014-01-01

    The explosion in online social networks motivates an enquiry into their structure and their welfare effects. A central feature of these networks is information sharing: online social networks lower the cost of getting information from others. These lower costs affect the attractiveness of individual search vis-a-vis a reliance on social networks. The paper reports the findings of an experiment on these effects. Our experiment shows that online networks can have large effects. Information acqu...

  8. Entropy of dynamical social networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Marton; Bianconi, Ginestra

    2012-02-01

    Dynamical social networks are evolving rapidly and are highly adaptive. Characterizing the information encoded in social networks is essential to gain insight into the structure, evolution, adaptability and dynamics. Recently entropy measures have been used to quantify the information in email correspondence, static networks and mobility patterns. Nevertheless, we still lack methods to quantify the information encoded in time-varying dynamical social networks. In this talk we present a model to quantify the entropy of dynamical social networks and use this model to analyze the data of phone-call communication. We show evidence that the entropy of the phone-call interaction network changes according to circadian rhythms. Moreover we show that social networks are extremely adaptive and are modified by the use of technologies such as mobile phone communication. Indeed the statistics of duration of phone-call is described by a Weibull distribution and is significantly different from the distribution of duration of face-to-face interactions in a conference. Finally we investigate how much the entropy of dynamical social networks changes in realistic models of phone-call or face-to face interactions characterizing in this way different type human social behavior.

  9. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  10. Analyzing complex networks through correlations in centrality measurements

    International Nuclear Information System (INIS)

    Ricardo Furlan Ronqui, José; Travieso, Gonzalo

    2015-01-01

    Many real world systems can be expressed as complex networks of interconnected nodes. It is frequently important to be able to quantify the relative importance of the various nodes in the network, a task accomplished by defining some centrality measures, with different centrality definitions stressing different aspects of the network. It is interesting to know to what extent these different centrality definitions are related for different networks. In this work, we study the correlation between pairs of a set of centrality measures for different real world networks and two network models. We show that the centralities are in general correlated, but with stronger correlations for network models than for real networks. We also show that the strength of the correlation of each pair of centralities varies from network to network. Taking this fact into account, we propose the use of a centrality correlation profile, consisting of the values of the correlation coefficients between all pairs of centralities of interest, as a way to characterize networks. Using the yeast protein interaction network as an example we show also that the centrality correlation profile can be used to assess the adequacy of a network model as a representation of a given real network. (paper)

  11. NASA GIBS Use in Live Planetarium Shows

    Science.gov (United States)

    Emmart, C. B.

    2015-12-01

    The American Museum of Natural History's Hayden Planetarium was rebuilt in year 2000 as an immersive theater for scientific data visualization to show the universe in context to our planet. Specific astrophysical movie productions provide the main daily programming, but interactive control software, developed at AMNH allows immersive presentation within a data aggregation of astronomical catalogs called the Digital Universe 3D Atlas. Since 2006, WMS globe browsing capabilities have been built into a software development collaboration with Sweden's Linkoping University (LiU). The resulting Uniview software, now a product of the company SCISS, is operated by about fifty planetariums around that world with ability to network amongst the sites for global presentations. Public presentation of NASA GIBS has allowed authoritative narratives to be presented within the range of data available in context to other sources such as Science on a Sphere, NASA Earth Observatory and Google Earth KML resources. Specifically, the NOAA supported World Views Network conducted a series of presentations across the US that focused on local ecological issues that could then be expanded in the course of presentation to national and global scales of examination. NASA support of for GIBS resources in an easy access multi scale streaming format like WMS has tremendously enabled particularly facile presentations of global monitoring like never before. Global networking of theaters for distributed presentations broadens out the potential for impact of this medium. Archiving and refinement of these presentations has already begun to inform new types of documentary productions that examine pertinent, global interdependency topics.

  12. Vestibulær migræne

    DEFF Research Database (Denmark)

    Hansen, Lars Juul; Kirchmann, Malene; Friis, Morten

    2015-01-01

    Dizziness caused by migraine, vestibular migraine (VM), has been highly debated over the last three decades. The co-morbidity of migraine and dizziness is higher than a random concurrence. One third of the patients with migraine and dizziness have VM. Recently, The International Headache Society ...... approved VM as a diagnostic entity and the diagnostic criteria for VM appear in the appendix for The International Classification of Headache Disorders. VM is common but often underdiagnosed. Treatment follows migraine management guidelines although evidence is sparse.......Dizziness caused by migraine, vestibular migraine (VM), has been highly debated over the last three decades. The co-morbidity of migraine and dizziness is higher than a random concurrence. One third of the patients with migraine and dizziness have VM. Recently, The International Headache Society...

  13. Network public goods with asymmetric information about cooperation preferences and network degree

    NARCIS (Netherlands)

    Dijkstra, Jacob; van Assen, Marcus

    2013-01-01

    We propose a game theoretical model of one-shot network public goods formalizing the 'closure argument' that cooperation is more frequent in denser groups or networks. Equilibrium analyses show that (i) an 'inefficiency problem' exists: players all preferring mutual cooperation need not all

  14. Exploring biological network structure with clustered random networks

    Directory of Open Access Journals (Sweden)

    Bansal Shweta

    2009-12-01

    Full Text Available Abstract Background Complex biological systems are often modeled as networks of interacting units. Networks of biochemical interactions among proteins, epidemiological contacts among hosts, and trophic interactions in ecosystems, to name a few, have provided useful insights into the dynamical processes that shape and traverse these systems. The degrees of nodes (numbers of interactions and the extent of clustering (the tendency for a set of three nodes to be interconnected are two of many well-studied network properties that can fundamentally shape a system. Disentangling the interdependent effects of the various network properties, however, can be difficult. Simple network models can help us quantify the structure of empirical networked systems and understand the impact of various topological properties on dynamics. Results Here we develop and implement a new Markov chain simulation algorithm to generate simple, connected random graphs that have a specified degree sequence and level of clustering, but are random in all other respects. The implementation of the algorithm (ClustRNet: Clustered Random Networks provides the generation of random graphs optimized according to a local or global, and relative or absolute measure of clustering. We compare our algorithm to other similar methods and show that ours more successfully produces desired network characteristics. Finding appropriate null models is crucial in bioinformatics research, and is often difficult, particularly for biological networks. As we demonstrate, the networks generated by ClustRNet can serve as random controls when investigating the impacts of complex network features beyond the byproduct of degree and clustering in empirical networks. Conclusion ClustRNet generates ensembles of graphs of specified edge structure and clustering. These graphs allow for systematic study of the impacts of connectivity and redundancies on network function and dynamics. This process is a key step in

  15. Power laws and fragility in flow networks.

    Science.gov (United States)

    Shore, Jesse; Chu, Catherine J; Bianchi, Matt T

    2013-01-01

    What makes economic and ecological networks so unlike other highly skewed networks in their tendency toward turbulence and collapse? Here, we explore the consequences of a defining feature of these networks: their nodes are tied together by flow. We show that flow networks tend to the power law degree distribution (PLDD) due to a self-reinforcing process involving position within the global network structure, and thus present the first random graph model for PLDDs that does not depend on a rich-get-richer function of nodal degree. We also show that in contrast to non-flow networks, PLDD flow networks are dramatically more vulnerable to catastrophic failure than non-PLDD flow networks, a finding with potential explanatory power in our age of resource- and financial-interdependence and turbulence.

  16. Networks as Drivers for Innovation – Experiences from Food Networks in Canada and New Zealand

    Directory of Open Access Journals (Sweden)

    Karen Hamann

    2013-02-01

    Full Text Available A common feature among networks is the focus on innovation but the approach to driving innovation and to supporting companies’ innovation work differs widely between networks. Some networks strive to be THE forum of an industry, andthese networks generally focus on promoting innovations that are market‐ready. Networks with a defined objective of promoting research‐driven innovation must have different network organisations from the forum‐oriented networks. Research shows that networks promoting research‐driven innovation also lead to patent applications and should have activities towards commercialisation support. This paper compares four networks from Canada and New Zealand in order to identify examples of how networks with different structures and objectives can support innovation in agri‐food companies. The paper is an empirical contribution to the research area of networks and innovation.

  17. The structural and functional brain networks that support human social networks.

    Science.gov (United States)

    Noonan, M P; Mars, R B; Sallet, J; Dunbar, R I M; Fellows, L K

    2018-02-20

    Social skills rely on a specific set of cognitive processes, raising the possibility that individual differences in social networks are related to differences in specific brain structural and functional networks. Here, we tested this hypothesis with multimodality neuroimaging. With diffusion MRI (DMRI), we showed that differences in structural integrity of particular white matter (WM) tracts, including cingulum bundle, extreme capsule and arcuate fasciculus were associated with an individual's social network size (SNS). A voxel-based morphology analysis demonstrated correlations between gray matter (GM) volume and SNS in limbic and temporal lobe regions. These structural changes co-occured with functional network differences. As a function of SNS, dorsomedial and dorsolateral prefrontal cortex showed altered resting-state functional connectivity with the default mode network (DMN). Finally, we integrated these three complementary methods, interrogating the relationship between social GM clusters and specific WM and resting-state networks (RSNs). Probabilistic tractography seeded in these GM nodes utilized the SNS-related WM pathways. Further, the spatial and functional overlap between the social GM clusters and the DMN was significantly closer than other control RSNs. These integrative analyses provide convergent evidence of the role of specific circuits in SNS, likely supporting the adaptive behavior necessary for success in extensive social environments. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.

  18. Thin Watts-Strogatz networks.

    Science.gov (United States)

    de Moura, Alessandro P S

    2006-01-01

    A modified version of the Watts-Strogatz (WS) network model is proposed, in which the number of shortcuts scales with the network size N as Nalpha, with alpha infinity, whereas in the original WS model, this ratio is constant. We call such networks "thin Watts-Strogatz networks." We show that even though the fraction of shortcuts becomes vanishingly small for large networks, they still cause a kind of small-world effect, in the sense that the length L of the network increases sublinearly with the size. We develop a mean-field theory for these networks, which predicts that the length scales as N1-alpha ln N for large N. We also study how a search using only local information works in thin WS networks. We find that the search performance is enhanced compared to the regular network, and we predict that the search time tau scales as N1-alpha/2. These theoretical results are tested using numerical simulations. We comment on the possible relevance of thin WS networks for the design of high-performance low-cost communication networks.

  19. Attachment and social networks.

    Science.gov (United States)

    Gillath, Omri; C Karantzas, Gery; Lee, Juwon

    2018-02-21

    The current review covers two lines of research linking attachment and social networks. One focuses on attachment networks (the people who fulfill one's attachment needs), examining composition and age-related differences pertaining to these networks. The other line integrates attachment with social network analysis to investigate how individual differences in adult attachment are associated with the management and characteristics (e.g., density, multiplexity, and centrality) of people's social networks. We show that most people's attachment networks are small and hierarchical, with one figure being the primary attachment figure (often a mother or romantic partner, depending on age). Furthermore, attachment style predicts network characteristics and management, such that insecurity is associated with less closeness, multiplexity, centrality, and poorer management (less maintenance, more dissolution). Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Hip abductors and thigh muscles strength ratios and their relation to electromyography amplitude during split squat and walking lunge exercises

    Directory of Open Access Journals (Sweden)

    Petr Stastny

    2015-06-01

    Full Text Available Background: The hip abductors (HAB, quadriceps (Q and hamstrings (H reciprocal strength ratios are predictors of electromyography (EMG amplitude during load carrying walking at moderate intensity. Therefore, these strength ratios might predict also the EMG during the exercises as walking lunge (WL or split squat (SSq at submaximal intensity. Objective: To determine whether the EMG amplitude of vastus mediali (VM, vastus laterali (VL, biceps femoris (BF and gluteus medius (Gmed is associated with muscle strength ratio during SSqs and WLs. To determine whether the EMG amplitude differs between individuals with HAB/H ratio above and below one and between individuals with H/Q or HAB/Q ratio above and below 0.5 during SSqs and WLs. Methods: 17 resistance-trained men (age 29.6 ± 4.6 years with at least 3 years of strength training performed in cross-sectional design 5 s maximal voluntary isometric contractions (MVIC on an isokinetic dynamometer for knee extension, knee flexion, and hip abduction. The MVIC was used to normalize the EMG signal and estimate the individual strength ratios. Than participants performed WL and SSq for a 5 repetition maximum, to find out muscle activity at submaximal intensity of exercise. Results: The H/Q ratio was associated by Kendall's tau (τ with VM (τ = .33 and BF (τ = -.71 amplitude, HAB/Q ratio was associated with BF (τ = -.43 and Gmed (τ = .38 amplitude, as well as HAB/H was associated with VM (τ = -.41 and Gmed (τ = .74 amplitude. ANOVA results showed significant differences between SSq and WL (F(4, 79 = 10, p < .001, ηp2 = .34 in Gmed amplitude, where WL resulted in higher Gmed amplitude compared to SSq. Other significant differences were found between H/Q groups (F(4, 29 = 3, p = .04, ηp2 = .28 in VM and Gmed amplitude, where group with H/Q > 0.5 showed higher VMO amplitude and lower Gmed amplitude. Furthermore, significant difference was found

  1. Complex Network Theory Applied to the Growth of Kuala Lumpur's Public Urban Rail Transit Network.

    Science.gov (United States)

    Ding, Rui; Ujang, Norsidah; Hamid, Hussain Bin; Wu, Jianjun

    2015-01-01

    Recently, the number of studies involving complex network applications in transportation has increased steadily as scholars from various fields analyze traffic networks. Nonetheless, research on rail network growth is relatively rare. This research examines the evolution of the Public Urban Rail Transit Networks of Kuala Lumpur (PURTNoKL) based on complex network theory and covers both the topological structure of the rail system and future trends in network growth. In addition, network performance when facing different attack strategies is also assessed. Three topological network characteristics are considered: connections, clustering and centrality. In PURTNoKL, we found that the total number of nodes and edges exhibit a linear relationship and that the average degree stays within the interval [2.0488, 2.6774] with heavy-tailed distributions. The evolutionary process shows that the cumulative probability distribution (CPD) of degree and the average shortest path length show good fit with exponential distribution and normal distribution, respectively. Moreover, PURTNoKL exhibits clear cluster characteristics; most of the nodes have a 2-core value, and the CPDs of the centrality's closeness and betweenness follow a normal distribution function and an exponential distribution, respectively. Finally, we discuss four different types of network growth styles and the line extension process, which reveal that the rail network's growth is likely based on the nodes with the biggest lengths of the shortest path and that network protection should emphasize those nodes with the largest degrees and the highest betweenness values. This research may enhance the networkability of the rail system and better shape the future growth of public rail networks.

  2. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  3. Patent citation network in nanotechnology (1976-2004)

    International Nuclear Information System (INIS)

    Li Xin; Chen Hsinchun; Huang Zan; Roco, Mihail C.

    2007-01-01

    The patent citation networks are described using critical node, core network, and network topological analysis. The main objective is understanding of the knowledge transfer processes between technical fields, institutions and countries. This includes identifying key influential players and subfields, the knowledge transfer patterns among them, and the overall knowledge transfer efficiency. The proposed framework is applied to the field of nanoscale science and engineering (NSE), including the citation networks of patent documents, submitting institutions, technology fields, and countries. The NSE patents were identified by keywords 'full-text' searching of patents at the United States Patent and Trademark Office (USPTO). The analysis shows that the United States is the most important citation center in NSE research. The institution citation network illustrates a more efficient knowledge transfer between institutions than a random network. The country citation network displays a knowledge transfer capability as efficient as a random network. The technology field citation network and the patent document citation network exhibit a less efficient knowledge diffusion capability than a random network. All four citation networks show a tendency to form local citation clusters

  4. Control of collective network chaos.

    Science.gov (United States)

    Wagemakers, Alexandre; Barreto, Ernest; Sanjuán, Miguel A F; So, Paul

    2014-06-01

    Under certain conditions, the collective behavior of a large globally-coupled heterogeneous network of coupled oscillators, as quantified by the macroscopic mean field or order parameter, can exhibit low-dimensional chaotic behavior. Recent advances describe how a small set of "reduced" ordinary differential equations can be derived that captures this mean field behavior. Here, we show that chaos control algorithms designed using the reduced equations can be successfully applied to imperfect realizations of the full network. To systematically study the effectiveness of this technique, we measure the quality of control as we relax conditions that are required for the strict accuracy of the reduced equations, and hence, the controller. Although the effects are network-dependent, we show that the method is effective for surprisingly small networks, for modest departures from global coupling, and even with mild inaccuracy in the estimate of network heterogeneity.

  5. Asynchronous networks: modularization of dynamics theorem

    Science.gov (United States)

    Bick, Christian; Field, Michael

    2017-02-01

    Building on the first part of this paper, we develop the theory of functional asynchronous networks. We show that a large class of functional asynchronous networks can be (uniquely) represented as feedforward networks connecting events or dynamical modules. For these networks we can give a complete description of the network function in terms of the function of the events comprising the network: the modularization of dynamics theorem. We give examples to illustrate the main results.

  6. Generalized instantly decodable network coding for relay-assisted networks

    KAUST Repository

    Elmahdy, Adel M.

    2013-09-01

    In this paper, we investigate the problem of minimizing the frame completion delay for Instantly Decodable Network Coding (IDNC) in relay-assisted wireless multicast networks. We first propose a packet recovery algorithm in the single relay topology which employs generalized IDNC instead of strict IDNC previously proposed in the literature for the same relay-assisted topology. This use of generalized IDNC is supported by showing that it is a super-set of the strict IDNC scheme, and thus can generate coding combinations that are at least as efficient as strict IDNC in reducing the average completion delay. We then extend our study to the multiple relay topology and propose a joint generalized IDNC and relay selection algorithm. This proposed algorithm benefits from the reception diversity of the multiple relays to further reduce the average completion delay in the network. Simulation results show that our proposed solutions achieve much better performance compared to previous solutions in the literature. © 2013 IEEE.

  7. Growth strategies and governance of horizontal business networks: the case of the biggest German cooperative food retail network

    Directory of Open Access Journals (Sweden)

    Douglas Wegner

    2011-08-01

    Full Text Available Several growth strategies may be adopted by cooperative retail networks, but these strategies create dilemmas about how to organize business networks with a large number of participants and the adjustments in the governance system that are necessary to facilitate growth. The article examines the relations between the growth strategies adopted by a horizontal business network and its governance system. We analyze the case of Edeka, a centennial cooperative network, leader in food retail in Germany, showing its growth strategies and implications for the network structure. The case study was based on various secondary data sources and focuses the whole network – and not the networked firms – as the unit of analysis. Results indicate that, in order to grow, the network changed its governance structure and the process of participation of members in decision making, creating a hierarchical structure with professional management. The paper contributes to the discussions on cooperative governance and demonstrates that governance systems are transient and adapt to the network strategies. From a management viewpoint, the results show the effects of the growth strategies adopted by business networks, regarding the role of network managers and entrepreneurs in network management.

  8. Protracted abstinence from distinct drugs of abuse shows regulation of a common gene network.

    Science.gov (United States)

    Le Merrer, Julie; Befort, Katia; Gardon, Olivier; Filliol, Dominique; Darcq, Emmanuel; Dembele, Doulaye; Becker, Jerome A J; Kieffer, Brigitte L

    2012-01-01

    Addiction is a chronic brain disorder. Prolonged abstinence from drugs of abuse involves dysphoria, high stress responsiveness and craving. The neurobiology of drug abstinence, however, is poorly understood. We previously identified a unique set of hundred mu-opioid receptor-dependent genes in the extended amygdala, a key site for hedonic and stress processing in the brain. Here we examined these candidate genes either immediately after chronic morphine, nicotine, Δ9-tetrahydrocannabinol or alcohol, or following 4 weeks of abstinence. Regulation patterns strongly differed among chronic groups. In contrast, gene regulations strikingly converged in the abstinent groups and revealed unforeseen common adaptations within a novel huntingtin-centered molecular network previously unreported in addiction research. This study demonstrates that, regardless the drug, a specific set of transcriptional regulations develops in the abstinent brain, which possibly contributes to the negative affect characterizing protracted abstinence. This transcriptional signature may represent a hallmark of drug abstinence and a unitary adaptive molecular mechanism in substance abuse disorders. © 2011 The Authors, Addiction Biology © 2011 Society for the Study of Addiction.

  9. Assessing the heritability of attentional networks

    Directory of Open Access Journals (Sweden)

    Fossella John A

    2001-09-01

    Full Text Available Abstract Background Current efforts to study the genetics of higher functions have been lacking appropriate phenotypes to describe cognition. One of the problems is that many cognitive concepts for which there is a single word (e.g. attention have been shown to be related to several anatomical networks. Recently we have developed an Attention Network Test (ANT that provides a separate measure for each of three anatomically defined attention networks. In this small scale study, we ran 26 pairs of MZ and DZ twins in an effort to determine if any of these networks show sufficient evidence of heritability to warrant further exploration of their genetic basis. Results The efficiency of the executive attention network, that mediates stimulus and response conflict, shows sufficient heritability to warrant further study. Alerting and overall reaction time show some evidence for heritability and in our study the orienting network shows no evidence of heritability. Conclusions These results suggest that genetic variation contributes to normal individual differences in higher order executive attention involving dopamine rich frontal areas including the anterior cingulate. At least the executive portion of the ANT may serve as a valid endophenotype for larger twin studies and subsequent molecular genetic analysis in normal subject populations.

  10. QSAR modelling using combined simple competitive learning networks and RBF neural networks.

    Science.gov (United States)

    Sheikhpour, R; Sarram, M A; Rezaeian, M; Sheikhpour, E

    2018-04-01

    The aim of this study was to propose a QSAR modelling approach based on the combination of simple competitive learning (SCL) networks with radial basis function (RBF) neural networks for predicting the biological activity of chemical compounds. The proposed QSAR method consisted of two phases. In the first phase, an SCL network was applied to determine the centres of an RBF neural network. In the second phase, the RBF neural network was used to predict the biological activity of various phenols and Rho kinase (ROCK) inhibitors. The predictive ability of the proposed QSAR models was evaluated and compared with other QSAR models using external validation. The results of this study showed that the proposed QSAR modelling approach leads to better performances than other models in predicting the biological activity of chemical compounds. This indicated the efficiency of simple competitive learning networks in determining the centres of RBF neural networks.

  11. Simulation modeling of cloud computing for smart grid using CloudSim

    Directory of Open Access Journals (Sweden)

    Sandeep Mehmi

    2017-05-01

    Full Text Available In this paper a smart grid cloud has been simulated using CloudSim. Various parameters like number of virtual machines (VM, VM Image size, VM RAM, VM bandwidth, cloudlet length, and their effect on cost and cloudlet completion time in time-shared and space-shared resource allocation policy have been studied. As the number of cloudlets increased from 68 to 178, greater number of cloudlets completed their execution with high cloudlet completion time in time-shared allocation policy as compared to space-shared allocation policy. Similar trend has been observed when VM bandwidth is increased from 1 Gbps to 10 Gbps and VM RAM is increased from 512 MB to 5120 MB. The cost of processing increased linearly with respect to increase in number of VMs, VM Image size and cloudlet length.

  12. Statistical physics of interacting neural networks

    Science.gov (United States)

    Kinzel, Wolfgang; Metzler, Richard; Kanter, Ido

    2001-12-01

    Recent results on the statistical physics of time series generation and prediction are presented. A neural network is trained on quasi-periodic and chaotic sequences and overlaps to the sequence generator as well as the prediction errors are calculated numerically. For each network there exists a sequence for which it completely fails to make predictions. Two interacting networks show a transition to perfect synchronization. A pool of interacting networks shows good coordination in the minority game-a model of competition in a closed market. Finally, as a demonstration, a perceptron predicts bit sequences produced by human beings.

  13. Local dependency in networks

    Directory of Open Access Journals (Sweden)

    Kudĕlka Miloš

    2015-06-01

    Full Text Available Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network’s nodes from the structure in local surroundings of individual nodes. For the tasks we deal with in this article, the key technical parameter is locality. Since only the surroundings of the examined nodes are used in computations, there is no need to analyze the entire network. This allows the application of our approach in the area of large-scale networks. We present several experiments using small networks as well as large-scale artificial and real world networks. The results of the experiments show high effectiveness due to the locality of our approach and also high quality node ranking comparable to PageRank.

  14. A comprehensive assessment of resting state networks: bidirectional modification of functional integrity in cerebro-cerebellar networks in dementia.

    Science.gov (United States)

    Castellazzi, Gloria; Palesi, Fulvia; Casali, Stefano; Vitali, Paolo; Sinforiani, Elena; Wheeler-Kingshott, Claudia A M; D'Angelo, Egidio

    2014-01-01

    In resting state fMRI (rs-fMRI), only functional connectivity (FC) reductions in the default mode network (DMN) are normally reported as a biomarker for Alzheimer's disease (AD). In this investigation we have developed a comprehensive strategy to characterize the FC changes occurring in multiple networks and applied it in a pilot study of subjects with AD and Mild Cognitive Impairment (MCI), compared to healthy controls (HC). Resting state networks (RSNs) were studied in 14 AD (70 ± 6 years), 12 MCI (74 ± 6 years), and 16 HC (69 ± 5 years). RSN alterations were present in almost all the 15 recognized RSNs; overall, 474 voxels presented a reduced FC in MCI and 1244 in AD while 1627 voxels showed an increased FC in MCI and 1711 in AD. The RSNs were then ranked according to the magnitude and extension of FC changes (gFC), putting in evidence 6 RSNs with prominent changes: DMN, frontal cortical network (FCN), lateral visual network (LVN), basal ganglia network (BGN), cerebellar network (CBLN), and the anterior insula network (AIN). Nodes, or hubs, showing alterations common to more than one RSN were mostly localized within the prefrontal cortex and the mesial-temporal cortex. The cerebellum showed a unique behavior where voxels of decreased gFC were only found in AD while a significant gFC increase was only found in MCI. The gFC alterations showed strong correlations (p neural reserve through plasticity, which evolve in a state of lack of connectivity between different networks with the worsening of the pathology.

  15. Residues in the extracellular loop 4 are critical for maintaining the conformational equilibrium of the gamma-aminobutyric acid transporter-1

    DEFF Research Database (Denmark)

    MacAulay, Nanna; Meinild, Anne-Kristine; Zeuthen, Thomas

    2003-01-01

    . Oocytes expressing M345H showed a decrease in apparent GABA affinity, an increase in apparent affinity for Na+, a shift in the charge/voltage (Q/Vm) relationship to more positive membrane potentials, and an increased Li+-induced leak current. Oocytes expressing T349H showed an increase in apparent GABA...... affinity, a decrease in apparent Na+ affinity, a profound shift in the Q/Vm relationship to more negative potentials, and a decreased Li+-induced leak current. The data are consistent with a shift in the conformational equilibrium of the mutant transporters, with M345H stabilized in an outward...

  16. Network interventions - How citizens’ social media networks influence their political participation

    DEFF Research Database (Denmark)

    Ohme, Jakob; de Vreese, Claes Holger; Albæk, Erik

    Social media platforms are special places of information exposure because they are structured around a user’s social network and not around content, like other news media. Studies could show that news exposure on social media can affect citizens’ political participation due to the personalized......, targeted, & inadvertent exposure. However, previous research did not strongly focus on how the characteristics of a citizens’ social media network might alter this relationship. We tests how political information exposure via three different media channels affects political participation among Danish...... citizens and examine possible moderation effects of users network size, network diversity and the newly introduced parameter of perceived network activity. To this end, a two-wave online survey (n=858) among the Danish population was conducted, applying a smartphone-based media diary study. We find strong...

  17. Software Defined Networking for Next Generation Converged Metro-Access Networks

    Science.gov (United States)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  18. Conflict and convention in dynamic networks.

    Science.gov (United States)

    Foley, Michael; Forber, Patrick; Smead, Rory; Riedl, Christoph

    2018-03-01

    An important way to resolve games of conflict (snowdrift, hawk-dove, chicken) involves adopting a convention: a correlated equilibrium that avoids any conflict between aggressive strategies. Dynamic networks allow individuals to resolve conflict via their network connections rather than changing their strategy. Exploring how behavioural strategies coevolve with social networks reveals new dynamics that can help explain the origins and robustness of conventions. Here, we model the emergence of conventions as correlated equilibria in dynamic networks. Our results show that networks have the tendency to break the symmetry between the two conventional solutions in a strongly biased way. Rather than the correlated equilibrium associated with ownership norms (play aggressive at home, not away), we usually see the opposite host-guest norm (play aggressive away, not at home) evolve on dynamic networks, a phenomenon common to human interaction. We also show that learning to avoid conflict can produce realistic network structures in a way different than preferential attachment models. © 2017 The Author(s).

  19. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  20. Enhancing Sensor Network Data Quality via Collaborated Circuit and Network Operations

    Directory of Open Access Journals (Sweden)

    Lucas Vespa

    2013-04-01

    Full Text Available In many applications, the quality of data gathered by sensor networks is directly related to the signal-to-noise ratio (SNR of the sensor data being transmitted in the networks. Different from the SNR that is often used in measuring the quality of communication links, the SNR used in this work measures how accurately the data in the network packets represent the physical parameters being sensed. Hence, the signal here refers to the physical parameters that are being monitored by sensor networks; the noise is due to environmental interference and circuit noises at sensor nodes, and packet loss during network transmission. While issues affecting SNR at sensor nodes have been intensively investigated, the impact of network packet loss on data SNR has not attracted significant attention in sensor network design. This paper investigates the impact of packet loss on sensor network data SNR and shows that data SNR is dramatically affected by network packet loss. A data quality metric, based on data SNR, is developed and a cross-layer adaptive scheme is presented to minimize data quality degradation in congested sensor networks. The proposed scheme consists of adaptive downsampling and bit truncation at sensor nodes and intelligent traffic management techniques at the network level. Simulation results are presented to demonstrate the validity and effectiveness of the proposed techniques.

  1. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  2. Cluster emergence and network evolution A longitudinal analysis of the inventor network in Sophia-Antipolis

    OpenAIRE

    Anne L. J. ter Wal

    2008-01-01

    Abstract It is increasingly acknowledged that clusters do not necessarily exhibit networks of local collective learning. This paper addresses the question under which conditions this is the case. Through a longitudinal case study of the business park Sophia-Antipolis it investigates how networks of collective learning emerged throughout the growth of the cluster. Network reconstruction with patent data shows that an innovation network emerged only in Information Technology, in whic...

  3. Is my network module preserved and reproducible?

    Directory of Open Access Journals (Sweden)

    Peter Langfelder

    2011-01-01

    Full Text Available In many applications, one is interested in determining which of the properties of a network module change across conditions. For example, to validate the existence of a module, it is desirable to show that it is reproducible (or preserved in an independent test network. Here we study several types of network preservation statistics that do not require a module assignment in the test network. We distinguish network preservation statistics by the type of the underlying network. Some preservation statistics are defined for a general network (defined by an adjacency matrix while others are only defined for a correlation network (constructed on the basis of pairwise correlations between numeric variables. Our applications show that the correlation structure facilitates the definition of particularly powerful module preservation statistics. We illustrate that evaluating module preservation is in general different from evaluating cluster preservation. We find that it is advantageous to aggregate multiple preservation statistics into summary preservation statistics. We illustrate the use of these methods in six gene co-expression network applications including 1 preservation of cholesterol biosynthesis pathway in mouse tissues, 2 comparison of human and chimpanzee brain networks, 3 preservation of selected KEGG pathways between human and chimpanzee brain networks, 4 sex differences in human cortical networks, 5 sex differences in mouse liver networks. While we find no evidence for sex specific modules in human cortical networks, we find that several human cortical modules are less preserved in chimpanzees. In particular, apoptosis genes are differentially co-expressed between humans and chimpanzees. Our simulation studies and applications show that module preservation statistics are useful for studying differences between the modular structure of networks. Data, R software and accompanying tutorials can be downloaded from the following webpage: http://www.genetics.ucla.edu/labs/horvath/CoexpressionNetwork/ModulePreservation.

  4. Interaction Networks: Generating High Level Hints Based on Network Community Clustering

    Science.gov (United States)

    Eagle, Michael; Johnson, Matthew; Barnes, Tiffany

    2012-01-01

    We introduce a novel data structure, the Interaction Network, for representing interaction-data from open problem solving environment tutors. We show how using network community detecting techniques are used to identify sub-goals in problems in a logic tutor. We then use those community structures to generate high level hints between sub-goals.…

  5. Neural activity in ventral medial prefrontal cortex is modulated more before approach than avoidance during reinforced and extinction trial blocks.

    Science.gov (United States)

    Gentry, Ronny N; Roesch, Matthew R

    2018-04-16

    Ventromedial prefrontal cortex (vmPFC) is thought to provide regulatory control over Pavlovian fear responses and has recently been implicated in appetitive approach behavior, but much less is known about its role in contexts where appetitive and aversive outcomes can be obtained and avoided, respectively. To address this issue, we recorded from single neurons in vmPFC while male rats performed our combined approach and avoidance task under reinforced and non-reinforced (extinction) conditions. Surprisingly, we found that cues predicting reward modulated cell firing in vmPFC more often and more robustly than cues preceding avoidable shock; additionally, firing of vmPFC neurons was both response (press or no-press) and outcome (reinforced or extinction) selective. These results suggest a complex role for vmPFC in regulating behavior and supports its role in appetitive contexts during both reinforced and non-reinforced conditions. SIGNIFICANCE STATEMENT Selecting context-appropriate behaviors to gain reward or avoid punishment is critical for survival. While the role of ventromedial prefrontal cortex (vmPFC) in mediating fear responses is well-established, vmPFC has also been implicated in the regulation of reward-guided approach and extinction. Many studies have used indirect methods and simple behavioral procedures to study vmPFC, which leaves the literature incomplete. We recorded vmFPC neural activity during a complex cue-driven combined approach and avoidance task and during extinction. Surprisingly, we found very little vmPFC modulation to cues predicting avoidable shock, while cues predicting reward approach robustly modulated vmPFC firing in a response- and outcome-selective manner. This suggests a more complex role for vmPFC than current theories suggest, specifically regarding context-specific behavioral optimization. Copyright © 2018 the authors.

  6. Disease spreading in real-life networks

    Science.gov (United States)

    Gallos, Lazaros; Argyrakis, Panos

    2002-08-01

    In recent years the scientific community has shown a vivid interest in the network structure and dynamics of real-life organized systems. Many such systems, covering an extremely wide range of applications, have been recently shown to exhibit scale-free character in their connectivity distribution, meaning that they obey a power law. Modeling of epidemics on lattices and small-world networks suffers from the presence of a critical infection threshold, above which the entire population is infected. For scale-free networks, the original assumption was that the formation of a giant cluster would lead to an epidemic spreading in the same way as in simpler networks. Here we show that modeling epidemics on a scale-free network can greatly improve the predictions on the rate and efficiency of spreading, as compared to lattice models and small-world networks. We also show that the dynamics of a disease are greatly influenced by the underlying population structure. The exact same model can describe a plethora of networks, such as social networks, virus spreading in the Web, rumor spreading, signal transmission etc.

  7. Cross System Extensions (CSE) experience

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1990-08-01

    Cross System Extension (CSE) provides VM/XA systems with the ability to share minidisks and spool in loosely coupled environment. CSE will also cooperate with the VM/HPO Inter System Facility (ISF) in sharing minidisks between VM/XA and VM/HPO to XA, reliability of CSE, and some operational considerations when running with it

  8. Active Versus Passive Academic Networking

    DEFF Research Database (Denmark)

    Goel, Rajeev K.; Grimpe, Christoph

    2013-01-01

    This paper examines determinants of networking by academics. Using information from a unique large survey of German researchers, the key contribution focuses on the active versus passive networking distinction. Is active networking by researchers a substitute or a complement to passive networking......? Other contributions include examining the role of geographic factors in networking and whether research bottlenecks affect a researcher's propensity to network. Are the determinants of European conference participation by German researchers different from conferences in rest of the world? Results show...... that some types of passive academic networking are complementary to active networking, while others are substitute. Further, we find differences in factors promoting participation in European conferences versus conferences in rest of the world. Finally, publishing bottlenecks as a group generally do...

  9. A Quantum Cryptography Communication Network Based on Software Defined Network

    Directory of Open Access Journals (Sweden)

    Zhang Hongliang

    2018-01-01

    Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.

  10. Functional Module Analysis for Gene Coexpression Networks with Network Integration.

    Science.gov (United States)

    Zhang, Shuqin; Zhao, Hongyu; Ng, Michael K

    2015-01-01

    Network has been a general tool for studying the complex interactions between different genes, proteins, and other small molecules. Module as a fundamental property of many biological networks has been widely studied and many computational methods have been proposed to identify the modules in an individual network. However, in many cases, a single network is insufficient for module analysis due to the noise in the data or the tuning of parameters when building the biological network. The availability of a large amount of biological networks makes network integration study possible. By integrating such networks, more informative modules for some specific disease can be derived from the networks constructed from different tissues, and consistent factors for different diseases can be inferred. In this paper, we have developed an effective method for module identification from multiple networks under different conditions. The problem is formulated as an optimization model, which combines the module identification in each individual network and alignment of the modules from different networks together. An approximation algorithm based on eigenvector computation is proposed. Our method outperforms the existing methods, especially when the underlying modules in multiple networks are different in simulation studies. We also applied our method to two groups of gene coexpression networks for humans, which include one for three different cancers, and one for three tissues from the morbidly obese patients. We identified 13 modules with three complete subgraphs, and 11 modules with two complete subgraphs, respectively. The modules were validated through Gene Ontology enrichment and KEGG pathway enrichment analysis. We also showed that the main functions of most modules for the corresponding disease have been addressed by other researchers, which may provide the theoretical basis for further studying the modules experimentally.

  11. Feasibility and Perceptions of Cell Phone-Based, Health-Related Communication With Adolescents in an Economically Depressed Area.

    Science.gov (United States)

    Sawni, Anju; Cederna-Meko, Crystal; LaChance, Jenny L; Buttigieg, Angie; Le, Quoc; Nunuk, Irene; Ang, Joyce; Burrell, Katherine M

    2017-02-01

    We examined the feasibility and perception of cell-based (texting, voicemail [VM], and email/social media), health-related communication with adolescents in Genesee County, MI, where 22% reside below the poverty level. Results of an anonymous survey found that 86% of respondents owned a cell phone, 87% had data, 96% texted, 90.5% emailed/used social media, and 68% had VM. Most adolescents were interested in cell-based communication via texting (52%), VM (37%), and email/social media (31%). Interest in types of health communication included appointment reminders (99% texting; 94% VM; 95% email/social media), shot reminders (84.5% texting; 74.5% VM; 81% email/social media), call for test results (71.5% texting; 75% VM; 65% email/social media), medication reminders (63% texting; 54% VM; 58% e-mail/social media), and health tips (36% texting; 18.5% VM; 73% email/social media). Cell-based health-related communication with adolescents is feasible even within low socioeconomic status populations, primarily via texting. Health providers should embrace cell-based patient communication.

  12. Higher resting heart rate variability predicts skill in expressing some emotions.

    Science.gov (United States)

    Tuck, Natalie L; Grant, Rosemary C I; Sollers, John J; Booth, Roger J; Consedine, Nathan S

    2016-12-01

    Vagally mediated heart rate variability (vmHRV) is a measure of cardiac vagal tone, and is widely viewed as a physiological index of the capacity to regulate emotions. However, studies have not directly tested whether vmHRV is associated with the ability to facially express emotions. In extending prior work, the current report tested links between resting vmHRV and the objectively assessed ability to facially express emotions, hypothesizing that higher vmHRV would predict greater expressive skill. Eighty healthy women completed self-reported measures, before attending a laboratory session in which vmHRV and the ability to express six emotions in the face were assessed. A repeated measures analysis of variance revealed a marginal main effect for vmHRV on skill overall; individuals with higher resting vmHRV were only better able to deliberately facially express anger and interest. Findings suggest that differences in resting vmHRV are associated with the objectively assessed ability to facially express some, but not all, emotions, with potential implications for health and well-being. © 2016 Society for Psychophysiological Research.

  13. Feedforward motor information enhances somatosensory responses and sharpens angular tuning of rat S1 barrel cortex neurons.

    Science.gov (United States)

    Khateb, Mohamed; Schiller, Jackie; Schiller, Yitzhak

    2017-01-06

    The primary vibrissae motor cortex (vM1) is responsible for generating whisking movements. In parallel, vM1 also sends information directly to the sensory barrel cortex (vS1). In this study, we investigated the effects of vM1 activation on processing of vibrissae sensory information in vS1 of the rat. To dissociate the vibrissae sensory-motor loop, we optogenetically activated vM1 and independently passively stimulated principal vibrissae. Optogenetic activation of vM1 supra-linearly amplified the response of vS1 neurons to passive vibrissa stimulation in all cortical layers measured. Maximal amplification occurred when onset of vM1 optogenetic activation preceded vibrissa stimulation by 20 ms. In addition to amplification, vM1 activation also sharpened angular tuning of vS1 neurons in all cortical layers measured. Our findings indicated that in addition to output motor signals, vM1 also sends preparatory signals to vS1 that serve to amplify and sharpen the response of neurons in the barrel cortex to incoming sensory input signals.

  14. Unraveling spurious properties of interaction networks with tailored random networks.

    Directory of Open Access Journals (Sweden)

    Stephan Bialonski

    Full Text Available We investigate interaction networks that we derive from multivariate time series with methods frequently employed in diverse scientific fields such as biology, quantitative finance, physics, earth and climate sciences, and the neurosciences. Mimicking experimental situations, we generate time series with finite length and varying frequency content but from independent stochastic processes. Using the correlation coefficient and the maximum cross-correlation, we estimate interdependencies between these time series. With clustering coefficient and average shortest path length, we observe unweighted interaction networks, derived via thresholding the values of interdependence, to possess non-trivial topologies as compared to Erdös-Rényi networks, which would indicate small-world characteristics. These topologies reflect the mostly unavoidable finiteness of the data, which limits the reliability of typically used estimators of signal interdependence. We propose random networks that are tailored to the way interaction networks are derived from empirical data. Through an exemplary investigation of multichannel electroencephalographic recordings of epileptic seizures--known for their complex spatial and temporal dynamics--we show that such random networks help to distinguish network properties of interdependence structures related to seizure dynamics from those spuriously induced by the applied methods of analysis.

  15. Complex Network Theory Applied to the Growth of Kuala Lumpur's Public Urban Rail Transit Network.

    Directory of Open Access Journals (Sweden)

    Rui Ding

    Full Text Available Recently, the number of studies involving complex network applications in transportation has increased steadily as scholars from various fields analyze traffic networks. Nonetheless, research on rail network growth is relatively rare. This research examines the evolution of the Public Urban Rail Transit Networks of Kuala Lumpur (PURTNoKL based on complex network theory and covers both the topological structure of the rail system and future trends in network growth. In addition, network performance when facing different attack strategies is also assessed. Three topological network characteristics are considered: connections, clustering and centrality. In PURTNoKL, we found that the total number of nodes and edges exhibit a linear relationship and that the average degree stays within the interval [2.0488, 2.6774] with heavy-tailed distributions. The evolutionary process shows that the cumulative probability distribution (CPD of degree and the average shortest path length show good fit with exponential distribution and normal distribution, respectively. Moreover, PURTNoKL exhibits clear cluster characteristics; most of the nodes have a 2-core value, and the CPDs of the centrality's closeness and betweenness follow a normal distribution function and an exponential distribution, respectively. Finally, we discuss four different types of network growth styles and the line extension process, which reveal that the rail network's growth is likely based on the nodes with the biggest lengths of the shortest path and that network protection should emphasize those nodes with the largest degrees and the highest betweenness values. This research may enhance the networkability of the rail system and better shape the future growth of public rail networks.

  16. A Cross-Entropy-Based Admission Control Optimization Approach for Heterogeneous Virtual Machine Placement in Public Clouds

    Directory of Open Access Journals (Sweden)

    Li Pan

    2016-03-01

    Full Text Available Virtualization technologies make it possible for cloud providers to consolidate multiple IaaS provisions into a single server in the form of virtual machines (VMs. Additionally, in order to fulfill the divergent service requirements from multiple users, a cloud provider needs to offer several types of VM instances, which are associated with varying configurations and performance, as well as different prices. In such a heterogeneous virtual machine placement process, one significant problem faced by a cloud provider is how to optimally accept and place multiple VM service requests into its cloud data centers to achieve revenue maximization. To address this issue, in this paper, we first formulate such a revenue maximization problem during VM admission control as a multiple-dimensional knapsack problem, which is known to be NP-hard to solve. Then, we propose to use a cross-entropy-based optimization approach to address this revenue maximization problem, by obtaining a near-optimal eligible set for the provider to accept into its data centers, from the waiting VM service requests in the system. Finally, through extensive experiments and measurements in a simulated environment with the settings of VM instance classes derived from real-world cloud systems, we show that our proposed cross-entropy-based admission control optimization algorithm is efficient and effective in maximizing cloud providers’ revenue in a public cloud computing environment.

  17. Structural Variation within the Amygdala and Ventromedial Prefrontal Cortex Predict Memory for Impressions in Older Adults

    Directory of Open Access Journals (Sweden)

    Brittany Shane Cassidy

    2012-08-01

    Full Text Available Research has shown that lesions to regions involved in social and emotional cognition disrupt socioemotional processing and memory. We investigated how structural variation of regions involved in socioemotional memory (ventromedial prefrontal cortex [vmPFC], amygdala, as opposed to a region implicated in explicit memory (hippocampus, affected memory for impressions in young and older adults. Anatomical MRI scans for fifteen young and fifteen older adults were obtained and reconstructed to gather information about cortical thickness and subcortical volume. Young adults had greater amygdala and hippocampus volumes than old, and thicker left vmPFC than old, although right vmPFC thickness did not differ across the age groups. Participants formed behavior-based impressions and responded to interpersonally meaningful, social but interpersonally irrelevant, or non-social prompts, and completed a memory test. Results showed that greater left amygdala volume predicted enhanced overall memory for impressions in older but not younger adults. Increased right vmPFC thickness in older, but not younger, adults correlated with enhanced memory for impressions formed in the interpersonally meaningful context. Hippocampal volume was not predictive of social memory in young or older adults. These findings demonstrate the importance of structural variation in regions linked to socioemotional processing in the retention of impressions with age, and suggest that the amygdala and vmPFC play an integral role when encoding and retrieving social information.

  18. Reciprocity of weighted networks.

    Science.gov (United States)

    Squartini, Tiziano; Picciolo, Francesco; Ruzzenenti, Franco; Garlaschelli, Diego

    2013-01-01

    In directed networks, reciprocal links have dramatic effects on dynamical processes, network growth, and higher-order structures such as motifs and communities. While the reciprocity of binary networks has been extensively studied, that of weighted networks is still poorly understood, implying an ever-increasing gap between the availability of weighted network data and our understanding of their dyadic properties. Here we introduce a general approach to the reciprocity of weighted networks, and define quantities and null models that consistently capture empirical reciprocity patterns at different structural levels. We show that, counter-intuitively, previous reciprocity measures based on the similarity of mutual weights are uninformative. By contrast, our measures allow to consistently classify different weighted networks according to their reciprocity, track the evolution of a network's reciprocity over time, identify patterns at the level of dyads and vertices, and distinguish the effects of flux (im)balances or other (a)symmetries from a true tendency towards (anti-)reciprocation.

  19. Task control signals in pediatric Tourette syndrome show evidence of immature and anomalous functional activity

    Directory of Open Access Journals (Sweden)

    Jessica A Church

    2009-11-01

    Full Text Available Tourette Syndrome (TS is a pediatric movement disorder that may affect control signaling in the brain. Previous work has proposed a dual-networks architecture of control processing involving a task-maintenance network and an adaptive control network (Dosenbach et al., 2008. A prior resting-state functional connectivity MRI (rs-fcMRI analysis in TS has revealed functional immaturity in both putative control networks, with “anomalous” correlations (i.e. correlations outside the typical developmental range limited to the adaptive control network (Church et al., 2009. The present study used functional MRI (fMRI to study brain activity related to adaptive control (by studying start-cues signals, and to task-maintenance (by studying signals sustained across a task set. Two hypotheses from the previous rs-fcMRI results were tested. First, adaptive control (i.e., start-cue activity will be altered in TS, including activity inconsistent with typical development (“anomalous”. Second, group differences found in task maintenance (i.e., sustained activity will be consistent with functional immaturity in TS. We examined regions found through a direct comparison of adolescents with and without TS, as well as regions derived from a previous investigation that showed differences between unaffected children and adults. The TS group showed decreased start-cue signal magnitude in regions where start-cue activity is unchanged over typical development, consistent with anomalous adaptive control. The TS group also had higher magnitude sustained signals in frontal cortex regions that overlapped with regions showing differences over typical development, consistent with immature task maintenance in TS. The results demonstrate task-related fMRI signal differences anticipated by the atypical functional connectivity found previously in adolescents with TS, strengthening the evidence for functional immaturity and anomalous signaling in control networks in adolescents

  20. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  1. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  2. Evolution of hybrid defect networks

    International Nuclear Information System (INIS)

    Martins, C. J. A. P.

    2009-01-01

    We apply a recently developed analytic model for the evolution of monopole networks to the case of monopoles attached to one string, usually known as hybrid networks. We discuss scaling solutions for both local and global hybrid networks, and also find an interesting application for the case of vortons. Our quantitative results agree with previous estimates in indicating that the hybrid networks will usually annihilate soon after the string-forming phase transition. However, we also show that in some specific circumstances these networks can survive considerably more than a Hubble time.

  3. Gossip algorithms in quantum networks

    Science.gov (United States)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up - in the best case exponentially - the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication.

  4. An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks

    Directory of Open Access Journals (Sweden)

    Huanlin Liu

    2014-01-01

    Full Text Available Network coding can improve the optical multicast routing performance in terms of network throughput, bandwidth utilization, and traffic load balance. But network coding needs high encoding operations costs in all-optical WDM networks due to shortage of optical RAM. In the paper, the network coding operation is defined to evaluate the number of network coding operation cost in the paper. An optical multicast routing algorithm based on minimal number of network coding operations is proposed to improve the multicast capacity. Two heuristic criteria are designed to establish the multicast routing with low network coding cost and high multicast capacity. One is to select one path from the former K shortest paths with the least probability of dropping the multicast maximal capacity. The other is to select the path with lowest potential coding operations with the highest link shared degree among the multiple wavelength disjoint paths cluster from source to each destination. Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.

  5. A random network based, node attraction facilitated network evolution method

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-03-01

    Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.

  6. Detection of Answer Copying Based on the Structure of a High-Stakes Test

    Science.gov (United States)

    Belov, Dmitry I.

    2011-01-01

    This article presents the Variable Match Index (VM-Index), a new statistic for detecting answer copying. The power of the VM-Index relies on two-dimensional conditioning as well as the structure of the test. The asymptotic distribution of the VM-Index is analyzed by reduction to Poisson trials. A computational study comparing the VM-Index with the…

  7. Secure Service Discovery in Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; van Dijk, H.W.; De Cock, Danny; Preneel, Bart; Kung, Antonio; d'Hooge, Michel

    2006-01-01

    This paper presents an architecture for secure service discovery for use in home networks. We give an overview and rationale of a cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and

  8. Personalized Network-Based Treatments in Oncology

    DEFF Research Database (Denmark)

    Robin, Xavier; Creixell, Pau; Radetskaya, Oxana

    2013-01-01

    Network medicine aims at unraveling cell signaling networks to propose personalized treatments for patients suffering from complex diseases. In this short review, we show the relevance of network medicine to cancer treatment by outlining the potential convergence points of the most recent technol...

  9. Bank-firm credit network in Japan: an analysis of a bipartite network.

    Science.gov (United States)

    Marotta, Luca; Miccichè, Salvatore; Fujiwara, Yoshi; Iyetomi, Hiroshi; Aoyama, Hideaki; Gallegati, Mauro; Mantegna, Rosario N

    2015-01-01

    We investigate the networked nature of the Japanese credit market. Our investigation is performed with tools of network science. In our investigation we perform community detection with an algorithm which is identifying communities composed of both banks and firms. We show that the communities obtained by directly working on the bipartite network carry information about the networked nature of the Japanese credit market. Our analysis is performed for each calendar year during the time period from 1980 to 2011. To investigate the time evolution of the networked structure of the credit market we introduce a new statistical method to track the time evolution of detected communities. We then characterize the time evolution of communities by detecting for each time evolving set of communities the over-expression of attributes of firms and banks. Specifically, we consider as attributes the economic sector and the geographical location of firms and the type of banks. In our 32-year-long analysis we detect a persistence of the over-expression of attributes of communities of banks and firms together with a slow dynamic of changes from some specific attributes to new ones. Our empirical observations show that the credit market in Japan is a networked market where the type of banks, geographical location of firms and banks, and economic sector of the firm play a role in shaping the credit relationships between banks and firms.

  10. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  11. Structure of the floating water bridge and water in an electric field.

    Science.gov (United States)

    Skinner, Lawrie B; Benmore, Chris J; Shyam, Badri; Weber, J K R; Parise, John B

    2012-10-09

    The floating water bridge phenomenon is a freestanding rope-shaped connection of pure liquid water, formed under the influence of a high potential difference (approximately 15 kV). Several recent spectroscopic, optical, and neutron scattering studies have suggested that the origin of the bridge is associated with the formation of anisotropic chains of water molecules in the liquid. In this work, high energy X-ray diffraction experiments have been performed on a series of floating water bridges as a function of applied voltage, bridge length, and position within the bridge. The two-dimensional X-ray scattering data showed no direction-dependence, indicating that the bulk water molecules do not exhibit any significant preferred orientation along the electric field. The only structural changes observed were those due to heating, and these effects were found to be the same as for bulk water. These X-ray scattering measurements are supported by molecular dynamics (MD) simulations which were performed under electric fields of 10(6) V/m and 10(9) V/m. Directional structure factor calculations were made from these simulations parallel and perpendicular to the E-field. The 10(6) V/m model showed no significant directional-dependence (anisotropy) in the structure factors. The 10(9) V/m model however, contained molecules aligned by the E-field, and had significant structural anisotropy.

  12. Conversion of Continuous-Valued Deep Networks to Efficient Event-Driven Networks for Image Classification.

    Science.gov (United States)

    Rueckauer, Bodo; Lungu, Iulia-Alexandra; Hu, Yuhuang; Pfeiffer, Michael; Liu, Shih-Chii

    2017-01-01

    Spiking neural networks (SNNs) can potentially offer an efficient way of doing inference because the neurons in the networks are sparsely activated and computations are event-driven. Previous work showed that simple continuous-valued deep Convolutional Neural Networks (CNNs) can be converted into accurate spiking equivalents. These networks did not include certain common operations such as max-pooling, softmax, batch-normalization and Inception-modules. This paper presents spiking equivalents of these operations therefore allowing conversion of nearly arbitrary CNN architectures. We show conversion of popular CNN architectures, including VGG-16 and Inception-v3, into SNNs that produce the best results reported to date on MNIST, CIFAR-10 and the challenging ImageNet dataset. SNNs can trade off classification error rate against the number of available operations whereas deep continuous-valued neural networks require a fixed number of operations to achieve their classification error rate. From the examples of LeNet for MNIST and BinaryNet for CIFAR-10, we show that with an increase in error rate of a few percentage points, the SNNs can achieve more than 2x reductions in operations compared to the original CNNs. This highlights the potential of SNNs in particular when deployed on power-efficient neuromorphic spiking neuron chips, for use in embedded applications.

  13. Conversion of Continuous-Valued Deep Networks to Efficient Event-Driven Networks for Image Classification

    Directory of Open Access Journals (Sweden)

    Bodo Rueckauer

    2017-12-01

    Full Text Available Spiking neural networks (SNNs can potentially offer an efficient way of doing inference because the neurons in the networks are sparsely activated and computations are event-driven. Previous work showed that simple continuous-valued deep Convolutional Neural Networks (CNNs can be converted into accurate spiking equivalents. These networks did not include certain common operations such as max-pooling, softmax, batch-normalization and Inception-modules. This paper presents spiking equivalents of these operations therefore allowing conversion of nearly arbitrary CNN architectures. We show conversion of popular CNN architectures, including VGG-16 and Inception-v3, into SNNs that produce the best results reported to date on MNIST, CIFAR-10 and the challenging ImageNet dataset. SNNs can trade off classification error rate against the number of available operations whereas deep continuous-valued neural networks require a fixed number of operations to achieve their classification error rate. From the examples of LeNet for MNIST and BinaryNet for CIFAR-10, we show that with an increase in error rate of a few percentage points, the SNNs can achieve more than 2x reductions in operations compared to the original CNNs. This highlights the potential of SNNs in particular when deployed on power-efficient neuromorphic spiking neuron chips, for use in embedded applications.

  14. A fusion networking model for smart grid power distribution backbone communication network based on PTN

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available In current communication network for distribution in Chinese power grid systems, the fiber communication backbone network for distribution and TD-LTE power private wireless backhaul network of power grid are both bearing by the SDH optical transmission network, which also carries the communication network of transformer substation and main electric. As the data traffic of the distribution communication and TD-LTE power private wireless network grow rapidly in recent years, it will have a big impact with the SDH network’s bearing capacity which is mainly used for main electric communication in high security level. This paper presents a fusion networking model which use a multiple-layer PTN network as the unified bearing of the TD-LTE power private wireless backhaul network and fiber communication backbone network for distribution. Network dataflow analysis shows that this model can greatly reduce the capacity pressure of the traditional SDH network as well as ensure the reliability of the transmission of the communication network for distribution and TD-LTE power private wireless network.

  15. When business networks “kill” social networks

    DEFF Research Database (Denmark)

    Jackson, Laurel; Young, L.

    2016-01-01

    that considers the changes to a community's social network and the associated norms emerging from the growing influence of a microfinance providers' network. A case study reports the impact of microfinance on a particular Bangladesh rural community. We show there is a breakdown in traditional social networks...... in this and other poor rural villages brought about by the taking of micro loans when the families have no means of paying them back. This increased indebtedness to NGOs is perpetuating their poverty and diminishing the community's quality of life including their traditions of bounded solidarity, where families...... in the economic structure of rural Bangladesh and changing norms, in particular the changes to traditional forms of financial exchange and associated support and risk management. We conclude that public policy and a different business model that is more accountable and altruistic are needed to guide...

  16. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  17. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks.

    Science.gov (United States)

    Murakami, Masaya; Kominami, Daichi; Leibnitz, Kenji; Murata, Masayuki

    2018-04-08

    Virtualization of wireless sensor networks (WSN) is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT) networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN) topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions) and nodes (i.e., neurons). We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR) model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  18. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks

    Directory of Open Access Journals (Sweden)

    Masaya Murakami

    2018-04-01

    Full Text Available Virtualization of wireless sensor networks (WSN is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions and nodes (i.e., neurons. We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  19. Comparing and Contrasting the Cognitive Effects of Hippocampal and Ventromedial Prefrontal Cortex Damage: A Review of Human Lesion Studies.

    Science.gov (United States)

    McCormick, Cornelia; Ciaramelli, Elisa; De Luca, Flavia; Maguire, Eleanor A

    2018-03-15

    The hippocampus and ventromedial prefrontal cortex (vmPFC) are closely connected brain regions whose functions are still debated. In order to offer a fresh perspective on understanding the contributions of these two brain regions to cognition, in this review we considered cognitive tasks that usually elicit deficits in hippocampal-damaged patients (e.g., autobiographical memory retrieval), and examined the performance of vmPFC-lesioned patients on these tasks. We then took cognitive tasks where performance is typically compromised following vmPFC damage (e.g., decision making), and looked at how these are affected by hippocampal lesions. Three salient motifs emerged. First, there are surprising gaps in our knowledge about how hippocampal and vmPFC patients perform on tasks typically associated with the other group. Second, while hippocampal or vmPFC damage seems to adversely affect performance on so-called hippocampal tasks, the performance of hippocampal and vmPFC patients clearly diverges on classic vmPFC tasks. Third, although performance appears analogous on hippocampal tasks, on closer inspection, there are significant disparities between hippocampal and vmPFC patients. Based on these findings, we suggest a tentative hierarchical model to explain the functions of the hippocampus and vmPFC. We propose that the vmPFC initiates the construction of mental scenes by coordinating the curation of relevant elements from neocortical areas, which are then funneled into the hippocampus to build a scene. The vmPFC then engages in iterative re-initiation via feedback loops with neocortex and hippocampus to facilitate the flow and integration of the multiple scenes that comprise the coherent unfolding of an extended mental event. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  20. [The Clinical Application of Video Mediastinoscopy and CT in the N Staging of Preoperative Lung Cancer.].

    Science.gov (United States)

    Wang, Zhiheng; Qi, Weibo; Zhu, Yong; Lin, Ruobai

    2009-10-20

    Preoperative lung cancer with mediastinal lymph nodes metastasis can be diagnosed by vedio mediastinoscopy (VM) and CT. This study was to explore the value of VM and CT in the diagnosis of N staging of preoperative lung cancer, and to discuss the difference between the two methods. Forty-eight cases diagnosed of lung cancer by CT or PET-CT were examined by VM. The sensitivity, specificity, validity, positive predictive value and negative predictive value of VM and CT were speculated according to the postoperative pathological reports, and the difference between VM and CT in the diagnosis of lung cancer with mediastinal lymph nodes metastasis was discussed. (1)Under the examination of VM, 31 patients with the negative outcome received the direct operation; 14 patients with N2 received 2 courses of neoadjuvant chemotherapy before operation; 3 patients with N3 received chemotherapy and/or radiotherapy. (2)Forty-one cases with final diagnosis of lung cancer were used as samples to speculate the sensitivity, specificity, validity, positive predictive value and negative predictive value of VM. They were 93.3%, 100%, 97.6%, 100%, 96.3%, which of CT were 66.7%, 53.8%, 58.5%, 45.5%, 73.7% (Chi-square=4.083, P=0.039), the difference between VM and CT was statistically significant. (3)In this group, the complications of VM incidence rate was 2.08% (1/48), and the case was pneumothorax. VM is superior to CT in the diagnosis of N staging of preoperative lung cancer; Due to its safety and effectiveness, VM will be wildly used in the field of thoracic surgery.

  1. The Clinical Application of Video Mediastinoscopy and CT in the N Staging of Preoperative Lung Cancer

    Directory of Open Access Journals (Sweden)

    Zhiheng WANG

    2009-10-01

    Full Text Available Background and objective Preoperative lung cancer with mediastinal lymph nodes metastasis can be diagnosed by vedio mediastinoscopy (VM and CT. This study was to explore the value of VM and CT in the diagnosis of N staging of preoperative lung cancer, and to discuss the difference between the 2 methods. Methods 48 cases diagnosed of lung cancer by CT or PET-CT were examined by VM. The sensitivity, specificity, validity, positive predictive value and negative predictive value of VM and CT were speculated according to the postoperative pathological reports, and the difference between VM and CT in the diagnosis of lung cancer with mediastinal lymph nodes metastasis was discussed. Results ①Under the examination of VM, 31 patients with the negative outcome received the direct operation, 14 patients with N2 received 2 courses of neoadjuvant chemotherapy before operation, 3 patients with N3 received chemotherapy and/or radiotherapy. ②Forty-one cases with final diagnosis of lung cancer were used as samples to speculate the sensitivity, specificity, validity, positive predictive value and negative predictive value of VM. They were 93.3%, 100%, 97.6%, 100%, 96.3%, which of CT were 66.7%, 53.8%, 58.5%, 45.5%, 73.7% (χ2=4.083, P=0.039, the difference between VM and CT was statistically significant. ③In this group, the complications of VM incidence rate is 2.08% (1/48, the case is pneumothorax. Conclusion VM is superior to CT in the diagnosis of N staging of preoperative lung cancer, it is safe and effective, and there will be a wide perspective for VM in thoracic surgery.

  2. Cold acclimation improves chill tolerance in the migratory locust through preservation of ion balance and membrane potential

    DEFF Research Database (Denmark)

    Andersen, Mads; Folkersen, Rasmus; MacMillan, Heath Andrew

    2017-01-01

    potential (Vm). Several studies have therefore suggested a link between preservation of Vm and cellular survival after cold stress, but none has measured Vm in this context. We tested this hypothesis by acclimating locusts (Locusta migratoria) to high (31°C) and low temperature (11°C) for 4 days before...... revealed that cellular injury during cold exposure occurs when Vm becomes severely depolarized. Interestingly, we found that cellular sensitivity to hypothermic hyperkalaemia was lower in cold-acclimated locusts that were better able to defend Vm whilst exposed to high extracellular [K+]. Together...

  3. A model of coauthorship networks

    Science.gov (United States)

    Zhou, Guochang; Li, Jianping; Xie, Zonglin

    2017-10-01

    A natural way of representing the coauthorship of authors is to use a generalization of graphs known as hypergraphs. A random geometric hypergraph model is proposed here to model coauthorship networks, which is generated by placing nodes on a region of Euclidean space randomly and uniformly, and connecting some nodes if the nodes satisfy particular geometric conditions. Two kinds of geometric conditions are designed to model the collaboration patterns of academic authorities and basic researches respectively. The conditions give geometric expressions of two causes of coauthorship: the authority and similarity of authors. By simulation and calculus, we show that the forepart of the degree distribution of the network generated by the model is mixture Poissonian, and the tail is power-law, which are similar to these of some coauthorship networks. Further, we show more similarities between the generated network and real coauthorship networks: the distribution of cardinalities of hyperedges, high clustering coefficient, assortativity, and small-world property

  4. Competitive cluster growth in complex networks.

    Science.gov (United States)

    Moreira, André A; Paula, Demétrius R; Costa Filho, Raimundo N; Andrade, José S

    2006-06-01

    In this work we propose an idealized model for competitive cluster growth in complex networks. Each cluster can be thought of as a fraction of a community that shares some common opinion. Our results show that the cluster size distribution depends on the particular choice for the topology of the network of contacts among the agents. As an application, we show that the cluster size distributions obtained when the growth process is performed on hierarchical networks, e.g., the Apollonian network, have a scaling form similar to what has been observed for the distribution of a number of votes in an electoral process. We suggest that this similarity may be due to the fact that social networks involved in the electoral process may also possess an underlining hierarchical structure.

  5. Reinforcement learning account of network reciprocity.

    Science.gov (United States)

    Ezaki, Takahiro; Masuda, Naoki

    2017-01-01

    Evolutionary game theory predicts that cooperation in social dilemma games is promoted when agents are connected as a network. However, when networks are fixed over time, humans do not necessarily show enhanced mutual cooperation. Here we show that reinforcement learning (specifically, the so-called Bush-Mosteller model) approximately explains the experimentally observed network reciprocity and the lack thereof in a parameter region spanned by the benefit-to-cost ratio and the node's degree. Thus, we significantly extend previously obtained numerical results.

  6. An investigation of the association between vending machine confectionery purchase frequency by schoolchildren in the UK and other dietary and lifestyle factors.

    Science.gov (United States)

    New, Susan A; Livingstone, M Barbara E

    2003-08-01

    Availability of confectionery from vending machines in secondary schools provides a convenient point of purchase. There is concern that this may lead to 'over-indulgence' and hence an increase in susceptibility to obesity and poor 'dietary quality'. The study objective was to investigate the association between the frequency of consumption of confectionery purchased from vending machines and other sources and related lifestyle factors in adolescent boys and girls. A secondary school-based, cross-sectional study. A total of 504 subjects were investigated (age range 12-15 years), from three schools in southern and northern England. Using a lifestyle questionnaire, frequency of confectionery consumption (CC) from all sources (AS) and vending machines (VM) was recorded for a typical school week. Subjects were categorised into non-consumers, low, medium and high consumers using the following criteria: none, 0 times per week; low, 1-5 times per week; medium, 6-9 times per week; high, 10 times per week or greater. No differences were found in the frequency of CC from AS or VM between those who consumed breakfast and lunch and those who did not. No differences were found in the frequency of fruit and vegetable intake in high VM CC vs. none VM CC groups, or in any of the VM CC groups. Confectionery consumption from AS (but not VM) was found to be higher in subjects who were physically active on the journey to school (Ppurchased from vending machines and 'poor' dietary practice or 'undesirable' lifestyle habits. Findings for total confectionery consumption showed some interesting trends, but the results were not consistent, either for a negative or positive effect.

  7. Therapy of established B16-F10 melanoma tumors by a single vaccination of CTL/T helper peptides in VacciMax®

    Directory of Open Access Journals (Sweden)

    Korets-Smith Ella

    2007-04-01

    Full Text Available Abstract Background Melanoma tumors are known to express antigens that usually induce weak immune responses of short duration. Expression of both tumor-associated antigens p53 and TRP2 by melanoma cells raises the possibility of simultaneously targeting more than one antigen in a therapeutic vaccine. In this report, we show that VacciMax® (VM, a novel liposome-based vaccine delivery platform, can increase the immunogenicity of melanoma associated antigens, resulting in tumor elimination. Methods C57BL/6 mice bearing B16-F10 melanoma tumors were vaccinated subcutaneously 6 days post tumor implantation with a mixture of synthetic peptides (modified p53: 232–240, TRP-2: 181–188 and PADRE and CpG. Tumor growth was monitored and antigen-specific splenocyte responses were assayed by ELISPOT. Results Vaccine formulated in VM increased the number of both TRP2- and p53-specific IFN-γ producing splenocytes following a single vaccination. Vaccine formulated without VM resulted only in enhanced IFN-γ producing splenocytes to one CTL epitopes (TRP2:180–188, suggesting that VM overcomes antigen dominance and enhances immunogenicity of multiple epitopes. Vaccination of mice bearing 6-day old B16-F10 tumors with both TRP2 and p53-peptides formulated in VM successfully eradicated tumors in all mice. A control vaccine which contained all ingredients except liposomes resulted in eradication of tumors in no more than 20% of mice. Conclusion A single administration of VM is capable of inducing an effective CTL response to multiple tumor-associated antigens. The responses generated were able to reject 6-day old B16-F10 tumors.

  8. Occurrence of airborne vancomycin- and gentamicin-resistant bacteria in various hospital wards in Isfahan, Iran.

    Science.gov (United States)

    Mirhoseini, Seyed Hamed; Nikaeen, Mahnaz; Khanahmad, Hossein; Hassanzadeh, Akbar

    2016-01-01

    Airborne transmission of pathogenic resistant bacteria is well recognized as an important route for the acquisition of a wide range of nosocomial infections in hospitals. The aim of this study was to determine the prevalence of airborne vancomycin and gentamicin (VM and GM) resistant bacteria in different wards of four educational hospitals. A total of 64 air samples were collected from operating theater (OT), Intensive Care Unit (ICU), surgery ward, and internal medicine ward of four educational hospitals in Isfahan, Iran. Airborne culturable bacteria were collected using all glass impingers. Samples were analyzed for the detection of VM- and GM-resistant bacteria. The average level of bacteria ranged from 99 to 1079 CFU/m(3). The highest level of airborne bacteria was observed in hospital 4 (628 CFU/m(3)) and the highest average concentration of GM- and VM-resistant airborne bacteria were found in hospital 3 (22 CFU/m(3)). The mean concentration of airborne bacteria was the lowest in OT wards and GM- and VM-resistant airborne bacteria were not detected in this ward of hospitals. The highest prevalence of antibiotic-resistant airborne bacteria was observed in ICU ward. There was a statistically significant difference for the prevalence of VM-resistant bacteria between hospital wards (P = 0.012). Our finding showed that the relatively high prevalence of VM- and GM-resistant airborne bacteria in ICUs could be a great concern from the point of view of patients' health. These results confirm the necessity of application of effective control measures which significantly decrease the exposure of high-risk patients to potentially airborne nosocomial infections.

  9. Markets on Networks

    Science.gov (United States)

    Toroczkai, Zoltan; Anghel, Marian; Bassler, Kevin; Korniss, Gyorgy

    2003-03-01

    The dynamics of human, and most biological populations is characterized by competition for resources. By its own nature, this dynamics creates the group of "elites", formed by those agents who have strategies that are the most successful in the given situation, and therefore the rest of the agents will tend to follow, imitate, or interact with them, creating a social structure of leadership in the agent society. These inter-agent communications generate a complex social network with small-world character which itself forms the substrate for a second network, the action network. The latter is a highly dynamic, adaptive, directed network, defined by those inter-agent communication links on the substrate along which the passed information /prediction is acted upon by the other agents. By using the minority game for competition dynamics, here we show that when the substrate network is highly connected, the action network spontaneously develops hubs with a broad distribution of out-degrees, defining a robust leadership structure that is scale-free. Furthermore, in certain, realistic parameter ranges, facilitated by information passing on the action network, agents can spontaneously generate a high degree of cooperation making the collective almost maximally efficient.

  10. Peeking Network States with Clustered Patterns

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jinoh [Texas A & M Univ., Commerce, TX (United States); Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sim, Alex [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-10-20

    Network traffic monitoring has long been a core element for effec- tive network management and security. However, it is still a chal- lenging task with a high degree of complexity for comprehensive analysis when considering multiple variables and ever-increasing traffic volumes to monitor. For example, one of the widely con- sidered approaches is to scrutinize probabilistic distributions, but it poses a scalability concern and multivariate analysis is not gen- erally supported due to the exponential increase of the complexity. In this work, we propose a novel method for network traffic moni- toring based on clustering, one of the powerful deep-learning tech- niques. We show that the new approach enables us to recognize clustered results as patterns representing the network states, which can then be utilized to evaluate “similarity” of network states over time. In addition, we define a new quantitative measure for the similarity between two compared network states observed in dif- ferent time windows, as a supportive means for intuitive analysis. Finally, we demonstrate the clustering-based network monitoring with public traffic traces, and show that the proposed approach us- ing the clustering method has a great opportunity for feasible, cost- effective network monitoring.

  11. Robustness of airline alliance route networks

    Science.gov (United States)

    Lordan, Oriol; Sallan, Jose M.; Simo, Pep; Gonzalez-Prieto, David

    2015-05-01

    The aim of this study is to analyze the robustness of the three major airline alliances' (i.e., Star Alliance, oneworld and SkyTeam) route networks. Firstly, the normalization of a multi-scale measure of vulnerability is proposed in order to perform the analysis in networks with different sizes, i.e., number of nodes. An alternative node selection criterion is also proposed in order to study robustness and vulnerability of such complex networks, based on network efficiency. And lastly, a new procedure - the inverted adaptive strategy - is presented to sort the nodes in order to anticipate network breakdown. Finally, the robustness of the three alliance networks are analyzed with (1) a normalized multi-scale measure of vulnerability, (2) an adaptive strategy based on four different criteria and (3) an inverted adaptive strategy based on the efficiency criterion. The results show that Star Alliance has the most resilient route network, followed by SkyTeam and then oneworld. It was also shown that the inverted adaptive strategy based on the efficiency criterion - inverted efficiency - shows a great success in quickly breaking networks similar to that found with betweenness criterion but with even better results.

  12. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  13. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated. Additionally...... with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with elevation......Aim Interacting communities of species are organized into complex networks, and network analysis is reckoned to be a strong tool for describing their architecture. Many species assemblies show strong macroecological patterns, e.g. increasing species richness with decreasing latitude, but whether...

  14. Scheduling Maintenance Jobs in Networks

    OpenAIRE

    Abed, Fidaa; Chen, Lin; Disser, Yann; Groß, Martin; Megow, Nicole; Meißner, Julie; Richter, Alexander T.; Rischke, Roman

    2017-01-01

    We investigate the problem of scheduling the maintenance of edges in a network, motivated by the goal of minimizing outages in transportation or telecommunication networks. We focus on maintaining connectivity between two nodes over time; for the special case of path networks, this is related to the problem of minimizing the busy time of machines. We show that the problem can be solved in polynomial time in arbitrary networks if preemption is allowed. If preemption is restricted to integral t...

  15. Emotion Regulation and Complex Brain Networks: Association Between Expressive Suppression and Efficiency in the Fronto-Parietal Network and Default-Mode Network

    Directory of Open Access Journals (Sweden)

    Junhao Pan

    2018-03-01

    Full Text Available Emotion regulation (ER refers to the “implementation of a conscious or non-conscious goal to start, stop or otherwise modulate the trajectory of an emotion” (Etkin et al., 2015. Whereas multiple brain areas have been found to be involved in ER, relatively little is known about whether and how ER is associated with the global functioning of brain networks. Recent advances in brain connectivity research using graph-theory based analysis have shown that the brain can be organized into complex networks composed of functionally or structurally connected brain areas. Global efficiency is one graphic metric indicating the efficiency of information exchange among brain areas and is utilized to measure global functioning of brain networks. The present study examined the relationship between trait measures of ER (expressive suppression (ES and cognitive reappraisal (CR and global efficiency in resting-state functional brain networks (the whole brain network and ten predefined networks using structural equation modeling (SEM. The results showed that ES was reliably associated with efficiency in the fronto-parietal network and default-mode network. The finding advances the understanding of neural substrates of ER, revealing the relationship between ES and efficient organization of brain networks.

  16. Effects of the network structure and coupling strength on the noise-induced response delay of a neuronal network

    International Nuclear Information System (INIS)

    Ozer, Mahmut; Uzuntarla, Muhammet

    2008-01-01

    The Hodgkin-Huxley (H-H) neuron model driven by stimuli just above threshold shows a noise-induced response delay with respect to time to the first spike for a certain range of noise strengths, an effect called 'noise delayed decay' (NDD). We study the response time of a network of coupled H-H neurons, and investigate how the NDD can be affected by the connection topology of the network and the coupling strength. We show that the NDD effect exists for weak and intermediate coupling strengths, whereas it disappears for strong coupling strength regardless of the connection topology. We also show that although the network structure has very little effect on the NDD for a weak coupling strength, the network structure plays a key role for an intermediate coupling strength by decreasing the NDD effect with the increasing number of random shortcuts, and thus provides an additional operating regime, that is absent in the regular network, in which the neurons may also exploit a spike time code

  17. NQAR: Network Quality Aware Routing in Error-Prone Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewon Choi

    2010-01-01

    Full Text Available We propose a network quality aware routing (NQAR mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods that select routes with the shortest arrival latency or the minimum hop count, the proposed scheme adaptively selects the route based on the network qualities including link errors and collisions with minimum additional complexity. It is designed to avoid the paths with potential noise and collision that may cause many non-deterministic backoffs and retransmissions. We propose a generic framework to select a minimum cost route that takes the packet loss rate and collision history into account. NQAR uses a data centric approach to estimate a single-hop delay based on processing time, propagation delay, packet loss rate, number of backoffs, and the retransmission timeout between two neighboring nodes. This enables a source node to choose the shortest expected end-to-end delay path to send a delay-sensitive data. The experiment results show that NQAR reduces the end-to-end transfer delay up to approximately 50% in comparison with the latency-based directed diffusion and the hop count-based directed diffusion under the error-prone network environments. Moreover, NQAR shows better performance than those routing methods in terms of jitter, reachability, and network lifetime.

  18. Reinforcement learning account of network reciprocity.

    Directory of Open Access Journals (Sweden)

    Takahiro Ezaki

    Full Text Available Evolutionary game theory predicts that cooperation in social dilemma games is promoted when agents are connected as a network. However, when networks are fixed over time, humans do not necessarily show enhanced mutual cooperation. Here we show that reinforcement learning (specifically, the so-called Bush-Mosteller model approximately explains the experimentally observed network reciprocity and the lack thereof in a parameter region spanned by the benefit-to-cost ratio and the node's degree. Thus, we significantly extend previously obtained numerical results.

  19. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and......, hopefully, to enhance the level of security provided by these solutions even further....

  20. Neural response to pictorial health warning labels can predict smoking behavioral change.

    Science.gov (United States)

    Riddle, Philip J; Newman-Norlund, Roger D; Baer, Jessica; Thrasher, James F

    2016-11-01

    In order to improve our understanding of how pictorial health warning labels (HWLs) influence smoking behavior, we examined whether brain activity helps to explain smoking behavior above and beyond self-reported effectiveness of HWLs. We measured the neural response in the ventromedial prefrontal cortex (vmPFC) and the amygdala while adult smokers viewed HWLs. Two weeks later, participants' self-reported smoking behavior and biomarkers of smoking behavior were reassessed. We compared multiple models predicting change in self-reported smoking behavior (cigarettes per day [CPD]) and change in a biomarkers of smoke exposure (expired carbon monoxide [CO]). Brain activity in the vmPFC and amygdala not only predicted changes in CO, but also accounted for outcome variance above and beyond self-report data. Neural data were most useful in predicting behavioral change as quantified by the objective biomarker (CO). This pattern of activity was significantly modulated by individuals' intention to quit. The finding that both cognitive (vmPFC) and affective (amygdala) brain areas contributed to these models supports the idea that smokers respond to HWLs in a cognitive-affective manner. Based on our findings, researchers may wish to consider using neural data from both cognitive and affective networks when attempting to predict behavioral change in certain populations (e.g. cigarette smokers). © The Author (2016). Published by Oxford University Press.

  1. Hybrid resource provisioning for clouds

    International Nuclear Information System (INIS)

    Rahman, Mahfuzur; Graham, Peter

    2012-01-01

    Flexible resource provisioning, the assignment of virtual machines (VMs) to physical machine, is a key requirement for cloud computing. To achieve 'provisioning elasticity', the cloud needs to manage its available resources on demand. A-priori, static, VM provisioning introduces no runtime overhead but fails to deal with unanticipated changes in resource demands. Dynamic provisioning addresses this problem but introduces runtime overhead. To reduce VM management overhead so more useful work can be done and to also avoid sub-optimal provisioning we propose a hybrid approach that combines static and dynamic provisioning. The idea is to adapt a good initial static placement of VMs in response to evolving load characteristics, using live migration, as long as the overhead of doing so is low and the effectiveness is high. When this is no longer so, we trigger a revised static placement. (Thus, we are essentially applying local multi-objective optimization to tune a global optimization with reduced overhead.) This approach requires a complicated migration decision algorithm based on current and predicted:future workloads, power consumptions and memory usage in the host machines as well as network burst characteristics for the various possible VM multiplexings (combinations of VMs on a host). A further challenge is to identify those characteristics of the dynamic provisioning that should trigger static re-provisioning.

  2. Crista Supraventricularis Purkinje Network and Its Relation to Intraseptal Purkinje Network.

    Science.gov (United States)

    De Almeida, Marcos C; Araujo, Mayssa; Duque, Mathias; Vilhena, Virginia

    2017-10-01

    Using transparent specimens with a dual color injection, microscopy, and computer tomography, this report shows that the right and left ventricular subendocardial Purkinje networks are connected by an extensive septal network in the bovine heart. The septal network is present along the entire septum except at a free zone below ventricular valves. Being the only communication of the basal right septum with the right free wall, the supraventricular crest is an enigmatic but not, by any means, hidden muscular structure. It is one of the last structures to be activated in human heart. It is shown here that the supraventricular crest Purkinje network connects the anterosuperior right ventricular basal free wall Purkinje network to anterior right ventricular basal septal Purkinje network. It is suggested that the stimulus initiated at middle left ventricular endocardium will activate the supraventricular crest. The intraseptal connection found between the basal left ventricular subendocardial septal Purkinje network and the right ventricular basal septal Purkinje network is, probably, the pathway for the stimulus. An anatomic basis is provided to explain why the inflow tract contracts earlier than the outflow tract in the right ventricle systole. Anat Rec, 2017. © 2017 Wiley Periodicals, Inc. Anat Rec, 300:1793-1801, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  3. Investigating the role of the ventromedial prefrontal cortex in the assessment of brands.

    Science.gov (United States)

    Santos, José Paulo; Seixas, Daniela; Brandão, Sofia; Moutinho, Luiz

    2011-01-01

    The ventromedial prefrontal cortex (vmPFC) is believed to be important in everyday preference judgments, processing emotions during decision-making. However, there is still controversy in the literature regarding the participation of the vmPFC. To further elucidate the contribution of the vmPFC in brand preference, we designed a functional magnetic resonance imaging (fMRI) study where 18 subjects assessed positive, indifferent, and fictitious brands. Also, both the period during and after the decision process were analyzed, hoping to unravel temporally the role of the vmPFC, using modeled and model-free fMRI analysis. Considering together the period before and after decision-making, there was activation of the vmPFC when comparing positive with indifferent or fictitious brands. However, when the decision-making period was separated from the moment after the response, and especially for positive brands, the vmPFC was more active after the choice than during the decision process itself, challenging some of the existing literature. The results of the present study support the notion that the vmPFC may be unimportant in the decision stage of brand preference, questioning theories that postulate that the vmPFC is in the origin of such a choice. Further studies are needed to investigate in detail why the vmPFC seems to be involved in brand preference only after the decision process.

  4. Advancing Health Professions Education Research by Creating a Network of Networks.

    Science.gov (United States)

    Carney, Patricia A; Brandt, Barbara; Dekhtyar, Michael; Holmboe, Eric S

    2018-02-27

    Producing the best evidence to show educational outcomes, such as competency achievement and credentialing effectiveness, across the health professions education continuum will require large multisite research projects and longitudinal studies. Current limitations that must be overcome to reach this goal include the prevalence of single-institution study designs, assessments of a single curricular component, and cross-sectional study designs that provide only a snapshot in time of a program or initiative rather than a longitudinal perspective.One solution to overcoming these limitations is to develop a network of networks that collaborates, using longitudinal approaches, across health professions and regions of the United States. Currently, individual networks are advancing educational innovation toward understanding the effectiveness of educational and credentialing programs. Examples of such networks include: (1) the American Medical Association's Accelerating Change in Medical Education initiative, (2) the National Center for Interprofessional Practice and Education, and (3) the Accreditation Council for Graduate Medical Education's Accreditation System. In this Invited Commentary, the authors briefly profile these existing networks, identify their progress and the challenges they have encountered, and propose a vigorous way forward toward creating a national network of networks designed to determine the effectiveness of health professions education and credentialing.

  5. Applications of Coding in Network Communications

    Science.gov (United States)

    Chang, Christopher SungWook

    2012-01-01

    This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…

  6. Special issue on network coding

    Science.gov (United States)

    Monteiro, Francisco A.; Burr, Alister; Chatzigeorgiou, Ioannis; Hollanti, Camilla; Krikidis, Ioannis; Seferoglu, Hulya; Skachek, Vitaly

    2017-12-01

    Future networks are expected to depart from traditional routing schemes in order to embrace network coding (NC)-based schemes. These have created a lot of interest both in academia and industry in recent years. Under the NC paradigm, symbols are transported through the network by combining several information streams originating from the same or different sources. This special issue contains thirteen papers, some dealing with design aspects of NC and related concepts (e.g., fountain codes) and some showcasing the application of NC to new services and technologies, such as data multi-view streaming of video or underwater sensor networks. One can find papers that show how NC turns data transmission more robust to packet losses, faster to decode, and more resilient to network changes, such as dynamic topologies and different user options, and how NC can improve the overall throughput. This issue also includes papers showing that NC principles can be used at different layers of the networks (including the physical layer) and how the same fundamental principles can lead to new distributed storage systems. Some of the papers in this issue have a theoretical nature, including code design, while others describe hardware testbeds and prototypes.

  7. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-05-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other’s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network’s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network’s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. Furthermore, with the use of fractional cooperation, the average recovery overhead is further reduced by around 5% for the primary network and around 10% for the secondary network when a high fractional cooperation probability is used.

  8. How to construct the statistic network? An association network of herbaceous

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2012-06-01

    Full Text Available In present study I defined a new type of network, the statistic network. The statistic network is a weighted and non-deterministic network. In the statistic network, a connection value, i.e., connection weight, represents connection strength and connection likelihood between two nodes and its absolute value falls in the interval (0,1]. The connection value is expressed as a statistical measure such as correlation coefficient, association coefficient, or Jaccard coefficient, etc. In addition, all connections of the statistic network can be statistically tested for their validity. A connection is true if the connection value is statistically significant. If all connection values of a node are not statistically significant, it is an isolated node. An isolated node has not any connection to other nodes in the statistic network. Positive and negative connection values denote distinct connectiontypes (positive or negative association or interaction. In the statistic network, two nodes with the greater connection value will show more similar trend in the change of their states. At any time we can obtain a sample network of the statistic network. A sample network is a non-weighted and deterministic network. Thestatistic network, in particular the plant association network that constructed from field sampling, is mostly an information network. Most of the interspecific relationships in plant community are competition and cooperation. Therefore in comparison to animal networks, the methodology of statistic network is moresuitable to construct plant association networks. Some conclusions were drawn from this study: (1 in the plant association network, most connections are weak and positive interactions. The association network constructed from Spearman rank correlation has most connections and isolated taxa are fewer. From net linear correlation,linear correlation, to Spearman rank correlation, the practical number of connections and connectance in the

  9. Measuring personal exposure from 900MHz mobile phone base stations in Australia and Belgium using a novel personal distributed exposimeter.

    Science.gov (United States)

    Bhatt, Chhavi Raj; Thielens, Arno; Redmayne, Mary; Abramson, Michael J; Billah, Baki; Sim, Malcolm R; Vermeulen, Roel; Martens, Luc; Joseph, Wout; Benke, Geza

    2016-01-01

    The aims of this study were to: i) measure personal exposure in the Global System for Mobile communications (GSM) 900MHz downlink (DL) frequency band with two systems of exposimeters, a personal distributed exposimeter (PDE) and a pair of ExpoM-RFs, ii) compare the GSM 900MHz DL exposures across various microenvironments in Australia and Belgium, and iii) evaluate the correlation between the PDE and ExpoM-RFs measurements. Personal exposure data were collected using the PDE and two ExpoM-RFs simultaneously across 34 microenvironments (17 each in Australia and Belgium) located in urban, suburban and rural areas. Summary statistics of the electric field strengths (V/m) were computed and compared across similar microenvironments in Australia and Belgium. The personal exposures across urban microenvironments were higher than those in the rural or suburban microenvironments. Likewise, the exposure levels across the outdoor were higher than those for indoor microenvironments. The five highest median exposure levels were: city centre (0.248V/m), bus (0.124V/m), railway station (0.105V/m), mountain/forest (rural) (0.057V/m), and train (0.055V/m) [Australia]; and bicycle (urban) (0.238V/m), tram station (0.238V/m), city centre (0.156V/m), residential outdoor (urban) (0.139V/m) and park (0.124V/m) [Belgium]. Exposures in the GSM900 MHz frequency band across most of the microenvironments in Australia were significantly lower than the exposures across the microenvironments in Belgium. Overall correlations between the PDE and the ExpoM-RFs measurements were high. The measured exposure levels were far below the general public reference levels recommended in the guidelines of the ICNIRP and the ARPANSA. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Bank-Firm Credit Network in Japan: An Analysis of a Bipartite Network

    Science.gov (United States)

    Marotta, Luca; Miccichè, Salvatore; Fujiwara, Yoshi; Iyetomi, Hiroshi; Aoyama, Hideaki; Gallegati, Mauro; Mantegna, Rosario N.

    2015-01-01

    We investigate the networked nature of the Japanese credit market. Our investigation is performed with tools of network science. In our investigation we perform community detection with an algorithm which is identifying communities composed of both banks and firms. We show that the communities obtained by directly working on the bipartite network carry information about the networked nature of the Japanese credit market. Our analysis is performed for each calendar year during the time period from 1980 to 2011. To investigate the time evolution of the networked structure of the credit market we introduce a new statistical method to track the time evolution of detected communities. We then characterize the time evolution of communities by detecting for each time evolving set of communities the over-expression of attributes of firms and banks. Specifically, we consider as attributes the economic sector and the geographical location of firms and the type of banks. In our 32-year-long analysis we detect a persistence of the over-expression of attributes of communities of banks and firms together with a slow dynamic of changes from some specific attributes to new ones. Our empirical observations show that the credit market in Japan is a networked market where the type of banks, geographical location of firms and banks, and economic sector of the firm play a role in shaping the credit relationships between banks and firms. PMID:25933413

  11. Recurrent neural network based hybrid model for reconstructing gene regulatory network.

    Science.gov (United States)

    Raza, Khalid; Alam, Mansaf

    2016-10-01

    One of the exciting problems in systems biology research is to decipher how genome controls the development of complex biological system. The gene regulatory networks (GRNs) help in the identification of regulatory interactions between genes and offer fruitful information related to functional role of individual gene in a cellular system. Discovering GRNs lead to a wide range of applications, including identification of disease related pathways providing novel tentative drug targets, helps to predict disease response, and also assists in diagnosing various diseases including cancer. Reconstruction of GRNs from available biological data is still an open problem. This paper proposes a recurrent neural network (RNN) based model of GRN, hybridized with generalized extended Kalman filter for weight update in backpropagation through time training algorithm. The RNN is a complex neural network that gives a better settlement between biological closeness and mathematical flexibility to model GRN; and is also able to capture complex, non-linear and dynamic relationships among variables. Gene expression data are inherently noisy and Kalman filter performs well for estimation problem even in noisy data. Hence, we applied non-linear version of Kalman filter, known as generalized extended Kalman filter, for weight update during RNN training. The developed model has been tested on four benchmark networks such as DNA SOS repair network, IRMA network, and two synthetic networks from DREAM Challenge. We performed a comparison of our results with other state-of-the-art techniques which shows superiority of our proposed model. Further, 5% Gaussian noise has been induced in the dataset and result of the proposed model shows negligible effect of noise on results, demonstrating the noise tolerance capability of the model. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Habit strength is predicted by activity dynamics in goal-directed brain systems during training.

    Science.gov (United States)

    Zwosta, Katharina; Ruge, Hannes; Goschke, Thomas; Wolfensteller, Uta

    2018-01-15

    Previous neuroscientific research revealed insights into the brain networks supporting goal-directed and habitual behavior, respectively. However, it remains unclear how these contribute to inter-individual differences in habit strength which is relevant for understanding not only normal behavior but also more severe dysregulations between these types of action control, such as in addiction. In the present fMRI study, we trained subjects on approach and avoidance behavior for an extended period of time before testing the habit strength of the acquired stimulus-response associations. We found that stronger habits were associated with a stronger decrease in inferior parietal lobule activity for approach and avoidance behavior and weaker vmPFC activity at the end of training for avoidance behavior, areas associated with the anticipation of outcome identity and value. VmPFC in particular showed markedly different activity dynamics during the training of approach and avoidance behavior. Furthermore, while ongoing training was accompanied by increasing functional connectivity between posterior putamen and premotor cortex, consistent with previous assumptions about the neural basis of increasing habitualization, this was not predictive of later habit strength. Together, our findings suggest that inter-individual differences in habitual behavior are driven by differences in the persistent involvement of brain areas supporting goal-directed behavior during training. Copyright © 2017. Published by Elsevier Inc.

  13. NDN-CRAHNs: Named Data Networking for Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rana Asif Rehman

    2015-01-01

    Full Text Available Named data networking (NDN is a newly proposed paradigm for future Internet, in which communication among nodes is based on data names, decoupling from their locations. In dynamic and self-organized cognitive radio ad hoc networks (CRAHNs, it is difficult to maintain end-to-end connectivity between ad hoc nodes especially in the presence of licensed users and intermittent wireless channels. Moreover, IP-based CRAHNs have several issues like scalability, inefficient-mapping, poor resource utilization, and location dependence. By leveraging the advantages of NDN, in this paper, we propose a new cross layer fine-grained architecture called named data networking for cognitive radio ad hoc networks (NDN-CRAHNs. The proposed architecture provides distinct features such as in-networking caching, security, scalability, and multipath routing. The performances of the proposed scheme are evaluated comparing to IP-based scheme in terms of average end-to-end delay and packet delivery ratio. Simulation results show that the proposed scheme is effective in terms of average contents download time and packet delivery ratios comparing to conventional cognitive radio ad hoc networks.

  14. Scaling of load in communications networks.

    Science.gov (United States)

    Narayan, Onuttom; Saniee, Iraj

    2010-09-01

    We show that the load at each node in a preferential attachment network scales as a power of the degree of the node. For a network whose degree distribution is p(k)∼k{-γ} , we show that the load is l(k)∼k{η} with η=γ-1 , implying that the probability distribution for the load is p(l)∼1/l{2} independent of γ . The results are obtained through scaling arguments supported by finite size scaling studies. They contradict earlier claims, but are in agreement with the exact solution for the special case of tree graphs. Results are also presented for real communications networks at the IP layer, using the latest available data. Our analysis of the data shows relatively poor power-law degree distributions as compared to the scaling of the load versus degree. This emphasizes the importance of the load in network analysis.

  15. Improved method to determine the molar volume and compositions of the NaCl-H2O-CO2 system inclusion

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    On the basis of Parry’s method (1986), an improved method was established to determine the molar volume (Vm) and compositions (X) of the NaCl-H2O-CO2 (NHC) system inclusion. To use this method, the determination of Vm-X only requires three microthermometric data of a NHC inclusion: partial homog-enization temperature (Th ,CO2), salinity (S) and total homogenization temperature (Th). Theoretically, four associated equations are needed containing four unknown parameters: X CO2, XNaCl, Vm and F (volume fraction of CO2 phase in total inclusion when occurring partial homogenization). When they are released, the Vm-X are determined. The former three equations, only correlated with Th ,CO2, S and F, have simplified expressions:XCO2=f1(Th,CO2,S,F),XNaCl=f2(Th,CO2,S,F),Vm=f3(Th,CO2,S,F). The last one is the thermodynamic relationship of X CO2, XNaCl, Vm and Th:f4(XCO2,XNaCl,Vm,Th)=0.Since the above four associated equations are complicated, it is necessary to adopt iterative technique to release them. The technique can be described by:(i) Freely input a F value (0≤F≤1),with Th ,CO2 and S, into the former three equations. As a result,X CO 2,XNaCl and the molar volume value recorded as Vm1 are derived. (ii) Input the X CO2 and XNaCl gotten in the step above into the last equation, and another molar volume value recorded as Vm2 is determined. (iii) If Vm1 is unequal to Vm2, the calculation will be restarted from “(i)”. The iteration is completed until Vm1 is equal to Vm2, which means that the four associated equations are released. Compared to Parry’s (1986) solution method, the improved method is more convenient to use, as well as more accurate to determine X CO 2. It is available for a NHC inlusion whose partial homogenization temperature is higher than clatherate melting temperature and there are no solid salt crystals in the inclusion at parital homogenization.

  16. Improved method to determine the molar volume and compositions of the NaCl-H2O-CO2 system inclusion

    Institute of Scientific and Technical Information of China (English)

    SONG YuCai; HU WenXuan; NI Pei; DUAN ZhenHao; ZHANG XueFeng

    2007-01-01

    On the basis of Parry's method (1986),an improved method was established to determine the molar volume(Vm)and compositions(X)of the NaCl-H2O-CO2(NHC)system inclusion.To use this method,the determination of Vm-X only requires three microthermometric data of a NHC inclusion:partial homogenization temperature(Th,CO2),salinity(s)and total homogenization temperature(Th).Theoretically,four associated equations are needed containing four unknown parameters:Xco2,XNcl,Vm and F (volume fraction of CO2 phase in total inclusion when occurring partial homogenization).When they are released,the Vm-X are determined.The former three equations,only correlated with Th,co2,S and F,have simplified expressions:XCO2=f1(Th,CO2,S,F),XNaCl=f2(Th,CO2,S,F),Vm=f3(Th,CO2,S,F).The last one is the thermodynamic relationship of Xco2,Xnacl,vm and Th:f4(XCO2,XNacl,Vm,Th)=0. Since the above four associated equations are complicated,it is necessary to adopt iterative technique to release them.The technique can be described by:(i)Freely input a F value(0≤F≤1),with Th,co2 and S,into the former three equations.As a result,Xco2,XNacl and the molar volume value recorded as Vm1 are derived.(ii)Input the Xco2 and XNacl gotten in the step above into the last equation,and another molar volume value recorded as Vm2 is determined.(iii) If Vm1 is unequal to Vm2,the calculation will be restarted from"(i)".The iteration is completed until Vm1 is equal to Vm2,which means that the four associated equations are released.Compared to Parry's (1986) solution method,the improved method is more convenient to use,as well as more accurate to determine Xco2.It is available for a NHC inlusion whose partial homogenization temperature is higher than clatherate melting temperature and there are no solid salt crystals in the inclusion at parital homogenization.

  17. Simulating synchronization in neuronal networks

    Science.gov (United States)

    Fink, Christian G.

    2016-06-01

    We discuss several techniques used in simulating neuronal networks by exploring how a network's connectivity structure affects its propensity for synchronous spiking. Network connectivity is generated using the Watts-Strogatz small-world algorithm, and two key measures of network structure are described. These measures quantify structural characteristics that influence collective neuronal spiking, which is simulated using the leaky integrate-and-fire model. Simulations show that adding a small number of random connections to an otherwise lattice-like connectivity structure leads to a dramatic increase in neuronal synchronization.

  18. Soil Bacterial and Fungal Communities Show Distinct Recovery Patterns during Forest Ecosystem Restoration.

    Science.gov (United States)

    Sun, Shan; Li, Song; Avera, Bethany N; Strahm, Brian D; Badgley, Brian D

    2017-07-15

    Bacteria and fungi are important mediators of biogeochemical processes and play essential roles in the establishment of plant communities, which makes knowledge about their recovery after extreme disturbances valuable for understanding ecosystem development. However, broad ecological differences between bacterial and fungal organisms, such as growth rates, stress tolerance, and substrate utilization, suggest they could follow distinct trajectories and show contrasting dynamics during recovery. In this study, we analyzed both the intra-annual variability and decade-scale recovery of bacterial and fungal communities in a chronosequence of reclaimed mined soils using next-generation sequencing to quantify their abundance, richness, β-diversity, taxonomic composition, and cooccurrence network properties. Bacterial communities shifted gradually, with overlapping β-diversity patterns across chronosequence ages, while shifts in fungal communities were more distinct among different ages. In addition, the magnitude of intra-annual variability in bacterial β-diversity was comparable to the changes across decades of chronosequence age, while fungal communities changed minimally across months. Finally, the complexity of bacterial cooccurrence networks increased with chronosequence age, while fungal networks did not show clear age-related trends. We hypothesize that these contrasting dynamics of bacteria and fungi in the chronosequence result from (i) higher growth rates for bacteria, leading to higher intra-annual variability; (ii) higher tolerance to environmental changes for fungi; and (iii) stronger influence of vegetation on fungal communities. IMPORTANCE Both bacteria and fungi play essential roles in ecosystem functions, and information about their recovery after extreme disturbances is important for understanding whole-ecosystem development. Given their many differences in phenotype, phylogeny, and life history, a comparison of different bacterial and fungal recovery

  19. Recurrent Spatial Transformer Networks

    DEFF Research Database (Denmark)

    Sønderby, Søren Kaae; Sønderby, Casper Kaae; Maaløe, Lars

    2015-01-01

    We integrate the recently proposed spatial transformer network (SPN) [Jaderberg et. al 2015] into a recurrent neural network (RNN) to form an RNN-SPN model. We use the RNN-SPN to classify digits in cluttered MNIST sequences. The proposed model achieves a single digit error of 1.5% compared to 2.......9% for a convolutional networks and 2.0% for convolutional networks with SPN layers. The SPN outputs a zoomed, rotated and skewed version of the input image. We investigate different down-sampling factors (ratio of pixel in input and output) for the SPN and show that the RNN-SPN model is able to down-sample the input...

  20. Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Lan Liu

    2017-01-01

    Full Text Available As the adoption of Software Defined Networks (SDNs grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the nodes between subnets. We also find that there exists a mobility rate threshold qc. The network malware will spread in the SDN when the mobility rate q>qc. The malware will survive when q>qc and perish when qshowed that our model is effective, and the results may help to decide the SDN control strategy to defend against network malware and provide a theoretical basis to reduce and prevent network security incidents.

  1. Suppressing epidemics on networks by exploiting observer nodes.

    Science.gov (United States)

    Takaguchi, Taro; Hasegawa, Takehisa; Yoshida, Yuichi

    2014-07-01

    To control infection spreading on networks, we investigate the effect of observer nodes that recognize infection in a neighboring node and make the rest of the neighbor nodes immune. We numerically show that random placement of observer nodes works better on networks with clustering than on locally treelike networks, implying that our model is promising for realistic social networks. The efficiency of several heuristic schemes for observer placement is also examined for synthetic and empirical networks. In parallel with numerical simulations of epidemic dynamics, we also show that the effect of observer placement can be assessed by the size of the largest connected component of networks remaining after removing observer nodes and links between their neighboring nodes.

  2. Suppressing epidemics on networks by exploiting observer nodes

    Science.gov (United States)

    Takaguchi, Taro; Hasegawa, Takehisa; Yoshida, Yuichi

    2014-07-01

    To control infection spreading on networks, we investigate the effect of observer nodes that recognize infection in a neighboring node and make the rest of the neighbor nodes immune. We numerically show that random placement of observer nodes works better on networks with clustering than on locally treelike networks, implying that our model is promising for realistic social networks. The efficiency of several heuristic schemes for observer placement is also examined for synthetic and empirical networks. In parallel with numerical simulations of epidemic dynamics, we also show that the effect of observer placement can be assessed by the size of the largest connected component of networks remaining after removing observer nodes and links between their neighboring nodes.

  3. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  4. CUFID-query: accurate network querying through random walk based network flow estimation.

    Science.gov (United States)

    Jeong, Hyundoo; Qian, Xiaoning; Yoon, Byung-Jun

    2017-12-28

    performance evaluation based on biological networks with known functional modules, we show that CUFID-query outperforms the existing state-of-the-art algorithms in terms of prediction accuracy and biological significance of the predictions.

  5. Hemispheric asymmetry of electroencephalography-based functional brain networks.

    Science.gov (United States)

    Jalili, Mahdi

    2014-11-12

    Electroencephalography (EEG)-based functional brain networks have been investigated frequently in health and disease. It has been shown that a number of graph theory metrics are disrupted in brain disorders. EEG-based brain networks are often studied in the whole-brain framework, where all the nodes are grouped into a single network. In this study, we studied the brain networks in two hemispheres and assessed whether there are any hemispheric-specific patterns in the properties of the networks. To this end, resting state closed-eyes EEGs from 44 healthy individuals were processed and the network structures were extracted separately for each hemisphere. We examined neurophysiologically meaningful graph theory metrics: global and local efficiency measures. The global efficiency did not show any hemispheric asymmetry, whereas the local connectivity showed rightward asymmetry for a range of intermediate density values for the constructed networks. Furthermore, the age of the participants showed significant direct correlations with the global efficiency of the left hemisphere, but only in the right hemisphere, with local connectivity. These results suggest that only local connectivity of EEG-based functional networks is associated with brain hemispheres.

  6. CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions

    Science.gov (United States)

    Cheng, Ge; Jin, Hai; Zou, Deqing; Shi, Lei; Ohoussou, Alex K.

    Normally, virtualization technology is adopted to construct the infrastructure of cloud computing environment. Resources are managed and organized dynamically through virtual machine (VM) coalitions in accordance with the requirements of applications. Enforcing mandatory access control (MAC) on the VM coalitions will greatly improve the security of VM-based cloud computing. However, the existing MAC models lack the mechanism to confine the covert flows and are hard to eliminate the convert channels. In this paper, we propose a covert flows confinement mechanism for virtual machine coalitions (CFCC), which introduces dynamic conflicts of interest based on the activity history of VMs, each of which is attached with a label. The proposed mechanism can be used to confine the covert flows between VMs in different coalitions. We implement a prototype system, evaluate its performance, and show that our mechanism is practical.

  7. Surname complex network for Brazil and Portugal

    Science.gov (United States)

    Ferreira, G. D.; Viswanathan, G. M.; da Silva, L. R.; Herrmann, H. J.

    2018-06-01

    We present a study of social networks based on the analysis of Brazilian and Portuguese family names (surnames). We construct networks whose nodes are names of families and whose edges represent parental relations between two families. From these networks we extract the connectivity distribution, clustering coefficient, shortest path and centrality. We find that the connectivity distribution follows an approximate power law. We associate the number of hubs, centrality and entropy to the degree of miscegenation in the societies in both countries. Our results show that Portuguese society has a higher miscegenation degree than Brazilian society. All networks analyzed lead to approximate inverse square power laws in the degree distribution. We conclude that the thermodynamic limit is reached for small networks (3 or 4 thousand nodes). The assortative mixing of all networks is negative, showing that the more connected vertices are connected to vertices with lower connectivity. Finally, the network of surnames presents some small world characteristics.

  8. Fractal and multifractal analyses of bipartite networks

    Science.gov (United States)

    Liu, Jin-Long; Wang, Jian; Yu, Zu-Guo; Xie, Xian-Hua

    2017-03-01

    Bipartite networks have attracted considerable interest in various fields. Fractality and multifractality of unipartite (classical) networks have been studied in recent years, but there is no work to study these properties of bipartite networks. In this paper, we try to unfold the self-similarity structure of bipartite networks by performing the fractal and multifractal analyses for a variety of real-world bipartite network data sets and models. First, we find the fractality in some bipartite networks, including the CiteULike, Netflix, MovieLens (ml-20m), Delicious data sets and (u, v)-flower model. Meanwhile, we observe the shifted power-law or exponential behavior in other several networks. We then focus on the multifractal properties of bipartite networks. Our results indicate that the multifractality exists in those bipartite networks possessing fractality. To capture the inherent attribute of bipartite network with two types different nodes, we give the different weights for the nodes of different classes, and show the existence of multifractality in these node-weighted bipartite networks. In addition, for the data sets with ratings, we modify the two existing algorithms for fractal and multifractal analyses of edge-weighted unipartite networks to study the self-similarity of the corresponding edge-weighted bipartite networks. The results show that our modified algorithms are feasible and can effectively uncover the self-similarity structure of these edge-weighted bipartite networks and their corresponding node-weighted versions.

  9. Critical Fluctuations in Spatial Complex Networks

    Science.gov (United States)

    Bradde, Serena; Caccioli, Fabio; Dall'Asta, Luca; Bianconi, Ginestra

    2010-05-01

    An anomalous mean-field solution is known to capture the nontrivial phase diagram of the Ising model in annealed complex networks. Nevertheless, the critical fluctuations in random complex networks remain mean field. Here we show that a breakdown of this scenario can be obtained when complex networks are embedded in geometrical spaces. Through the analysis of the Ising model on annealed spatial networks, we reveal, in particular, the spectral properties of networks responsible for critical fluctuations and we generalize the Ginsburg criterion to complex topologies.

  10. Mining social networks and security informatics

    CERN Document Server

    Özyer, Tansel; Rokne, Jon; Khoury, Suheil

    2013-01-01

    Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for soci

  11. The dimensionality of ecological networks

    DEFF Research Database (Denmark)

    Eklöf, Anna; Jacob, Ute; Kopp, Jason

    2013-01-01

    How many dimensions (trait-axes) are required to predict whether two species interact? This unanswered question originated with the idea of ecological niches, and yet bears relevance today for understanding what determines network structure. Here, we analyse a set of 200 ecological networks......, including food webs, antagonistic and mutualistic networks, and find that the number of dimensions needed to completely explain all interactions is small (... the most to explaining network structure. We show that accounting for a few traits dramatically improves our understanding of the structure of ecological networks. Matching traits for resources and consumers, for example, fruit size and bill gape, are the most successful combinations. These results link...

  12. Comparative study of Hg(II) adsorption by thiol- and hydroxyl-containing bifunctional montmorillonite and vermiculite

    Energy Technology Data Exchange (ETDEWEB)

    Tran, Lytuong [College of Environment and Energy, South China University of Technology, Guangzhou 510006 (China); The Key Lab of Pollution Control and Ecosystem Restoration in Industry Clusters, Ministry of Education, Guangzhou 510006 (China); QuangBinh University, QuangBinh (Viet Nam); Wu, Pingxiao, E-mail: pppxwu@scut.edu.cn [College of Environment and Energy, South China University of Technology, Guangzhou 510006 (China); The Key Lab of Pollution Control and Ecosystem Restoration in Industry Clusters, Ministry of Education, Guangzhou 510006 (China); The Key Laboratory of Environmental Protection and Eco-Remediation of Guangdong Regular Higher Education Institutions (China); Zhu, Yajie; Liu, Shuai; Zhu, Nengwu [College of Environment and Energy, South China University of Technology, Guangzhou 510006 (China); The Key Lab of Pollution Control and Ecosystem Restoration in Industry Clusters, Ministry of Education, Guangzhou 510006 (China)

    2015-11-30

    Graphical abstract: - Highlights: • Novel adsorbents were prepared by functionalization with BAL to remove Hg(II). • Thiol and hydroxyl groups contributed to the enhancement of Hg(II) removal. • BAL-Vm showed the most adsorption capacity of Hg(II). • The adsorption mechanism was discussed based on the adsorption behaviors. - Abstract: A novel approach to prepare adsorbents for Hg(II) uptake from aqueous media based on the grafting of dimercaprol (BAL), containing thiol and hydroxyl groups, onto the natural montmorillonite and vermiculite was investigated concerning the evaluation of the adsorption capacity. The kinetic study showed that the adsorption process abided by pseudo-second-order model. The adsorption behavior of Hg(II) onto the obtained samples fitted well with Langmuir isotherm model, exhibiting an enhanced maximum adsorption capacity of 8.57 and 3.21 mg g{sup −1} for BAL-Vm and BAL-Mt, respectively. The feasibility of Hg(II) uptake onto the the samples was studied thermodynamically and the calculated coefficients such as ΔH, ΔS and ΔG indicated a physical and spontaneous process. The pH values and coexisting cations had a great influence on Hg(II) removal, confirming the optimal pH value of 4.0–5.0 and the negative correlation between the ionic strength and the adsorption capacity of Hg(II). In general, BAL-Vm possessed a higher efficiency of Hg(II) uptake than BAL-Mt, contrary to that of the pristine clays. The pristine and functionalized materials were investigated by XRD, FTIR, BET, SEM and zeta potential analysis to gain in-depth insight into the structure and surface morphology. The results showed that BAL was successful grafted on montmorillonite and vermiculite surface, providing plentiful adsorption sites as chelating ligands. The mechanisms of Hg(II) adsorption on these samples could be further explained as ion exchange and electrostatic attraction for Vm and Mt, and formation of complexes for BAL-Vm and BAL-Mt.

  13. Comparative study of Hg(II) adsorption by thiol- and hydroxyl-containing bifunctional montmorillonite and vermiculite

    International Nuclear Information System (INIS)

    Tran, Lytuong; Wu, Pingxiao; Zhu, Yajie; Liu, Shuai; Zhu, Nengwu

    2015-01-01

    Graphical abstract: - Highlights: • Novel adsorbents were prepared by functionalization with BAL to remove Hg(II). • Thiol and hydroxyl groups contributed to the enhancement of Hg(II) removal. • BAL-Vm showed the most adsorption capacity of Hg(II). • The adsorption mechanism was discussed based on the adsorption behaviors. - Abstract: A novel approach to prepare adsorbents for Hg(II) uptake from aqueous media based on the grafting of dimercaprol (BAL), containing thiol and hydroxyl groups, onto the natural montmorillonite and vermiculite was investigated concerning the evaluation of the adsorption capacity. The kinetic study showed that the adsorption process abided by pseudo-second-order model. The adsorption behavior of Hg(II) onto the obtained samples fitted well with Langmuir isotherm model, exhibiting an enhanced maximum adsorption capacity of 8.57 and 3.21 mg g −1 for BAL-Vm and BAL-Mt, respectively. The feasibility of Hg(II) uptake onto the the samples was studied thermodynamically and the calculated coefficients such as ΔH, ΔS and ΔG indicated a physical and spontaneous process. The pH values and coexisting cations had a great influence on Hg(II) removal, confirming the optimal pH value of 4.0–5.0 and the negative correlation between the ionic strength and the adsorption capacity of Hg(II). In general, BAL-Vm possessed a higher efficiency of Hg(II) uptake than BAL-Mt, contrary to that of the pristine clays. The pristine and functionalized materials were investigated by XRD, FTIR, BET, SEM and zeta potential analysis to gain in-depth insight into the structure and surface morphology. The results showed that BAL was successful grafted on montmorillonite and vermiculite surface, providing plentiful adsorption sites as chelating ligands. The mechanisms of Hg(II) adsorption on these samples could be further explained as ion exchange and electrostatic attraction for Vm and Mt, and formation of complexes for BAL-Vm and BAL-Mt.

  14. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  15. Synaptic Plasticity and Spike Synchronisation in Neuronal Networks

    Science.gov (United States)

    Borges, Rafael R.; Borges, Fernando S.; Lameu, Ewandson L.; Protachevicz, Paulo R.; Iarosz, Kelly C.; Caldas, Iberê L.; Viana, Ricardo L.; Macau, Elbert E. N.; Baptista, Murilo S.; Grebogi, Celso; Batista, Antonio M.

    2017-12-01

    Brain plasticity, also known as neuroplasticity, is a fundamental mechanism of neuronal adaptation in response to changes in the environment or due to brain injury. In this review, we show our results about the effects of synaptic plasticity on neuronal networks composed by Hodgkin-Huxley neurons. We show that the final topology of the evolved network depends crucially on the ratio between the strengths of the inhibitory and excitatory synapses. Excitation of the same order of inhibition revels an evolved network that presents the rich-club phenomenon, well known to exist in the brain. For initial networks with considerably larger inhibitory strengths, we observe the emergence of a complex evolved topology, where neurons sparsely connected to other neurons, also a typical topology of the brain. The presence of noise enhances the strength of both types of synapses, but if the initial network has synapses of both natures with similar strengths. Finally, we show how the synchronous behaviour of the evolved network will reflect its evolved topology.

  16. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  17. Childhood maltreatment and combat posttraumatic stress differentially predict fear-related fronto-subcortical connectivity.

    Science.gov (United States)

    Birn, Rasmus M; Patriat, Rémi; Phillips, Mary L; Germain, Anne; Herringa, Ryan J

    2014-10-01

    Adult posttraumatic stress disorder (PTSD) has been characterized by altered fear-network connectivity. Childhood trauma is a major risk factor for adult PTSD, yet its contribution to fear-network connectivity in PTSD remains unexplored. We examined, within a single model, the contribution of childhood maltreatment, combat exposure, and combat-related posttraumatic stress symptoms (PTSS) to resting-state connectivity (rs-FC) of the amygdala and hippocampus in military veterans. Medication-free male veterans (n = 27, average 26.6 years) with a range of PTSS completed resting-state fMRI. Measures including the Clinician-Administered PTSD Scale (CAPS), Childhood Trauma Questionnaire (CTQ), and Combat Exposure Scale (CES) were used to predict rs-FC using multilinear regression. Fear-network seeds included the amygdala and hippocampus. Amygdala: CTQ predicted lower connectivity to ventromedial prefrontal cortex (vmPFC), but greater anticorrelation with dorsal/lateral PFC. CAPS positively predicted connectivity to insula, and loss of anticorrelation with dorsomedial/dorsolateral (dm/dl)PFC. Hippocampus: CTQ predicted lower connectivity to vmPFC, but greater anticorrelation with dm/dlPFC. CES predicted greater anticorrelation, whereas CAPS predicted less anticorrelation with dmPFC. Childhood trauma, combat exposure, and PTSS differentially predict fear-network rs-FC. Childhood maltreatment may weaken ventral prefrontal-subcortical circuitry important in automatic fear regulation, but, in a compensatory manner, may also strengthen dorsal prefrontal-subcortical pathways involved in more effortful emotion regulation. PTSD symptoms, in turn, appear to emerge with the loss of connectivity in the latter pathway. These findings suggest potential mechanisms by which developmental trauma exposure leads to adult PTSD, and which brain mechanisms are associated with the emergence of PTSD symptoms. © 2014 Wiley Periodicals, Inc.

  18. The complex network reliability and influential nodes

    Science.gov (United States)

    Li, Kai; He, Yongfeng

    2017-08-01

    In order to study the complex network node important degree and reliability, considering semi-local centrality, betweenness centrality and PageRank algorithm, through the simulation method to gradually remove nodes and recalculate the importance in the random network, small world network and scale-free network. Study the relationship between the largest connected component and node removed proportion, the research results show that betweenness centrality and PageRank algorithm based on the global information network are more effective for evaluating the importance of nodes, and the reliability of the network is related to the network topology.

  19. Transforming phylogenetic networks: Moving beyond tree space

    OpenAIRE

    Huber, Katharina T.; Moulton, Vincent; Wu, Taoyang

    2016-01-01

    Phylogenetic networks are a generalization of phylogenetic trees that are used to represent reticulate evolution. Unrooted phylogenetic networks form a special class of such networks, which naturally generalize unrooted phylogenetic trees. In this paper we define two operations on unrooted phylogenetic networks, one of which is a generalization of the well-known nearest-neighbor interchange (NNI) operation on phylogenetic trees. We show that any unrooted phylogenetic network can be transforme...

  20. Measuring political polarization: Twitter shows the two sides of Venezuela

    Science.gov (United States)

    Morales, A. J.; Borondo, J.; Losada, J. C.; Benito, R. M.

    2015-03-01

    We say that a population is perfectly polarized when divided in two groups of the same size and opposite opinions. In this paper, we propose a methodology to study and measure the emergence of polarization from social interactions. We begin by proposing a model to estimate opinions in which a minority of influential individuals propagate their opinions through a social network. The result of the model is an opinion probability density function. Next, we propose an index to quantify the extent to which the resulting distribution is polarized. Finally, we apply the proposed methodology to a Twitter conversation about the late Venezuelan president, Hugo Chávez, finding a good agreement between our results and offline data. Hence, we show that our methodology can detect different degrees of polarization, depending on the structure of the network.

  1. Energy Efficient Evolution of Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben

    2011-01-01

    options for how to evolve their networks, allowing them to carry the expected increase in traffic. The best solution is generally selected based on two main criteria, performance and cost. However, pushed by a variety of environmental and energy challenges, MNOs are now also showing interest...... in understanding the impact that different options can have on the energy consumption of their networks. This paper investigates the possible energy gains of evolving a mobile network through a joint pico deployment and macro upgrade solution over a period of 8 years. Besides the network energy consumption, energy...... efficiency in Mbps/kWh is also analyzed. Furthermore, a cost analysis is carried out, to give a more complete picture of the different options being considered. Focusing on the last year of the evolution analysis, results show that deploying more pico sites reduces the energy consumption of the network...

  2. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  3. Self-Interested Routing in Queueing Networks

    OpenAIRE

    Ali K. Parlaktürk; Sunil Kumar

    2004-01-01

    We study self-interested routing in stochastic networks, taking into account the discrete stochastic dynamics of such networks. We analyze a two-station multiclass queueing network in which the system manager chooses the scheduling rule and individual customers choose routes in a self-interested manner. We show that this network can be unstable in Nash equilibrium under some scheduling rules. We also design a nontrivial scheduling rule that negates the performance degradation resulting from s...

  4. Complex network description of the ionosphere

    Science.gov (United States)

    Lu, Shikun; Zhang, Hao; Li, Xihai; Li, Yihong; Niu, Chao; Yang, Xiaoyun; Liu, Daizhi

    2018-03-01

    Complex networks have emerged as an essential approach of geoscience to generate novel insights into the nature of geophysical systems. To investigate the dynamic processes in the ionosphere, a directed complex network is constructed, based on a probabilistic graph of the vertical total electron content (VTEC) from 2012. The results of the power-law hypothesis test show that both the out-degree and in-degree distribution of the ionospheric network are not scale-free. Thus, the distribution of the interactions in the ionosphere is homogenous. None of the geospatial positions play an eminently important role in the propagation of the dynamic ionospheric processes. The spatial analysis of the ionospheric network shows that the interconnections principally exist between adjacent geographical locations, indicating that the propagation of the dynamic processes primarily depends on the geospatial distance in the ionosphere. Moreover, the joint distribution of the edge distances with respect to longitude and latitude directions shows that the dynamic processes travel further along the longitude than along the latitude in the ionosphere. The analysis of small-world-ness indicates that the ionospheric network possesses the small-world property, which can make the ionosphere stable and efficient in the propagation of dynamic processes.

  5. Preferential Attachment in Online Networks: Measurement and Explanations

    NARCIS (Netherlands)

    Kunegis, J; Blattner, M; Moser, C.

    2013-01-01

    We perform an empirical study of the preferential attachment phenomenon in temporal networks and show that on the Web, networks follow a nonlinear preferential attachment model in which the exponent depends on the type of network considered. The classical preferential attachment model for networks

  6. Measuring the evolutionary rewiring of biological networks.

    Directory of Open Access Journals (Sweden)

    Chong Shou

    Full Text Available We have accumulated a large amount of biological network data and expect even more to come. Soon, we anticipate being able to compare many different biological networks as we commonly do for molecular sequences. It has long been believed that many of these networks change, or "rewire", at different rates. It is therefore important to develop a framework to quantify the differences between networks in a unified fashion. We developed such a formalism based on analogy to simple models of sequence evolution, and used it to conduct a systematic study of network rewiring on all the currently available biological networks. We found that, similar to sequences, biological networks show a decreased rate of change at large time divergences, because of saturation in potential substitutions. However, different types of biological networks consistently rewire at different rates. Using comparative genomics and proteomics data, we found a consistent ordering of the rewiring rates: transcription regulatory, phosphorylation regulatory, genetic interaction, miRNA regulatory, protein interaction, and metabolic pathway network, from fast to slow. This ordering was found in all comparisons we did of matched networks between organisms. To gain further intuition on network rewiring, we compared our observed rewirings with those obtained from simulation. We also investigated how readily our formalism could be mapped to other network contexts; in particular, we showed how it could be applied to analyze changes in a range of "commonplace" networks such as family trees, co-authorships and linux-kernel function dependencies.

  7. Cluster-based single-sink wireless sensor networks and passive optical network converged network incorporating sideband modulation schemes

    Science.gov (United States)

    Kumar, Love; Sharma, Vishal; Singh, Amarpal

    2018-02-01

    Wireless sensor networks have tremendous applications, such as civil, military, and environmental monitoring. In most of the applications, sensor data are required to be propagated over the internet/core networks, which result in backhaul setback. Subsequently, there is a necessity to backhaul the sensed information of such networks together with prolonging of the transmission link. Passive optical network (PON) is next-generation access technology emerging as a potential candidate for convergence of the sensed data to the core system. Earlier, the work with single-optical line terminal-PON was demonstrated and investigated merely analytically. This work is an attempt to demonstrate a practical model of a bidirectional single-sink wireless sensor network-PON converged network in which the collected data from cluster heads are transmitted over PON networks. Further, modeled converged structure has been investigated under the influence of double, single, and tandem sideband modulation schemes incorporating a corresponding phase-delay to the sensor data entities that have been overlooked in the past. The outcome illustrates the successful fusion of the sensor data entities over PON with acceptable bit error rate and signal to noise ratio serving as a potential development in the sphere of such converged networks. It has also been revealed that the data entities treated with tandem side band modulation scheme help in improving the performance of the converged structure. Additionally, analysis for uplink transmission reported with queue theory in terms of time cycle, average time delay, data packet generation, and bandwidth utilization. An analytical analysis of proposed converged network shows that average time delay for data packet transmission is less as compared with time cycle delay.

  8. Volumetric modulated arc therapy and breath-hold in image-guided locoregional left-sided breast irradiation

    International Nuclear Information System (INIS)

    Osman, Sarah O.S.; Hol, Sandra; Poortmans, Philip M.; Essers, Marion

    2014-01-01

    Purpose: To investigate the effects of using volumetric modulated arc therapy (VMAT) and/or voluntary moderate deep inspiration breath-hold (vmDIBH) in the radiation therapy (RT) of left-sided breast cancer including the regional lymph nodes. Materials and methods: For 13 patients, four treatment combinations were compared; 3D-conformal RT (i.e., forward IMRT) in free-breathing 3D-CRT(FB), 3D-CRT(vmDIBH), 2 partial arcs VMAT(FB), and VMAT(vmDIBH). Prescribed dose was 42.56 Gy in 16 fractions. For 10 additional patients, 3D-CRT and VMAT in vmDIBH only were also compared. Results: Dose conformity, PTV coverage, ipsilateral and total lung doses were significantly better for VMAT plans compared to 3D-CRT. Mean heart dose (D mean,heart ) reduction in 3D-CRT(vmDIBH) was between 0.9 and 8.6 Gy, depending on initial D mean,heart (in 3D-CRT(FB) plans). VMAT(vmDIBH) reduced the D mean,heart further when D mean,heart was still >3.2 Gy in 3D-CRT(vmDIBH). Mean contralateral breast dose was higher for VMAT plans (2.7 Gy) compared to 3DCRT plans (0.7 Gy). Conclusions: VMAT and 3D-CRT(vmDIBH) significantly reduced heart dose for patients treated with locoregional RT of left-sided breast cancer. When D mean,heart exceeded 3.2 Gy in 3D-CRT(vmDIBH) plans, VMAT(vmDIBH) resulted in a cumulative heart dose reduction. VMAT also provided better target coverage and reduced ipsilateral lung dose, at the expense of a small increase in the dose to the contralateral breast

  9. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qian Xiao

    2012-09-01

    Full Text Available To provide security for data gathering based on network coding in wireless sensor networks (WSNs, a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPPaamp;PP protocol using network coding is designed. DPPaamp;PP makes use of a new proposed pollution symbol selection and pollution (PSSP scheme based on a new obfuscation idea to pollute existing symbols. Analyses of DPPaamp;PP show that it not only requires low overhead on computation and communication, but also provides high security on resisting brute-force attacks.

  10. Failure to unmask pseudonormal diastolic function by a valsalva maneuver: tricuspid insufficiency is a major factor.

    Science.gov (United States)

    Hu, Kai; Liu, Dan; Niemann, Markus; Hatle, Liv; Herrmann, Sebastian; Voelker, Wolfram; Ertl, Georg; Bijnens, Bart; Weidemann, Frank

    2011-11-01

    For the clinical assessment of patients with dyspnea, the inversion of the early (E) and late (A) transmitral flow during Valsalva maneuver (VM) frequently helps to distinguish pseudonormal from normal filling pattern. However, in an important number of patients, VM fails to reveal the change from dominant early mitral flow velocity toward larger late velocity. From December 2009 to October 2010, we selected consecutive patients with abnormal filling with (n=25) and without E/A inversion (n=25) during VM. Transmitral, tricuspid, and pulmonary Doppler traces were recorded and the degree of insufficiency was estimated. After evaluating all standard echocardiographic morphological, functional, and flow-related parameters, it became evident that the failure to unmask the pseudonormal filling pattern by VM was related to the degree of the tricuspid insufficiency (TI). TI was graded as mild in 24 of 25 patients in the group with E/A inversion during VM, whereas TI was graded as moderate to severe in 24 of the 25 patients with pseudonormal diastolic function without E/A inversion during VM. Our data suggest that TI is a major factor to prevent E/A inversion during a VM in patients with pseudonormal diastolic function. This probably is due to a decrease in TI resulting in an increase in forward flow rather than the expected decrease during the VM. Thus, whenever a pseudonormal diastolic filling pattern is suspected, the use of a VM is not an informative discriminator in the presence of moderate or severe TI.

  11. Parallel consensual neural networks.

    Science.gov (United States)

    Benediktsson, J A; Sveinsson, J R; Ersoy, O K; Swain, P H

    1997-01-01

    A new type of a neural-network architecture, the parallel consensual neural network (PCNN), is introduced and applied in classification/data fusion of multisource remote sensing and geographic data. The PCNN architecture is based on statistical consensus theory and involves using stage neural networks with transformed input data. The input data are transformed several times and the different transformed data are used as if they were independent inputs. The independent inputs are first classified using the stage neural networks. The output responses from the stage networks are then weighted and combined to make a consensual decision. In this paper, optimization methods are used in order to weight the outputs from the stage networks. Two approaches are proposed to compute the data transforms for the PCNN, one for binary data and another for analog data. The analog approach uses wavelet packets. The experimental results obtained with the proposed approach show that the PCNN outperforms both a conjugate-gradient backpropagation neural network and conventional statistical methods in terms of overall classification accuracy of test data.

  12. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  13. Extending the Lifetime of Sensor Networks through Adaptive Reclustering

    Directory of Open Access Journals (Sweden)

    Gianluigi Ferrari

    2007-06-01

    Full Text Available We analyze the lifetime of clustered sensor networks with decentralized binary detection under a physical layer quality-of-service (QoS constraint, given by the maximum tolerable probability of decision error at the access point (AP. In order to properly model the network behavior, we consider four different distributions (exponential, uniform, Rayleigh, and lognormal for the lifetime of a single sensor. We show the benefits, in terms of longer network lifetime, of adaptive reclustering. We also derive an analytical framework for the computation of the network lifetime and the penalty, in terms of time delay and energy consumption, brought by adaptive reclustering. On the other hand, absence of reclustering leads to a shorter network lifetime, and we show the impact of various clustering configurations under different QoS conditions. Our results show that the organization of sensors in a few big clusters is the winning strategy to maximize the network lifetime. Moreover, the observation of the phenomenon should be frequent in order to limit the penalties associated with the reclustering procedure. We also apply the developed framework to analyze the energy consumption associated with the proposed reclustering protocol, obtaining results in good agreement with the performance of realistic wireless sensor networks. Finally, we present simulation results on the lifetime of IEEE 802.15.4 wireless sensor networks, which enrich the proposed analytical framework and show that typical networking performance metrics (such as throughput and delay are influenced by the sensor network lifetime.

  14. Extending the Lifetime of Sensor Networks through Adaptive Reclustering

    Directory of Open Access Journals (Sweden)

    Ferrari Gianluigi

    2007-01-01

    Full Text Available We analyze the lifetime of clustered sensor networks with decentralized binary detection under a physical layer quality-of-service (QoS constraint, given by the maximum tolerable probability of decision error at the access point (AP. In order to properly model the network behavior, we consider four different distributions (exponential, uniform, Rayleigh, and lognormal for the lifetime of a single sensor. We show the benefits, in terms of longer network lifetime, of adaptive reclustering. We also derive an analytical framework for the computation of the network lifetime and the penalty, in terms of time delay and energy consumption, brought by adaptive reclustering. On the other hand, absence of reclustering leads to a shorter network lifetime, and we show the impact of various clustering configurations under different QoS conditions. Our results show that the organization of sensors in a few big clusters is the winning strategy to maximize the network lifetime. Moreover, the observation of the phenomenon should be frequent in order to limit the penalties associated with the reclustering procedure. We also apply the developed framework to analyze the energy consumption associated with the proposed reclustering protocol, obtaining results in good agreement with the performance of realistic wireless sensor networks. Finally, we present simulation results on the lifetime of IEEE 802.15.4 wireless sensor networks, which enrich the proposed analytical framework and show that typical networking performance metrics (such as throughput and delay are influenced by the sensor network lifetime.

  15. Pre-processing for Triangulation of Probabilistic Networks

    NARCIS (Netherlands)

    Bodlaender, H.L.; Koster, A.M.C.A.; Eijkhof, F. van den; Gaag, L.C. van der

    2001-01-01

    The currently most efficient algorithm for inference with a probabilistic network builds upon a triangulation of a networks graph. In this paper, we show that pre-processing can help in finding good triangulations for probabilistic networks, that is, triangulations with a minimal maximum

  16. Formulation and applications of complex network theory

    Science.gov (United States)

    Park, Juyong

    In recent years, there has been a great surge of interest among physicists in modeling social, technological, or biological systems as networks. Analyses of large-scale networks such as the Internet have led to discoveries of many unexpected network properties, including power-law degree distributions. These discoveries have prompted physicists to devise novel ways to model networks, both computational and theoretical. In this dissertation, we present several network models and their applications. First, we study the theory of Exponential Random Graphs. We derive it from the principle of maximum entropy, thereby showing that it is the equivalent of the Gibbs ensemble for networks. Using tools of statistical physics, we solve well-known and new examples that include power-law networks and the two-star model. Our solutions confirm the existence of a first-order phase transition for the latter whose exact behavior has not been presented previously. We also study degree correlations and clustering in networks. Degrees of adjacent vertices are positively correlated in social networks, whereas they are negatively correlated in other types of networks. We demonstrate that a negative degree correlation is a more natural state of a network, and therefore that social networks are an exception. We argue that variations in the number of vertices in social groups cause positive degree correlations, and analyze a model that incorporates such a mechanism. The model indeed shows a high level of degree correlation and clustering that is similar in value to those of real networks. Finally, we develop algorithms for ranking vertices in networks that represent pairwise comparisons. The first algorithm is based on the familiar concept of indirect wins and losses. The second algorithm is based on the concept of retrodictive accuracy, which is maximized by positioning as many winners above the losers as possible. We compare the rankings of American college football teams generated by our

  17. Building the quantum network

    International Nuclear Information System (INIS)

    Elliott, Chip

    2002-01-01

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  18. Electric Field Gradients at Hf and Fe Sites in Hf2Fe Recalculated

    International Nuclear Information System (INIS)

    Belosevic-Cavor, J.; Cekic, B.; Novakovic, N.; Koteski, V.; Milosevic, Z.

    2004-01-01

    The electric field gradients (EFG) of the Hf 2 Fe intermetallic compound were calculated using the full-potential linearized augmented plain-wave (FP-LAPW) method as embodied in the WIEN 97 code. The obtained values are compared with other ab-initio calculations and on a qualitative basis with the previously reported experimental data obtained from TDPAC. The calculated results, -23.1.10 21 V/m 2 and 2.7.10 21 V/m 2 for Hf 48f and Fe 32e position, respectively, are in excellent agreement with experimental data (23.4.10 21 V/m 2 and 2.7.10 21 V/m 2 ), better than those reported in earlier calculations. The calculated EFG for Hf 16c position (4.2.10 21 V/m 2 ) is stronger than the experimental one (1.1.10 21 V/m 2 ).

  19. Ventromedial prefrontal cortex damage does not impair the development and use of common ground in social interaction: implications for cognitive theory of mind.

    Science.gov (United States)

    Gupta, Rupa; Tranel, Daniel; Duff, Melissa C

    2012-01-01

    During conversation, interactants draw on their shared communicative context and history ("common ground") to help decide what to say next, tailoring utterances based on their knowledge of what the listener knows. The use of common ground draws on an understanding of the thoughts and feelings of others to create and update a model of what is known by the other person, employing cognitive processes such as theory of mind. We tested the hypothesis that the ventromedial prefrontal cortex (vmPFC), a neural region involved in processing and interpreting social and emotional information, would be critical for the development and use of common ground. We studied seven patients with bilateral vmPFC damage and seven age-, sex-, and education-matched healthy comparison participants, each interacting with a familiar partner. Across 24 trials, participants verbally directed their partners how to arrange a set of 12 abstract tangram cards. Our hypothesis was not supported: the vmPFC and healthy comparison groups showed similar development and use of common ground, evident in reduction in time and words used to describe the cards, similar increases in the use of definite references (e.g., the horse), and comparable use of verbal play (playful language) in their interactions. These results argue against the idea that the vmPFC is critical for the development and use of common ground in social interaction. We propose that a cognitive and neuroanatomical bifurcation in theory of mind processes may explain this outcome. The vmPFC may be important for affective theory of mind (the ability to understand another's feelings); however, the development and use of common ground in social interaction may place higher demands on the ability to understand another's knowledge, or cognitive theory of mind, which may not require the vmPFC. Copyright © 2011 Elsevier Ltd. All rights reserved.

  20. Development of White Matter Microstructure and Intrinsic Functional Connectivity Between the Amygdala and Ventromedial Prefrontal Cortex: Associations With Anxiety and Depression.

    Science.gov (United States)

    Jalbrzikowski, Maria; Larsen, Bart; Hallquist, Michael N; Foran, William; Calabro, Finnegan; Luna, Beatriz

    2017-10-01

    Connectivity between the amygdala and ventromedial prefrontal cortex (vmPFC) is compromised in multiple psychiatric disorders, many of which emerge during adolescence. To identify to what extent the deviations in amygdala-vmPFC maturation contribute to the onset of psychiatric disorders, it is essential to characterize amygdala-vmPFC connectivity changes during typical development. Using an accelerated cohort longitudinal design (1-3 time points, 10-25 years old, n = 246), we characterized developmental changes of the amygdala-vmPFC subregion functional and structural connectivity using resting-state functional magnetic resonance imaging and diffusion-weighted imaging. Functional connectivity between the centromedial amygdala and rostral anterior cingulate cortex (rACC), anterior vmPFC, and subgenual cingulate significantly decreased from late childhood to early adulthood in male and female subjects. Age-associated decreases were also observed between the basolateral amygdala and the rACC. Importantly, these findings were replicated in a separate cohort (10-22 years old, n = 327). Similarly, structural connectivity, as measured by quantitative anisotropy, significantly decreased with age in the same regions. Functional connectivity between the centromedial amygdala and the rACC was associated with structural connectivity in these same regions during early adulthood (22-25 years old). Finally, a novel time-varying coefficient analysis showed that increased centromedial amygdala-rACC functional connectivity was associated with greater anxiety and depression symptoms during early adulthood, while increased structural connectivity in centromedial amygdala-anterior vmPFC white matter was associated with greater anxiety/depression during late childhood. Specific developmental periods of functional and structural connectivity between the amygdala and the prefrontal systems may contribute to the emergence of anxiety and depressive symptoms and may play a critical role in

  1. Python passive network mapping P2NMAP

    CERN Document Server

    Hosmer, Chet

    2015-01-01

    Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important

  2. Data Dissemination Based on Fuzzy Logic and Network Coding in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Tang

    2017-01-01

    Full Text Available Vehicular networks, as a significant technology in intelligent transportation systems, improve the convenience, efficiency, and safety of driving in smart cities. However, because of the high velocity, the frequent topology change, and the limited bandwidth, it is difficult to efficiently propagate data in vehicular networks. This paper proposes a data dissemination scheme based on fuzzy logic and network coding for vehicular networks, named SFN. It uses fuzzy logic to compute a transmission ability for each vehicle by comprehensively considering the effects of three factors: the velocity change rate, the velocity optimization degree, and the channel quality. Then, two nodes with high abilities are selected as primary backbone and slave backbone in every road segment, which propagate data to other vehicles in this segment and forward them to the backbones in the next segment. The backbone network helps to increase the delivery ratio and avoid invalid transmissions. Additionally, network coding is utilized to reduce transmission overhead and accelerate data retransmission in interbackbone forwarding and intrasegment broadcasting. Experiments show that, compared with existing schemes, SFN has a high delivery ratio and a short dissemination delay, while the backbone network keeps high reliability.

  3. Virtual Machine-level Software Transactional Memory: Principles, Techniques, and Implementation

    Science.gov (United States)

    2015-08-13

    against non-VM STMs, with the same algorithm inside the VM versus “outside”it. Our competitor non-VM STMs include Deuce, ObjectFabric, Multiverse , and...TL2 ByteSTM/NOrec Non-VM/NOrec Deuce/TL2 Object Fabric Multiverse JVSTM (a) 20% writes. (b) 80% writes. Fig. 1 Throughput for Linked-List. Higher is...When Scalability Meets Consistency: Genuine Multiversion Update-Serializable Partial Data Replication. In ICDCS, pages 455–465, 2012. [34] D

  4. The use of contrast-enhanced color doppler ultrasound in the differentiation of retinal detachment from vitreous membrane

    International Nuclear Information System (INIS)

    Han, Sang Suk; Chang, Seung Kook; Yoon, Jung Hee; Lee, Young Joon

    2001-01-01

    To compare the clinical utility of contrast-enhanced color Doppler US in the differentiation of retinal detachment (RD) from vitreous membrane (VM) with that of various conventional US modalities, and to analyze the enhancement patterns in cases showing an enhancement effect. In 32 eyes examined over a recent two-year period, RD (n=14) and VM (n=18) were confirmed by surgery (n=28) or clinical follow-up (n=4). In all cases, gray-scale, color Doppler, and power Doppler US were performed prior to contrast injection, and after the intravenous injection of Levovist (Schering, Berlin) by hand for 30 seconds at a dose of 2.5 g and a concentration of 300 mg/mL via an antecubital vein, contrast-enhanced color Doppler US was performed. At Doppler US, the diagnostic criterion for RD and VM was whether or not color signals were visualized in membranous structures. Diagnostic accuracy was 78% at gray-scale US, 81% at color Doppler US, 59% at power Doppler US, and 97% at contrast-enhanced color Doppler US. The sensitivity of color Doppler US to color signals in RD increased from 57% to 93% after contrast enhancement. The enhancement patterns observed were signal accentuation (n=3), signal extension (n=2), signal addition (n=3), and new signal visualization (n=5). Contrast-enhanced color Doppler US was the most accurate US modality for differentiating RD from VM, showing a significantly increased signal detection rate in RD

  5. How self-determined choice facilitates performance: a key role of the ventromedial prefrontal cortex.

    Science.gov (United States)

    Murayama, Kou; Matsumoto, Madoka; Izuma, Keise; Sugiura, Ayaka; Ryan, Richard M; Deci, Edward L; Matsumoto, Kenji

    2015-05-01

    Recent studies have documented that self-determined choice does indeed enhance performance. However, the precise neural mechanisms underlying this effect are not well understood. We examined the neural correlates of the facilitative effects of self-determined choice using functional magnetic resonance imaging (fMRI). Participants played a game-like task involving a stopwatch with either a stopwatch they selected (self-determined-choice condition) or one they were assigned without choice (forced-choice condition). Our results showed that self-determined choice enhanced performance on the stopwatch task, despite the fact that the choices were clearly irrelevant to task difficulty. Neuroimaging results showed that failure feedback, compared with success feedback, elicited a drop in the vmPFC activation in the forced-choice condition, but not in the self-determined-choice condition, indicating that negative reward value associated with the failure feedback vanished in the self-determined-choice condition. Moreover, the vmPFC resilience to failure in the self-determined-choice condition was significantly correlated with the increased performance. Striatal responses to failure and success feedback were not modulated by the choice condition, indicating the dissociation between the vmPFC and striatal activation pattern. These findings suggest that the vmPFC plays a unique and critical role in the facilitative effects of self-determined choice on performance. © The Author 2013. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  6. Clastogenic effects of radiofrequency radiations on chromosomes of Tradescantia

    International Nuclear Information System (INIS)

    Haider, Thomas; Kundi, Michael; Haider, Manfred; Knasmueller, Siegfried

    1994-01-01

    The clastogenicity of electromagnetic fields (EMF) has so far been studied only under laboratory conditions. We used the Tradescantia-micronucleus (Trad-MCN) bioassay in an in situ experiment to find out whether short-wave electromagnetic fields used for broadcasting (10-21 MHz) may show genotoxic effects. Plant cuttings bearing young flower buds were exposed (30 h) on both sides of a slewable curtain antenna (300/500 kW, 40-170 V/m) and 15 m (90 V/m) and 30 m (70 V/m) distant from a vertical cage antenna (100 kW) as well as at the neighbors living near the broadcasting station (200 m, 1-3 V/m). The exposure at both sides of the slewable curtain antenna was performed simultaneously within cages, one of the Faraday type shielding the field and one non-shielding mesh cage. Laboratory controls were maintained for comparison. Higher MCN frequencies than in laboratory controls were found for all exposure sites in the immediate vicinity of the antennae, where the exposure standards of the electric field strength of the International Radiation Protection Association (IRPA) were exceeded. The results at all exposure sites except one were statistically significant. Since the parallel exposure in a non-shielding and a shielding cage also revealed significant differences in MCN frequencies (the latter showing no significant differences from laboratory controls), the clastogenic effects are clearly attributable to the short-wave radiation from the antennae

  7. Gossip algorithms in quantum networks

    International Nuclear Information System (INIS)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up – in the best case exponentially – the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication. - Highlights: • We analyze the performance of gossip algorithms in quantum networks. • Local operations and classical communication (LOCC) can speed the performance up. • The speed-up is exponential in the best case; the number of LOCC is polynomial.

  8. Gossip algorithms in quantum networks

    Energy Technology Data Exchange (ETDEWEB)

    Siomau, Michael, E-mail: siomau@nld.ds.mpg.de [Physics Department, Jazan University, P.O. Box 114, 45142 Jazan (Saudi Arabia); Network Dynamics, Max Planck Institute for Dynamics and Self-Organization (MPIDS), 37077 Göttingen (Germany)

    2017-01-23

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up – in the best case exponentially – the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication. - Highlights: • We analyze the performance of gossip algorithms in quantum networks. • Local operations and classical communication (LOCC) can speed the performance up. • The speed-up is exponential in the best case; the number of LOCC is polynomial.

  9. The modularity of pollination networks

    DEFF Research Database (Denmark)

    Olesen, Jens Mogens; Bascompte, J.; Dupont, Yoko

    2007-01-01

    In natural communities, species and their interactions are often organized as nonrandom networks, showing distinct and repeated complex patterns. A prevalent, but poorly explored pattern is ecological modularity, with weakly interlinked subsets of species (modules), which, however, internally...... consist of strongly connected species. The importance of modularity has been discussed for a long time, but no consensus on its prevalence in ecological networks has yet been reached. Progress is hampered by inadequate methods and a lack of large datasets. We analyzed 51 pollination networks including...... almost 10,000 species and 20,000 links and tested for modularity by using a recently developed simulated annealing algorithm. All networks with >150 plant and pollinator species were modular, whereas networks with

  10. Networks model of the East Turkistan terrorism

    Science.gov (United States)

    Li, Ben-xian; Zhu, Jun-fang; Wang, Shun-guo

    2015-02-01

    The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis is adopted to reveal the network type and the network structure characteristics. We also find the crucial terrorist leader. Ultimately, some results show that the East Turkistan network has big hub nodes and small shortest path, and that the network follows a pattern of small world network with hierarchical structure.

  11. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  12. Fitness for synchronization of network motifs

    DEFF Research Database (Denmark)

    Vega, Y.M.; Vázquez-Prada, M.; Pacheco, A.F.

    2004-01-01

    We study the synchronization of Kuramoto's oscillators in small parts of networks known as motifs. We first report on the system dynamics for the case of a scale-free network and show the existence of a non-trivial critical point. We compute the probability that network motifs synchronize, and fi...... that the fitness for synchronization correlates well with motifs interconnectedness and structural complexity. Possible implications for present debates about network evolution in biological and other systems are discussed....

  13. Associative memory in phasing neuron networks

    Energy Technology Data Exchange (ETDEWEB)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  14. Constructing level-2 phylogenetic networks from triplets

    OpenAIRE

    Iersel, Leo; Keijsper, J.C.M.; Kelk, Steven; Stougie, Leen; Hagen, F.; Boekhout, T.; Vingron, M.; Wong, L.

    2009-01-01

    htmlabstractJansson and Sung showed that, given a dense set of input triplets T (representing hypotheses about the local evolutionary relationships of triplets of taxa), it is possible to determine in polynomial time whether there exists a level-1 network consistent with T, and if so to construct such a network (Inferring a Level-1 Phylogenetic Network from a Dense Set of Rooted Triplets, Theoretical Computer Science, 363, pp. 60-68 (2006)). Here we extend this work by showing that this probl...

  15. Task vs. rest-different network configurations between the coactivation and the resting-state brain networks.

    Science.gov (United States)

    Di, Xin; Gohel, Suril; Kim, Eun H; Biswal, Bharat B

    2013-01-01

    There is a growing interest in studies of human brain networks using resting-state functional magnetic resonance imaging (fMRI). However, it is unclear whether and how brain networks measured during the resting-state exhibit comparable properties to brain networks during task performance. In the present study, we investigated meta-analytic coactivation patterns among brain regions based upon published neuroimaging studies, and compared the coactivation network configurations with those in the resting-state network. The strength of resting-state functional connectivity between two regions were strongly correlated with the coactivation strength. However, the coactivation network showed greater global efficiency, smaller mean clustering coefficient, and lower modularity compared with the resting-state network, which suggest a more efficient global information transmission and between system integrations during task performing. Hub shifts were also observed within the thalamus and the left inferior temporal cortex. The thalamus and the left inferior temporal cortex exhibited higher and lower degrees, respectively in the coactivation network compared with the resting-state network. These results shed light regarding the reconfiguration of the brain networks between task and resting-state conditions, and highlight the role of the thalamus in change of network configurations in task vs. rest.

  16. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  17. COMPLEX NETWORK SIMULATION OF FOREST NETWORK SPATIAL PATTERN IN PEARL RIVER DELTA

    Directory of Open Access Journals (Sweden)

    Y. Zeng

    2017-09-01

    Full Text Available Forest network-construction uses for the method and model with the scale-free features of complex network theory based on random graph theory and dynamic network nodes which show a power-law distribution phenomenon. The model is suitable for ecological disturbance by larger ecological landscape Pearl River Delta consistent recovery. Remote sensing and GIS spatial data are available through the latest forest patches. A standard scale-free network node distribution model calculates the area of forest network’s power-law distribution parameter value size; The recent existing forest polygons which are defined as nodes can compute the network nodes decaying index value of the network’s degree distribution. The parameters of forest network are picked up then make a spatial transition to GIS real world models. Hence the connection is automatically generated by minimizing the ecological corridor by the least cost rule between the near nodes. Based on scale-free network node distribution requirements, select the number compared with less, a huge point of aggregation as a future forest planning network’s main node, and put them with the existing node sequence comparison. By this theory, the forest ecological projects in the past avoid being fragmented, scattered disorderly phenomena. The previous regular forest networks can be reduced the required forest planting costs by this method. For ecological restoration of tropical and subtropical in south China areas, it will provide an effective method for the forest entering city project guidance and demonstration with other ecological networks (water, climate network, etc. for networking a standard and base datum.

  18. Imbalanced functional link between executive control network and reward network explain the online-game seeking behaviors in Internet gaming disorder.

    Science.gov (United States)

    Dong, Guangheng; Lin, Xiao; Hu, Yanbo; Xie, Chunming; Du, Xiaoxia

    2015-03-17

    Literatures have shown that Internet gaming disorder (IGD) subjects show impaired executive control and enhanced reward sensitivities than healthy controls. However, how these two networks jointly affect the valuation process and drive IGD subjects' online-game-seeking behaviors remains unknown. Thirty-five IGD and 36 healthy controls underwent a resting-states scan in the MRI scanner. Functional connectivity (FC) was examined within control and reward network seeds regions, respectively. Nucleus accumbens (NAcc) was selected as the node to find the interactions between these two networks. IGD subjects show decreased FC in the executive control network and increased FC in the reward network when comparing with the healthy controls. When examining the correlations between the NAcc and the executive control/reward networks, the link between the NAcc - executive control network is negatively related with the link between NAcc - reward network. The changes (decrease/increase) in IGD subjects' brain synchrony in control/reward networks suggest the inefficient/overly processing within neural circuitry underlying these processes. The inverse proportion between control network and reward network in IGD suggest that impairments in executive control lead to inefficient inhibition of enhanced cravings to excessive online game playing. This might shed light on the mechanistic understanding of IGD.

  19. A comprehensive assessment of resting state networks: bidirectional modification of functional integrity in cerebro-cerebellar networks in dementia

    Directory of Open Access Journals (Sweden)

    Gloria eCastellazzi

    2014-07-01

    Full Text Available In resting state fMRI (rs-fMRI, only functional connectivity (FC reductions in the default mode network (DMN are normally reported as a biomarker for Alzheimer's disease (AD. In this investigation we have developed a comprehensive strategy to characterize the FC changes occurring in multiple networks and applied it in a pilot study of subjects with AD and Mild Cognitive Impairment (MCI, compared to healthy controls (HC. Resting state networks (RSNs were studied in 14 AD (70±6 years, 12 MCI (74±6 years and 16 HC (69±5 years. RSN alterations were present in almost all the 15 recognized RSNs; overall, 474 voxels presented a reduced FC in MCI and 1244 in AD while 1627 voxels showed an increased FC in MCI and 1711 in AD. The RSNs were then ranked according to the magnitude and extension of FC changes (gFC, putting in evidence 6 RSNs with prominent changes: DMN, frontal cortical network (FCN, lateral visual network (LVN, basal ganglia network (BGN, cerebellar network (CBLN, and the anterior insula network (AIN. Nodes, or hubs, showing alterations common to more than one RSN were mostly localized within the prefrontal cortex and the mesial-temporal cortex. The cerebellum showed a unique behavior where voxels of decreased gFC were only found in AD while a significant gFC increase was only found in MCI. The gFC alterations showed strong correlations (p< 0.001 with psychological scores, in particular MMSE and attention/memory tasks. In conclusion, this analysis revealed that the DMN was affected by remarkable FC increases, that FC alterations extended over several RSNs, that derangement of functional relationships between multiple areas occurred already in the early stages of dementia. These results warrant future work to verify whether these represent compensatory mechanisms that exploit a pre-existing neural reserve through plasticity, which evolve in a state of lack of connectivity between different networks with the worsening of the pathology.

  20. Influence of degree correlations on network structure and stability in protein-protein interaction networks

    Directory of Open Access Journals (Sweden)

    Zimmer Ralf

    2007-08-01

    Full Text Available Abstract Background The existence of negative correlations between degrees of interacting proteins is being discussed since such negative degree correlations were found for the large-scale yeast protein-protein interaction (PPI network of Ito et al. More recent studies observed no such negative correlations for high-confidence interaction sets. In this article, we analyzed a range of experimentally derived interaction networks to understand the role and prevalence of degree correlations in PPI networks. We investigated how degree correlations influence the structure of networks and their tolerance against perturbations such as the targeted deletion of hubs. Results For each PPI network, we simulated uncorrelated, positively and negatively correlated reference networks. Here, a simple model was developed which can create different types of degree correlations in a network without changing the degree distribution. Differences in static properties associated with degree correlations were compared by analyzing the network characteristics of the original PPI and reference networks. Dynamics were compared by simulating the effect of a selective deletion of hubs in all networks. Conclusion Considerable differences between the network types were found for the number of components in the original networks. Negatively correlated networks are fragmented into significantly less components than observed for positively correlated networks. On the other hand, the selective deletion of hubs showed an increased structural tolerance to these deletions for the positively correlated networks. This results in a lower rate of interaction loss in these networks compared to the negatively correlated networks and a decreased disintegration rate. Interestingly, real PPI networks are most similar to the randomly correlated references with respect to all properties analyzed. Thus, although structural properties of networks can be modified considerably by degree

  1. Interarrival times of message propagation on directed networks

    Science.gov (United States)

    Mihaljev, Tamara; de Arcangelis, Lucilla; Herrmann, Hans J.

    2011-08-01

    One of the challenges in fighting cybercrime is to understand the dynamics of message propagation on botnets, networks of infected computers used to send viruses, unsolicited commercial emails (SPAM) or denial of service attacks. We map this problem to the propagation of multiple random walkers on directed networks and we evaluate the interarrival time distribution between successive walkers arriving at a target. We show that the temporal organization of this process, which models information propagation on unstructured peer to peer networks, has the same features as SPAM reaching a single user. We study the behavior of the message interarrival time distribution on three different network topologies using two different rules for sending messages. In all networks the propagation is not a pure Poisson process. It shows universal features on Poissonian networks and a more complex behavior on scale free networks. Results open the possibility to indirectly learn about the process of sending messages on networks with unknown topologies, by studying interarrival times at any node of the network.

  2. Designing Network-based Business Model Ontology

    DEFF Research Database (Denmark)

    Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz

    2015-01-01

    Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....

  3. The Homogeneity Research of Urban Rail Transit Network Performance

    Directory of Open Access Journals (Sweden)

    Wang Fu-jian

    2016-01-01

    Full Text Available Urban Rail Transit is an important part of the public transit, it is necessary to carry out the corresponding network function analysis. Previous studies mainly about network performance analysis of a single city rail transit, lacking of horizontal comparison between the multi-city, it is difficult to find inner unity of different Urban Rail Transit network functions. Taking into account the Urban Rail Transit network is a typical complex networks, so this paper proposes the application of complex network theory to research the homogeneity of Urban Rail Transit network performance. This paper selects rail networks of Beijing, Shanghai, Guangzhou as calculation case, gave them a complex network mapping through the L, P Space method and had a static topological analysis using complex network theory, Network characteristics in three cities were calculated and analyzed form node degree distribution and node connection preference. Finally, this paper studied the network efficiency changes of Urban Rail Transit system under different attack mode. The results showed that, although rail transport network size, model construction and construction planning of the three cities are different, but their network performance in many aspects showed high homogeneity.

  4. An evolving network model with modular growth

    International Nuclear Information System (INIS)

    Zou Zhi-Yun; Liu Peng; Lei Li; Gao Jian-Zhi

    2012-01-01

    In this paper, we propose an evolving network model growing fast in units of module, according to the analysis of the evolution characteristics in real complex networks. Each module is a small-world network containing several interconnected nodes and the nodes between the modules are linked by preferential attachment on degree of nodes. We study the modularity measure of the proposed model, which can be adjusted by changing the ratio of the number of inner-module edges and the number of inter-module edges. In view of the mean-field theory, we develop an analytical function of the degree distribution, which is verified by a numerical example and indicates that the degree distribution shows characteristics of the small-world network and the scale-free network distinctly at different segments. The clustering coefficient and the average path length of the network are simulated numerically, indicating that the network shows the small-world property and is affected little by the randomness of the new module. (interdisciplinary physics and related areas of science and technology)

  5. Origin of Peer Influence in Social Networks

    Science.gov (United States)

    Pinheiro, Flávio L.; Santos, Marta D.; Santos, Francisco C.; Pacheco, Jorge M.

    2014-03-01

    Social networks pervade our everyday lives: we interact, influence, and are influenced by our friends and acquaintances. With the advent of the World Wide Web, large amounts of data on social networks have become available, allowing the quantitative analysis of the distribution of information on them, including behavioral traits and fads. Recent studies of correlations among members of a social network, who exhibit the same trait, have shown that individuals influence not only their direct contacts but also friends' friends, up to a network distance extending beyond their closest peers. Here, we show how such patterns of correlations between peers emerge in networked populations. We use standard models (yet reflecting intrinsically different mechanisms) of information spreading to argue that empirically observed patterns of correlation among peers emerge naturally from a wide range of dynamics, being essentially independent of the type of information, on how it spreads, and even on the class of underlying network that interconnects individuals. Finally, we show that the sparser and clustered the network, the more far reaching the influence of each individual will be.

  6. Social networks and cooperation in hunter-gatherers.

    Science.gov (United States)

    Apicella, Coren L; Marlowe, Frank W; Fowler, James H; Christakis, Nicholas A

    2012-01-25

    Social networks show striking structural regularities, and both theory and evidence suggest that networks may have facilitated the development of large-scale cooperation in humans. Here, we characterize the social networks of the Hadza, a population of hunter-gatherers in Tanzania. We show that Hadza networks have important properties also seen in modernized social networks, including a skewed degree distribution, degree assortativity, transitivity, reciprocity, geographic decay and homophily. We demonstrate that Hadza camps exhibit high between-group and low within-group variation in public goods game donations. Network ties are also more likely between people who give the same amount, and the similarity in cooperative behaviour extends up to two degrees of separation. Social distance appears to be as important as genetic relatedness and physical proximity in explaining assortativity in cooperation. Our results suggest that certain elements of social network structure may have been present at an early point in human history. Also, early humans may have formed ties with both kin and non-kin, based in part on their tendency to cooperate. Social networks may thus have contributed to the emergence of cooperation.

  7. Distributed controller clustering in software defined networks.

    Directory of Open Access Journals (Sweden)

    Ahmed Abdelaziz

    Full Text Available Software Defined Networking (SDN is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN SDN and Open Network Operating System (ONOS controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.

  8. Distributed controller clustering in software defined networks.

    Science.gov (United States)

    Abdelaziz, Ahmed; Fong, Ang Tan; Gani, Abdullah; Garba, Usman; Khan, Suleman; Akhunzada, Adnan; Talebian, Hamid; Choo, Kim-Kwang Raymond

    2017-01-01

    Software Defined Networking (SDN) is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs) brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN) SDN and Open Network Operating System (ONOS) controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.

  9. Norcantharidin inhibits tumor growth and vasculogenic mimicry of human gallbladder carcinomas by suppression of the PI3-K/MMPs/Ln-5γ2 signaling pathway

    International Nuclear Information System (INIS)

    Zhang, Jing-Tao; Sun, Wei; Zhang, Wen-Zhong; Ge, Chun-Yan; Liu, Zhong-Yan; Zhao, Ze-Ming; Lu, Xing-Sui; Fan, Yue-Zu

    2014-01-01

    Vasculogenic mimicry (VM) is a novel tumor blood supply in some highly aggressive malignant tumors. Recently, we reported VM existed in gallbladder carcinomas (GBCs) and the formation of the special passage through the activation of the PI3K/MMPs/Ln-5γ2 signaling pathway. GBC is a highly aggressive malignant tumor with disappointing treatments and a poor prognosis. Norcantharidin (NCTD) has shown to have multiple antitumor activities against GBCs, etc; however the exact mechanism is not thoroughly elucidated. In this study, we firstly investigated the anti-VM activity of NCTD as a VM inhibitor for GBCs and its underlying mechanisms. In vitro and in vivo experiments to determine the effects of NCTD on proliferation, invasion, migration, VM formation, hemodynamic and tumor growth of GBC-SD cells and xenografts were respectively done by proliferation, invasion, migration assays, H&E staining and CD31-PAS double stainings, optic/electron microscopy, tumor assay, and dynamic micro-MRA. Further, immunohistochemistry, immunofluorescence, Western blotting and RT-PCR were respectively used to examine expression of VM signaling-related markers PI3-K, MMP-2, MT1-MMP and Ln-5γ2 in GBC-SD cells and xenografts in vitro and in vivo. After treatment with NCTD, proliferation, invasion, migration of GBC-SD cells were inhibited; GBC-SD cells and xenografts were unable to form VM-like structures; tumor center-VM region of the xenografts exhibited a decreased signal in intensity; then cell or xenograft growth was inhibited. Whereas all of untreated GBC-SD cells and xenografts formed VM-like structures with the same conditions; the xenograft center-VM region exhibited a gradually increased signal; and facilitated cell or xenograft growth. Furthermore, expression of MMP-2 and MT1-MMP products from sections/supernates of 3-D matrices and the xenografts, and expression of PI3-K, MMP-2, MM1-MMP and Ln-5γ2 proteins/mRNAs of the xenografts were all decreased in NCTD or TIMP-2 group; (all P

  10. Effect of gamma irradiation and ethyl methane sulphonate on growth, flowering and bulbs production in tuberose (Polianthes tuberosa L) cv. double

    International Nuclear Information System (INIS)

    Singh, Rajbir; Goyal, R.K.; Gupta, A.K.

    2008-01-01

    The bulbs of tuberose cv. Double were treated with a combination of gamma rays and EMS at the rate 1Kr+0.25%; 1Kr+0.50%; 2Kr+0.25% and 2Kr+0.50%. The bulbs were first treated with gamma rays and later on same bulbs were treated in aqueous solution of EMS (pH 7) for 16 hrs before planting. The plant height and number of leaves decreased with increased doses of the gamma irradiation and EMS combinations. The diameter of spike in VM 1 ranged from 4.99 to 5.53 mm and in 1Kr + 0.25 % EMS proved most significant in increasing the diameter of spike where diameter of spike was recorded maximum (5.53 mm). In VM 2 generation, the diameter of spike ranged from 6.01 to 6.54mm. The length of spike in VM 1 generation ranged from 50.13 to 62.54 cm. The maximum length of spike (62.54 cm) was observed under control, which was followed by using 1 Kr + 0.25 and 0.50% EMS. The higher concentration of EMS with 2 Kr dose of gamma irradiation significantly decreased the length of spike. In VM 2 generation the pattern was different from VM 1 generation. In VM 2 generation, the length of spike under control and other treatments was more in comparison to VM 1 generation and maximum length of spike was recorded under control (75.43 cm). The lowest dose of EMS i.e., 1 Kr + 0.25%EMS was found significantly effective in producing maximum number of florets per spike followed by 1 Kr + 0.50% EMS in VM 1 generation. In VM 2 generation 1 Kr + 0.25% EMS was found significant and produced maximum number of florets per spike (29.89) followed by control. The weight of hundred florets ranged from 169.42 -173.43 g in VM 1 generation. In VM 2 generation, a significant improvement was found in weight of hundred florets by using 1 Kr + 0.25 to 0.50% EMS and maximum weight of hundred florets (144.33 g) was recorded under 1 Kr + 0.25%EMS. Maximum number of bulbs (17.45) were recorded in 1Kr + 0.50% EMS combination in VM 2 generation, on the other hand maximum weight of the bulbs (274.56g) per plant was found

  11. A network of networks model to study phase synchronization using structural connection matrix of human brain

    Science.gov (United States)

    Ferrari, F. A. S.; Viana, R. L.; Reis, A. S.; Iarosz, K. C.; Caldas, I. L.; Batista, A. M.

    2018-04-01

    The cerebral cortex plays a key role in complex cortical functions. It can be divided into areas according to their function (motor, sensory and association areas). In this paper, the cerebral cortex is described as a network of networks (cortex network), we consider that each cortical area is composed of a network with small-world property (cortical network). The neurons are assumed to have bursting properties with the dynamics described by the Rulkov model. We study the phase synchronization of the cortex network and the cortical networks. In our simulations, we verify that synchronization in cortex network is not homogeneous. Besides, we focus on the suppression of neural phase synchronization. Synchronization can be related to undesired and pathological abnormal rhythms in the brain. For this reason, we consider the delayed feedback control to suppress the synchronization. We show that delayed feedback control is efficient to suppress synchronous behavior in our network model when an appropriate signal intensity and time delay are defined.

  12. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  13. NASA Integrated Network COOP

    Science.gov (United States)

    Anderson, Michael L.; Wright, Nathaniel; Tai, Wallace

    2012-01-01

    Natural disasters, terrorist attacks, civil unrest, and other events have the potential of disrupting mission-essential operations in any space communications network. NASA's Space Communications and Navigation office (SCaN) is in the process of studying options for integrating the three existing NASA network elements, the Deep Space Network, the Near Earth Network, and the Space Network, into a single integrated network with common services and interfaces. The need to maintain Continuity of Operations (COOP) after a disastrous event has a direct impact on the future network design and operations concepts. The SCaN Integrated Network will provide support to a variety of user missions. The missions have diverse requirements and include anything from earth based platforms to planetary missions and rovers. It is presumed that an integrated network, with common interfaces and processes, provides an inherent advantage to COOP in that multiple elements and networks can provide cross-support in a seamless manner. The results of trade studies support this assumption but also show that centralization as a means of achieving integration can result in single points of failure that must be mitigated. The cost to provide this mitigation can be substantial. In support of this effort, the team evaluated the current approaches to COOP, developed multiple potential approaches to COOP in a future integrated network, evaluated the interdependencies of the various approaches to the various network control and operations options, and did a best value assessment of the options. The paper will describe the trade space, the study methods, and results of the study.

  14. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  15. Weighted Scaling in Non-growth Random Networks

    International Nuclear Information System (INIS)

    Chen Guang; Yang Xuhua; Xu Xinli

    2012-01-01

    We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in non-growth random networks. In this model, we use multiple-edges to represent the connections between vertices and define the weight of a multiple-edge as the total weights of all single-edges within it and the strength of a vertex as the sum of weights for those multiple-edges attached to it. The network evolves according to a vertex strength preferential selection mechanism. During the evolution process, the network always holds its total number of vertices and its total number of single-edges constantly. We show analytically and numerically that a network will form steady scale-free distributions with our model. The results show that a weighted non-growth random network can evolve into scale-free state. It is interesting that the network also obtains the character of an exponential edge weight distribution. Namely, coexistence of scale-free distribution and exponential distribution emerges.

  16. The ASCI Network for SC 2000: Gigabyte Per Second Networking; TOPICAL

    International Nuclear Information System (INIS)

    PRATT, THOMAS J.; NAEGLE, JOHN H.; MARTINEZ JR., LUIS G.; HU, TAN CHANG; MILLER, MARC M.; BARNABY, MARTY L.; ADAMS, ROGER L.; KLAUS, EDWARD J.

    2001-01-01

    This document highlights the Discom's Distance computing and communication team activities at the 2000 Supercomputing conference in Dallas Texas. This conference is sponsored by the IEEE and ACM. Sandia's participation in the conference has now spanned a decade, for the last five years Sandia National Laboratories, Los Alamos National Lab and Lawrence Livermore National Lab have come together at the conference under the DOE's ASCI, Accelerated Strategic Computing Initiatives, Program rubric to demonstrate ASCI's emerging capabilities in computational science and our combined expertise in high performance computer science and communication networking developments within the program. At SC 2000, DISCOM demonstrated an infrastructure. DISCOM2 uses this forum to demonstrate and focus communication and pre-standard implementation of 10 Gigabit Ethernet, the first gigabyte per second data IP network transfer application, and VPN technology that enabled a remote Distributed Resource Management tools demonstration. Additionally a national OC48 POS network was constructed to support applications running between the show floor and home facilities. This network created the opportunity to test PSE's Parallel File Transfer Protocol (PFTP) across a network that had similar speed and distances as the then proposed DISCOM WAN. The SCINET SC2000 showcased wireless networking and the networking team had the opportunity to explore this emerging technology while on the booth. This paper documents those accomplishments, discusses the details of their convention exhibit floor. We also supported the production networking needs of the implementation, and describes how these demonstrations supports DISCOM overall strategies in high performance computing networking

  17. Contagion on complex networks with persuasion

    Science.gov (United States)

    Huang, Wei-Min; Zhang, Li-Jie; Xu, Xin-Jian; Fu, Xinchu

    2016-03-01

    The threshold model has been widely adopted as a classic model for studying contagion processes on social networks. We consider asymmetric individual interactions in social networks and introduce a persuasion mechanism into the threshold model. Specifically, we study a combination of adoption and persuasion in cascading processes on complex networks. It is found that with the introduction of the persuasion mechanism, the system may become more vulnerable to global cascades, and the effects of persuasion tend to be more significant in heterogeneous networks than those in homogeneous networks: a comparison between heterogeneous and homogeneous networks shows that under weak persuasion, heterogeneous networks tend to be more robust against random shocks than homogeneous networks; whereas under strong persuasion, homogeneous networks are more stable. Finally, we study the effects of adoption and persuasion threshold heterogeneity on systemic stability. Though both heterogeneities give rise to global cascades, the adoption heterogeneity has an overwhelmingly stronger impact than the persuasion heterogeneity when the network connectivity is sufficiently dense.

  18. Agent-based modeling and network dynamics

    CERN Document Server

    Namatame, Akira

    2016-01-01

    The book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The book begins with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling’s segregation model and Axelrod’s spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The book also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. The book reviews a number of pioneering and representative models in this family. Upon the gi...

  19. A critical survey of live virtual machine migration techniques

    Directory of Open Access Journals (Sweden)

    Anita Choudhary

    2017-11-01

    Full Text Available Abstract Virtualization techniques effectively handle the growing demand for computing, storage, and communication resources in large-scale Cloud Data Centers (CDC. It helps to achieve different resource management objectives like load balancing, online system maintenance, proactive fault tolerance, power management, and resource sharing through Virtual Machine (VM migration. VM migration is a resource-intensive procedure as VM’s continuously demand appropriate CPU cycles, cache memory, memory capacity, and communication bandwidth. Therefore, this process degrades the performance of running applications and adversely affects efficiency of the data centers, particularly when Service Level Agreements (SLA and critical business objectives are to be met. Live VM migration is frequently used because it allows the availability of application service, while migration is performed. In this paper, we make an exhaustive survey of the literature on live VM migration and analyze the various proposed mechanisms. We first classify the types of Live VM migration (single, multiple and hybrid. Next, we categorize VM migration techniques based on duplication mechanisms (replication, de-duplication, redundancy, and compression and awareness of context (dependency, soft page, dirty page, and page fault and evaluate the various Live VM migration techniques. We discuss various performance metrics like application service downtime, total migration time and amount of data transferred. CPU, memory and storage data is transferred during the process of VM migration and we identify the category of data that needs to be transferred in each case. We present a brief discussion on security threats in live VM migration and categories them in three different classes (control plane, data plane, and migration module. We also explain the security requirements and existing solutions to mitigate possible attacks. Specific gaps are identified and the research challenges in improving

  20. A boost of confidence: The role of the ventromedial prefrontal cortex in memory, decision-making, and schemas.

    Science.gov (United States)

    Hebscher, Melissa; Gilboa, Asaf

    2016-09-01

    The ventromedial prefrontal cortex (vmPFC) has been implicated in a wide array of functions across multiple domains. In this review, we focus on the vmPFC's involvement in mediating strategic aspects of memory retrieval, memory-related schema functions, and decision-making. We suggest that vmPFC generates a confidence signal that informs decisions and memory-guided behaviour. Confidence is central to these seemingly diverse functions: (1) Strategic retrieval: lesions to the vmPFC impair an early, automatic, and intuitive monitoring process ("feeling of rightness"; FOR) often associated with confabulation (spontaneous reporting of erroneous memories). Critically, confabulators typically demonstrate high levels of confidence in their false memories, suggesting that faulty monitoring following vmPFC damage may lead to indiscriminate confidence signals. (2) Memory schemas: the vmPFC is critically involved in instantiating and maintaining contextually relevant schemas, broadly defined as higher level knowledge structures that encapsulate lower level representational elements. The correspondence between memory retrieval cues and these activated schemas leads to FOR monitoring. Stronger, more elaborate schemas produce stronger FOR and influence confidence in the veracity of memory candidates. (3) Finally, we review evidence on the vmPFC's role in decision-making, extending this role to decision-making during memory retrieval. During non-mnemonic and mnemonic decision-making the vmPFC automatically encodes confidence. Confidence signal in the vmPFC is revealed as a non-linear relationship between a first-order monitoring assessment and second-order action or choice. Attempting to integrate the multiple functions of the vmPFC, we propose a posterior-anterior organizational principle for this region. More posterior vmPFC regions are involved in earlier, automatic, subjective, and contextually sensitive functions, while more anterior regions are involved in controlled actions