WorldWideScience

Sample records for vm showed networks

  1. Runtime Performance and Virtual Network Control Alternatives in VM-Based High-Fidelity Network Simulations

    Science.gov (United States)

    2012-12-01

    described in detail in (Yoginath, Perumalla and Henz 2012). The MPI benchmarks comprise two scenarios, namely, Constant Network Delay ( CND ) and...Varying Network Delay (VND). With CND , we evaluate the performance of NSX and CSX scheduler support for time-ordered event execution when the...identifier of the jth message in the ith run. CND Benchmark Performance Figure 2: CND benchmark error plots (left); CND benchmark runtime plots

  2. Status and Roadmap of CernVM

    Science.gov (United States)

    Berzano, D.; Blomer, J.; Buncic, P.; Charalampidis, I.; Ganis, G.; Meusel, R.

    2015-12-01

    Cloud resources nowadays contribute an essential share of resources for computing in high-energy physics. Such resources can be either provided by private or public IaaS clouds (e.g. OpenStack, Amazon EC2, Google Compute Engine) or by volunteers computers (e.g. LHC@Home 2.0). In any case, experiments need to prepare a virtual machine image that provides the execution environment for the physics application at hand. The CernVM virtual machine since version 3 is a minimal and versatile virtual machine image capable of booting different operating systems. The virtual machine image is less than 20 megabyte in size. The actual operating system is delivered on demand by the CernVM File System. CernVM 3 has matured from a prototype to a production environment. It is used, for instance, to run LHC applications in the cloud, to tune event generators using a network of volunteer computers, and as a container for the historic Scientific Linux 5 and Scientific Linux 4 based software environments in the course of long-term data preservation efforts of the ALICE, CMS, and ALEPH experiments. We present experience and lessons learned from the use of CernVM at scale. We also provide an outlook on the upcoming developments. These developments include adding support for Scientific Linux 7, the use of container virtualization, such as provided by Docker, and the streamlining of virtual machine contextualization towards the cloud-init industry standard.

  3. Enabling μCernVM for the Interactive Use Case

    CERN Document Server

    Nicolaou, Vasilis

    2013-01-01

    The $\\mu$CernVM will be the successor of the CernVM as a new appliance to help with accessing LHC for data analysis and development. CernVM has a web appliance agent that facilitates user interaction with the virtual machine and reduces the need for executing shell commands or installing graphical applications for displaying basic information such as memory usage or performing simple tasks such as updating the operating system. The updates are done differently in the $\\mu$CernVM than mainstream Linux distributions. Its filesystem is a composition of a read-only layer that exists in the network and a read/write layer that is initilised on first boot and keeps the user changes afterwards. Thus, means are provided to avoid loss of user data and system instabilities when the operating system is updated by fetching a new read-only layer.

  4. Secure VM for Monitoring Industrial Process Controllers

    Energy Technology Data Exchange (ETDEWEB)

    Dasgupta, Dipankar [ORNL; Ali, Mohammad Hassan [University of Memphis; Abercrombie, Robert K [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL; Carvalho, Marco [Institute of Human and Machine Cognition

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicated host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.

  5. Android Virtual Machine (VM) Setup on Linux

    Science.gov (United States)

    2014-12-01

    Machine (VM) Setup on Linux Ken F Yu Computational and Information Sciences Directorate, ARL...Virtual Machine (VM) Setup on Linux 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Ken F Yu 5d. PROJECT NUMBER

  6. Can recurrence networks show small-world property?

    Energy Technology Data Exchange (ETDEWEB)

    Jacob, Rinku, E-mail: rinku.jacob.vallanat@gmail.com [Department of Physics, The Cochin College, Cochin, 682002 (India); Harikrishnan, K.P., E-mail: kp_hk2002@yahoo.co.in [Department of Physics, The Cochin College, Cochin, 682002 (India); Misra, R., E-mail: rmisra@iucaa.in [Inter University Centre for Astronomy and Astrophysics, Pune, 411007 (India); Ambika, G., E-mail: g.ambika@iiserpune.ac.in [Indian Institute of Science Education and Research, Pune, 411008 (India)

    2016-08-12

    Recurrence networks are complex networks, constructed from time series data, having several practical applications. Though their properties when constructed with the threshold value ϵ chosen at or just above the percolation threshold of the network are quite well understood, what happens as the threshold increases beyond the usual operational window is still not clear from a complex network perspective. The present Letter is focused mainly on the network properties at intermediate-to-large values of the recurrence threshold, for which no systematic study has been performed so far. We argue, with numerical support, that recurrence networks constructed from chaotic attractors with ϵ equal to the usual recurrence threshold or slightly above cannot, in general, show small-world property. However, if the threshold is further increased, the recurrence network topology initially changes to a small-world structure and finally to that of a classical random graph as the threshold approaches the size of the strange attractor. - Highlights: • Properties of recurrence networks at intermediate-to-large values of recurrence threshold are analyzed from a complex network perspective. • Using a combined plot of characteristic path length and clustering coefficient, it is shown that the recurrence network constructed with recurrence threshold equal to or just above the percolation threshold cannot, in general, display small-world property. • As the recurrence threshold is increased from its usual operational window, the resulting network makes a smooth transition initially to a small-world network for an intermediate range of thresholds and finally to the classical random graph as the threshold becomes comparable to the size of the attractor.

  7. A structural approach in networks: showing patterns, possibilities and pitfalls

    Directory of Open Access Journals (Sweden)

    Carlos Alberto Alves

    2010-01-01

    Full Text Available In recent years there has been a noticeable shift in evaluation paradigms away from positivist, individualist and atomistic explanations of phenomena to those seeking a more relational, contextual and systemic understanding. This growing shift in interest to the interrelationships or networks of connections between entities is apparent in fields as organizations in networks, knowledge transmission between social groups and so. A growing theoretical and methodological base is providing enhanced capacities to uncover the actual topologies or patterns of connections between entities, elements, people, organizations or communities and deliver a more fine grained analysis of their elements. In this way network analysis differs from conventional evaluation and research modes since its focus is on the interrelationships of entities not the characteristics of individuals. In this paper, we review and analyze the emerging capacity of the network paradigm as an evaluation method and show how this model can be applied t a range of evaluation arenas. In doing so, we outline a framework to guide network evaluation, establish some key network indicators and highlight key methodological aspects and pitfalls.

  8. Creep Resistance of VM12 Steel

    OpenAIRE

    Zieliński A.; Golański G.; Dobrzański J.; Sroka M.

    2016-01-01

    This article presents selected material characteristics of VM12 steel used for elements of boilers with super- and ultra-critical steam parameters. In particular, abridged and long-term creep tests with and without elongation measurement during testing and investigations of microstructural changes due to long-term impact of temperature and stress were carried out. The practical aspect of the use of creep test results in forecasting the durability of materials operating under creep conditions ...

  9. Creep Resistance of VM12 Steel

    Directory of Open Access Journals (Sweden)

    Zieliński A.

    2016-09-01

    Full Text Available This article presents selected material characteristics of VM12 steel used for elements of boilers with super- and ultra-critical steam parameters. In particular, abridged and long-term creep tests with and without elongation measurement during testing and investigations of microstructural changes due to long-term impact of temperature and stress were carried out. The practical aspect of the use of creep test results in forecasting the durability of materials operating under creep conditions was presented. The characteristics of steels with regard to creep tests developed in this paper are used in assessment of changes in functional properties of the material of elements operating under creep conditions.

  10. Performance Tests of CMSSW on the CernVM

    Science.gov (United States)

    Petek, Marko; Gowdy, Stephen

    2012-12-01

    The CERN Virtual Machine (CernVM) Software Appliance is a project developed in CERN with the goal of allowing the execution of the experiment's software on different operating systems in an easy way for the users. To achieve this it makes use of Virtual Machine images consisting of a JEOS (Just Enough Operating System) Linux image, bundled with CVMFS, a distributed file system for software. This image can then be run with a proper virtualizer on most of the platforms available. It also aggressively caches data on the local user's machine so that it can operate disconnected from the network. CMS wanted to compare the performance of the CMS Software running in the virtualized environment with the same software running on a native Linux box. To answer this wish, a series of tests were made on a controlled environment during 2010-2011. This work presents the results of those tests.

  11. Executive attention networks show altered relationship with default mode network in PD

    Directory of Open Access Journals (Sweden)

    Peter Boord

    2017-01-01

    Full Text Available Attention dysfunction is a common but often undiagnosed cognitive impairment in Parkinson's disease that significantly reduces quality of life. We sought to increase understanding of the mechanisms underlying attention dysfunction using functional neuroimaging. Functional MRI was acquired at two repeated sessions in the resting state and during the Attention Network Test, for 25 non-demented subjects with Parkinson's disease and 21 healthy controls. Behavioral and MRI contrasts were calculated for alerting, orienting, and executive control components of attention. Brain regions showing group differences in attention processing were used as seeds in a functional connectivity analysis of a separate resting state run. Parkinson's disease subjects showed more activation during increased executive challenge in four regions of the dorsal attention and frontoparietal networks, namely right frontal eye field, left and right intraparietal sulcus, and precuneus. In three regions we saw reduced resting state connectivity to the default mode network. Further, whereas higher task activation in the right intraparietal sulcus correlated with reduced resting state connectivity between right intraparietal sulcus and the precuneus in healthy controls, this relationship was absent in Parkinson's disease subjects. Our results suggest that a weakened interaction between the default mode and task positive networks might alter the way in which the executive response is processed in PD.

  12. Moving to a total VM environment

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, T.Y.

    1981-08-11

    The Stanford Linear Accelerator Center is a single purpose laboratory operated by Stanford University for the Department of Energy. Its mission is to do research in High Energy (particle) physics. This research involves the use of large and complex electronic detectors. Each of these detectors is a multi-million dollar device. A part of each detector is a computer for process control and data logging. Most detectors at SLAC now use VAX 11/780s for this purpose. Most detectors record digital data via this process control computer. Consequently, physics today is not bounded by the cost of analog to digital conversion as it was in the past, and the physicist is able to run larger experiments than were feasible a decade ago. Today a medium sized experiment will produce several hundred full reels of 6250 BPI tape whereas a large experiment is a couple of thousand reels. The raw data must first be transformed into physics events using data transformation programs. The physicists then use subsets of the data to understand what went on. The subset may be anywhere from a few megabytes to 5 or 6 gigabytes of data (30 or 40 full reels of tape). This searching would be best solved interactively (if computers and I/0 devices were fast enough). Instead what we find are very dynamic batch programs that are generally changed every run. The result is that on any day there are probably around 50 to 100 physicists interacting with a half dozen different experiments who are causing us to mount around 750 to 1000 tapes a day. This has been the style of computing for the last decade. Our going to VM is part of our effort to change this style of computing and to make physics computing more effective.

  13. Molecular cloning and characterization of Vigna mungo processing enzyme 1 (VmPE-1), an asparaginyl endopeptidase possibly involved in post-translational processing of a vacuolar cysteine endopeptidase (SH-EP).

    Science.gov (United States)

    Okamoto, T; Minamikawa, T

    1999-01-01

    Asparaginyl endopeptidase is a cysteine endopeptidase that has strict substrate specificity toward the carboxy side of asparagine residues. Vigna mungo processing enzyme 1, termed VmPE-1, occurs in the cotyledons of germinated seeds of V. mungo, and is possibly involved in the post-translational processing of a vacuolar cysteine endopeptidase, designated SH-EP, which degrades seed storage protein. VmPE-1 also showed a substrate specificity to asparagine residues, and its enzymatic activity was inhibited by NEM but not E-64. In addition, purified VmPE-1 had a potential to process the recombinant SH-EP precursor to its intermediate in vitro. cDNA clones for VmPE-1 and its homologue, named VmPE-1A, were identified and sequenced, and their expressions in the cotyledons of V. mungo seedlings and other organs were investigated. VmPE-1 mRNA and SH-EP mRNA were expressed in germinated seeds at the same stage of germination although the enzymatic activity of VmPE-1 rose prior to that of SH-EP. The level of VmPE-1A mRNA continued increasing as germination proceeded. In roots, stems and leaves of fully grown plants, and in hypocotyls, VmPE-1 and VmPE-1A were little expressed. We discuss possible functions of VmPE-1 and VmPE-1A in the cotyledons of germinated seeds.

  14. Optimizing VM allocation and data placement for data-intensive applications in cloud using ACO metaheuristic algorithm

    Directory of Open Access Journals (Sweden)

    T.P. Shabeera

    2017-04-01

    Full Text Available Nowadays data-intensive applications for processing big data are being hosted in the cloud. Since the cloud environment provides virtualized resources for computation, and data-intensive applications require communication between the computing nodes, the placement of Virtual Machines (VMs and location of data affect the overall computation time. Majority of the research work reported in the current literature consider the selection of physical nodes for placing data and VMs as independent problems. This paper proposes an approach which considers VM placement and data placement hand in hand. The primary objective is to reduce cross network traffic and bandwidth usage, by placing required number of VMs and data in Physical Machines (PMs which are physically closer. The VM and data placement problem (referred as MinDistVMDataPlacement problem is defined in this paper and has been proved to be NP- Hard. This paper presents and evaluates a metaheuristic algorithm based on Ant Colony Optimization (ACO, which selects a set of adjacent PMs for placing data and VMs. Data is distributed in the physical storage devices of the selected PMs. According to the processing capacity of each PM, a set of VMs are placed on these PMs to process data stored in them. We use simulation to evaluate our algorithm. The results show that the proposed algorithm selects PMs in close proximity and the jobs executed in the VMs allocated by the proposed scheme outperforms other allocation schemes.

  15. HotpathVM: An Effective JIT for Resource-constrained Devices

    DEFF Research Database (Denmark)

    Gal, Andreas; Franz, Michael; Probst, Christian

    2006-01-01

    We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet surprisingly effective. Our system dynamically identifies traces of frequently executed bytecode instructions (which may span several basic blocks across several methods) and compiles...... benchmarks show a speedup that in some cases rivals heavy-weight just-in-time compilers....

  16. CernVM: Minimal maintenance approach to virtualization

    Science.gov (United States)

    Buncic, Predrag; Aguado-Sanchez, Carlos; Blomer, Jakob; Harutyunyan, Artem

    2011-12-01

    CernVM is a virtual software appliance designed to support the development cycle and provide a runtime environment for the LHC experiments. It consists of three key components that differentiate it from more traditional virtual machines: a minimal Linux Operating System (OS), a specially tuned file system designed to deliver application software on demand, and contextualization tools that provide a means to easily customize and configure CernVM instances for different tasks and user communities. In this contribution we briefly describe the most important use cases for virtualization in High Energy Physics (HEP), CernVM key components and discuss how end-to-end systems corresponding to these use cases can be realized using CernVM.

  17. Workload-aware VM Scheduling on Multicore Systems

    Directory of Open Access Journals (Sweden)

    Insoon Jo

    2011-11-01

    Full Text Available In virtualized environments, performance interference between virtual machines (VMs is a key challenge. In order to mitigate resource contention, an efficient VM scheduling is positively necessary.In this paper, we propose a workload-aware VM scheduler on multi-core systems, which finds a systemwide mapping of VMs to physical cores. Our work aims not only at minimizing the number of used hosts,but at maximizing the system throughput. To achieve the first goal, our scheduler dynamically adjusts a set of used hosts. To achieve the second goal, it maps each VM on a physical core where the physical core and its host most sufficiently meet the resource requirements of the VM. Evaluation demonstrates that our scheduling ensures efficient use of data center resources.

  18. Savannah River VM--Intellect application support documentation

    Energy Technology Data Exchange (ETDEWEB)

    Carter, L.S.

    1988-09-23

    This document details the underlying support programming and structures that support the INTELLECT and KBMS products at the Savannah River Facility. The target audience for this document includes INTELLECT System Administrators, INTELLECT programmers and developers, and VM Systems Programmers.

  19. FCJ-178 Network Affordances: The unpredictable parameters of a Hong Kong SPEED SHOW

    Directory of Open Access Journals (Sweden)

    Audrey Samson

    2015-06-01

    Full Text Available This paper examines the notion of network affordance within the context of network art. We expand on the notion of affordances, (Gibson, 1977; Gaver, 1996 to include ecological and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibition, SPEED SHOW [2.0] Hong Kong (2013. The paper discusses how the artworks are contingent upon the parametric relations (Parisi, 2013 of the network. We introduce network affordance as a dynamic framework that could articulate the experience of tension arising from the (visible symbolic representation of computational processes and its hidden occurrences.

  20. Overhead-Aware-Best-Fit (OABF) Resource Allocation Algorithm for Minimizing VM Launching Overhead

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Hao [IIT; Garzoglio, Gabriele [Fermilab; Ren, Shangping [IIT, Chicago; Timm, Steven [Fermilab; Noh, Seo Young [KISTI, Daejeon

    2014-11-11

    FermiCloud is a private cloud developed in Fermi National Accelerator Laboratory to provide elastic and on-demand resources for different scientific research experiments. The design goal of the FermiCloud is to automatically allocate resources for different scientific applications so that the QoS required by these applications is met and the operational cost of the FermiCloud is minimized. Our earlier research shows that VM launching overhead has large variations. If such variations are not taken into consideration when making resource allocation decisions, it may lead to poor performance and resource waste. In this paper, we show how we may use an VM launching overhead reference model to minimize VM launching overhead. In particular, we first present a training algorithm that automatically tunes a given refer- ence model to accurately reflect FermiCloud environment. Based on the tuned reference model for virtual machine launching overhead, we develop an overhead-aware-best-fit resource allocation algorithm that decides where and when to allocate resources so that the average virtual machine launching overhead is minimized. The experimental results indicate that the developed overhead-aware-best-fit resource allocation algorithm can significantly improved the VM launching time when large number of VMs are simultaneously launched.

  1. Correlation of VEGF and COX-2 Expression with VM in Malignant Melanomas

    Institute of Scientific and Technical Information of China (English)

    BaocunSun; ShiwuZhang; XiulanZhao; YanxueLiu; ChunshengNi; DanfangZhang; HongQi; ZhiyongLiu; XishanHao

    2004-01-01

    OBJECTIVE To investigate the relationship between vascular epithelial growth factor (VEGF) and cyclooxygenase-2 (COX-2) in melanomas and the expressive difference of VEGF and COX-2 between melanomas with and without vasculogenic mimicry(VM).METHODS Sixty cases of malignant melanomas emoeaaea In paraffin were studied. The tumors were divided into a high-grade malignant group and a low-grade malignant group based on their tumor type, atypia and survival time of the patient. Then tissue microarrays were produced from these paraffin-embedded tumor tissues which were stained for VEGF, COX-2 and PAS. The difference in expression between VEGF and COX-2 in the malignant melanomas was compared using a grid-count. In addition, the tumors were also divided into mimicry and non-mimicry groups based on their PAS staining. Then the differences between the PAS positive and negative areas of the 2 groups were compared.RESULTS In malignant melanomas with VM, VEGF and COX-2 expression was less in tumors in which VM was absent, but VEGF, COX-2 expression in high-grade malignant melanomas was higher than that in low-grade grade malignant melanomas. Expression of VEGF was correlated with COX-2 expression.CONCLUSION VM exists in some high-grade malignant melanomas. The differences and relations between VEGF and COX-2 showed that some high-grade malignant melanomas possess a unique molecular-mechanism of tumor metastasis and blood supply.

  2. Porting of $\\mu$CernVM to AArch64

    CERN Document Server

    Scheffler, Felix

    2016-01-01

    $\\mu$CernVM is a virtual appliance that contains a stripped-down Linux OS connecting to a CernVM-Filesystem (CVMFS) repository that resides on a dedicated web server. In contrast to “usual” VMs, anything that is needed from this repository is only downloaded on demand, aggressively cached and eventually released again. Currently, $\\mu$CernVM is only distributed for x86-64. Recently, ARM (market leader in mobile computing) has started to enter the server market, which is still dominated by x86-64 infrastructure. However, in terms of performance/watt, AArch64 (latest ARM 64bit architecture) is a promising alternative. Facing millions of jobs to compute every day, it is thus desirable to have an HEP virtualisation solution for AArch64. In this project, $\\mu$CernVM was successfully ported to AArch64. Native and virtualised runtime performance was evaluated using ROOT6 and CMS benchmarks. It was found that VM performance is inferior to host performance across all tests. Respective numbers greatly vary between...

  3. Optimization of CernVM early boot process

    CERN Document Server

    Mazdin, Petra

    2015-01-01

    CernVM virtual machine is a Linux based virtual appliance optimized for High Energy Physics experiments. It is used for cloud computing, volunteer computing, and software development by the four large LHC experiments. The goal of this project is proling and optimizing the boot process of the CernVM. A key part was the development of a performance profiler for shell scripts as an extension to the popular BusyBox open source UNIX tool suite. Based on the measurements, costly shell code was replaced by more efficient, custom C programs. The results are compared to the original ones and successful optimization is proven.

  4. Research and Implementation of Software Used for the Remote Control for VM700T Video Measuring Instrument

    Directory of Open Access Journals (Sweden)

    Song Wenjie

    2015-01-01

    Full Text Available In this paper, the measurement software which can be used to realize remote control of the VM700T video measuring instrument is introduced. The authors can operate VM700T by a virtual panel on the client computer, select the results that the measuring equipment displayed to transmit it, and then display the image on the VM700T virtual panel in real time. The system does have some practical values and play an important role in distance learning. The functions that the system realized mainly includes four aspects: the real-time transmission of message based on the socket technology, the serial connection between server PC and VM700T measuring equipment, the image acquisition based on VFW technology and JPEG compression and decompression, and the network transmission of image files. The actual network transmission test is shown that the data acquisition method of this thesis is flexible and convenient, and the system is of extraordinary stability. It can display the measurement results in real time and basically realize the requirements of remote control. In the content, this paper includes a summary of principle, the detailed introduction of the system realization process and some related technology.

  5. Constraining models of postglacial rebound using space geodesy: a detailed assessment of model ICE-5G (VM2) and its relatives

    Science.gov (United States)

    Argus, Donald F.; Peltier, W. Richard

    2010-05-01

    Using global positioning system, very long baseline interferometry, satellite laser ranging and Doppler Orbitography and Radiopositioning Integrated by Satellite observations, including the Canadian Base Network and Fennoscandian BIFROST array, we constrain, in models of postglacial rebound, the thickness of the ice sheets as a function of position and time and the viscosity of the mantle as a function of depth. We test model ICE-5G VM2 T90 Rot, which well fits many hundred Holocene relative sea level histories in North America, Europe and worldwide. ICE-5G is the deglaciation history having more ice in western Canada than ICE-4G; VM2 is the mantle viscosity profile having a mean upper mantle viscosity of 0.5 × 1021Pas and a mean uppermost-lower mantle viscosity of 1.6 × 1021Pas T90 is an elastic lithosphere thickness of 90 km; and Rot designates that the model includes (rotational feedback) Earth's response to the wander of the North Pole of Earth's spin axis towards Canada at a speed of ~1° Myr-1. The vertical observations in North America show that, relative to ICE-5G, the Laurentide ice sheet at last glacial maximum (LGM) at ~26 ka was (1) much thinner in southern Manitoba, (2) thinner near Yellowknife (Northwest Territories), (3) thicker in eastern and southern Quebec and (4) thicker along the northern British Columbia-Alberta border, or that ice was unloaded from these areas later (thicker) or earlier (thinner) than in ICE-5G. The data indicate that the western Laurentide ice sheet was intermediate in mass between ICE-5G and ICE-4G. The vertical observations and GRACE gravity data together suggest that the western Laurentide ice sheet was nearly as massive as that in ICE-5G but distributed more broadly across northwestern Canada. VM2 poorly fits the horizontal observations in North America, predicting places along the margins of the Laurentide ice sheet to be moving laterally away from the ice centre at 2 mm yr-1 in ICE-4G and 3 mm yr-1 in ICE-5G, in

  6. Experimental study of one-stage VM cryocooler operating below 8 K

    Science.gov (United States)

    Pan, Changzhao; Zhang, Tong; Zhou, Yuan; Wang, Junjie

    2015-12-01

    The Vuilleumier (VM) refrigerator, known as heat driven refrigerator, is one kind of closed-cycle Stirling type regenerative refrigerator. The VM refrigerator with power being supplied by liquid nitrogen was proposed by Hogen and developed by Zhou, which shows great potential for development below 10 K. This paper describes the experimental development of a VM cryocooler operating below 8 K, which was achieved by using liquid nitrogen as a heat sink of middle cavity. The regenerator was optimized by using a part of metallic magnetic regenerator material Er3Ni to replace the lead sphere and a no-load temperature of 7.8 K was obtained. Then all the lead spheres were replaced by Er0.6Pr0.4 material and a no-load temperature of 7.35 K was obtained, which is the lowest temperature for this kind of refrigerator reported so far. The cooling power at 10 K is about 500 mW with a pressure ratio near 1.6 and a charge pressure of 1.8 MPa. Especially, the magnetic material Er0.6Pr0.4 was found to be a potential substitution for the conventional lead.

  7. A novel coupled VM-PT cryocooler operating at liquid helium temperature

    Science.gov (United States)

    Pan, Changzhao; Zhang, Tong; Zhou, Yuan; Wang, Junjie

    2016-07-01

    This paper presents experimental results on a novel two-stage gas-coupled VM-PT cryocooler, which is a one-stage VM cooler coupled a pulse tube cooler. In order to reach temperatures below the critical point of helium-4, a one-stage coaxial pulse tube cryocooler was gas-coupled on the cold end of the former VM cryocooler. The low temperature inertance tube and room temperature gas reservoir were used as phase shifters. The influence of room temperature double-inlet was first investigated, and the results showed that it added excessive heat loss. Then the inertance tube, regenerator and the length of the pulse tube were researched experimentally. Especially, the DC flow, whose function is similar to the double-orifice, was experimentally studied, and shown to contribute about 0.2 K for the no-load temperature. The minimum no-load temperature of 4.4 K was obtained with a pressure ratio near 1.5, working frequency of 2.2 Hz, and average pressure of 1.73 MPa.

  8. Energy Efficient Security Preserving VM Live Migration In Data Centers For Cloud Computing

    Directory of Open Access Journals (Sweden)

    Korir Sammy

    2012-03-01

    Full Text Available Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy-efficient operations of servers. Virtual machine (VM migration brings multiple benefits such as resource distribution and energy aware consolidation. Server consolidation achieves energy efficiency by enabling multiple instances of operating systems to run simultaneously on a single machine. With virtualization, it is possible to consolidate severs through VM live migration. However, migration of virtual machines brings extra energy consumption and serious security concerns that derail full adoption of this technology. In this paper, we propose a secure energy-aware provisioning of cloud computing resources on consolidated and virtualized platforms. Energy efficiency is achieved through just-right dynamic Round-Robin provisioning mechanism and the ability to power down sub-systems of a host system that are not required by VMs mapped to it. We further propose solutions to security challenges faced during VM live migration. We validate our approach by conducting a set of rigorous performance evaluation study using CloudSim toolkit. The experimental results show that our approach achieves reduced energy consumption in data centers while not compromising on security.

  9. PEMILIHAN DAN MIGRASI VM MENGGUNAKAN MCDM UNTUK PENINGKATAN KINERJA LAYANAN PADA CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Abdullah Fadil

    2016-08-01

    Full Text Available Komputasi awan atau cloud computing merupakan lingkungan yang heterogen dan terdistribusi, tersusun atas gugusan jaringan server dengan berbagai kapasitas sumber daya komputasi yang berbeda-beda guna menopang model layanan yang ada di atasnya. Virtual machine (VM dijadikan sebagai representasi dari ketersediaan sumber daya komputasi dinamis yang dapat dialokasikan dan direalokasikan sesuai dengan permintaan. Mekanisme live migration VM di antara server fisik yang terdapat di dalam data center cloud digunakan untuk mencapai konsolidasi dan memaksimalkan utilisasi VM. Pada prosedur konsoidasi vm, pemilihan dan penempatan VM sering kali menggunakan kriteria tunggal dan statis. Dalam penelitian ini diusulkan pemilihan dan penempatan VM menggunakan multi-criteria decision making (MCDM pada prosedur konsolidasi VM dinamis di lingkungan cloud data center guna meningkatkan layanan cloud computing. Pendekatan praktis digunakan dalam mengembangkan lingkungan cloud computing berbasis OpenStack Cloud dengan mengintegrasikan VM selection dan VM Placement pada prosedur konsolidasi VM menggunakan OpenStack-Neat. Hasil penelitian menunjukkan bahwa metode pemilihan dan penempatan VM melalui live migration mampu menggantikan kerugian yang disebabkan oleh down-times sebesar 11,994 detik dari waktu responnya. Peningkatan response times terjadi sebesar 6 ms ketika terjadi proses live migration VM dari host asal ke host tujuan. Response times rata-rata setiap vm yang tersebar pada compute node setelah terjadi proses live migration sebesar 67 ms yang menunjukkan keseimbangan beban pada sistem cloud computing.

  10. Experimental results on V-M type pulse tube refrigerator

    Science.gov (United States)

    Dai, Wei; Matsubara, Yoichi; Kobayashi, Hisayasu

    2002-06-01

    This article mainly introduces experimental results on a new type pulse tube refrigerator named as V-M type pulse tube refrigerator. The main difference from Stirling type or G-M type pulse tube refrigerator is that thermal compressor similar to that of a V-M cryocooler is used instead of mechanical compressor. By using temperature difference between room temperature and liquid nitrogen, pressure wave with high to low pressure ratio around 1.2 is obtained. This pressure wave is used to generate cooling effect at the cold end. With a 20 K pre-cooler, this machine reaches lowest temperature 5.25 K by using helium 4 at 0.77 Hz, 19 bar charge pressure. DC flow plays an important role in our system. It not only influences the final obtainable lowest temperature, but also is used to increase cold end cool-down speed. Total volume of the V-M type pulse tube refrigerator is around 3.3 l. However, dead volume inside rotor housing occupies about 2.8 l and can be much reduced.

  11. Complex network structure of flocks in the Vicsek Model with Vectorial Noise

    Science.gov (United States)

    Baglietto, Gabriel; Albano, Ezequiel V.; Candia, Julián

    2014-09-01

    In the Vicsek Model (VM), self-driven individuals try to adopt the direction of movement of their neighbors under the influence of noise, thus leading to a noise-driven order-disorder phase transition. By implementing the so-called Vectorial Noise (VN) variant of the VM (i.e. the VM-VN model), this phase transition has been shown to be discontinuous (first-order). In this paper, we perform an extensive complex network study of VM-VN flocks and show that their topology can be described as highly clustered, assortative, and nonhierarchical. We also study the behavior of the VM-VN model in the case of "frozen flocks" in which, after the flocks are formed using the full dynamics, particle displacements are suppressed (i.e. only rotations are allowed). Under this kind of restricted dynamics, we show that VM-VN flocks are unable to support the ordered phase. Therefore, we conclude that the particle displacements at every time-step in the VM-VN dynamics are a key element needed to sustain long-range ordering throughout.

  12. The genome-scale metabolic extreme pathway structure in Haemophilus influenzae shows significant network redundancy.

    Science.gov (United States)

    Papin, Jason A; Price, Nathan D; Edwards, Jeremy S; Palsson B, Bernhard Ø

    2002-03-07

    Genome-scale metabolic networks can be characterized by a set of systemically independent and unique extreme pathways. These extreme pathways span a convex, high-dimensional space that circumscribes all potential steady-state flux distributions achievable by the defined metabolic network. Genome-scale extreme pathways associated with the production of non-essential amino acids in Haemophilus influenzae were computed. They offer valuable insight into the functioning of its metabolic network. Three key results were obtained. First, there were multiple internal flux maps corresponding to externally indistinguishable states. It was shown that there was an average of 37 internal states per unique exchange flux vector in H. influenzae when the network was used to produce a single amino acid while allowing carbon dioxide and acetate as carbon sinks. With the inclusion of succinate as an additional output, this ratio increased to 52, a 40% increase. Second, an analysis of the carbon fates illustrated that the extreme pathways were non-uniformly distributed across the carbon fate spectrum. In the detailed case study, 45% of the distinct carbon fate values associated with lysine production represented 85% of the extreme pathways. Third, this distribution fell between distinct systemic constraints. For lysine production, the carbon fate values that represented 85% of the pathways described above corresponded to only 2 distinct ratios of 1:1 and 4:1 between carbon dioxide and acetate. The present study analysed single outputs from one organism, and provides a start to genome-scale extreme pathways studies. These emergent system-level characterizations show the significance of metabolic extreme pathway analysis at the genome-scale.

  13. Optimal bandwidth-aware VM allocation for Infrastructure-as-a-Service

    CERN Document Server

    Dutta, Debojyoti; Post, Ian; Shinde, Rajendra

    2012-01-01

    Infrastructure-as-a-Service (IaaS) providers need to offer richer services to be competitive while optimizing their resource usage to keep costs down. Richer service offerings include new resource request models involving bandwidth guarantees between virtual machines (VMs). Thus we consider the following problem: given a VM request graph (where nodes are VMs and edges represent virtual network connectivity between the VMs) and a real data center topology, find an allocation of VMs to servers that satisfies the bandwidth guarantees for every virtual network edge---which maps to a path in the physical network---and minimizes congestion of the network. Previous work has shown that for arbitrary networks and requests, finding the optimal embedding satisfying bandwidth requests is $\\mathcal{NP}$-hard. However, in most data center architectures, the routing protocols employed are based on a spanning tree of the physical network. In this paper, we prove that the problem remains $\\mathcal{NP}$-hard even when the phys...

  14. An assessment of the ICE6G_C(VM5a) glacial isostatic adjustment model

    Science.gov (United States)

    Purcell, A.; Tregoning, P.; Dehecq, A.

    2016-05-01

    The recent release of the next-generation global ice history model, ICE6G_C(VM5a), is likely to be of interest to a wide range of disciplines including oceanography (sea level studies), space gravity (mass balance studies), glaciology, and, of course, geodynamics (Earth rheology studies). In this paper we make an assessment of some aspects of the ICE6G_C(VM5a) model and show that the published present-day radial uplift rates are too high along the eastern side of the Antarctic Peninsula (by ˜8.6 mm/yr) and beneath the Ross Ice Shelf (by ˜5 mm/yr). Furthermore, the published spherical harmonic coefficients—which are meant to represent the dimensionless present-day changes due to glacial isostatic adjustment (GIA)—contain excessive power for degree ≥90, do not agree with physical expectations and do not represent accurately the ICE6G_C(VM5a) model. We show that the excessive power in the high-degree terms produces erroneous uplift rates when the empirical relationship of Purcell et al. (2011) is applied, but when correct Stokes coefficients are used, the empirical relationship produces excellent agreement with the fully rigorous computation of the radial velocity field, subject to the caveats first noted by Purcell et al. (2011). Using the Australian National University (ANU) groups CALSEA software package, we recompute the present-day GIA signal for the ice thickness history and Earth rheology used by Peltier et al. (2015) and provide dimensionless Stokes coefficients that can be used to correct satellite altimetry observations for GIA over oceans and by the space gravity community to separate GIA and present-day mass balance change signals. We denote the new data sets as ICE6G_ANU.

  15. EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Jasmin James

    2012-09-01

    Full Text Available Cloud computing is a fast growing area in computing research and industry today. With the advancement of the Cloud, there are new possibilities opening up on how applications can be built and how different services can be offered to the end user through Virtualization, on the internet. There are the cloud service providers who provide large scaled computing infrastructure defined on usage, and provide the infrastructure services in a very flexiblemanner which the users can scale up or down at will. The establishment of an effective load balancing algorithm and how to use Cloud computing resources efficiently for effective and efficient cloud computing is one of the Cloud computing service providers’ultimate goals. In this paper firstly analysis of different Virtual Machine (VM load balancing algorithms is done. Secondly, a new VM load balancing algorithm has been proposed and implemented for an IaaS framework in Simulated cloud computing environment; i.e. ‘Weighted Active Monitoring Load Balancing Algorithm’ using CloudSimtools, for the Datacenter to effectively load balance requests between the available virtual machines assigning a weight, in order to achieve better performance parameters such as response time and Data processing time.

  16. Toxicity and medical countermeasure studies on the organophosphorus nerve agents VM and VX.

    Science.gov (United States)

    Rice, Helen; Dalton, Christopher H; Price, Matthew E; Graham, Stuart J; Green, A Christopher; Jenner, John; Groombridge, Helen J; Timperley, Christopher M

    2015-04-08

    To support the effort to eliminate the Syrian Arab Republic chemical weapons stockpile safely, there was a requirement to provide scientific advice based on experimentally derived information on both toxicity and medical countermeasures (MedCM) in the event of exposure to VM, VX or VM-VX mixtures. Complementary in vitro and in vivo studies were undertaken to inform that advice. The penetration rate of neat VM was not significantly different from that of neat VX, through either guinea pig or pig skin in vitro. The presence of VX did not affect the penetration rate of VM in mixtures of various proportions. A lethal dose of VM was approximately twice that of VX in guinea pigs poisoned via the percutaneous route. There was no interaction in mixed agent solutions which altered the in vivo toxicity of the agents. Percutaneous poisoning by VM responded to treatment with standard MedCM, although complete protection was not achieved.

  17. Experience on QA in the CernVM File System

    CERN Document Server

    CERN. Geneva; MEUSEL, Rene

    2015-01-01

    The CernVM-File System (CVMFS) delivers experiment software installations to thousands of globally distributed nodes in the WLCG and beyond. In recent years it became a mission-critical component for offline data processing of the LHC experiments and many other collaborations. From a software engineering perspective, CVMFS is a medium-sized C++ system-level project. Following the growth of the project, we introduced a number of measures to improve the code quality, testability, and maintainability. In particular, we found very useful code reviews through github pull requests and automated unit- and integration testing. We are also transitioning to a test-driven development for new features and bug fixes. These processes are supported by a number of tools, such as Google Test, Jenkins, Docker, and others. We would like to share our experience on problems we encountered and on which processes and tools worked well for us.

  18. 3-D-eChem VM: Cheminformatics Research Infrastructure in a Downloadable Virtual Machine

    OpenAIRE

    Verhoeven, Stefan; Vass, Marton; de Esch, Iwan; Leurs, Rob; Lusher, Scott; Vriend, Gerrrit; Ritschel, Tina; de Graaf, Chris; McGuire, Ross

    2016-01-01

    3D-e-Chem VM is a freely available Virtual Machine (VM) encompassing tools, databases & workflows, including new resources developed for ligand binding site comparisons and GPCR research. The VM contains a fully functional cheminformatics infrastructure consisting of a chemistry enabled relational database system (PostgreSQL + RDKit) with a data analytics workflow tool (KNIME) and additional cheminformatics capabilities. Tools, workflows and reference data sets are made available. The wid...

  19. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Science.gov (United States)

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution.

  20. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Directory of Open Access Journals (Sweden)

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  1. Workload-Aware and CPU Frequency Scaling for Optimal Energy Consumption in VM Allocation

    Directory of Open Access Journals (Sweden)

    Zhen Liu

    2014-01-01

    Full Text Available In the problem of VMs consolidation for cloud energy saving, different workloads will ask for different resources. Thus, considering workload characteristic, the VM placement solution will be more reasonable. In the real world, different workload works in a varied CPU utilization during its work time according to its task characteristics. That means energy consumption related to both the CPU utilization and CPU frequency. Therefore, only using the model of CPU frequency to evaluate energy consumption is insufficient. This paper theoretically verified that there will be a CPU frequency best suit for a certain CPU utilization in order to obtain the minimum energy consumption. According to this deduction, we put forward a heuristic CPU frequency scaling algorithm VP-FS (virtual machine placement with frequency scaling. In order to carry the experiments, we realized three typical greedy algorithms for VMs placement and simulate three groups of VM tasks. Our efforts show that different workloads will affect VMs allocation results. Each group of workload has its most suitable algorithm when considering the minimum used physical machines. And because of the CPU frequency scaling, VP-FS has the best results on the total energy consumption compared with the other three algorithms under any of the three groups of workloads.

  2. Investigating the role of the ventromedial prefrontal cortex (vmPFC in the assessment of brands

    Directory of Open Access Journals (Sweden)

    Jose Paulo eSantos

    2011-06-01

    Full Text Available The ventromedial prefrontal cortex (vmPFC is believed to be important in everyday preference judgments, processing emotions during decision-making. However, there is still controversy in the literature regarding the participation of the vmPFC. To further elucidate the contribution of the vmPFC in brand preference, we designed a functional magnetic resonance imaging (fMRI study where 18 subjects assessed positive, indifferent and fictitious brands. Also, both the period during and after the decision process were analyzed, hoping to unravel temporally the role of the vmPFC, using modeled and model-free fMRI analysis. Considering together the period before and after decision-making, there was activation of the vmPFC when comparing positive with indifferent or fictitious brands. However, when the decision-making period was separated from the moment after the response, and especially for positive brands, the vmPFC was more active after the choice than during the decision process itself, challenging some of the existing literature. The results of the present study support the notion that the vmPFC may be unimportant in the decision stage of brand preference, questioning theories that postulate that the vmPFC is in the origin of such a choice. Further studies are needed to investigate in detail why the vmPFC seems to be involved in brand preference only after the decision process.

  3. Network Analysis Shows Novel Molecular Mechanisms of Action for Copper-Based Chemotherapy

    Science.gov (United States)

    Espinal-Enríquez, Jesús; Hernández-Lemus, Enrique; Mejía, Carmen; Ruiz-Azuara, Lena

    2016-01-01

    The understanding of the mechanisms associated with the action of chemotherapeutic agents is fundamental to assess and account for possible side-effects of such treatments. Casiopeínas have demonstrated a cytotoxic effect by activation of pro-apoptotic processes in malignant cells. Such processes have been proved to activate the apoptotic intrinsic route, as well as cell cycle arrest. Despite this knowledge, the whole mechanism of action of Casiopeínas is yet to be completely understood. In this work we implement a systems biology approach based on two pathway analysis tools (Over-Representation Analysis and Causal Network Analysis) to observe changes in some hallmarks of cancer, induced by this copper-based chemotherapeutic agent in HeLa cell lines. We find that the metabolism of metal ions is exacerbated, as well as cell division processes being globally diminished. We also show that cellular migration and proliferation events are decreased. Moreover, the molecular mechanisms of liver protection are increased in the cell cultures under the actions of Casiopeínas, unlike the case in many other cytotoxic drugs. We argue that this chemotherapeutic agent may be promising, given its protective hepatic function, concomitant with its cytotoxic participation in the onset of apoptotic processes in malignant cells. PMID:26793116

  4. Postglacial Rebound Model ICE-6G_C (VM5a) Constrained by Geodetic and Geologic Observations

    Science.gov (United States)

    Peltier, W. R.; Argus, D. F.; Drummond, R.

    2014-12-01

    We fit the revised global model of glacial isostatic adjustment ICE-6G_C (VM5a) to all available data, consisting of several hundred GPS uplift rates, a similar number of 14C dated relative sea level histories, and 62 geologic estimates of changes in Antarctic ice thickness. The mantle viscosity profile, VM5a is a simple multi-layer fit to prior model VM2 of Peltier (1996, Science). However, the revised deglaciation history, ICE-6G (VM5a), differs significantly from previous models in the Toronto series. (1) In North America, GPS observations of vertical uplift of Earth's surface from the Canadian Base Network require the thickness of the Laurentide ice sheet at Last Glacial Maximum to be significantly revised. At Last Glacial Maximum the new model ICE-6G_C in this region, relative to ICE-5G, roughly 50 percent thicker east of Hudson Bay (in and northern Quebec and Labrador region) and roughly 30 percent thinner west of Hudson Bay (in Manitoba, Saskatchewan, and the Northwest Territories).the net change in mass, however, is small. We find that rates of gravity change determined by GRACE when corrected for the predictions of ICE-6G_C (VM5a) are significantly smaller than residuals determined on the basis of earlier models. (2) In Antarctica, we fit GPS uplift rates, geologic estimates of changes in ice thickness, and geologic constraints on the timing of ice loss. The resulting deglaciation history also differs significantly from prior models. The contribution of Antarctic ice loss to global sea level rise since Last Glacial Maximum in ICE-6G_C is 13.6 meters, less than in ICE-5G (17.5 m), but significantly larger than in both the W12A model of Whitehouse et al. [2012] (8 m) and the IJ05 R02 model of Ivins et al. [2013] (7.5 m). In ICE-6G_C rapid ice loss occurs in Antarctica from 11.5 to 8 thousands years ago, with a rapid onset at 11.5 ka thereby contributing significantly to Meltwater Pulse 1B. In ICE-6G_C (VM5a), viscous uplift of Antarctica is increasing

  5. Space-geodetic and water level gauge constraints on continental uplift and tilting over North America: regional convergence of the ICE-6G_C (VM5a/VM6) models

    Science.gov (United States)

    Roy, Keven; Peltier, W. R.

    2017-08-01

    We present a series of analyses of the regional convergence of the iterative methodology that has been developed for use in the construction of global models of the glacial isostatic adjustment process. Our specific focus is upon the North American component of such models which embodied the largest concentration of grounded land ice at the Last Glacial Maximum. We show that, although the introduction of the VM6 viscosity structure helps the global ICE-6G_C (VM5a) model to improve the fit to relative sea level data from the region of forebulge collapse along the U.S. East coast, it also leads to a significant misfit to the totality of the available space-geodetic observations, which the original ICE-6G_C (VM5a) model was able to fit with high accuracy. This raises the issue of the convergence of the iterative methodology being employed in the process of model construction. We demonstrate through detailed further analysis that a fully converged solution which reconciles all available data from the continent, including additional data on the time dependent de-levelling of the Great Lakes region, is obtained through modest further modifications of both the viscosity structure of the model and the North American component of the surface mass loading history.

  6. Fast-Solving Quasi-Optimal LS-S$³$VM Based on an Extended Candidate Set.

    Science.gov (United States)

    Ma, Yuefeng; Liang, Xun; Kwok, James T; Li, Jianping; Zhou, Xiaoping; Zhang, Haiyan

    2017-02-14

    The semisupervised least squares support vector machine (LS-S³VM) is an important enhancement of least squares support vector machines in semisupervised learning. Given that most data collected from the real world are without labels, semisupervised approaches are more applicable than standard supervised approaches. Although a few training methods for LS-S³VM exist, the problem of deriving the optimal decision hyperplane efficiently and effectually has not been solved. In this paper, a fully weighted model of LS-S³VM is proposed, and a simple integer programming (IP) model is introduced through an equivalent transformation to solve the model. Based on the distances between the unlabeled data and the decision hyperplane, a new indicator is designed to represent the possibility that the label of an unlabeled datum should be reversed in each iteration during training. Using the indicator, we construct an extended candidate set consisting of the indices of unlabeled data with high possibilities, which integrates more information from unlabeled data. Our algorithm is degenerated into a special scenario of the previous algorithm when the extended candidate set is reduced into a set with only one element. Two strategies are utilized to determine the descent directions based on the extended candidate set. Furthermore, we developed a novel method for locating a good starting point based on the properties of the equivalent IP model. Combined with the extended candidate set and the carefully computed starting point, a fast algorithm to solve LS-S³VM quasi-optimally is proposed. The choice of quasi-optimal solutions results in low computational cost and avoidance of overfitting. Experiments show that our algorithm equipped with the two designed strategies is more effective than other algorithms in at least one of the following three aspects: 1) computational complexity; 2) generalization ability; and 3) flexibility. However, our algorithm and other algorithms have similar

  7. Drosophila vitelline membrane assembly: A critical role for an evolutionarily conserved cysteine in the “VM domain” of sV23

    OpenAIRE

    Wu, T; Manogaran, A.L; Beauchamp, J.M.; Waring, G L

    2010-01-01

    The vitelline membrane (VM), the oocyte proximal layer of the Drosophila eggshell, contains four major proteins (VMPs) that possess a highly conserved “VM domain” which includes three precisely spaced, evolutionarily conserved, cysteines (CX7CX8C). Focusing on sV23, this study showed that the three cysteines are not functionally equivalent. While substitution mutations at the first (C123S) or third (C140S) cysteines were tolerated, females with a substitution at the second position (C131S) we...

  8. NMDA antagonist, but not nNOS inhibitor, requires AMPA receptors in the ventromedial prefrontal cortex (vmPFC) to induce antidepressant-like effects

    DEFF Research Database (Denmark)

    Pereira, V. S.; Wegener, Gregers; Joca, S. R.

    2013-01-01

    Depressed individuals and stressed animals show enhanced levels of glutamate and neuronal nitric oxide synthase (nNOS) activity in limbic structures, including the vmPFC. Systemic administration of glutamatergic NMDA receptor antagonists or inhibitors of nitric oxide (NO) synthesis induces antide...

  9. Analysis of genetic interaction networks shows that alternatively spliced genes are highly versatile.

    Science.gov (United States)

    Talavera, David; Sheoran, Ritika; Lovell, Simon C

    2013-01-01

    Alternative splicing has the potential to increase the diversity of the transcriptome and proteome. Where more than one transcript arises from a gene they are often so different that they are quite unlikely to have the same function. However, it remains unclear if alternative splicing generally leads to a gene being involved in multiple biological processes or whether it alters the function within a single process. Knowing that genetic interactions occur between functionally related genes, we have used them as a proxy for functional versatility, and have analysed the sets of genes of two well-characterised model organisms: Caenorhabditis elegans and Drosophila melanogaster. Using network analyses we find that few genes are functionally homogenous (only involved in a few functionally-related biological processes). Moreover, there are differences between alternatively spliced genes and genes with a single transcript; specifically, genes with alternatively splicing are, on average, involved in more biological processes. Finally, we suggest that factors other than specific functional classes determine whether a gene is alternatively spliced.

  10. Toxicity and medical countermeasure studies on the organophosphorus nerve agents VM and VX

    OpenAIRE

    Rice, Helen; Dalton, Christopher H.; Price, Matthew E.; Stuart J Graham; Green, A. Christopher; Jenner, John; Groombridge, Helen J.; Timperley, Christopher M.

    2015-01-01

    To support the effort to eliminate the Syrian Arab Republic chemical weapons stockpile safely, there was a requirement to provide scientific advice based on experimentally derived information on both toxicity and medical countermeasures (MedCM) in the event of exposure to VM, VX or VM–VX mixtures. Complementary in vitro and in vivo studies were undertaken to inform that advice. The penetration rate of neat VM was not significantly different from that of neat VX, through either guinea pig or p...

  11. Unique properties of the classical bovine spongiform encephalopathy strain and its emergence from H-type bovine spongiform encephalopathy substantiated by VM transmission studies.

    Science.gov (United States)

    Bencsik, Anna; Leboidre, Mikael; Debeer, Sabine; Aufauvre, Claire; Baron, Thierry

    2013-03-01

    In addition to classical bovine spongiform encephalopathy (C-BSE), which is recognized as being at the origin of the human variant form of Creutzfeldt-Jakob disease, 2 rare phenotypes of BSE (H-type BSE [H-BSE] and L-type BSE [L-BSE]) were identified in 2004. H-type BSE and L-BSE are considered to be sporadic forms of prion disease in cattle because they differ from C-BSE with respect to incubation period, vacuolar pathology in the brain, and biochemical properties of the protease-resistant prion protein (PrP) in natural hosts and in some mouse models that have been tested. Recently, we showed that H-BSE transmitted to C57Bl/6 mice resulted in a dissociation of the phenotypic features, that is, some mice showed an H-BSE phenotype, whereas others had a C-BSE phenotype. Here, these 2 phenotypes were further studied in VM mice and compared with cattle C-BSE, H-BSE, and L-BSE. Serial passages from the C-BSE-like phenotype on VM mice retained similarities with C-BSE. Moreover, our results indicate that strains 301V and 301C derived from C-BSE transmitted to VM and C57Bl/6 mice, respectively, are fundamentally the same strain. These VM transmission studies confirm the unique properties of the C-BSE strain and support the emergence of a strain that resembles C-BSE from H-BSE.

  12. Non-Toxic Metabolic Management of Metastatic Cancer in VM Mice: Novel Combination of Ketogenic Diet, Ketone Supplementation, and Hyperbaric Oxygen Therapy.

    Science.gov (United States)

    Poff, A M; Ward, N; Seyfried, T N; Arnold, P; D'Agostino, D P

    2015-01-01

    The Warburg effect and tumor hypoxia underlie a unique cancer metabolic phenotype characterized by glucose dependency and aerobic fermentation. We previously showed that two non-toxic metabolic therapies - the ketogenic diet with concurrent hyperbaric oxygen (KD+HBOT) and dietary ketone supplementation - could increase survival time in the VM-M3 mouse model of metastatic cancer. We hypothesized that combining these therapies could provide an even greater therapeutic benefit in this model. Mice receiving the combination therapy demonstrated a marked reduction in tumor growth rate and metastatic spread, and lived twice as long as control animals. To further understand the effects of these metabolic therapies, we characterized the effects of high glucose (control), low glucose (LG), ketone supplementation (βHB), hyperbaric oxygen (HBOT), or combination therapy (LG+βHB+HBOT) on VM-M3 cells. Individually and combined, these metabolic therapies significantly decreased VM-M3 cell proliferation and viability. HBOT, alone or in combination with LG and βHB, increased ROS production in VM-M3 cells. This study strongly supports further investigation into this metabolic therapy as a potential non-toxic treatment for late-stage metastatic cancers.

  13. Non-Toxic Metabolic Management of Metastatic Cancer in VM Mice: Novel Combination of Ketogenic Diet, Ketone Supplementation, and Hyperbaric Oxygen Therapy.

    Directory of Open Access Journals (Sweden)

    A M Poff

    Full Text Available The Warburg effect and tumor hypoxia underlie a unique cancer metabolic phenotype characterized by glucose dependency and aerobic fermentation. We previously showed that two non-toxic metabolic therapies - the ketogenic diet with concurrent hyperbaric oxygen (KD+HBOT and dietary ketone supplementation - could increase survival time in the VM-M3 mouse model of metastatic cancer. We hypothesized that combining these therapies could provide an even greater therapeutic benefit in this model. Mice receiving the combination therapy demonstrated a marked reduction in tumor growth rate and metastatic spread, and lived twice as long as control animals. To further understand the effects of these metabolic therapies, we characterized the effects of high glucose (control, low glucose (LG, ketone supplementation (βHB, hyperbaric oxygen (HBOT, or combination therapy (LG+βHB+HBOT on VM-M3 cells. Individually and combined, these metabolic therapies significantly decreased VM-M3 cell proliferation and viability. HBOT, alone or in combination with LG and βHB, increased ROS production in VM-M3 cells. This study strongly supports further investigation into this metabolic therapy as a potential non-toxic treatment for late-stage metastatic cancers.

  14. A UV-induced genetic network links the RSC complex to nucleotide excision repair and shows dose-dependent rewiring.

    Science.gov (United States)

    Srivas, Rohith; Costelloe, Thomas; Carvunis, Anne-Ruxandra; Sarkar, Sovan; Malta, Erik; Sun, Su Ming; Pool, Marijke; Licon, Katherine; van Welsem, Tibor; van Leeuwen, Fred; McHugh, Peter J; van Attikum, Haico; Ideker, Trey

    2013-12-26

    Efficient repair of UV-induced DNA damage requires the precise coordination of nucleotide excision repair (NER) with numerous other biological processes. To map this crosstalk, we generated a differential genetic interaction map centered on quantitative growth measurements of >45,000 double mutants before and after different doses of UV radiation. Integration of genetic data with physical interaction networks identified a global map of 89 UV-induced functional interactions among 62 protein complexes, including a number of links between the RSC complex and several NER factors. We show that RSC is recruited to both silenced and transcribed loci following UV damage where it facilitates efficient repair by promoting nucleosome remodeling. Finally, a comparison of the response to high versus low levels of UV shows that the degree of genetic rewiring correlates with dose of UV and reveals a network of dose-specific interactions. This study makes available a large resource of UV-induced interactions, and it illustrates a methodology for identifying dose-dependent interactions based on quantitative shifts in genetic networks.

  15. A UV-Induced Genetic Network Links the RSC Complex to Nucleotide Excision Repair and Shows Dose-Dependent Rewiring

    Directory of Open Access Journals (Sweden)

    Rohith Srivas

    2013-12-01

    Full Text Available Efficient repair of UV-induced DNA damage requires the precise coordination of nucleotide excision repair (NER with numerous other biological processes. To map this crosstalk, we generated a differential genetic interaction map centered on quantitative growth measurements of >45,000 double mutants before and after different doses of UV radiation. Integration of genetic data with physical interaction networks identified a global map of 89 UV-induced functional interactions among 62 protein complexes, including a number of links between the RSC complex and several NER factors. We show that RSC is recruited to both silenced and transcribed loci following UV damage where it facilitates efficient repair by promoting nucleosome remodeling. Finally, a comparison of the response to high versus low levels of UV shows that the degree of genetic rewiring correlates with dose of UV and reveals a network of dose-specific interactions. This study makes available a large resource of UV-induced interactions, and it illustrates a methodology for identifying dose-dependent interactions based on quantitative shifts in genetic networks.

  16. Properties and Microstructure of Laser Welded VM12-SHC Steel Pipes Joints

    Directory of Open Access Journals (Sweden)

    Skrzypczyk A.

    2016-06-01

    Full Text Available Paper presents results of microstructure and tests of welded joints of new generation VM12-SHC martensitic steel using high power CO2 laser (LBW method with bifocal welding head. VM12-SHC is dedicated to energetic installation material, designed to replace currently used. High content of chromium and others alloying elements improve its resistance and strength characteristic. Use of VM12-SHC steel for production of the superheaters, heating chambers and walls in steam boilers resulted in various weldability researches. In article are presented results of destructive and non-destructive tests. For destructive: static bending and Vickers hardness tests, and for non-destructive: VT, RT, UT, micro and macroscopic tests were performed.

  17. Performance Tests of CMSSW on the CernVM

    CERN Document Server

    Petek, Marko

    2012-01-01

    goal of allowing the execution of the experiment's software on different operating systems in an easy way for the users. To achieve this it makes use of Virtual Machine images consisting of a JEOS (Just Enough Operational System) Linux image, bundled with CVMFS, a distributed file system for software. This image can this be run with a proper virtualizer on most of the platforms available. It also aggressively caches data on the local user's machine so that it can operate disconnected from the network. CMS wanted to compare the performance of the CMS Software running in the virtualized environment with the same software running on a native Linux box. To answer this need a series of tests were made on a controlled environment during 2010-2011. This work presents the results of those tests.

  18. Quantitative levels of Deficiens and Globosa during late petal development show a complex transcriptional network topology of B function.

    Science.gov (United States)

    Manchado-Rojo, María; Delgado-Benarroch, Luciana; Roca, María J; Weiss, Julia; Egea-Cortines, Marcos

    2012-10-01

    The transcriptional network topology of B function in Antirrhinum, required for petal and stamen development, is thought to rely on initial activation of transcription of DEFICIENS (DEF) and GLOBOSA (GLO), followed by a positive autoregulatory loop maintaining gene expression levels. Here, we show that the mutant compacta (co), whose vegetative growth and petal size are affected, plays a role in B function. Late events in petal morphogenesis such as development of conical cell area and scent emissions were reduced in co and def (nicotianoides) (def (nic) ), and absent in co def (nic) double mutants, suggesting a role for CO in petal identity. Expression of DEF was down-regulated in co but surprisingly GLO was not affected. We investigated the levels of DEF and GLO at late stages of petal development in the co, def (nic) and glo-1 mutants, and established a reliable transformation protocol that yielded RNAi-DEF lines. We show that the threshold levels of DEF or GLO required to obtain petal tissue are approximately 11% of wild-type. The relationship between DEF and GLO transcripts is not equal or constant and changes during development. Furthermore, down-regulation of DEF or GLO does not cause parallel down-regulation of the partner. Our results demonstrate that, at late stages of petal development, the B function transcriptional network topology is not based on positive autoregulation, and has additional components of transcriptional maintenance. Our results suggest changes in network topology that may allow changes in protein complexes that would explain the fact that not all petal traits appear early in development.

  19. Non-Toxic Metabolic Management of Metastatic Cancer in VM Mice: Novel Combination of Ketogenic Diet, Ketone Supplementation, and Hyperbaric Oxygen Therapy

    OpenAIRE

    2015-01-01

    The Warburg effect and tumor hypoxia underlie a unique cancer metabolic phenotype characterized by glucose dependency and aerobic fermentation. We previously showed that two non-toxic metabolic therapies - the ketogenic diet with concurrent hyperbaric oxygen (KD+HBOT) and dietary ketone supplementation - could increase survival time in the VM-M3 mouse model of metastatic cancer. We hypothesized that combining these therapies could provide an even greater therapeutic benefit in this model. Mic...

  20. Interference of Quorum Sensing by Delftia sp. VM4 Depends on the Activity of a Novel N-Acylhomoserine Lactone-Acylase.

    Directory of Open Access Journals (Sweden)

    Vimal B Maisuria

    Full Text Available Turf soil bacterial isolate Delftia sp. VM4 can degrade exogenous N-acyl homoserine lactone (AHL, hence it effectively attenuates the virulence of bacterial soft rot pathogen Pectobacterium carotovorum subsp. carotovorum strain BR1 (Pcc BR1 as a consequence of quorum sensing inhibition.Isolated Delftia sp. VM4 can grow in minimal medium supplemented with AHL as a sole source of carbon and energy. It also possesses the ability to degrade various AHL molecules in a short time interval. Delftia sp. VM4 suppresses AHL accumulation and the production of virulence determinant enzymes by Pcc BR1 without interference of the growth during co-culture cultivation. The quorum quenching activity was lost after the treatment with trypsin and proteinase K. The protein with quorum quenching activity was purified by three step process. Matrix assisted laser desorption/ionization-time of flight (MALDI-TOF and Mass spectrometry (MS/MS analysis revealed that the AHL degrading enzyme (82 kDa demonstrates homology with the NCBI database hypothetical protein (Daci_4366 of D. acidovorans SPH-1. The purified AHL acylase of Delftia sp. VM4 demonstrated optimum activity at 20-40°C and pH 6.2 as well as AHL acylase type mode of action. It possesses similarity with an α/β-hydrolase fold protein, which makes it unique among the known AHL acylases with domains of the N-terminal nucleophile (Ntn-hydrolase superfamily. In addition, the kinetic and thermodynamic parameters for hydrolysis of the different AHL substrates by purified AHL-acylase were estimated. Here we present the studies that investigate the mode of action and kinetics of AHL-degradation by purified AHL acylase from Delftia sp. VM4.We characterized an AHL-inactivating enzyme from Delftia sp. VM4, identified as AHL acylase showing distinctive similarity with α/β-hydrolase fold protein, described its biochemical and thermodynamic properties for the first time and revealed its potential application as an anti

  1. 3D-e-Chem-VM: Structural Cheminformatics Research Infrastructure in a Freely Available Virtual Machine.

    Science.gov (United States)

    McGuire, Ross; Verhoeven, Stefan; Vass, Márton; Vriend, Gerrit; de Esch, Iwan J P; Lusher, Scott J; Leurs, Rob; Ridder, Lars; Kooistra, Albert J; Ritschel, Tina; de Graaf, Chris

    2017-02-14

    3D-e-Chem-VM is an open source, freely available Virtual Machine ( http://3d-e-chem.github.io/3D-e-Chem-VM/ ) that integrates cheminformatics and bioinformatics tools for the analysis of protein-ligand interaction data. 3D-e-Chem-VM consists of software libraries, and database and workflow tools that can analyze and combine small molecule and protein structural information in a graphical programming environment. New chemical and biological data analytics tools and workflows have been developed for the efficient exploitation of structural and pharmacological protein-ligand interaction data from proteomewide databases (e.g., ChEMBLdb and PDB), as well as customized information systems focused on, e.g., G protein-coupled receptors (GPCRdb) and protein kinases (KLIFS). The integrated structural cheminformatics research infrastructure compiled in the 3D-e-Chem-VM enables the design of new approaches in virtual ligand screening (Chemdb4VS), ligand-based metabolism prediction (SyGMa), and structure-based protein binding site comparison and bioisosteric replacement for ligand design (KRIPOdb).

  2. 3D-e-Chem-VM: Structural Cheminformatics Research Infrastructure in a Freely Available Virtual Machine

    Science.gov (United States)

    2017-01-01

    3D-e-Chem-VM is an open source, freely available Virtual Machine (http://3d-e-chem.github.io/3D-e-Chem-VM/) that integrates cheminformatics and bioinformatics tools for the analysis of protein–ligand interaction data. 3D-e-Chem-VM consists of software libraries, and database and workflow tools that can analyze and combine small molecule and protein structural information in a graphical programming environment. New chemical and biological data analytics tools and workflows have been developed for the efficient exploitation of structural and pharmacological protein–ligand interaction data from proteomewide databases (e.g., ChEMBLdb and PDB), as well as customized information systems focused on, e.g., G protein-coupled receptors (GPCRdb) and protein kinases (KLIFS). The integrated structural cheminformatics research infrastructure compiled in the 3D-e-Chem-VM enables the design of new approaches in virtual ligand screening (Chemdb4VS), ligand-based metabolism prediction (SyGMa), and structure-based protein binding site comparison and bioisosteric replacement for ligand design (KRIPOdb). PMID:28125221

  3. Getting started with Oracle VM VirtualBox

    CERN Document Server

    Dash, Pradyumna

    2013-01-01

    A step-by-step guide that will show you how to install, configure, and manage VirtualBox.This book is for system administrators, technical architects, and virtualization enthusiasts who want to learn how to set up a virtual machine. Knowledge of the Linux environment is expected. Prior experience with VirtualBox or knowledge of virtualization is not required.

  4. Ventral medial prefrontal cortex (vmPFC) as a target of the dorsolateral prefrontal modulation by transcranial direct current stimulation (tDCS) in drug addiction.

    Science.gov (United States)

    Nakamura-Palacios, Ester Miyuki; Lopes, Isabela Bittencourt Coutinho; Souza, Rodolpho Albuquerque; Klauss, Jaisa; Batista, Edson Kruger; Conti, Catarine Lima; Moscon, Janine Andrade; de Souza, Rodrigo Stênio Moll

    2016-10-01

    Here, we report some electrophysiologic and imaging effects of the transcranial direct current stimulation (tDCS) over the dorsolateral prefrontal cortex (dlPFC) in drug addiction, notably in alcohol and crack-cocaine dependence. The low resolution electromagnetic tomography (LORETA) analysis obtained through event-related potentials (ERPs) under drug-related cues, more specifically in its P3 segment (300-500 ms) in both, alcoholics and crack-cocaine users, showed that the ventral medial prefrontal cortex (vmPFC) was the brain area with the largest change towards increasing activation under drug-related cues in those subjects that kept abstinence during and after the treatment with bilateral tDCS (2 mA, 35 cm(2), cathodal left and anodal right) over dlPFC, applied repetitively (five daily sessions). In an additional study in crack-cocaine, which showed craving decreases after repetitive bilateral tDCS, we examined data originating from diffusion tensor imaging (DTI), and we found increased DTI parameters in the left connection between vmPFC and nucleus accumbens (NAcc), such as the number of voxels, fractional anisotropy (FA) and apparent diffusion coefficient (ADC), in tDCS-treated crack-cocaine users when compared to the sham-tDCS group. This increasing of DTI parameters was significantly correlated with craving decreasing after the repetitive tDCS. The vmPFC relates to the control of drug seeking, possibly by extinguishing this behavior. In our studies, the bilateral dlPFC tDCS reduced relapses and craving to the drug use, and increased the vmPFC activation under drug cues, which may be of a great importance in the control of drug use in drug addiction.

  5. Usage of a localised microflow device to show that mitochondrial networks are not extensive in skeletal muscle fibres.

    Directory of Open Access Journals (Sweden)

    Joseph Bruton

    Full Text Available In cells, such as neurones and immune cells, mitochondria can form dynamic and extensive networks that change over the minute timescale. In contrast, mitochondria in adult mammalian skeletal muscle fibres show little motility over several hours. Here, we use a novel three channelled microflow device, the multifunctional pipette, to test whether mitochondria in mouse skeletal muscle connect to each other. The central channel in the pipette delivers compounds to a restricted region of the sarcolemma, typically 30 µm in diameter. Two channels on either side of the central channel use suction to create a hydrodynamically confined flow zone and remove compounds completely from the bulk solution to internal waste compartments. Compounds were delivered locally to the end or side of single adult mouse skeletal muscle fibres to test whether changes in mitochondrial membrane potential were transmitted to more distant located mitochondria. Mitochondrial membrane potential was monitored with tetramethylrhodamine ethyl ester (TMRE. Cytosolic free [Ca2+] was monitored with fluo-3. A pulse of carbonyl cyanide 4-(trifluoromethoxy phenylhydrazone (FCCP, 100 µM applied to a small area of the muscle fibre (30 µm in diameter produced a rapid decrease in the mitochondrial TMRE signal (indicative of depolarization to 38% of its initial value. After washout of FCCP, the TMRE signal partially recovered. At distances greater than 50 µm away from the site of FCCP application, the mitochondrial TMRE signal was unchanged. Similar results were observed when two sites along the fibre were pulsed sequentially with FCCP. After a pulse of FCCP, cytosolic [Ca2+] was unchanged and fibres contracted in response to electrical stimulation. In conclusion, our results indicate that extensive networks of interconnected mitochondria do not exist in skeletal muscle. Furthermore, the limited and reversible effects of targeted FCCP application with the multifunctional pipette highlight

  6. Two isoforms of TALDO1 generated by alternative translational initiation show differential nucleocytoplasmic distribution to regulate the global metabolic network

    Science.gov (United States)

    Moriyama, Tetsuji; Tanaka, Shu; Nakayama, Yasumune; Fukumoto, Masahiro; Tsujimura, Kenji; Yamada, Kohji; Bamba, Takeshi; Yoneda, Yoshihiro; Fukusaki, Eiichiro; Oka, Masahiro

    2016-01-01

    Transaldolase 1 (TALDO1) is a rate-limiting enzyme involved in the pentose phosphate pathway, which is traditionally thought to occur in the cytoplasm. In this study, we found that the gene TALDO1 has two translational initiation sites, generating two isoforms that differ by the presence of the first 10 N-terminal amino acids. Notably, the long and short isoforms were differentially localised to the cell nucleus and cytoplasm, respectively. Pull-down and in vitro transport assays showed that the long isoform, unlike the short one, binds to importin α and is actively transported into the nucleus in an importin α/β-dependent manner, demonstrating that the 10 N-terminal amino acids are essential for its nuclear localisation. Additionally, we found that these two isoforms can form homo- and/or hetero-dimers with different localisation dynamics. A metabolite analysis revealed that the subcellular localisation of TALDO1 is not crucial for its activity in the pentose phosphate pathway. However, the expression of these two isoforms differentially affected the levels of various metabolites, including components of the tricarboxylic acid cycle, nucleotides, and sugars. These results demonstrate that the nucleocytoplasmic distribution of TALDO1, modulated via alternative translational initiation and dimer formation, plays an important role in a wide range of metabolic networks. PMID:27703206

  7. HTLV-I Tax and Cytokeratin: Tax-Expressing Cells Show Morphological Changes in Keratin-Containing Cytoskeletal Networks.

    Science.gov (United States)

    Trihn, D.; Jeang, K.-T.; Semmes, O.J.

    1997-01-01

    Human T cell leukemia virus type I (HTLV-I) has been linked to the development of an aggressive lymphoproliferative disorder (adult T cell leukemia), a chronic neurodegenerative presentation (HTLV-I-associated myelopathy/tropical spastic paraparesis) and numerous less well-defined inflammatory conditions. The viral regulatory protein Tax has been implicated in cellular transformation events leading to the onset of adult T cell leukemia. Details on the stepwise processes through which Tax induces morphological changes in cells are poorly understood. We show here that Tax can bind to a class of intermediate filaments, the cytokeratins (Ker). Tax interacts with the 1B helical coil of keratin 8, a domain critical for higher-order intermediate filament matrix formation. Expression of Tax in epithelial cells visibly altered the structural pattern of the Ker network. In a T lymphocyte cell line, induction of Tax expression resulted in increased cellular adherence/invasion of Matrigel filters. We propose that one aspect of Tax function is the induction of morphological changes in cellular cytoskeletal structures. This finding for Tax-expressing cells might be one factor contributing directly to the pathogenesis of HTLV-I disease(s). Copyright 1997 S. Karger AG, Basel

  8. STUDIES OF SPONDYLOARTHRITIS IN RUSSIA: FROM V.M. BEKHTEREV TO OUR DAYS

    Directory of Open Access Journals (Sweden)

    A. А. Godzenko

    2016-01-01

    Full Text Available The paper briefly describes the history of spondyloarthritis  studies from the works of the outstanding Russian neurologist V.M. Bekhterev up to the present time. Special emphasis is laid on the results of the representatives of the scientific school of Professor E.R. Agababova, an organizer of the first laboratory of spondyloarthritis  in Russia. The major areas of the investigations that are currently under way in Russia are shown.

  9. Engineering the CernVM-Filesystem as a High Bandwidth Distributed Filesystem for Auxiliary Physics Data

    Science.gov (United States)

    Dykstra, D.; Bockelman, B.; Blomer, J.; Herner, K.; Levshina, T.; Slyz, M.

    2015-12-01

    A common use pattern in the computing models of particle physics experiments is running many distributed applications that read from a shared set of data files. We refer to this data is auxiliary data, to distinguish it from (a) event data from the detector (which tends to be different for every job), and (b) conditions data about the detector (which tends to be the same for each job in a batch of jobs). Relatively speaking, conditions data also tends to be relatively small per job where both event data and auxiliary data are larger per job. Unlike event data, auxiliary data comes from a limited working set of shared files. Since there is spatial locality of the auxiliary data access, the use case appears to be identical to that of the CernVM- Filesystem (CVMFS). However, we show that distributing auxiliary data through CVMFS causes the existing CVMFS infrastructure to perform poorly. We utilize a CVMFS client feature called "alien cache" to cache data on existing local high-bandwidth data servers that were engineered for storing event data. This cache is shared between the worker nodes at a site and replaces caching CVMFS files on both the worker node local disks and on the site's local squids. We have tested this alien cache with the dCache NFSv4.1 interface, Lustre, and the Hadoop Distributed File System (HDFS) FUSE interface, and measured performance. In addition, we use high-bandwidth data servers at central sites to perform the CVMFS Stratum 1 function instead of the low-bandwidth web servers deployed for the CVMFS software distribution function. We have tested this using the dCache HTTP interface. As a result, we have a design for an end-to-end high-bandwidth distributed caching read-only filesystem, using existing client software already widely deployed to grid worker nodes and existing file servers already widely installed at grid sites. Files are published in a central place and are soon available on demand throughout the grid and cached locally on the

  10. Engineering the CernVM-Filesystem as a High Bandwidth Distributed Filesystem for Auxiliary Physics Data

    Energy Technology Data Exchange (ETDEWEB)

    Dykstra, D. [Fermilab; Bockelman, B. [Nebraska U.; Blomer, J. [CERN; Herner, K. [Fermilab; Levshina, T. [Fermilab; Slyz, M. [Fermilab

    2015-12-23

    A common use pattern in the computing models of particle physics experiments is running many distributed applications that read from a shared set of data files. We refer to this data is auxiliary data, to distinguish it from (a) event data from the detector (which tends to be different for every job), and (b) conditions data about the detector (which tends to be the same for each job in a batch of jobs). Relatively speaking, conditions data also tends to be relatively small per job where both event data and auxiliary data are larger per job. Unlike event data, auxiliary data comes from a limited working set of shared files. Since there is spatial locality of the auxiliary data access, the use case appears to be identical to that of the CernVM- Filesystem (CVMFS). However, we show that distributing auxiliary data through CVMFS causes the existing CVMFS infrastructure to perform poorly. We utilize a CVMFS client feature called 'alien cache' to cache data on existing local high-bandwidth data servers that were engineered for storing event data. This cache is shared between the worker nodes at a site and replaces caching CVMFS files on both the worker node local disks and on the site's local squids. We have tested this alien cache with the dCache NFSv4.1 interface, Lustre, and the Hadoop Distributed File System (HDFS) FUSE interface, and measured performance. In addition, we use high-bandwidth data servers at central sites to perform the CVMFS Stratum 1 function instead of the low-bandwidth web servers deployed for the CVMFS software distribution function. We have tested this using the dCache HTTP interface. As a result, we have a design for an end-to-end high-bandwidth distributed caching read-only filesystem, using existing client software already widely deployed to grid worker nodes and existing file servers already widely installed at grid sites. Files are published in a central place and are soon available on demand throughout the grid and cached

  11. Anatomical network analysis shows decoupling of modular lability and complexity in the evolution of the primate skull.

    Directory of Open Access Journals (Sweden)

    Borja Esteve-Altava

    Full Text Available Modularity and complexity go hand in hand in the evolution of the skull of primates. Because analyses of these two parameters often use different approaches, we do not know yet how modularity evolves within, or as a consequence of, an also-evolving complex organization. Here we use a novel network theory-based approach (Anatomical Network Analysis to assess how the organization of skull bones constrains the co-evolution of modularity and complexity among primates. We used the pattern of bone contacts modeled as networks to identify connectivity modules and quantify morphological complexity. We analyzed whether modularity and complexity evolved coordinately in the skull of primates. Specifically, we tested Herbert Simon's general theory of near-decomposability, which states that modularity promotes the evolution of complexity. We found that the skulls of extant primates divide into one conserved cranial module and up to three labile facial modules, whose composition varies among primates. Despite changes in modularity, statistical analyses reject a positive feedback between modularity and complexity. Our results suggest a decoupling of complexity and modularity that translates to varying levels of constraint on the morphological evolvability of the primate skull. This study has methodological and conceptual implications for grasping the constraints that underlie the developmental and functional integration of the skull of humans and other primates.

  12. Using XRootD to provide caches for CernVM-FS

    CERN Document Server

    Domenighini, Matteo

    2017-01-01

    CernVM-FS recently added the possibility of using plugin for cache management. In order to investigate the capabilities and limits of such possibility, an XRootD plugin was written and benchmarked; as a byproduct, a POSIX plugin was also generated. The tests revealed that the plugin interface introduces no signicant performance over- head; moreover, the XRootD plugin performance was discovered to be worse than the ones of the built-in cache manager and the POSIX plugin. Further test of the XRootD component revealed that its per- formance is dependent on the server disk speed.

  13. Security in the CernVM File System and the Frontier Distributed Database Caching System

    CERN Document Server

    Dykstra, David

    2014-01-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently both CVMFS and Frontier have added X509-based integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  14. Security in the CernVM File System and the Frontier Distributed Database Caching System

    Energy Technology Data Exchange (ETDEWEB)

    Dykstra, D.; Blomer, J. [CERN

    2014-01-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  15. Dynamic virtual AliEn Grid sites on Nimbus with CernVM

    Science.gov (United States)

    Harutyunyan, A.; Buncic, P.; Freeman, T.; Keahey, K.

    2010-04-01

    We describe the work on enabling one click deployment of Grid sites of AliEn Grid framework on the Nimbus 'science cloud' at the University of Chicago. The integration of computing resources of the cloud with the resource pool of AliEn Grid is achieved by leveraging two mechanisms: the Nimbus Context Broker developed at Argonne National Laboratory and the University of Chicago, and CernVM - a baseline virtual software appliance for LHC experiments developed at CERN. Two approaches of dynamic virtual AliEn Grid site deployment are presented.

  16. Dynamic virtual AliEn Grid sites on Nimbus with CernVM

    Energy Technology Data Exchange (ETDEWEB)

    Harutyunyan, A [Armenian e-Science Foundation, Yerevan (Armenia); Buncic, P [CERN, Geneva (Switzerland); Freeman, T; Keahey, K, E-mail: hartem@mail.yerphi.a, E-mail: Predrag.Buncic@cern.c, E-mail: tfreeman@mcs.anl.go, E-mail: keahey@mcs.anl.go [University of Chicago, Chicago IL (United States)

    2010-04-01

    We describe the work on enabling one click deployment of Grid sites of AliEn Grid framework on the Nimbus 'science cloud' at the University of Chicago. The integration of computing resources of the cloud with the resource pool of AliEn Grid is achieved by leveraging two mechanisms: the Nimbus Context Broker developed at Argonne National Laboratory and the University of Chicago, and CernVM - a baseline virtual software appliance for LHC experiments developed at CERN. Two approaches of dynamic virtual AliEn Grid site deployment are presented.

  17. Physical metallurgy: Scientific school of the Academician V.M. Schastlivtsev

    Science.gov (United States)

    Tabatchikova, T. I.

    2016-04-01

    This paper is to honor Academician Vadim Mikhailovich Schastlivtsev, a prominent scientist in the field of metal physics and materials science. The article comprises an analysis of the topical issues of the physical metallurgy of the early 21st century and of the contribution of V.M. Schastlivtsev and of his school to the science of phase and structural transformations in steels. In 2015, Vadim Mikhailovich celebrates his 80th birthday, and this paper is timed to this honorable date. The list of his main publications is given in it.

  18. A network model shows the importance of coupled processes in the microbial N cycle in the Cape Fear River Estuary

    Science.gov (United States)

    Hines, David E.; Lisa, Jessica A.; Song, Bongkeun; Tobias, Craig R.; Borrett, Stuart R.

    2012-06-01

    Estuaries serve important ecological and economic functions including habitat provision and the removal of nutrients. Eutrophication can overwhelm the nutrient removal capacity of estuaries and poses a widely recognized threat to the health and function of these ecosystems. Denitrification and anaerobic ammonium oxidation (anammox) are microbial processes responsible for the removal of fixed nitrogen and diminish the effects of eutrophication. Both of these microbial removal processes can be influenced by direct inputs of dissolved inorganic nitrogen substrates or supported by microbial interactions with other nitrogen transforming pathways such as nitrification and dissimilatory nitrate reduction to ammonium (DNRA). The coupling of nitrogen removal pathways to other transformation pathways facilitates the removal of some forms of inorganic nitrogen; however, differentiating between direct and coupled nitrogen removal is difficult. Network modeling provides a tool to examine interactions among microbial nitrogen cycling processes and to determine the within-system history of nitrogen involved in denitrification and anammox. To examine the coupling of nitrogen cycling processes, we built a nitrogen budget mass balance network model in two adjacent 1 cm3 sections of bottom water and sediment in the oligohaline portion of the Cape Fear River Estuary, NC, USA. Pathway, flow, and environ ecological network analyses were conducted to characterize the organization of nitrogen flow in the estuary and to estimate the coupling of nitrification to denitrification and of nitrification and DNRA to anammox. Centrality analysis indicated NH4+ is the most important form of nitrogen involved in removal processes. The model analysis further suggested that direct denitrification and coupled nitrification-denitrification had similar contributions to nitrogen removal while direct anammox was dominant to coupled forms of anammox. Finally, results also indicated that partial

  19. CernVM WebAPI - Controlling Virtual Machines from the Web

    Science.gov (United States)

    Charalampidis, I.; Berzano, D.; Blomer, J.; Buncic, P.; Ganis, G.; Meusel, R.; Segal, B.

    2015-12-01

    Lately, there is a trend in scientific projects to look for computing resources in the volunteering community. In addition, to reduce the development effort required to port the scientific software stack to all the known platforms, the use of Virtual Machines (VMs)u is becoming increasingly popular. Unfortunately their use further complicates the software installation and operation, restricting the volunteer audience to sufficiently expert people. CernVM WebAPI is a software solution addressing this specific case in a way that opens wide new application opportunities. It offers a very simple API for setting-up, controlling and interfacing with a VM instance in the users computer, while in the same time offloading the user from all the burden of downloading, installing and configuring the hypervisor. WebAPI comes with a lightweight javascript library that guides the user through the application installation process. Malicious usage is prohibited by offering a per-domain PKI validation mechanism. In this contribution we will overview this new technology, discuss its security features and examine some test cases where it is already in use.

  20. A performance study of live VM migration technologies: VMotion vs XenMotion

    Science.gov (United States)

    Feng, Xiujie; Tang, Jianxiong; Luo, Xuan; Jin, Yaohui

    2011-12-01

    Due to the growing demand of flexible resource management for cloud computing services, researches on live virtual machine migration have attained more and more attention. Live migration of virtual machine across different hosts has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance and so on. In this paper, we use a measurement-based approach to compare the performance of two major live migration technologies under certain network conditions, i.e., VMotion and XenMotion. The results show that VMotion generates much less data transferred than XenMotion when migrating identical VMs. However, in network with moderate packet loss and delay, which are typical in a VPN (virtual private network) scenario used to connect the data centers, XenMotion outperforms VMotion in total migration time. We hope that this study can be helpful in choosing suitable virtualization environments for data center administrators and optimizing existing live migration mechanisms.

  1. On Use of the Variable Zagreb vM2 Index in QSPR: Boiling Points of Benzenoid Hydrocarbons

    Directory of Open Access Journals (Sweden)

    Albin Jurić

    2004-12-01

    Full Text Available The variable Zagreb vM2 index is introduced and applied to the structure-boiling point modeling of benzenoid hydrocarbons. The linear model obtained (thestandard error of estimate for the fit model Sfit=6.8 oC is much better than thecorresponding model based on the original Zagreb M2 index (Sfit=16.4 oC. Surprisingly,the model based on the variable vertex-connectivity index (Sfit=6.8 oC is comparable tothe model based on vM2 index. A comparative study with models based on the vertex-connectivity index, edge-connectivity index and several distance indices favours modelsbased on the variable Zagreb vM2 index and variable vertex-connectivity index.However, the multivariate regression with two-, three- and four-descriptors givesimproved models, the best being the model with four-descriptors (but vM2 index is notamong them with Sfit=5 oC, though the four-descriptor model contaning vM2 index isonly slightly inferior (Sfit=5.3 oC.

  2. A New Resources Provisioning Method Based on QoS Differentiation and VM Resizing in IaaS

    Directory of Open Access Journals (Sweden)

    Rongdong Hu

    2015-01-01

    Full Text Available In order to improve the host energy efficiency in IaaS, we proposed an adaptive host resource provisioning method, CoST, which is based on QoS differentiation and VM resizing. The control model can adaptively adjust control parameters according to real time application performance, in order to cope with changes in load. CoST takes advantage of the fact that different types of applications have different sensitivity degrees to performance and cost. It places two different types of VMs on the same host and dynamically adjusts their sizes based on the load forecasting and QoS feedback. It not only guarantees the performance defined in SLA, but also keeps the host running in energy-efficient state. Real Google cluster trace and host power data are used to evaluate the proposed method. Experimental results show that CoST can provide performance-sensitive application with a steady QoS and simultaneously speed up the overall processing of performance-tolerant application by 20~66%. The host energy efficiency is significantly improved by 7~23%.

  3. PROOF as a Service on the Cloud: a Virtual Analysis Facility based on the CernVM ecosystem

    CERN Document Server

    Berzano, Dario; Buncic, Predrag; Charalampidis, Ioannis; Ganis, Gerardo; Lestaris, Georgios; Meusel, René

    2014-01-01

    PROOF, the Parallel ROOT Facility, is a ROOT-based framework which enables interactive parallelism for event-based tasks on a cluster of computing nodes. Although PROOF can be used simply from within a ROOT session with no additional requirements, deploying and configuring a PROOF cluster used to be not as straightforward. Recently great efforts have been spent to make the provisioning of generic PROOF analysis facilities with zero configuration, with the added advantages of positively affecting both stability and scalability, making the deployment operations feasible even for the end user. Since a growing amount of large-scale computing resources are nowadays made available by Cloud providers in a virtualized form, we have developed the Virtual PROOF-based Analysis Facility: a cluster appliance combining the solid CernVM ecosystem and PoD (PROOF on Demand), ready to be deployed on the Cloud and leveraging some peculiar Cloud features such as elasticity. We will show how this approach is effective both for sy...

  4. 国外名机VM-1448功放检证

    Institute of Scientific and Technical Information of China (English)

    徐柏华

    2007-01-01

    美国的Voiceof Music Corporation(音乐之声)推出的VM-1448型多功能功率放大器,可供Phono、Toner、Tape与AOX多种音乐系统的信号进行高保真的放大。该功放由6AQ5组成双声道功率放大器,输出功率为10W×2。现经日本音响大师进行检证,表明该功放性能卓越,功能齐全,保真度高、声音动听悦耳,是一款专门用于室内播放音乐的优质功放。

  5. Disease-associated pathophysiologic structures in pediatric rheumatic diseases show characteristics of scale-free networks seen in physiologic systems: implications for pathogenesis and treatment

    Directory of Open Access Journals (Sweden)

    McGhee Timothy

    2009-02-01

    Full Text Available Abstract Background While standard reductionist approaches have provided some insights into specific gene polymorphisms and molecular pathways involved in disease pathogenesis, our understanding of complex traits such as atherosclerosis or type 2 diabetes remains incomplete. Gene expression profiling provides an unprecedented opportunity to understand complex human diseases by providing a global view of the multiple interactions across the genome that are likely to contribute to disease pathogenesis. Thus, the goal of gene expression profiling is not to generate lists of differentially expressed genes, but to identify the physiologic or pathogenic processes and structures represented in the expression profile. Methods RNA was separately extracted from peripheral blood neutrophils and mononuclear leukocytes, labeled, and hybridized to genome level microarrays to generate expression profiles of children with polyarticular juvenile idiopathic arthritis, juvenile dermatomyositis relative to childhood controls. Statistically significantly differentially expressed genes were identified from samples of each disease relative to controls. Functional network analysis identified interactions between products of these differentially expressed genes. Results In silico models of both diseases demonstrated similar features with properties of scale-free networks previously described in physiologic systems. These networks were observable in both cells of the innate immune system (neutrophils and cells of the adaptive immune system (peripheral blood mononuclear cells. Conclusion Genome-level transcriptional profiling from childhood onset rheumatic diseases suggested complex interactions in two arms of the immune system in both diseases. The disease associated networks showed scale-free network patterns similar to those reported in normal physiology. We postulate that these features have important implications for therapy as such networks are relatively resistant

  6. The potential of value management (VM) to improve the consideration of energy efficiency within pre-construction

    Science.gov (United States)

    Tahir, Mohamad Zamhari; Nawi, Mohd Nasrun Mohd; Rajemi, Mohamad Farizal

    2016-08-01

    Energy demand and consumption in buildings will rise rapidly in the near future because of several social economics factors and this situation occurs not only in developed countries but also in developing countries such as Malaysia. There is demand towards building with energy efficiency features at this time, however most of the current buildings types are still being constructed with conventional designs, thus contribute to inefficient of energy consumption during the operation stage of the building. This paper presents the concept and the application of Value Management (VM) approach and its potential to improve consideration of energy efficiency within pre-construction process. Based on the relevant literatures, VM has provides an efficient and effective delivery system to fulfill the objectives and client's requirements. Generally in this paper, VM is discussed and scrutinized with reference to previous studies to see how these concepts contribute to better optimize the energy consumption in a building by seeking the best value energy efficiency through the design and construction process. This paper will not draw any conclusion but rather a preliminary research to propose the most energy efficiency measures to reliably accomplish a function that will meet the client's needs, desires and expectations. For further research in future, simple quantitative industry survey and VM workshops will be conducted to validate and further improve the research.

  7. VM-ADCP measured upper ocean currents in the southeastern Arabian Sea and Equatorial Indian Ocean during December, 2000

    Digital Repository Service at National Institute of Oceanography (India)

    Murty, V.S.N.; Suryanarayana, A.; Somayajulu, Y.K.; Raikar, V.; Tilvi, V.

    The Vessel-Mounted Acoustic Doppler Current Profiler (VM-ADCP) measured currents in the upper 200 m along the cruise track covering the southeastern Arabian Sea and the Eastern Equatorial Indian Ocean during northern winter monsoon (10-31 December...

  8. Gene network analysis shows immune-signaling and ERK1/2 as novel genetic markers for multiple addiction phenotypes: alcohol, smoking and opioid addiction.

    Science.gov (United States)

    Reyes-Gibby, Cielito C; Yuan, Christine; Wang, Jian; Yeung, Sai-Ching J; Shete, Sanjay

    2015-06-05

    Addictions to alcohol and tobacco, known risk factors for cancer, are complex heritable disorders. Addictive behaviors have a bidirectional relationship with pain. We hypothesize that the associations between alcohol, smoking, and opioid addiction observed in cancer patients have a genetic basis. Therefore, using bioinformatics tools, we explored the underlying genetic basis and identified new candidate genes and common biological pathways for smoking, alcohol, and opioid addiction. Literature search showed 56 genes associated with alcohol, smoking and opioid addiction. Using Core Analysis function in Ingenuity Pathway Analysis software, we found that ERK1/2 was strongly interconnected across all three addiction networks. Genes involved in immune signaling pathways were shown across all three networks. Connect function from IPA My Pathway toolbox showed that DRD2 is the gene common to both the list of genetic variations associated with all three addiction phenotypes and the components of the brain neuronal signaling network involved in substance addiction. The top canonical pathways associated with the 56 genes were: 1) calcium signaling, 2) GPCR signaling, 3) cAMP-mediated signaling, 4) GABA receptor signaling, and 5) G-alpha i signaling. Cancer patients are often prescribed opioids for cancer pain thus increasing their risk for opioid abuse and addiction. Our findings provide candidate genes and biological pathways underlying addiction phenotypes, which may be future targets for treatment of addiction. Further study of the variations of the candidate genes could allow physicians to make more informed decisions when treating cancer pain with opioid analgesics.

  9. [The toxicity of massive dosis of VM26 (4-demethyl-epipodophyllotoxin-beta-D-thenylidene glucoside). A contribution to the therapy of advanced ovarian cancer (author's transl)].

    Science.gov (United States)

    Jankowski, R P; Vahrson, H

    1977-12-09

    19 patients with advanced ovarian cancer (FIGO-stages IIb-IV) were treated by ultra-high doses of VM26 partly according to positive oncobiograms during Multiple-drug-stoss-therapy. The toxic reactions and the cytostatic effect were investigated. The range of 57,9% remissions and the moderate toxicity suggest a specific application of VM26 in advanced ovarian cancer.

  10. miR-27a-3p suppresses tumor metastasis and VM by down-regulating VE-cadherin expression and inhibiting EMT: an essential role for Twist-1 in HCC

    Science.gov (United States)

    Zhao, Nan; Sun, Huizhi; Sun, Baocun; Zhu, Dongwang; Zhao, Xiulan; Wang, Yong; Gu, Qiang; Dong, Xueyi; Liu, Fang; Zhang, Yanhui; Li, Xiao

    2016-01-01

    Twist-1 and miRNAs have been reported to be associated with tumor metastasis and angiogenesis. However, the relationship between Twist-1 and miRNAs and the function of miRNAs remain largely undefined. We aimed to reveal the Twist-1-related miRNA expression profile and to determine whether Twist-1 functions in tumor metastasis and vasculogenic mimicry (VM) by regulating miRNA expression in hepatocellular carcinoma (HCC). Results showed that the expression of miR-27a-3p was consistently down-regulated in HCC cell lines and tissue samples displaying high expression of Twist-1. Both loss- and gain-of-function assays revealed suppressive effects of miR-27a-3p. Low miR-27a-3p expression was significantly associated with early metastasis in HCC. Subsequent investigations revealed that miR-27a-3p mediated the inhibition of epithelial–mesenchymal transition (EMT). Additional experiments showed that VE-cadherin is a direct target of miR-27a-3p and further demonstrated the critical role of miR-27a-3p in suppressing tumor metastasis and VM. Conclusions: Twist-1 up-regulation in HepG2 cells resulted in the differential expression of 18 miRNAs. Among them, miR-27a-3p deregulation contributed to VM and metastasis. The miR-27a-3p-mediated down-regulation of VE-cadherin and inhibition of EMT may be essential for Twist-1 to induce tumor metastasis and VM. Our findings highlight the importance of miR-27a-3p and suggest a promising new strategy for anti-HCC therapy. PMID:26980408

  11. Advanced neuroblastoma: improved response rate using a multiagent regimen (OPEC) including sequential cisplatin and VM-26.

    Science.gov (United States)

    Shafford, E A; Rogers, D W; Pritchard, J

    1984-07-01

    Forty-two children, all over one year of age, were given vincristine, cyclophosphamide, and sequentially timed cisplatin and VM-26 (OPEC) or OPEC and doxorubicin (OPEC-D) as initial treatment for newly diagnosed stage III or IV neuroblastoma. Good partial response was achieved in 31 patients (74%) overall and in 28 (78%) of 36 patients whose treatment adhered to the chemotherapy protocol, compared with a 65% response rate achieved in a previous series of children treated with pulsed cyclophosphamide and vincristine with or without doxorubicin. Only six patients, including two of the six children whose treatment did not adhere to protocol, failed to respond, but there were five early deaths from treatment-related complications. Tumor response to OPEC, which was the less toxic of the two regimens, was at least as good as tumor response to OPEC-D. Cisplatin-induced morbidity was clinically significant in only one patient and was avoided in others by careful monitoring of glomerular filtration rate and hearing. Other centers should test the efficacy of OPEC or equivalent regimens in the treatment of advanced neuroblastoma.

  12. THE DEFORMATION EFFECT OF VM SLIDER MULTI COMPLEX MACHINE SERIES ON PRECISION MACHINING

    Directory of Open Access Journals (Sweden)

    Berezhnoy S. B.

    2015-09-01

    Full Text Available The article is devoted to the problems of increasing the economic growth of the Russian Federation, the development of high-tech knowledge-intensive manufacturing industries on the basis of a fundamentally new technological order, new unmanned technologies. The measures to improve the accuracy of manufacturing of complex and large-sized parts. Currently, the technical level of many sectors of the economy is largely determined by the level of production of means of production. The basis of these means is the machine tool industry. On the basis of machine tool development we handle a comprehensive mechanization and automation of production processes in industry, construction, agriculture, transport and other industries. We completed a comprehensive analysis of the errors affecting the manufacturing precision parts. The activities for improving the accuracy of manufacture based on VM 32 multi-machine complex series were proposed. We made the analysis of the cutting forces influence and the cross-sectional shape of the slide on its deformation for various types of processing. We determined the optimal shape of the cross section of the slider to increase stiffness and reduce deformation of the slide in metal cutting

  13. Utilizing ICN/CCN for service and VM migration support in virtualized LTE systems

    NARCIS (Netherlands)

    Karimzadeh, Morteza; Satria, Triadimas; Karagiannis, Georgios

    2014-01-01

    One of the most important concepts used in mobile networks, like LTE (Long Term Evolution) is service continuity. A mobile user moving from one network to another network should not lose an on-going service. In cloud-based (virtualized) LTE systems, services are hosted on Virtual Machines (VMs) that

  14. Show Time

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    <正> Story: Show Time!The whole class presents the story"Under the Sea".Everyone is so excited and happy.Both Leo and Kathy show their parentsthe characters of the play."Who’s he?"asks Kathy’s mom."He’s the prince."Kathy replies."Who’s she?"asks Leo’s dad."She’s the queen."Leo replieswith a smile.

  15. Snobbish Show

    Institute of Scientific and Technical Information of China (English)

    YIN PUMIN

    2010-01-01

    @@ The State Administration of Radio,Film and Television (SARFT),China's media watchdog,issued a new set of mles on June 9 that strictly regulate TV match-making shows,which have been sweeping the country's primetime programming. "Improper social and love values such as money worship should not be presented in these shows.Humiliation,verbal attacks and sex-implied vulgar content are not allowed" the new roles said.

  16. 虚拟机跨域迁移中的网络重定向模型%Network Redirection Model in Cross-domain Migration of Virtual Machine

    Institute of Scientific and Technical Information of China (English)

    刘进军; 徐志红; 赵生慧

    2012-01-01

    The network redirection model is proposed and cross-domain migration of Virtual Machine(VM) is achieved Local Area Network (LAN) or in Wide Area Network(WAN). With Address Resolution Protocol(ARP) synchronization, the unidirectional IP tunnel is quickly established between the source node and the migrated VM. The data is redirected to the VM. With dual IP stacks, all new requests are responded by the new IP and old sessions are maintained. Experimental results show that the model can effectively reduce the deployment time, optimize forwarding path, ' lower latency, achieve transparent cross-domain migration.%提出一个网络重定向模型,实现局域网或广域网环境下的虚拟机跨域迁移.利用地址解析协议同步策略,在源节点和迁移后的虚拟机之间快速建立单向IP隧道,将数据重定向至虚拟机.采用IP双栈方式,使虚拟机在保持原有会话的同时,通过新增IP响应所有新的连接请求.实验结果表明,该模型能减少部署时间,优化数据转发路径,降低响应延迟,实现跨域迁移.

  17. EROBATIC SHOW

    Institute of Scientific and Technical Information of China (English)

    2016-01-01

    Visitors look at plane models of the Commercial Aircraft Corp. of China, developer of the count,s first homegrown large passenger jet C919, during the Singapore Airshow on February 16. The biennial event is the largest airshow in Asia and one of the most important aviation and defense shows worldwide. A number of Chinese companies took part in the event during which Okay Airways, the first privately owned aidine in China, signed a deal to acquire 12 Boeing 737 jets.

  18. Primary exploration of the efficiency of VM26 combined with MeCCNU therapy for the low-grade gliomas%VM26联合MeCCNU在人脑低级别胶质瘤治疗中应用的初步探讨

    Institute of Scientific and Technical Information of China (English)

    曹广辉; 谭卫国; 冯鸣; 申昊; 王君祥; 黄煜伦; 周幽心

    2011-01-01

    Objective To explore the efficiency of VM26 combined with MeCCNU therapy for the low-grade gliomas of MCMT-positive after tumor resection and radiotherapy. Methods The clinical data of 22 patients with MCMT-positive who underwent total removal of tumors with enhanced MRI imaging showing no residual tumors from Jan 2005 to Oct 2008 in our department were analyzed retrospectively. Of 22 patients . 10 were diffuse astrocytomas; 3 were oligodendrogliomas;5 were are mixed oligo-astrocytomas and 4 ependymomas. These patients received three-dimensional conformal radiotherapy 2 -4 weeks after surgery with radiation and exposure dose being ( 50~ 55 ) Gy( 6 ~ 7 )weeks. 2 weeks after the end of radiotherapy , these patients underwent VM26 comhined with MeCCNU therapy ( VM26 : 50mg/m2/day , intravenous dripping for 3 days , repeated after 8 weeks for 3 cycles.MeCCNU: 50mg/m2/day, taken orally for 3 days, repeated after 8 weeks for 4 cycles) with MRI scanning regularly. Results Of 22 MCMT-positive grade Ⅱ gliomas,6 cases were positive for both TopoⅡα and Pgp,10 and 2 were only positive for TopoⅡα and Pgp, respectively; and 4 were negative for both TopoⅡα and Pgp. The following up from 2 t0 5 years showed tumors recurred in 6 cases with average time of recurrence being 16. 6 months ,CT or MRI imaging showed no tumor recurrence in 13 ,3 underwent the second surgery due to MRI imaging showing possible tumor recurrence 2 vears after prior surgery. Pathological examination reported suspected recurring tumor was necrotic tissue. In these 22 patients , one vear survival rate of one vear was 100% and two vears was 88.9% . Conclusions VM26 combined with MeCCNU chemotherapy is able to efficaciously inhibit the growth of gliomas ,with little side-effects.safety. It's an therapeutic method for patients with low-grade MGMT-positive gliomas aftert tumor resection and radiotherapy.%目的 探讨人脑胶质瘤手术切除和放疗后O6-甲基鸟嘌呤DNA甲基转移酶(MGMT

  19. A three phase optimization method for precopy based VM live migration.

    Science.gov (United States)

    Sharma, Sangeeta; Chawla, Meenu

    2016-01-01

    Virtual machine live migration is a method of moving virtual machine across hosts within a virtualized datacenter. It provides significant benefits for administrator to manage datacenter efficiently. It reduces service interruption by transferring the virtual machine without stopping at source. Transfer of large number of virtual machine memory pages results in long migration time as well as downtime, which also affects the overall system performance. This situation becomes unbearable when migration takes place over slower network or a long distance migration within a cloud. In this paper, precopy based virtual machine live migration method is thoroughly analyzed to trace out the issues responsible for its performance drops. In order to address these issues, this paper proposes three phase optimization (TPO) method. It works in three phases as follows: (i) reduce the transfer of memory pages in first phase, (ii) reduce the transfer of duplicate pages by classifying frequently and non-frequently updated pages, and (iii) reduce the data sent in last iteration of migration by applying the simple RLE compression technique. As a result, each phase significantly reduces total pages transferred, total migration time and downtime respectively. The proposed TPO method is evaluated using different representative workloads on a Xen virtualized environment. Experimental results show that TPO method reduces total pages transferred by 71 %, total migration time by 70 %, downtime by 3 % for higher workload, and it does not impose significant overhead as compared to traditional precopy method. Comparison of TPO method with other methods is also done for supporting and showing its effectiveness. TPO method and precopy methods are also tested at different number of iterations. The TPO method gives better performance even with less number of iterations.

  20. VM600汽轮机监视仪表的功能分析和应用%Functional Analysis and Application of the VM600 Turbine Supervisory Instrumentation

    Institute of Scientific and Technical Information of China (English)

    刘海燕

    2009-01-01

    分析了印度雅幕娜电厂汽轮机监视系统所采用的瑞士VM600仪表的功能和基本构成、组态与配置,并简单说明了使用情况.系统的配置是合适的,在机组运行期间,系统能正确反映汽轮机的运行参数,未出现信号异常.

  1. Network-state modulation of power-law frequency-scaling in visual cortical neurons.

    Science.gov (United States)

    El Boustani, Sami; Marre, Olivier; Béhuret, Sébastien; Baudot, Pierre; Yger, Pierre; Bal, Thierry; Destexhe, Alain; Frégnac, Yves

    2009-09-01

    Various types of neural-based signals, such as EEG, local field potentials and intracellular synaptic potentials, integrate multiple sources of activity distributed across large assemblies. They have in common a power-law frequency-scaling structure at high frequencies, but it is still unclear whether this scaling property is dominated by intrinsic neuronal properties or by network activity. The latter case is particularly interesting because if frequency-scaling reflects the network state it could be used to characterize the functional impact of the connectivity. In intracellularly recorded neurons of cat primary visual cortex in vivo, the power spectral density of V(m) activity displays a power-law structure at high frequencies with a fractional scaling exponent. We show that this exponent is not constant, but depends on the visual statistics used to drive the network. To investigate the determinants of this frequency-scaling, we considered a generic recurrent model of cortex receiving a retinotopically organized external input. Similarly to the in vivo case, our in computo simulations show that the scaling exponent reflects the correlation level imposed in the input. This systematic dependence was also replicated at the single cell level, by controlling independently, in a parametric way, the strength and the temporal decay of the pairwise correlation between presynaptic inputs. This last model was implemented in vitro by imposing the correlation control in artificial presynaptic spike trains through dynamic-clamp techniques. These in vitro manipulations induced a modulation of the scaling exponent, similar to that observed in vivo and predicted in computo. We conclude that the frequency-scaling exponent of the V(m) reflects stimulus-driven correlations in the cortical network activity. Therefore, we propose that the scaling exponent could be used to read-out the "effective" connectivity responsible for the dynamical signature of the population signals measured

  2. Network-state modulation of power-law frequency-scaling in visual cortical neurons.

    Directory of Open Access Journals (Sweden)

    Sami El Boustani

    2009-09-01

    Full Text Available Various types of neural-based signals, such as EEG, local field potentials and intracellular synaptic potentials, integrate multiple sources of activity distributed across large assemblies. They have in common a power-law frequency-scaling structure at high frequencies, but it is still unclear whether this scaling property is dominated by intrinsic neuronal properties or by network activity. The latter case is particularly interesting because if frequency-scaling reflects the network state it could be used to characterize the functional impact of the connectivity. In intracellularly recorded neurons of cat primary visual cortex in vivo, the power spectral density of V(m activity displays a power-law structure at high frequencies with a fractional scaling exponent. We show that this exponent is not constant, but depends on the visual statistics used to drive the network. To investigate the determinants of this frequency-scaling, we considered a generic recurrent model of cortex receiving a retinotopically organized external input. Similarly to the in vivo case, our in computo simulations show that the scaling exponent reflects the correlation level imposed in the input. This systematic dependence was also replicated at the single cell level, by controlling independently, in a parametric way, the strength and the temporal decay of the pairwise correlation between presynaptic inputs. This last model was implemented in vitro by imposing the correlation control in artificial presynaptic spike trains through dynamic-clamp techniques. These in vitro manipulations induced a modulation of the scaling exponent, similar to that observed in vivo and predicted in computo. We conclude that the frequency-scaling exponent of the V(m reflects stimulus-driven correlations in the cortical network activity. Therefore, we propose that the scaling exponent could be used to read-out the "effective" connectivity responsible for the dynamical signature of the population

  3. Antitumor activity of the two epipodophyllotoxin derivatives VP-16 and VM-26 in preclinical systems: a comparison of in vitro and in vivo drug evaluation

    DEFF Research Database (Denmark)

    Jensen, P B; Roed, H; Skovsgaard, T

    1990-01-01

    The epipodophyllotoxines VP-16 and VM-26 are chemically closely related. VM-26 has been found to be considerably more potent than VP-16 in vitro in a number of investigations. Although the drugs have been known for greater than 20 years, they have not been compared at clearly defined equitoxic do......-resistance between the two drugs suggests that they have an identical antineoplastic spectrum. VM-26 was more potent than VP-16 in vitro; however, this was not correlated to a therapeutic advantage for VM-26 over VP-16 in vivo.......The epipodophyllotoxines VP-16 and VM-26 are chemically closely related. VM-26 has been found to be considerably more potent than VP-16 in vitro in a number of investigations. Although the drugs have been known for greater than 20 years, they have not been compared at clearly defined equitoxic...... doses on an optimal schedule in vivo and it has not been clarified as to whether a therapeutic difference exists between them. A prolonged schedule is optimal for both drugs; accordingly we determined the toxicity in mice using a 5-day schedule. The dose killing 10% of the mice (LD10) was 9.4 mg...

  4. [Russian oxygen generation system "Elektron-VM": hydrogen content in electrolytically produced oxygen for breathing by International Space Station crews].

    Science.gov (United States)

    Proshkin, V Yu; Kurmazenko, E A

    2014-01-01

    The article presents the particulars of hydrogen content in electrolysis oxygen produced aboard the ISS Russian segment by oxygen generator "Elektron-VM" (SGK) for crew breathing. Hydrogen content was estimated as in the course of SGK operation in the ISS RS, so during the ground life tests. According to the investigation of hydrogen sources, the primary path of H2 appearance in oxygen is its diffusion through the porous diaphragm separating the electrolytic-cell cathode and anode chambers. Effectiveness of hydrogen oxidation in the SGK reheating unit was evaluated.

  5. Pyrroloquinoline Quinone-Dependent Cytochrome Reduction in Polyvinyl Alcohol-Degrading Pseudomonas sp. Strain VM15C

    OpenAIRE

    1989-01-01

    A polyvinyl alcohol (PVA) oxidase-deficient mutant of Pseudomonas sp. strain VM15C, strain ND1, was shown to possess PVA dehydrogenase, in which pyrroloquinoline quinone (PQQ) functions as a coenzyme. The mutant grew on PVA and required PQQ for utilization of PVA as an essential growth factor. Incubation of the membrane fraction of the mutant with PVA caused cytochrome reduction of the fraction. Furthermore, it was found that in spite of the presence of PVA oxidase, the membrane fraction of s...

  6. Determination of loss of tension in old green line that joining the furnaces VM1 e Panela1; Determinacao da queda de tensao na antiga linha verde de alimentaco dos fornos VM1 e Panela1

    Energy Technology Data Exchange (ETDEWEB)

    Panunzio, Paulo Armando; Magalhaes Sobrinho, Pedro [UNESP, Guaratingueta, SP (Brazil); Manfrin, Antonio Carlos [Villares Metals S.A., SP(Brazil). Unidade Sumare

    2009-11-01

    The objective of this work is to demonstrate the gains obtained with electrical energy, due to replacement of electric cables of air called 'power of the green line to arc furnaces VM1 and panel 1 of Villares Metals - Unit Sumare' by underground cables. We can mention other gains in safety, maintenance, environment and quality of power, but will not be measured. This substitution was motivated due to the existing line to the limit of its useful life, with restrictions to increase the load (expansion) and stops unwanted maintenance. It is emphasized that this determination is the only power loss due to ohmic resistance of bare aluminum conductor used in the old line (green). The economy demonstrated in this study is R$ 3,313.21 and 16.339752 MWh even if it is significantly reduced because there is a spare in MWh, which can be used within the company in which extensions are necessary. (author)

  7. Glacial Isostatic Adjustment with ICE-6G{_}C (VM5a) and Laterally Heterogeneous Mantle Viscosity

    Science.gov (United States)

    Li, Tanghua; Wu, Patrick; Steffen, Holger

    2017-04-01

    Recently, Peltier et al. (2015) introduced the ICE-6GC (VM5a) ice-earth model pair, which has successfully explained many observations of Glacial Isostatic Adjustment (GIA) simultaneously. However, their earth model used (VM5a) to infer the ice history (ICE-6G_C) is laterally homogeneous with viscosity profile varying in the radial direction only. Since surface geology and seismic tomography clearly indicates that the Earth's material properties also vary in the lateral direction, laterally heterogeneity must be included in GIA models. This can be achieved by using the Coupled-Laplace-Finite-Element method (Wu 2004) to model GIA in a spherical, self-gravitating, compressible viscoelastic Earth with linear rheology and lateral heterogeneity. In fact, Wu et al (2013) have used such model with GIA observations (e.g. global relative sea level data, GRACE data with recent hydrology contributions removed and GPS crustal uplift rates) to study the thermal contribution to lateral heterogeneity in the mantle. Their lateral viscosity perturbations are inferred from the seismic shear wave tomography model S20A (Ekstrom & Dziewonski 1998) by applying a scaling law, which includes both the effect of anharmonicity and anelasticity. The thermal contribution to seismic tomography, which is represented by the beta factor in the scaling relationship, is searched in the upper and lower mantle, for the best combination that gives the best fit between GIA predictions and observations. However, their study is based on ICE-4G only, and the new ice-earth model pair may give other best beta value combinations in the upper and lower mantle. Here, we follow the work of Wu et al (2013) but use the new ICE-6GC ice model instead. The higher resolution seismic tomography model by Bunge & Grand (2000) substitutes S20A. Earth model VM5a is used as the reference background viscosity model. The full viscosity model is obtained by superposing the background model with the lateral viscosity

  8. Identification of host transcriptional networks showing concentration-dependent regulation by HPV16 E6 and E7 proteins in basal cervical squamous epithelial cells.

    Science.gov (United States)

    Smith, Stephen P; Scarpini, Cinzia G; Groves, Ian J; Odle, Richard I; Coleman, Nicholas

    2016-07-26

    Development of cervical squamous cell carcinoma requires increased expression of the major high-risk human-papillomavirus (HPV) oncogenes E6 and E7 in basal cervical epithelial cells. We used a systems biology approach to identify host transcriptional networks in such cells and study the concentration-dependent changes produced by HPV16-E6 and -E7 oncoproteins. We investigated sample sets derived from the W12 model of cervical neoplastic progression, for which high quality phenotype/genotype data were available. We defined a gene co-expression matrix containing a small number of highly-connected hub nodes that controlled large numbers of downstream genes (regulons), indicating the scale-free nature of host gene co-expression in W12. We identified a small number of 'master regulators' for which downstream effector genes were significantly associated with protein levels of HPV16 E6 (n = 7) or HPV16 E7 (n = 5). We validated our data by depleting E6/E7 in relevant cells and by functional analysis of selected genes in vitro. We conclude that the network of transcriptional interactions in HPV16-infected basal-type cervical epithelium is regulated in a concentration-dependent manner by E6/E7, via a limited number of central master-regulators. These effects are likely to be significant in cervical carcinogenesis, where there is competitive selection of cells with elevated expression of virus oncoproteins.

  9. Altered catalytic activity of and DNA cleavage by DNA topoisomerase II from human leukemic cells selected for resistance to VM-26.

    Science.gov (United States)

    Danks, M K; Schmidt, C A; Cirtain, M C; Suttle, D P; Beck, W T

    1988-11-29

    The simultaneous development of resistance to the cytotoxic effects of several classes of natural product anticancer drugs, after exposure to only one of these agents, is referred to as multiple drug resistance (MDR). At least two distinct mechanisms for MDR have been postulated: that associated with P-glycoprotein and that thought to be due to an alteration in DNA topoisomerase II activity (at-MDR). We describe studies with two sublines of human leukemic CCRF-CEM cells approximately 50-fold resistant (CEM/VM-1) and approximately 140-fold resistant (CEM/VM-1-5) to VM-26, a drug known to interfere with DNA topoisomerase II activity. Each of these lines is cross-resistant to other drugs known to affect topoisomerase II but not cross-resistant to vinblastine, an inhibitor of mitotic spindle formation. We found little difference in the amount of immunoreactive DNA topoisomerase II in 1.0 M NaCl nuclear extracts of the two resistant and parental cell lines. However, topoisomerase II in nuclear extracts of the resistant sublines is altered in both catalytic activity (unknotting) of and DNA cleavage by this enzyme. Also, the rate at which catenation occurs is 20-30-fold slower with the CEM/VM-1-5 preparations. The effect of VM-26 on both strand passing and DNA cleavage is inversely related to the degree of primary resistance of each cell line. Our data support the hypothesis that at-MDR is due to an alteration in topoisomerase II or in a factor modulating its activity.

  10. Genome-wide analysis of primary CD4+ and CD8+ T cell transcriptomes shows evidence for a network of enriched pathways associated with HIV disease

    Directory of Open Access Journals (Sweden)

    Wang Bin

    2011-03-01

    Full Text Available Abstract Background HIV preferentially infects CD4+ T cells, and the functional impairment and numerical decline of CD4+ and CD8+ T cells characterize HIV disease. The numerical decline of CD4+ and CD8+ T cells affects the optimal ratio between the two cell types necessary for immune regulation. Therefore, this work aimed to define the genomic basis of HIV interactions with the cellular transcriptome of both CD4+ and CD8+ T cells. Results Genome-wide transcriptomes of primary CD4+ and CD8+ T cells from HIV+ patients were analyzed at different stages of HIV disease using Illumina microarray. For each cell subset, pairwise comparisons were performed and differentially expressed (DE genes were identified (fold change >2 and B-statistic >0 followed by quantitative PCR validation. Gene ontology (GO analysis of DE genes revealed enriched categories of complement activation, actin filament, proteasome core and proton-transporting ATPase complex. By gene set enrichment analysis (GSEA, a network of enriched pathways functionally connected by mitochondria was identified in both T cell subsets as a transcriptional signature of HIV disease progression. These pathways ranged from metabolism and energy production (TCA cycle and OXPHOS to mitochondria meditated cell apoptosis and cell cycle dysregulation. The most unique and significant feature of our work was that the non-progressing status in HIV+ long-term non-progressors was associated with MAPK, WNT, and AKT pathways contributing to cell survival and anti-viral responses. Conclusions These data offer new comparative insights into HIV disease progression from the aspect of HIV-host interactions at the transcriptomic level, which will facilitate the understanding of the genetic basis of transcriptomic interaction of HIV in vivo and how HIV subverts the human gene machinery at the individual cell type level.

  11. DEPENDENCE OF THE SLIDER DEFORMATION AND MACHINING PRECISION ON THE MULTIPURPOSE MACHINE-TOOL COMPLEX OF VM SERIES

    Directory of Open Access Journals (Sweden)

    Berezhnoy S. B.

    2016-04-01

    Full Text Available The article is devoted to the development of high-tech metal-working industry, as well as to the use of unmanned technology. We recommended measures to improve the accuracy and quality of manufacturing of complex and large workpieces weighing up to 100 tons. To date, the technical level of many economy sectors is largely determined by the level of the production means. Based on the engineering development there is an overall automation and mechanization of production and industry processes, construction, agriculture, transport and other industries. We analyzed forms of slide sections, of errors affecting the accuracy of the workpieces manufacturing. We made simulation of the cutting forces and sliders deformations. Solved measures increase manufacturing accuracy based on multi-purpose machine tool systems of VM series. We held the analysis of the dependence of cutting forces, a slider form on its strain in different types of processing. We obtained a graph of cutting force and precision manufacturing. We defined the optimal shape of the slider cross section to increase the rigidity and reduce the slide deformation in metal cutting

  12. TwinDrivers: Semi-Automatic Derivation of Fast and Safe Hypervisor Network Drivers from Guest OS Drivers

    OpenAIRE

    2009-01-01

    In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor. Doing so protects the hypervisor from bugs in the driver, and also allows the reuse of the device driver and its support infrastructure in the VM. Unfortunately, this approach results in poor performance for I/O intensive devices such as network cards. The alternative approach is to run device drivers directly in the hypervisor. Although this approach results in better perfo...

  13. Cocaine users with comorbid Cluster B personality disorders show dysfunctional brain activation and connectivity in the emotional regulation networks during negative emotion maintenance and reappraisal.

    Science.gov (United States)

    Albein-Urios, Natalia; Verdejo-Román, Juan; Soriano-Mas, Carles; Asensio, Samuel; Martínez-González, José Miguel; Verdejo-García, Antonio

    2013-12-01

    Cocaine dependence often co-occurs with Cluster B personality disorders. Since both disorders are characterized by emotion regulation deficits, we predicted that cocaine comorbid patients would exhibit dysfunctional patterns of brain activation and connectivity during reappraisal of negative emotions. We recruited 18 cocaine users with comorbid Cluster B personality disorders, 17 cocaine users without comorbidities and 21 controls to be scanned using functional magnetic resonance imaging (fMRI) during performance on a reappraisal task in which they had to maintain or suppress the emotions induced by negative affective stimuli. We followed region of interest (ROI) and whole-brain approaches to investigate brain activations and connectivity associated with negative emotion experience and reappraisal. Results showed that cocaine users with comorbid personality disorders had reduced activation of the subgenual anterior cingulate cortex during negative emotion maintenance and increased activation of the lateral orbitofrontal cortex and the amygdala during reappraisal. Amygdala activation correlated with impulsivity and antisocial beliefs in the comorbid group. Connectivity analyses showed that in the cocaine comorbid group the subgenual cingulate was less efficiently connected with the amygdala and the fusiform gyri and more efficiently connected with the anterior insula during maintenance, whereas during reappraisal the left orbitofrontal cortex was more efficiently connected with the amygdala and the right orbitofrontal cortex was less efficiently connected with the dorsal striatum. We conclude that cocaine users with comorbid Cluster B personality disorders have distinctive patterns of brain activation and connectivity during maintenance and reappraisal of negative emotions, which correlate with impulsivity and dysfunctional beliefs.

  14. The purpose of this study is to determine the clinical usefulness of Valsalva maneuver (VM) to evaluate piriform-fossae lesions on helical CT

    Energy Technology Data Exchange (ETDEWEB)

    Yamamoto, Shoji; Yasuda, Shigeo; Kimura, Shinjiro; Ito, Hisao [Chiba Univ. (Japan). Hospital; Fujimoto, Hajime; Nasu, Katsuhiro; Motoori, Ken

    1997-07-01

    Forty-four patients who were suspected hypopharyngeal carcinoma underwent both conventional CT under quiet breath holding and helical CT under Valsalva maneuver (VMCT). All patients successfully performed Valsalva maneuver during image acquisition. Normal piriform fossae were dilated well under VM. Five fossae involved by hypopharyngeal carcinoma were poorly dilated on VMCT. In conclusion VMCT is a supportive method to evaluate piriform fossae. If piriform fossae lesions were suspected on conventional CT, VMCT should be performed. (author)

  15. Performance evaluation of the General Electric eXplore CT 120 micro-CT using the vmCT phantom

    Energy Technology Data Exchange (ETDEWEB)

    Bahri, M.A., E-mail: M.Bahri@ulg.ac.be [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); Warnock, G.; Plenevaux, A. [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); Choquet, P.; Constantinesco, A. [Biophysique et Medecine Nucleaire, Hopitaux universitaires de Strasbourg, Strasbourg (France); Salmon, E.; Luxen, A. [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); Seret, A. [ULg-Liege University, Cyclotron Research Centre, Liege, Bat. 30, Allee du 6 aout, 8 (Belgium); ULg-Liege University, Experimental Medical Imaging, Liege (Belgium)

    2011-08-21

    The eXplore CT 120 is the latest generation micro-CT from General Electric. It is equipped with a high-power tube and a flat-panel detector. It allows high resolution and high contrast fast CT scanning of small animals. The aim of this study was to compare the performance of the eXplore CT 120 with that of the eXplore Ultra, its predecessor for which the methodology using the vmCT phantom has already been described . The phantom was imaged using typical a rat (fast scan or F) or mouse (in vivo bone scan or H) scanning protocols. With the slanted edge method, a 10% modulation transfer function (MTF) was observed at 4.4 (F) and 3.9-4.4 (H) mm{sup -1} corresponding to 114 {mu}m resolution. A fairly larger MTF was obtained by the coil method with the MTF for the thinnest coil (3.3 mm{sup -1}) equal to 0.32 (F) and 0.34 (H). The geometric accuracy was better than 0.3%. There was a highly linear (R{sup 2}>0.999) relationship between measured and expected CT numbers for both the CT number accuracy and linearity sections of the phantom. A cupping effect was clearly seen on the uniform slices and the uniformity-to-noise ratio ranged from 0.52 (F) to 0.89 (H). The air CT number depended on the amount of polycarbonate surrounding the area where it was measured; a difference as high as approximately 200 HU was observed. This hindered the calibration of this scanner in HU. This is likely due to the absence of corrections for beam hardening and scatter in the reconstruction software. However in view of the high linearity of the system, the implementation of these corrections would allow a good quality calibration of the scanner in HU. In conclusion, the eXplore CT 120 achieved a better spatial resolution than the eXplore Ultra (based on previously reported specifications) and future software developments will include beam hardening and scatter corrections that will make the new generation CT scanner even more promising.

  16. ARC-VM: An architecture real options complexity-based valuation methodology for military systems-of-systems acquisitions

    Science.gov (United States)

    Domercant, Jean Charles

    The combination of today's national security environment and mandated acquisition policies makes it necessary for military systems to interoperate with each other to greater degrees. This growing interdependency results in complex Systems-of-Systems (SoS) that only continue to grow in complexity to meet evolving capability needs. Thus, timely and affordable acquisition becomes more difficult, especially in the face of mounting budgetary pressures. To counter this, architecting principles must be applied to SoS design. The research objective is to develop an Architecture Real Options Complexity-Based Valuation Methodology (ARC-VM) suitable for acquisition-level decision making, where there is a stated desire for more informed tradeoffs between cost, schedule, and performance during the early phases of design. First, a framework is introduced to measure architecture complexity as it directly relates to military SoS. Development of the framework draws upon a diverse set of disciplines, including Complexity Science, software architecting, measurement theory, and utility theory. Next, a Real Options based valuation strategy is developed using techniques established for financial stock options that have recently been adapted for use in business and engineering decisions. The derived complexity measure provides architects with an objective measure of complexity that focuses on relevant complex system attributes. These attributes are related to the organization and distribution of SoS functionality and the sharing and processing of resources. The use of Real Options provides the necessary conceptual and visual framework to quantifiably and traceably combine measured architecture complexity, time-valued performance levels, as well as programmatic risks and uncertainties. An example suppression of enemy air defenses (SEAD) capability demonstrates the development and usefulness of the resulting architecture complexity & Real Options based valuation methodology. Different

  17. Simultaneous measurement of tabun, sarin, soman, cyclosarin, VR, VX, and VM adducts to tyrosine in blood products by isotope dilution UHPLC-MS/MS.

    Science.gov (United States)

    Crow, Brian S; Pantazides, Brooke G; Quiñones-González, Jennifer; Garton, Joshua W; Carter, Melissa D; Perez, Jonas W; Watson, Caroline M; Tomcik, Dennis J; Crenshaw, Michael D; Brewer, Bobby N; Riches, James R; Stubbs, Sarah J; Read, Robert W; Evans, Ronald A; Thomas, Jerry D; Blake, Thomas A; Johnson, Rudolph C

    2014-10-21

    This work describes a new specific, sensitive, and rapid stable isotope dilution method for the simultaneous detection of the organophosphorus nerve agents (OPNAs) tabun (GA), sarin (GB), soman (GD), cyclosarin (GF), VR, VX, and VM adducts to tyrosine (Tyr). Serum, plasma, and lysed whole blood samples (50 μL) were prepared by protein precipitation followed by digestion with Pronase. Specific Tyr adducts were isolated from the digest by a single solid phase extraction (SPE) step, and the analytes were separated by reversed-phase ultra high performance liquid chromatography (UHPLC) gradient elution in less than 2 min. Detection was performed on a triple quadrupole tandem mass spectrometer using time-triggered selected reaction monitoring (SRM) in positive electrospray ionization (ESI) mode. The calibration range was characterized from 0.100-50.0 ng/mL for GB- and VR-Tyr and 0.250-50.0 ng/mL for GA-, GD-, GF-, and VX/VM-Tyr (R(2) ≥ 0.995). Inter- and intra-assay precision had coefficients of variation of ≤17 and ≤10%, respectively, and the measured concentration accuracies of spiked samples were within 15% of the targeted value for multiple spiking levels. The limit of detection was calculated to be 0.097, 0.027, 0.018, 0.074, 0.023, and 0.083 ng/mL for GA-, GB-, GD-, GF-, VR-, and VX/VM-Tyr, respectively. A convenience set of 96 serum samples with no known nerve agent exposure was screened and revealed no baseline values or potential interferences. This method provides a simple and highly specific diagnostic tool that may extend the time postevent that a confirmation of nerve agent exposure can be made with confidence.

  18. Intramural optical mapping of V(m) and Ca(i)2+ during long-duration ventricular fibrillation in canine hearts.

    Science.gov (United States)

    Kong, Wei; Ideker, Raymond E; Fast, Vladimir G

    2012-03-15

    Intramural gradients of intracellular Ca(2+) (Ca(i)(2+)) Ca(i)(2+) handling, Ca(i)(2+) oscillations, and Ca(i)(2+) transient (CaT) alternans may be important in long-duration ventricular fibrillation (LDVF). However, previous studies of Ca(i)(2+) handling have been limited to recordings from the heart surface during short-duration ventricular fibrillation. To examine whether abnormalities of intramural Ca(i)(2+) handling contribute to LDVF, we measured membrane voltage (V(m)) and Ca(i)(2+) during pacing and LDVF in six perfused canine hearts using five eight-fiber optrodes. Measurements were grouped into epicardial, midwall, and endocardial layers. We found that during pacing at 350-ms cycle length, CaT duration was slightly longer (by ≃10%) in endocardial layers than in epicardial layers, whereas action potential duration (APD) exhibited no difference. Rapid pacing at 150-ms cycle length caused alternans in both APD (APD-ALT) and CaT amplitude (CaA-ALT) without significant transmural differences. For 93% of optrode recordings, CaA-ALT was transmurally concordant, whereas APD-ALT was either concordant (36%) or discordant (54%), suggesting that APD-ALT was not caused by CaA-ALT. During LDVF, V(m) and Ca(i)(2+) progressively desynchronized when not every action potential was followed by a CaT. Such desynchronization developed faster in the epicardium than in the other layers. In addition, CaT duration strongly increased (by ∼240% at 5 min of LDVF), whereas APD shortened (by ∼17%). CaT rises always followed V(m) upstrokes during pacing and LDVF. In conclusion, the fact that V(m) upstrokes always preceded CaTs indicates that spontaneous Ca(i)(2+) oscillations in the working myocardium were not likely the reason for LDVF maintenance. Strong V(m)-Ca(i)(2+) desynchronization and the occurrence of long CaTs during LDVF indicate severely impaired Ca(i)(2+) handling and may potentially contribute to LDVF maintenance.

  19. Deconstructing the brain’s moral network: dissociable functionality between the temporoparietal junction and ventro-medial prefrontal cortex

    Science.gov (United States)

    Mobbs, Dean; Dalgleish, Tim

    2014-01-01

    Research has illustrated that the brain regions implicated in moral cognition comprise a robust and broadly distributed network. However, understanding how these brain regions interact and give rise to the complex interplay of cognitive processes underpinning human moral cognition is still in its infancy. We used functional magnetic resonance imaging to examine patterns of activation for ‘difficult’ and ‘easy’ moral decisions relative to matched non-moral comparators. This revealed an activation pattern consistent with a relative functional double dissociation between the temporoparietal junction (TPJ) and ventro-medial prefrontal cortex (vmPFC). Difficult moral decisions activated bilateral TPJ and deactivated the vmPFC and OFC. In contrast, easy moral decisions revealed patterns of activation in the vmPFC and deactivation in bilateral TPJ and dorsolateral PFC. Together these results suggest that moral cognition is a dynamic process implemented by a distributed network that involves interacting, yet functionally dissociable networks. PMID:23322890

  20. Deconstructing the brain's moral network: dissociable functionality between the temporoparietal junction and ventro-medial prefrontal cortex.

    Science.gov (United States)

    Feldmanhall, Oriel; Mobbs, Dean; Dalgleish, Tim

    2014-03-01

    Research has illustrated that the brain regions implicated in moral cognition comprise a robust and broadly distributed network. However, understanding how these brain regions interact and give rise to the complex interplay of cognitive processes underpinning human moral cognition is still in its infancy. We used functional magnetic resonance imaging to examine patterns of activation for 'difficult' and 'easy' moral decisions relative to matched non-moral comparators. This revealed an activation pattern consistent with a relative functional double dissociation between the temporoparietal junction (TPJ) and ventro-medial prefrontal cortex (vmPFC). Difficult moral decisions activated bilateral TPJ and deactivated the vmPFC and OFC. In contrast, easy moral decisions revealed patterns of activation in the vmPFC and deactivation in bilateral TPJ and dorsolateral PFC. Together these results suggest that moral cognition is a dynamic process implemented by a distributed network that involves interacting, yet functionally dissociable networks.

  1. Analysis of gene expression pattern and neuroanatomical correlates for SLC20A2 (PiT-2) shows a molecular network with potential impact in idiopathic basal ganglia calcification ("Fahr's disease").

    Science.gov (United States)

    da Silva, R J Galdino; Pereira, I C L; Oliveira, J R M

    2013-06-01

    Familial idiopathic basal ganglia calcification (FIBGC), also known as "Fahr's disease," is a neuropsychiatric disorder with motor and cognitive symptoms. It is characterized pathologically by bilateral calcification most commonly in the basal ganglia and also in other brain regions such as the thalamus and cerebellum. A recent report by Wang et al. (2012) discovered multiple families with FIBGC carrying mutations in the SLC20A2 gene, encoding the inorganic phosphate transporter PiT-2, which segregated in an autosomal dominant pattern. To understand further the role of SLC20A2 in FIBGC brain pathology, here we described the gene expression pattern across the whole brain for SLC20A2, using the Allen Institute Human Brain Atlas database. Microarray analysis provided evidence that the neuroanatomical pattern of expression for SLC20A2 is highest in the regions most commonly affected in FIBGC. Neuroanatomical regions that demonstrated high correlation or anti-correlation with SLC20A2 expression also showed a molecular network with potential to explain the limited neuroanatomical distribution of calcifications in IBGC. Lastly, these co-expression networks suggest additional further candidate genes for FIBGC.

  2. On network flow management in virtualized environments

    OpenAIRE

    Rodríguez Haro, Fernando; Freitag, Fèlix; Navarro Moldes, Leandro; Farías Mendoza, Nicandro; Guerrero Ibáñez, Juan Antonio

    2009-01-01

    Virtualization has enabled the use of virtual machine (VM) based resource providers to offer computing power as a service. However, one important feature is to have certainty about the planed or expected performance of the applications that run inside the VMs. Therefore, consolidating the work load of web-based applications, with time-varying resource requirements, should be done in an automated way. We present and evaluate a network flow management component for the admission control of HTTP...

  3. Externally applied electric fields up to 1.6 × 10(5) V/m do not affect the homogeneous nucleation of ice in supercooled water.

    Science.gov (United States)

    Stan, Claudiu A; Tang, Sindy K Y; Bishop, Kyle J M; Whitesides, George M

    2011-02-10

    The freezing of water can initiate at electrically conducting electrodes kept at a high electric potential or at charged electrically insulating surfaces. The microscopic mechanisms of these phenomena are unknown, but they must involve interactions between water molecules and electric fields. This paper investigates the effect of uniform electric fields on the homogeneous nucleation of ice in supercooled water. Electric fields were applied across drops of water immersed in a perfluorinated liquid using a parallel-plate capacitor; the drops traveled in a microchannel and were supercooled until they froze due to the homogeneous nucleation of ice. The distribution of freezing temperatures of drops depended on the rate of nucleation of ice, and the sensitivity of measurements allowed detection of changes by a factor of 1.5 in the rate of nucleation. Sinusoidal alternation of the electric field at frequencies from 3 to 100 kHz prevented free ions present in water from screening the electric field in the bulk of drops. Uniform electric fields in water with amplitudes up to (1.6 ± 0.4) × 10(5) V/m neither enhanced nor suppressed the homogeneous nucleation of ice. Estimations based on thermodynamic models suggest that fields in the range of 10(7)-10(8) V/m might cause an observable increase in the rate of nucleation.

  4. Inhibition of BCL-2 leads to increased apoptosis and delayed neuronal differentiation in human ReNcell VM cells in vitro.

    Science.gov (United States)

    Fröhlich, Michael; Jaeger, Alexandra; Weiss, Dieter G; Kriehuber, Ralf

    2016-02-01

    BCL-2 is a multifunctional protein involved in the regulation of apoptosis, cell cycle progression and neural developmental processes. Its function in the latter process is not well understood and needs further elucidation. Therefore, we characterized the protein expression kinetics of BCL-2 and associated regulatory proteins of the intrinsic apoptosis pathway during the process of neuronal differentiation in ReNcell VM cells with and without functional inhibition of BCL-2 by its competitive ligand HA14-1. Inhibition of BCL-2 caused a diminished BCL-2 expression and higher levels of cleaved BAX, activated Caspase-3 and cleaved PARP, all pro-apoptotic markers, when compared with untreated differentiating cells. In parallel, flow cytometric analysis of HA14-1-treated cells revealed a delayed differentiation into HuC/D+ neuronal cells when compared to untreated differentiating cells. In conclusion, BCL-2 possess a protective function in fully differentiated ReNcell VM cells. We propose that the pro-survival signaling of BCL-2 is closely connected with its stimulatory effects on neurogenesis of human neural progenitor cells.

  5. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    with each other via a central controller. The 2 access technologies used were 802.11 ( WiFi ) and a Carrier-Sense Multiple Access (CSMA) protocol ...wireless subnets could communicate with each other. 3. Results and Discussion Using the 3-VM LTE/ WiFi configuration, we placed a User Datagram Protocol ...control plane protocols . A network model that can abstract disparate MAC layers in heterogeneous networks and interconnect them using a unified and

  6. MIPAS temperature from the stratosphere to the lower thermosphere: comparison of version vM21 with ACE-FTS, MLS, OSIRIS, SABER, SOFIE and lidar measurements

    Directory of Open Access Journals (Sweden)

    M. García-Comas

    2014-07-01

    Full Text Available We present vM21 MIPAS temperatures from the lower stratosphere to the lower thermosphere, which cover all optimized resolution measurements performed by MIPAS in the Middle Atmosphere, Upper Atmosphere and NoctiLucent Cloud modes during its lifetime. i.e., from January 2005 to March 2012. The main upgrades with respect to the previous version of MIPAS temperatures (vM11 are the update of the spectroscopic database, the use of a different climatology of atomic oxygen and carbon dioxide, and the improvement of important technical aspects of the retrieval setup (temperature gradient along the line of sight and offset regularizations, apodization accuracy. Additionally, an updated version of ESA calibrated L1b spectra (5.02/5.06 is used. The vM21 temperatures correct the main systematic errors of the previous version because they on average provide a 1–2 K warmer stratopause and middle mesosphere, and a 6–10 K colder mesopause (except in high latitude summers and lower thermosphere. These lead to a remarkable improvement of MIPAS comparisons with ACE-FTS, MLS, OSIRIS, SABER, SOFIE and the two Rayleigh lidars at Mauna Loa and Table Mountain, that, with few specific exceptions, typically exhibit differences smaller than 1 K below 50 km and than 2 K at 50–80 km in spring, autumn, winter at all latitudes, and summer at low to mid-latitudes. Differences in the high latitude summers are typically smaller than 1 K below 50 km, smaller than 2 K at 50–65 km and 5 K at 65–80 km. Differences with the other instruments in the mid-mesosphere are generally negative. MIPAS mesopause is within 4 K of the other instruments measurements, except in the high latitude summers, where it is within 5–10 K of the other instruments, being warmer than SABER, MLS and OSIRIS and colder than ACE-FTS and SOFIE. The agreement in the lower thermosphere is typically better than 5 K, except for high latitudes during spring and summer, where MIPAS usually exhibits larger

  7. Persistent improved results after adding vincristine and bleomycin to a cyclophosphamide/hydroxorubicin/Vm-26/prednisone combination (CHVmP) in stage III-IV intermediate- and high-grade non-Hodgkin's lymphoma. The EORTC Lymphoma Cooperative Group.

    Science.gov (United States)

    Meerwaldt, J H; Carde, P; Somers, R; Thomas, J; Kluin-Nelemans, J C; Bron, D; Noordijk, E M; Cosset, J M; Bijnens, L; Teodorovic, I; Hagenbeek, A

    1997-01-01

    CHOP has been and still is regarded by many as the 'standard' treatment of advanced non-Hodgkin's lymphoma. In 1980 the EORTC Lymphoma Cooperative Group started a study to evaluate the addition of vincristine and bleomycin to its standard four-drug combination chemotherapy, CHVmP (cyclophosphamide, hydroxorubicin, Vm-26, prednisone). Eligible patients were stage III or IV, intermediate- to high-grade non-Hodgkin's lymphoma (Working Formulation E-I). One-hundred-eighty-nine patients were entered, of whom 140 were eligible and evaluable. A previous report showed an improved response rate and failure-free survival (FFS) and overall survival for the combination CHVmP-VB. At ten years, the outcome still favors the addition of vincristine and bleomycin. The FFS was 34% vs. 23% and the overall survival 34% vs 22%. This difference was mainly due to a difference in CR rate (74% vs. 49%), Relapse-free survival for patients reaching a CR was the same in both arms. When the patients were grouped according to the International Prognostic Factor Index, no statistically significant difference could be observed in favor of one treatment within either group. This trial clearly demonstrates the benefit gained by the addition of vincristine and bleomycin to 'standard' chemotherapy for intermediate and high-grade non-Hodgkin's lymphoma.

  8. Applying VM to Evaluate the City Buildings of China%用VM的观点看中国的城市建筑

    Institute of Scientific and Technical Information of China (English)

    李岩; 李素蕾

    2006-01-01

    改革开放以来,中国的各大城市与若干年前相比发生了天翻地覆的变化.贪大、求洋、求新、超越实际经济承受能力的城市建筑正在中国大张旗鼓的上演.目前,我国是一个资源浪费大国,面临严重的能源危机.但还有很多城市在超越经济承受能力的情况下大搞城镇建设.本文用VM(Value Management)的观点分析这一现象.

  9. The Kv1.3 channel blocker Vm24 enhances muscle glucose transporter 4 mobilization but does not reduce body-weight gain in diet-induced obese male rats.

    Science.gov (United States)

    Jaimes-Hoy, Lorraine; Gurrola, Georgina B; Cisneros, Miguel; Joseph-Bravo, Patricia; Possani, Lourival D; Charli, Jean-Louis

    2017-07-15

    Voltage-gated potassium channels 1.3 (Kv1.3) can be targeted to reduce diet-induced obesity and insulin resistance in mice. Since species-specific differences in Kv1.3 expression and pharmacology have been observed, we tested the effect of Vm24, a high-affinity specific blocker of Kv1.3 channels from Vaejovis mexicanus smithi, on body weight (BW), glucose tolerance and insulin resistance in diet-induced obese rats. Young adult male Wistar rats were switched to a high-fat/high-fructose (HFF) diet. Eighteen days later animals were divided in two groups: vehicle and Vm24 group. Subcutaneous injections were applied every other day until sacrifice 2months later. An additional cohort was maintained on standard chow. The HFF diet promoted obesity. Treatment with Vm24 did not alter various metabolic parameters such as food intake, BW gain, visceral white adipose tissue mass, adipocyte diameter, serum glucose, leptin and thyroid hormone concentrations, brown adipose tissue mass or uncoupling protein-1 expression, and insulin tolerance. Vm24 did reduce basal and glucose-stimulated serum insulin concentrations, serum C-peptide concentration, increased QUICKI, and tended to lower HOMA-IR. Vm24 treatment did not change the activation of insulin receptor substrate-1, but enhanced protein-kinase B activation and membrane glucose-transporter 4 (GLUT4) protein levels in skeletal muscle. In conclusion, in male rats, long-term blockade of Kv1.3 channels with Vm24 does not reduce weight gain and visceral adiposity induced by HFF diet; instead, it reduces serum insulin concentration, and enhances GLUT4 mobilization in skeletal muscle. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Global detection of live virtual machine migration based on cellular neural networks.

    Science.gov (United States)

    Xie, Kang; Yang, Yixian; Zhang, Ling; Jing, Maohua; Xin, Yang; Li, Zhongxian

    2014-01-01

    In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM) migration detection algorithm based on the cellular neural networks (CNNs), is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, in which improved particle swarm optimization algorithm based on bubble sort is used to solve the problem. Experimental results demonstrate that the proposed method can display the VM migration processing intuitively. Compared with the best fit heuristic algorithm, this approach reduces the processing time, and emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI) implementation allowing the VM migration detection to be performed better.

  11. Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2014-01-01

    Full Text Available In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM migration detection algorithm based on the cellular neural networks (CNNs, is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, in which improved particle swarm optimization algorithm based on bubble sort is used to solve the problem. Experimental results demonstrate that the proposed method can display the VM migration processing intuitively. Compared with the best fit heuristic algorithm, this approach reduces the processing time, and emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation allowing the VM migration detection to be performed better.

  12. The Health Show

    OpenAIRE

    Swann, David

    2011-01-01

    Dr David Swann interviewed on The Health Show, Series 1, Episode 5, 2011 for BBC World about the award-winning 21st Century Nursing Bag. BBC World News reaches 241million people every week, available in 296 million homes, 1.8 million hotel rooms and has the highest average viewership on a weekday of any international news channel. The Health Show is a new 26-part series for BBC World News covering the most important news stories from around the world.

  13. MicroRNA-181b提高U87细胞对VM-26的敏感性研究%miR-181b Enhances Sensitivity to Teniposide in Glioma Cell Line U87

    Institute of Scientific and Technical Information of China (English)

    孙衍昶; 郭琤琤; 赛克; 王翦; 王洁; 陈芙蓉; 张宗平; 陈忠平

    2013-01-01

    背景与目的:MicroRNA(miRNA)参与肿瘤发生发展的诸多过程,并参与调节多种抗肿瘤药物的敏感性.本研究探讨恶性胶质瘤中miR-181b对VM-26(teniposide)化疗敏感性的影响.方法:以荧光定量PCR法检测miR-181b在高级别胶质瘤中的表达,并利用CCK-8细胞毒性实验检测高级别胶质瘤患者细胞对VM-26的化疗敏感性;并通过慢病毒感染构建稳定高表达miR-181b的U87/181b细胞及其对照组U87/nc,在荧光显微镜下观察其转染率及荧光定量PCR法检测其中miR-181b的表达;进而利用CCK-8细胞毒性实验检测U87/181b和U87/nc细胞对VM-26的敏感性,利用流式细胞仪检测VM-26作用72小时后U87/181b和U87/nc的凋亡情况.结果:在高级别胶质瘤中,miR-181b的表达与VM-26的敏感性呈正相关(r=-0.691,P< 0.01),也就是miR-181b高表达肿瘤对VM-26的敏感性高.qPCR检测miR-181b在U87/181b (0.699±0.023)的表达显著高于U87/nc(0.019±0.001) (P< 0.05).CCK-8检测结果显示U87/181b [IC50:(1.25±0.12)μg/mL]对VM-26的敏感性显著高于U87/nc[IC50:(6.24±0.88) μg/mL] (P< 0.05).经VM-26处理后U87/181b凋亡率(69.41±0.77)明显高于U87/nc(37.93±2.90)(P< 0.05).结论:在高级别胶质瘤高表达miR-181b的肿瘤对VM-26的敏感性高;在胶质瘤细胞U87中增加miR-181b表达可以提高对VM-26的敏感性.

  14. Audience affects decision-making in a marmoset communication network.

    Science.gov (United States)

    Toarmino, Camille R; Wong, Lauren; Miller, Cory T

    2017-01-01

    An audience can have a profound effect on the dynamics of communicative interactions. As a result, non-human primates often adjust their social decision-making strategies depending on the audience composition at a given time. Here we sought to test how the unique vocal behaviour of multiple audience members affected decisions to communicate. To address this issue, we developed a novel experimental paradigm in which common marmosets directly interacted with multiple 'virtual monkeys' (VMs), each of whom represented an individual marmoset with distinct vocal behaviour. This active social signalling paradigm provided subjects an opportunity to interact with and learn about the behaviour of each VM in the network and apply this knowledge in subsequent communicative decisions. We found that subjects' propensity to interact with particular VMs was determined by the behaviour of each VM in the audience and suggests that marmoset social decision-making strategies are highly adaptive to nuances of the immediate communication network.

  15. A Fashion Show

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    <正>Story: The yearly fashion show day.The children take turns to walk on the stage and show the class their favorite clothes.Now it’s Joe’s and Phoebe’s turn.Joe walks on the stage and says,“My shorts are blue.Do you like my blue shorts?”On the other side of the stage, Phoebe is wearing her favorite pink skirt.“My skirt is pink.Do you like my pink skirt?”asks

  16. UPDATE E923 - SEARCH FOR T VIOLATING MUON POLARIZATION IN K+ YIELDS M+P0VM DECAY.

    Energy Technology Data Exchange (ETDEWEB)

    CARROLL,A.; DIWAN,M.V.; FRANK,J.; GORDEEV,A.; KETTELL,S.; LEIPUNER,L.; LITTENBERG,L.; MA,H.; OLCHANSKI,K.ET AL

    1998-10-08

    This is an update to the E923 proposal for a new search for the time reversal violating polarization of the muon normal to the decay plane of the K{sup +} {r_arrow} {mu}{sup +}{pi}{sup 0}{nu} decay. The value of such polarization in the Standard Model is zero. However, it is now accepted that the baryon asymmetry of the universe requires a source of CP violation stronger than that embodied in the quark mixing matrix. Models of non-standard CP violation that produce the baryon asymmetry could also produce effects observable in the transverse polarization. The very high sensitivity of the experiment makes this search interesting and timely. In this update we discuss the possibility of additional kaon decay measurements with the same apparatus as well as the detector development over the last year. In particular, we show that we will be able to measure the T-violating muon polarization in K{sup +} {r_arrow} {mu}{sup +}{nu}{gamma} decays. Such a measurement is complimentary to the main goal of this experiment. We also show that we will obtain a large sample of K{sup +} {r_arrow} {pi}{sup +}{pi}{sup 0}{gamma} events that can be used to understand kaon structure and test the detailed predictions from Chiral Perturbation Theory.

  17. On not showing scalps

    DEFF Research Database (Denmark)

    Marselis, Randi Lorenz

    2016-01-01

    proposed by Janet Marstine, the editor of the Routledge Companion to Museum Ethics, I show how the museum succeeded in engaging users in questions of museum ethics. However, this specific debate on human remains in museums developed into an encounter between a global, museological discourse...

  18. Violence and TV Shows

    OpenAIRE

    ÖZTÜRK, Yrd. Doç. Dr. Şinasi

    2008-01-01

    This study aims to discuss theories on theviolent effects of TV shows on viewers, especiallyon children. Therefore, this study includes a briefdiscussion of definitions of violence, discussionof violence theories, main results of researcheson televised violence, measuring TV violence,perception of televised violence, individualdifferences and reactions to TV violence,aggressiveness and preferences for TV violence.

  19. Honored Teacher Shows Commitment.

    Science.gov (United States)

    Ratte, Kathy

    1987-01-01

    Part of the acceptance speech of the 1985 National Council for the Social Studies Teacher of the Year, this article describes the censorship experience of this honored social studies teacher. The incident involved the showing of a videotape version of the feature film entitled "The Seduction of Joe Tynan." (JDH)

  20. A Visionary Show

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Seduction. Distinction. Relax. Pulsation. These are the "style universes" on display at Première Vision, heralded as "The World’s Premiere Fabric Show." Started more than 35 years ago by 15 French weavers, Première Vision has expanded beyond its

  1. Honored Teacher Shows Commitment.

    Science.gov (United States)

    Ratte, Kathy

    1987-01-01

    Part of the acceptance speech of the 1985 National Council for the Social Studies Teacher of the Year, this article describes the censorship experience of this honored social studies teacher. The incident involved the showing of a videotape version of the feature film entitled "The Seduction of Joe Tynan." (JDH)

  2. Mechanisms of long-lasting hyperpolarizations underlying slow sleep oscillations in cat corticothalamic networks.

    Science.gov (United States)

    Contreras, D; Timofeev, I; Steriade, M

    1996-01-01

    1. To explore the nature of the long-lasting hyperpolarizations that characterize slow oscillations in corticothalamic circuits in vivo, intracellular recordings were obtained under ketamine-xylazine anaesthesia from cortical (Cx) cells of the cat precruciate motor cortex, thalamic reticular (RE) cells from the rostrolateral sector, and thalamocortical (TC) cells from the ventrolateral (VL) nucleus. 2. Measurements in the three cell types showed input resistance (Rin) to be highest during the long-lasting hyperpolarizations that correspond to depth-positive waves of the cortical EEG. Rin was lowest during the early phase of high-amplitude depth-negative EEG waves and increased thereafter until the next cycle of the slow oscillation. 3. Spontaneous long-lasting hyperpolarizations were compared with those evoked by dorsal thalamic stimulation. Voltage versus current (V-I) plots showed similar membrane potential (Vm) ranges and slopes for spontaneous and evoked hyperpolarizations in both Cx and RE cells. V-I plots from TC cells had similar slopes, but Vm during evoked hyperpolarizations was displaced towards more negative values. 4. Intracellular injection of constant hyperpolarizing current in Cx cells increased the amplitude of the initial part of the depolarizing plateau of the slow oscillation, but decreased the amplitude of the last part. 5. These results suggest disfacilitation to be the dominant mechanism in the membrane of cortical and thalamic cells during the spontaneous long-lasting hyperpolarizations, which shape and synchronize slow oscillations in corticothalamic networks. In Cx and RE cells, the same mechanism underlies thalamically evoked long-lasting hyperpolarizations. By contrast, evoked responses in TC cells show a strong additional hyperpolarizing factor. We propose that GABAB processes are stronger in TC than in Cx neurones, thus rendering the thalamus an easier target for absence-type epileptic phenomena through potentiation of thalamic rebound

  3. Shanghai Shows Its Heart

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The city known as China’s economic powerhouse showed a more caring face as host of the Special Olympic Games Between October 2 and 11,the Special Olympics Summer Games were hosted in Shanghai,the first time the 40-year-old athletic com- petition for people with intellectual disabilities came to a developing country. This Special Olympics was also larger than all previous games in temps of the number of athletes.

  4. Not a "reality" show.

    Science.gov (United States)

    Wrong, Terence; Baumgart, Erica

    2013-01-01

    The authors of the preceding articles raise legitimate questions about patient and staff rights and the unintended consequences of allowing ABC News to film inside teaching hospitals. We explain why we regard their fears as baseless and not supported by what we heard from individuals portrayed in the filming, our decade-long experience making medical documentaries, and the full un-aired context of the scenes shown in the broadcast. The authors don't and can't know what conversations we had, what documents we reviewed, and what protections we put in place in each televised scene. Finally, we hope to correct several misleading examples cited by the authors as well as their offhand mischaracterization of our program as a "reality" show.

  5. Showing Value (Editorial

    Directory of Open Access Journals (Sweden)

    Denise Koufogiannakis

    2009-06-01

    Full Text Available When Su Cleyle and I first decided to start Evidence Based Library and Information Practice, one of the things we agreed upon immediately was that the journal be open access. We knew that a major obstacle to librarians using the research literature was that they did not have access to the research literature. Although Su and I are both academic librarians who can access a wide variety of library and information literature from our institutions, we belong to a profession where not everyone has equal access to the research in our field. Without such access to our own body of literature, how can we ever hope for practitioners to use research evidence in their decision making? It would have been contradictory to the principles of evidence based library and information practice to do otherwise.One of the specific groups we thought could use such an open access venue for discovering research literature was school librarians. School librarians are often isolated and lacking access to the research literature that may help them prove to stakeholders the importance of their libraries and their role within schools. Certainly, school libraries have been in decline and the use of evidence to show value is needed. As Ken Haycock noted in his 2003 report, The Crisis in Canada’s School Libraries: The Case for Reform and Reinvestment, “Across the country, teacher-librarians are losing their jobs or being reassigned. Collections are becoming depleted owing to budget cuts. Some principals believe that in the age of the Internet and the classroom workstation, the school library is an artifact” (9. Within this context, school librarians are looking to our research literature for evidence of the impact that school library programs have on learning outcomes and student success. They are integrating that evidence into their practice, and reflecting upon what can be improved locally. They are focusing on students and showing the impact of school libraries and

  6. Public medical shows.

    Science.gov (United States)

    Walusinski, Olivier

    2014-01-01

    In the second half of the 19th century, Jean-Martin Charcot (1825-1893) became famous for the quality of his teaching and his innovative neurological discoveries, bringing many French and foreign students to Paris. A hunger for recognition, together with progressive and anticlerical ideals, led Charcot to invite writers, journalists, and politicians to his lessons, during which he presented the results of his work on hysteria. These events became public performances, for which physicians and patients were transformed into actors. Major newspapers ran accounts of these consultations, more like theatrical shows in some respects. The resultant enthusiasm prompted other physicians in Paris and throughout France to try and imitate them. We will compare the form and substance of Charcot's lessons with those given by Jules-Bernard Luys (1828-1897), Victor Dumontpallier (1826-1899), Ambroise-Auguste Liébault (1823-1904), Hippolyte Bernheim (1840-1919), Joseph Grasset (1849-1918), and Albert Pitres (1848-1928). We will also note their impact on contemporary cinema and theatre.

  7. The Great Cometary Show

    Science.gov (United States)

    2007-01-01

    its high spatial and spectral resolution, it was possible to zoom into the very heart of this very massive star. In this innermost region, the observations are dominated by the extremely dense stellar wind that totally obscures the underlying central star. The AMBER observations show that this dense stellar wind is not spherically symmetric, but exhibits a clearly elongated structure. Overall, the AMBER observations confirm that the extremely high mass loss of Eta Carinae's massive central star is non-spherical and much stronger along the poles than in the equatorial plane. This is in agreement with theoretical models that predict such an enhanced polar mass-loss in the case of rapidly rotating stars. ESO PR Photo 06c/07 ESO PR Photo 06c/07 RS Ophiuchi in Outburst Several papers from this special feature focus on the later stages in a star's life. One looks at the binary system Gamma 2 Velorum, which contains the closest example of a star known as a Wolf-Rayet. A single AMBER observation allowed the astronomers to separate the spectra of the two components, offering new insights in the modeling of Wolf-Rayet stars, but made it also possible to measure the separation between the two stars. This led to a new determination of the distance of the system, showing that previous estimates were incorrect. The observations also revealed information on the region where the winds from the two stars collide. The famous binary system RS Ophiuchi, an example of a recurrent nova, was observed just 5 days after it was discovered to be in outburst on 12 February 2006, an event that has been expected for 21 years. AMBER was able to detect the extension of the expanding nova emission. These observations show a complex geometry and kinematics, far from the simple interpretation of a spherical fireball in extension. AMBER has detected a high velocity jet probably perpendicular to the orbital plane of the binary system, and allowed a precise and careful study of the wind and the shockwave

  8. Frontal Network Heterogeneity of Adult with Attention Deficit Hyperactivity Disorder%成人注意缺陷多动障碍额叶网络异质性

    Institute of Scientific and Technical Information of China (English)

    王君玲; 朱旭阳; 郭文明

    2013-01-01

    神经影像学研究表明注意缺陷/多动障碍(ADHD)与额叶-纹状体网络功能异质有密切关系.利用静息态功能磁共振数据,探讨成人ADHD组和健康对照组的功能连通性(FC)是否有差异.获取成人ADHD组(N=20)和健康对照组(N=20)的血氧水平依赖(BOLD)信号,以腹内侧前额叶皮质(vmPFC)为感兴趣区进行功能相关分析,使用皮尔森相关系数为衡量功能相关强度的指标.经两样本统计分析,成人注意缺陷多动障碍组左侧眶额叶、右后外侧前额叶皮层、角回与vmPFC正相关性较对照组均存在显著的增强(p<0.01,经Alphasim);成人注意缺陷多动障碍组较对照组右侧背外额中回与vmPFC负相关性有所下降(p<0.01,经Alphasim).进一步证明了前额叶与其他脑区的连通性存在差异,成人ADHD前额叶默认网络存在功能失调.%Neurochemical studies have generally hypothesized that fronto-striatal functional network abnormalities as the likely cause of ADHD.The aim of this study was to investigate whether functional connectivity (FC) of the resting-state functional magnetic resonance imaging (rs-fMRI) was abnormal between ADHD and normal adult.Blood oxygenation level dependent (BOLD) signal of adult ADHD patients (N=20) and matched healthy control participants (N=20) was acquired to calculate the FC with vmPFC,the region of interest (ROI).Pearson correlation coefficients was used as an index to measure FC strength.By using two-sample analysis with a corrected threshold of p<0.01 determined by AlphaSim,that are found in comparison with controls,Adult ADHD patients showed a significantly increased connectivity strength with the ROI,including the left orbitofrontal cortex,the right post-lateral prefrontal cortex,the right angular gyrus.Mean while,it showed a significantly decreased anti-correlation between the fight dorsolateral middle frontal gyrus and the vmPFC.Our data support the hypothesis that ADHD and normal adult existence

  9. Analyse af VM-Husene

    DEFF Research Database (Denmark)

    Ryborg Jørgensen, Thomas

    2007-01-01

    Bearbejdet uddrag fra 'Arkitektonisk kvalitet & industrielle byggesystemer' Kunstakademiets Arkitektskole 2007 (CINARK Forskning). Papiret er anvendt i forbindelse med adskillelige arkitekturteoretiske studiekredse....

  10. Germinación, microinjertación y cultivo de callos in vitro de Vasconcellea stipulata V.M. Badillo y Vasconcellea pubescens A.DC

    OpenAIRE

    2016-01-01

    En varias poblaciones rurales de regiones andinas y centroamericanas se utilizan con fines etnomédicos las hojas, el látex y el fruto de las plantas de la familia Caricaceae cuyo miembro más representativo es la papaya (Carica papaya L.), la cual produce la fuente comercial más importante de la enzima proteolítica papaína. El presente trabajo estudia las especies Vasconcellea stipulata V.M. Badillo y Vasconcellea pubescens A.DC que pertenecen al género Vasconcellea, miembros de la familia Car...

  11. A Comprehensive Sensitivity Analysis of a Data Center Network with Server Virtualization for Business Continuity

    Directory of Open Access Journals (Sweden)

    Tuan Anh Nguyen

    2015-01-01

    Full Text Available Sensitivity assessment of availability for data center networks (DCNs is of paramount importance in design and management of cloud computing based businesses. Previous work has presented a performance modeling and analysis of a fat-tree based DCN using queuing theory. In this paper, we present a comprehensive availability modeling and sensitivity analysis of a DCell-based DCN with server virtualization for business continuity using stochastic reward nets (SRN. We use SRN in modeling to capture complex behaviors and dependencies of the system in detail. The models take into account (i two DCell configurations, respectively, composed of two and three physical hosts in a DCell0 unit, (ii failure modes and corresponding recovery behaviors of hosts, switches, and VMs, and VM live migration mechanism within and between DCell0s, and (iii dependencies between subsystems (e.g., between a host and VMs and between switches and VMs in the same DCell0. The constructed SRN models are analyzed in detail with regard to various metrics of interest to investigate system’s characteristics. A comprehensive sensitivity analysis of system availability is carried out in consideration of the major impacting parameters in order to observe the system’s complicated behaviors and find the bottlenecks of system availability. The analysis results show the availability improvement, capability of fault tolerance, and business continuity of the DCNs complying with DCell network topology. This study provides a basis of designing and management of DCNs for business continuity.

  12. Retraction statement: Dynamics of Cytochrome C Oxidase Activity in Acute Ischemic Stroke' by Selaković, V.M., Jovanović, M.D., Mihajlović, R.R. and Radenović, L.L.J.

    Science.gov (United States)

    2016-10-01

    The above article from Acta Neurologica Scandinavica, published online on 7 April 2005 in Wiley Online Library (wileyonlinelibrary.com) and in Volume 111, pp. 329-332, has been retracted by agreement between the journal Editor in Chief, Professor Elinor Ben-Menachem, and John Wiley & Sons Ltd. The article has been retracted because a similar article had previously been published in the Jugoslovenska medicinska biohemija in 2003. The authors presumed that since the journal was no longer existing, they felt the need to re-publish their work in Acta Neuorologica Scandinavica. However, in the consideration of the Journal, this constitutes dual publication. References SelakovićVM, JovanovićMD, MihajlovićR, RadenovićLLJ. Cytochrome c oxidase in patients with acute ischaemic brain disease. Jugoslovenska medicinska biohemija. 2003;22:329-334. SelakovićVM, JovanovićMD, MihajlovićRR, RadenovićLLJ. Dynamics of cytochrome c oxidase activity in acute ischemic stroke. Acta Neurol Scand. 2005;111:329-332.

  13. Neural Dysregulation in Posttraumatic Stress Disorder: Evidence for Disrupted Equilibrium between Salience and Default Mode Brain Networks

    Science.gov (United States)

    Sripada, Rebecca K.; King, Anthony P.; Welsh, Robert C.; Garfinkel, Sarah N.; Wang, Xin; Sripada, Chandra S.; Liberzon, Israel

    2012-01-01

    Objective Convergent neuroimaging and neuropsychological research demonstrates disrupted attention and heightened threat sensitivity in PTSD. This might be linked to aberrations in large-scale networks subserving detection of salient stimuli, i.e. the salience network (SN), and stimulus-independent, internally-focused thought, i.e. the default mode network (DMN). Methods Resting state brain activity was measured in returning veterans who served in Iraq or Afghanistan with (n=15) and without PTSD (n=15) and in healthy community controls (n=15). Correlation coefficients were calculated between the time course of seed regions in key SN and DMN regions (posterior cingulate, ventromedial prefrontal cortex, and bilateral anterior insula) and all other voxels of the brain. Results Compared to control groups, PTSD participants showed reduced functional connectivity within DMN (between DMN seeds and other DMN regions), including rostral ACC/vmPFC (Z=3.31; p=.005, corrected) and hippocampus (Z=2.58; p=.005), and increased connectivity within SN (between insula seeds and other SN regions), including amygdala (Z=3.03; p=.01, corrected). PTSD participants also demonstrated increased cross-network connectivity. DMN seeds exhibited elevated connectivity with SN regions, including insula (Z=3.06; p=.03, corrected), putamen, and supplementary motor area (Z=4.14; Z=4.08; p<.001), and SN seeds exhibited elevated connectivity with DMN regions, including hippocampus (Z=3.10; p=.048, corrected). Conclusions During resting state scanning, PTSD participants showed reduced coupling within DMN, greater coupling within SN, and increased coupling between DMN and SN. Our findings suggest a relative dominance of threat-sensitive circuitry in PTSD, even in task-free conditions. Disequilibrium between large-scale networks subserving salience detection versus internally focused thought may be associated with PTSD pathophysiology. PMID:23115342

  14. Cosmological networks

    CERN Document Server

    Boguna, Marian; Krioukov, Dmitri

    2013-01-01

    Networks often represent systems that do not have a long history of studies in traditional fields of physics, albeit there are some notable exceptions such as energy landscapes and quantum gravity. Here we consider networks that naturally arise in cosmology. Nodes in these networks are stationary observers uniformly distributed in an expanding open FLRW universe with any scale factor, and two observers are connected if one can causally influence the other. We show that these networks are growing Lorentz-invariant graphs with power-law distributions of node degrees. New links in these networks not only connect new nodes to existing ones, but also appear at a certain rate between existing nodes, as they do in many complex networks.

  15. XAANTAL2 (AGL14) Is an Important Component of the Complex Gene Regulatory Network that Underlies Arabidopsis Shoot Apical Meristem Transitions.

    Science.gov (United States)

    Pérez-Ruiz, Rigoberto V; García-Ponce, Berenice; Marsch-Martínez, Nayelli; Ugartechea-Chirino, Yamel; Villajuana-Bonequi, Mitzi; de Folter, Stefan; Azpeitia, Eugenio; Dávila-Velderrain, José; Cruz-Sánchez, David; Garay-Arroyo, Adriana; Sánchez, María de la Paz; Estévez-Palmas, Juan M; Álvarez-Buylla, Elena R

    2015-05-01

    In Arabidopsis thaliana, multiple genes involved in shoot apical meristem (SAM) transitions have been characterized, but the mechanisms required for the dynamic attainment of vegetative, inflorescence, and floral meristem (VM, IM, FM) cell fates during SAM transitions are not well understood. Here we show that a MADS-box gene, XAANTAL2 (XAL2/AGL14), is necessary and sufficient to induce flowering, and its regulation is important in FM maintenance and determinacy. xal2 mutants are late flowering, particularly under short-day (SD) condition, while XAL2 overexpressing plants are early flowering, but their flowers have vegetative traits. Interestingly, inflorescences of the latter plants have higher expression levels of LFY, AP1, and TFL1 than wild-type plants. In addition we found that XAL2 is able to bind the TFL1 regulatory regions. On the other hand, the basipetal carpels of the 35S::XAL2 lines lose determinacy and maintain high levels of WUS expression under SD condition. To provide a mechanistic explanation for the complex roles of XAL2 in SAM transitions and the apparently paradoxical phenotypes of XAL2 and other MADS-box (SOC1, AGL24) overexpressors, we conducted dynamic gene regulatory network (GRN) and epigenetic landscape modeling. We uncovered a GRN module that underlies VM, IM, and FM gene configurations and transition patterns in wild-type plants as well as loss and gain of function lines characterized here and previously. Our approach thus provides a novel mechanistic framework for understanding the complex basis of SAM development. Copyright © 2015 The Author. Published by Elsevier Inc. All rights reserved.

  16. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  17. Optimized Virtual Machine Placement with Traffic-Aware Balancing in Data Center Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2016-01-01

    Full Text Available Virtualization has been an efficient method to fully utilize computing resources such as servers. The way of placing virtual machines (VMs among a large pool of servers greatly affects the performance of data center networks (DCNs. As network resources have become a main bottleneck of the performance of DCNs, we concentrate on VM placement with Traffic-Aware Balancing to evenly utilize the links in DCNs. In this paper, we first proposed a Virtual Machine Placement Problem with Traffic-Aware Balancing (VMPPTB and then proved it to be NP-hard and designed a Longest Processing Time Based Placement algorithm (LPTBP algorithm to solve it. To take advantage of the communication locality, we proposed Locality-Aware Virtual Machine Placement Problem with Traffic-Aware Balancing (LVMPPTB, which is a multiobjective optimization problem of simultaneously minimizing the maximum number of VM partitions of requests and minimizing the maximum bandwidth occupancy on uplinks of Top of Rack (ToR switches. We also proved it to be NP-hard and designed a heuristic algorithm (Least-Load First Based Placement algorithm, LLBP algorithm to solve it. Through extensive simulations, the proposed heuristic algorithm is proven to significantly balance the bandwidth occupancy on uplinks of ToR switches, while keeping the number of VM partitions of each request small enough.

  18. Correlation in business networks

    Science.gov (United States)

    Souma, Wataru; Aoyama, Hideaki; Fujiwara, Yoshi; Ikeda, Yuichi; Iyetomi, Hiroshi; Kaizoji, Taisei

    2006-10-01

    This paper considers business networks. Through empirical study, we show that business networks display characteristics of small-world networks and scale-free networks. In this paper, we characterize firms as sales and bankruptcy probabilities. A correlation between sales and a correlation between bankruptcy probabilities in business networks are also considered. The results reveal that the correlation between sales depends strongly on the type of network, whereas the correlation between bankruptcy probabilities does so only weakly.

  19. NASA GIBS Use in Live Planetarium Shows

    Science.gov (United States)

    Emmart, C. B.

    2015-12-01

    The American Museum of Natural History's Hayden Planetarium was rebuilt in year 2000 as an immersive theater for scientific data visualization to show the universe in context to our planet. Specific astrophysical movie productions provide the main daily programming, but interactive control software, developed at AMNH allows immersive presentation within a data aggregation of astronomical catalogs called the Digital Universe 3D Atlas. Since 2006, WMS globe browsing capabilities have been built into a software development collaboration with Sweden's Linkoping University (LiU). The resulting Uniview software, now a product of the company SCISS, is operated by about fifty planetariums around that world with ability to network amongst the sites for global presentations. Public presentation of NASA GIBS has allowed authoritative narratives to be presented within the range of data available in context to other sources such as Science on a Sphere, NASA Earth Observatory and Google Earth KML resources. Specifically, the NOAA supported World Views Network conducted a series of presentations across the US that focused on local ecological issues that could then be expanded in the course of presentation to national and global scales of examination. NASA support of for GIBS resources in an easy access multi scale streaming format like WMS has tremendously enabled particularly facile presentations of global monitoring like never before. Global networking of theaters for distributed presentations broadens out the potential for impact of this medium. Archiving and refinement of these presentations has already begun to inform new types of documentary productions that examine pertinent, global interdependency topics.

  20. Age Differences in the Intrinsic Functional Connectivity of Default Network Subsystems

    Directory of Open Access Journals (Sweden)

    Karen eCampbell

    2013-11-01

    Full Text Available Recent work suggests that the default mode network (DMN includes two core regions, the ventromedial prefrontal cortex (vmPFC and posterior cingulate cortex (PCC, and several unique subsystems that are functionally distinct. These include a medial temporal lobe (MTL subsystem, active during remembering and future projection, and a dorsomedial PFC (dmPFC subsystem, active during self-reference. The PCC has been further subdivided into ventral (vPCC and dorsal (dPCC regions that are more strongly connected with the DMN and cognitive control networks, respectively. The goal of this study was to examine age differences in resting state functional connectivity within these subsystems. After applying a rigorous procedure to reduce the effects of head motion, we used a multivariate technique to identify both common and unique patterns of functional connectivity in the MTL vs. the dmPFC, and in vPCC vs. dPCC. All four areas had robust functional connectivity with other DMN regions, and each also showed distinct connectivity patterns in both age groups. Young and older adults had equivalent functional connectivity in the MTL subsystem. Older adults showed weaker connectivity in the vPCC and dmPFC subsystems, particularly with other DMN areas, but stronger connectivity than younger adults in the dPCC subsystem, which included areas involved in cognitive control. Our data provide evidence for distinct subsystems involving DMN nodes, which are maintained with age. Nevertheless, there are age differences in the strength of functional connectivity within these subsystems, supporting prior evidence that DMN connectivity is particularly vulnerable to age, whereas connectivity involving cognitive control regions is relatively maintained. These results suggest an age difference in the integrated activity among brain networks that can have implications for cognition in older adults.

  1. 虚拟机宿主服务器及其性能收集方法研究%Research of VM-hosted servers and performance collecting methods

    Institute of Scientific and Technical Information of China (English)

    薛青; 张延园

    2009-01-01

    介绍了虚拟化技术的概念和研究范围,接着探讨计算平台虚拟化及高可用等特性,引入虚拟机宿主服务器的概念,指出为了发挥虚拟化技术的特性,对虚拟机宿主服务器进行性能数据收集的必要性,以EsxServer和Xen为性能收集对象,分别探讨性能收集方法.具体方法是针对不同虚拟化产品,相应使用了Linux命令查询解析、虚拟化监视器命令解析及数据管理对象访问.最后以虚拟化产品厂商提供的性能监视数据作为参照,指出了性能收集方法的优劣.%The virtualization technology is introduced including its conception and research range. The computing platform virtualization is discussed later, involving the term VM-hosted servers. Then the necessity is pointed out which emphasized to collect performance information from VM-hosted servers to take advantage of features of virtualization. After that the information gathering methods for Esx Server and Xen are discussed, such as query and analysis by Linux command, analysis by VMM command and data management objects access. According to the data from tools of virtualization products manufactures, the Pros and Cons of these implied methods are analyzed.

  2. Planning a Successful Tech Show

    Science.gov (United States)

    Nikirk, Martin

    2011-01-01

    Tech shows are a great way to introduce prospective students, parents, and local business and industry to a technology and engineering or career and technical education program. In addition to showcasing instructional programs, a tech show allows students to demonstrate their professionalism and skills, practice public presentations, and interact…

  3. Risk Aversion in Game Shows

    DEFF Research Database (Denmark)

    2008-01-01

    We review the use of behavior from television game shows to infer risk attitudes. These shows provide evidence when contestants are making decisions over very large stakes, and in a replicated, structured way. Inferences are generally confounded by the subjective assessment of skill in some games......, and the dynamic nature of the task in most games. We consider the game shows Card Sharks, Jeopardy!, Lingo, and finally Deal Or No Deal. We provide a detailed case study of the analyses of Deal Or No Deal, since it is suitable for inference about risk attitudes and has attracted considerable attention....

  4. Measuring performance at trade shows

    DEFF Research Database (Denmark)

    Hansen, Kåre

    2004-01-01

    Trade shows is an increasingly important marketing activity to many companies, but current measures of trade show performance do not adequately capture dimensions important to exhibitors. Based on the marketing literature's outcome and behavior-based control system taxonomy, a model is built...... that captures a outcome-based sales dimension and four behavior-based dimensions (i.e. information-gathering, relationship building, image building, and motivation activities). A 16-item instrument is developed for assessing exhibitors perceptions of their trade show performance. The paper presents evidence...

  5. Complexity of Public Transport Networks

    Institute of Scientific and Technical Information of China (English)

    LU Huapu; SHI Ye

    2007-01-01

    The theory of complex networks was used to classify public transport networks into public transportation route networks, public transportation transfer networks, and bus station networks. The practical significance of the network parameters was then analyzed. The public transport networks in Langfang, Jining, and Dalian were then chosen as specific research cases. The results show that the public transportation networks have the characteristics of complex networks. In addition, the urban transportation network parameters all significantly affect the accessibility, convenience, and terrorist security capability of the urban public transportation network. The results link the findings with the actual situations to explore means to solve transportation system problems.

  6. Tokyo Motor Show 2003; Tokyo Motor Show 2003

    Energy Technology Data Exchange (ETDEWEB)

    Joly, E.

    2004-01-01

    The text which follows present the different techniques exposed during the 37. Tokyo Motor Show. The report points out the great tendencies of developments of the Japanese automobile industry. The hybrid electric-powered vehicles or those equipped with fuel cells have been highlighted by the Japanese manufacturers which allow considerable budgets in the research of less polluting vehicles. The exposed models, although being all different according to the manufacturer, use always a hybrid system: fuel cell/battery. The manufacturers have stressed too on the intelligent systems for navigation and safety as well as on the design and comfort. (O.M.)

  7. Risk Aversion in Game Shows

    DEFF Research Database (Denmark)

    Andersen, Steffen; Lau, Morten I.; Rutström, E. Elisabet

    2008-01-01

    , and the dynamic nature of the task in most games. We consider the game shows Card Sharks, Jeopardy!, Lingo, and finally Deal Or No Deal. We provide a detailed case study of the analyses of Deal Or No Deal, since it is suitable for inference about risk attitudes and has attracted considerable attention....

  8. Phyllodes tumor showing intraductal growth.

    Science.gov (United States)

    Makidono, Akari; Tsunoda, Hiroko; Mori, Miki; Yagata, Hiroshi; Onoda, Yui; Kikuchi, Mari; Nozaki, Taiki; Saida, Yukihisa; Nakamura, Seigo; Suzuki, Koyu

    2013-07-01

    Phyllodes tumor of the breast is a rare fibroepithelial lesion and particularly uncommon in adolescent girls. It is thought to arise from the periductal rather than intralobular stroma. Usually, it is seen as a well-defined mass. Phyllodes tumor showing intraductal growth is extremely rare. Here we report a girl who has a phyllodes tumor with intraductal growth.

  9. Pembrolizumab Shows Promise for NSCLC.

    Science.gov (United States)

    2015-06-01

    Data from the KEYNOTE-001 trial show that pembrolizumab improves clinical outcomes for patients with advanced non-small cell lung cancer, and is well tolerated. PD-L1 expression in at least 50% of tumor cells correlated with improved efficacy.

  10. Create a Polarized Light Show.

    Science.gov (United States)

    Conrad, William H.

    1992-01-01

    Presents a lesson that introduces students to polarized light using a problem-solving approach. After illustrating the concept using a slinky and poster board with a vertical slot, students solve the problem of creating a polarized light show using Polya's problem-solving methods. (MDH)

  11. Reality show: um paradoxo nietzschiano

    Directory of Open Access Journals (Sweden)

    Ilana Feldman

    2011-01-01

    Full Text Available

    O fenômeno dos reality shows - e a subseqüente relação entre imagem e verdade - assenta-se sobre uma série de paradoxos. Tais paradoxos podem ser compreendidos à luz do pensamento do filósofo alemão Friedrich Nietzsche, que, através dos usos de formulações paradoxais, concebia a realidade como um mundo de pura aparência e a verdade como um acréscimo ficcional, como um efeito. A ficção é então tomada, na filosofia de Nietzsche, não em seu aspecto falsificante e desrealizador - como sempre pleiteou nossa tradição metafísica -, mas como condição necessária para que certa espécie de invenção possa operar como verdade. Sendo assim, a própria expressão reality show, através de sua formulação paradoxal, engendra explicitamente um mundo de pura aparência, em que a verdade, a parte reality da proposição, é da ordem do suplemento, daquilo que se acrescenta ficcionalmente - como um adjetivo - a show. O ornamento, nesse caso, passa a ocupar o lugar central, apontando para o efeito produzido: o efeito-de-verdade. Seguindo, então, o pensamento nietzschiano e sua atualização na contemporaneidade, investigaremos de que forma os televisivos “shows de realidade” operam paradoxalmente, em consonância com nossas paradoxais práticas culturais.

  12. Picasso on Show in Shanghai

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    A staff member of the National Picasso Museum of France checks one of the great Spanish artist Pablo Picasso’s works at the China Pavilion inside the site of the 2010 World Expo in Shanghai on October 12.Sixty-two priceless paintings and statues selected from the works of the renowned artist have been brought to the pavilion for an upcoming exhibition to premiere on October 18.Besides these representative masterpieces,50 valuable photographs showing the artist’s whole life will also be presented.The exhibition’s estimated value is 678 million euros ($934 million).It will be held until January 10,2012.

  13. Reality shows: uma abordagem psicossocial

    Directory of Open Access Journals (Sweden)

    Marília Pereira Bueno Millan

    Full Text Available Desde os primórdios da civilização, o ser humano mostra necessidade de representar cenicamente seus dramas pessoais e vicissitudes existenciais. O "reality show" é uma das versões pós-modernas da encenação da vida humana. Este artigo, por meio de uma pesquisa bibliográfica, analisa criticamente as relações existentes entre o "reality show" e aspectos psicossociais do comportamento humano. Conclui-se que tais programas televisivos são o retrato da contemporaneidade, ou seja, revelam a morte do sujeito, a fugacidade das experiências vividas, a desvalorização da história e o culto à imagem e à superficialidade. Por meio da sedução do espectador, mobilizam-se aspectos primitivos de seu psiquismo, fazendo com que ele se sinta narcisicamente poderoso e onipotente e se acredite dono do destino dos participantes do programa. Sugerem-se novos estudos que contribuam para a reflexão crítica e maior conscientização.

  14. "Medicine show." Alice in Doctorland.

    Science.gov (United States)

    1987-01-01

    This is an excerpt from the script of a 1939 play provided to the Institute of Social Medicine and Community Health by the Library of Congress Federal Theater Project Collection at George Mason University Library, Fairfax, Virginia, pages 2-1-8 thru 2-1-14. The Federal Theatre Project (FTP) was part of the New Deal program for the arts 1935-1939. Funded by the Works Progress Administration (WPA) its goal was to employ theater professionals from the relief rolls. A number of FTP plays deal with aspects of medicine and public health. Pageants, puppet shows and documentary plays celebrated progress in medical science while examining social controversies in medical services and the public health movement. "Medicine Show" sharply contrasts technological wonders with social backwardness. The play was rehearsed by the FTP but never opened because funding ended. A revised version ran on Broadway in 1940. The preceding comments are adapted from an excellent, well-illustrated review of five of these plays by Barabara Melosh: "The New Deal's Federal Theatre Project," Medical Heritage, Vol. 2, No. 1 (Jan/Feb 1986), pp. 36-47.

  15. Multiple brain networks contribute to the acquisition of bias in perceptual decision-making

    Directory of Open Access Journals (Sweden)

    Mei-Yen eChen

    2015-03-01

    Full Text Available Bias occurs in perceptual decisions when the reward associated with a particular response dominates the sensory evidence in support of a choice. However, it remains unclear how this bias is acquired and once acquired, how it influences perceptual decision processes in the brain. We addressed these questions using model-based neuroimaging in a motion discrimination paradigm where contextual cues suggested which one of two options would receive higher rewards on each trial. We found that participants gradually learned to choose the higher-rewarded option in each context when making a perceptual decision. The amount of bias on each trial was fit well by a reinforcement-learning model that estimated the subjective value of each option within the current context. The brain mechanisms underlying this bias acquisition process were similar to those observed in reward-based decision tasks: prediction errors correlated with the fMRI signals in ventral striatum, dlPFC, and parietal cortex, whereas the amount of acquired bias correlated with activity in ventromedial prefrontal (vmPFC, dorsolateral frontal (dlPFC, and parietal cortices. Moreover, psychophysiological interaction analysis revealed that as bias increased, functional connectivity increased within multiple brain networks (dlPFC-vmPFC-visual, vmPFC-motor, and parietal-anterior-cingulate, suggesting that multiple mechanisms contribute to bias in perceptual decisions through integration of value processing with action, sensory, and control systems. These provide a novel link between the neural mechanisms underlying perceptual and economic decision-making.

  16. 紫杉醇联合替尼泊苷对胃癌BGC-823细胞增殖和凋亡的影响%Effects of taxol and VM-26 on proliferation and apoptosis of gastric cancer cell line BGC-823

    Institute of Scientific and Technical Information of China (English)

    罗执芬; 周云; 刘明月

    2009-01-01

    目的:探讨紫杉醇(Taxol)和替尼泊苷(VM-26)联合应用对胃癌BGC-823细胞的体外抑制和诱导细胞凋亡的作用.方法:采用MTT法测定Taxol单药(0.75、1.50、3.00、6.00、12.00 mg/L),VM-26单药(1.25、2.50、5.00、10.00、20.00mg/L)及联合用药(0.75/1.25,1.5/2.50,3.00/5.00,6.00/10.00,12.00/20.00 mg/L)对BGC-823细胞的生长抑制率,应用流式细胞仪测定0.75 mg/L Taxol、1.25 mg/L VM-26单药及其联合用药作用0,12,24,48 h各时间点的细胞周期和凋亡率.结果:Taxol和VM-26单药及联合用药对BGC-823细胞的生长抑制率随药物的质量浓度的增加而增加.联合用药指数(CI)为1.43.经1.25 mg/L的VM-26和0.75 mg/L Taxol单药及联合用药均可诱导胃癌BGC-823细胞的凋亡,Taxol单药处理后24 h,使G2/M细胞显著增多,S期细胞显著减少;VM-26单药处理后48 h,G1/G0、S期细胞减少,G2/M期细胞显著增加.结论:Taxol与VM-26单药均可抑制胃癌BGC-823细胞的生长,诱导细胞凋亡,联合用药对胃癌BGC-823细胞的生长抑制有拮抗作用.

  17. Development, management and economy of show caves.

    Directory of Open Access Journals (Sweden)

    Cigna Arrigo A.

    2000-01-01

    Full Text Available The problems concerning the development of show caves are here considered by taking into account different aspects of the problem. A procedure to carry out an Environmental Impact Assessment (EIA has been established in the last decade and it is now currently applied. Such an assessment starts with a pre-operational phase to obtain sufficient information on the undisturbed status of a cave to be developed into a show cave. Successively a programme for its development is established with the scope to optimise the intervention on the cave at the condition that its basic environmental parameters are not irreversibly modified. The last phase of the assessment is focussed to assure a feedback through a monitoring network in order to detect any unforeseen difference or anomaly between the project and the effective situation achieved after the cave development. Some data on some of the most important show caves in the world are reported and a tentative evaluation of the economy in connection with the show caves business is eventually made.

  18. Casimir experiments showing saturation effects

    CERN Document Server

    Sernelius, Bo E

    2009-01-01

    We address several different Casimir experiments where theory and experiment disagree. First out is the classical Casimir force measurement between two metal half spaces; here both in the form of the torsion pendulum experiment by Lamoreaux and in the form of the Casimir pressure measurement between a gold sphere and a gold plate as performed by Decca et al.; theory predicts a large negative thermal correction, absent in the high precision experiments. The third experiment is the measurement of the Casimir force between a metal plate and a laser irradiated semiconductor membrane as performed by Chen et al.; the change in force with laser intensity is larger than predicted by theory. The fourth experiment is the measurement of the Casimir force between an atom and a wall in the form of the measurement by Obrecht et al. of the change in oscillation frequency of a 87 Rb Bose-Einstein condensate trapped to a fused silica wall; the change is smaller than predicted by theory. We show that saturation effects can exp...

  19. Robustness of Interdependent Networks

    Science.gov (United States)

    Havlin, Shlomo

    2011-03-01

    In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This may happen recursively and can lead to a cascade of failures. In fact, a failure of a very small fraction of nodes in one network may lead to the complete fragmentation of a system of many interdependent networks. We will present a framework for understanding the robustness of interacting networks subject to such cascading failures and provide a basic analytic approach that may be useful in future studies. We present exact analytical solutions for the critical fraction of nodes that upon removal will lead to a failure cascade and to a complete fragmentation of two interdependent networks in a first order transition. Surprisingly, analyzing complex systems as a set of interdependent networks may alter a basic assumption that network theory has relied on: while for a single network a broader degree distribution of the network nodes results in the network being more robust to random failures, for interdependent networks, the broader the distribution is, the more vulnerable the networks become to random failure. We also show that reducing the coupling between the networks leads to a change from a first order percolation phase transition to a second order percolation transition at a critical point. These findings pose a significant challenge to the future design of robust networks that need to consider the unique properties of interdependent networks.

  20. Chaotic diagonal recurrent neural network

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos,and its structure andlearning algorithm are designed.The multilayer feedforward neural network,diagonal recurrent neural network,and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map.The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks.

  1. Network Cosmology

    CERN Document Server

    Krioukov, Dmitri; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguna, Marian

    2012-01-01

    Causal sets are an approach to quantum gravity in which the causal structure of spacetime plays a fundamental role. The causal set is a quantum network which underlies the fabric of spacetime. The nodes in this network are tiny quanta of spacetime, with two such quanta connected if they are causally related. Here we show that the structure of these networks in de Sitter spacetime, such as our accelerating universe, is remarkably similar to the structure of complex networks -- the brain or the Internet, for example. Specifically, we show that the node degree distribution of causal sets in de Sitter spacetime is described by a power law with exponent 2, similar to many complex networks. Quantifying the differences between the causal set structure in de Sitter spacetime and in the real universe, we find that since the universe today is relatively young, its power-law exponent is not 2 but 3/4, yet exponent 2 is currently emerging. Finally, we show that as a consequence of a simple geometric duality, the growth d...

  2. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter

    2011-01-01

    Sloep, P. B. (2011). Learning Networks, Networked Learning. Presentation at Annual Assembly of the European Society for the Systemic Innovation of Education - ESSIE. May, 27, 2011, Leuven, Belgium: Open University in the Netherlands.

  3. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  4. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  5. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  6. Network integration; Network integration

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-02-29

    Together with the rapid spread of information network, a shift is seen from the conventional original network to the system based on the standard network also in the monitoring/control field. In the network construction in the monitoring/control field, Meidensha uses internet/intranet technology and multimedia technology and is working on the construction of multimedia network into which sound/image/data are integrated. The paper indicates an example of constructing a large-scale network based on the ATM network constructed by the company and an example of constructing a network based on the Ethernet. The image system is coded/decoded by MPEG2 encoder/decoder and delivered by ATM switch. The sound system is connected to ATM network via CLAD and constructs PBX net. The data system which intercommunicates among terminals interconnects routers on ATM network using TCP/IP. Further, it copes with difficulties such as cable cut by making a detour for the ATM network. (translated by NEDO)

  7. Network observability transitions.

    Science.gov (United States)

    Yang, Yang; Wang, Jianhui; Motter, Adilson E

    2012-12-21

    In the modeling, monitoring, and control of complex networks, a fundamental problem concerns the comprehensive determination of the state of the system from limited measurements. Using power grids as example networks, we show that this problem leads to a new type of percolation transition, here termed a network observability transition, which we solve analytically for the configuration model. We also demonstrate a dual role of the network's community structure, which both facilitates optimal measurement placement and renders the networks substantially more sensitive to "observability attacks." Aside from their immediate implications for the development of smart grids, these results provide insights into decentralized biological, social, and technological networks.

  8. Software-defined optical network for metro-scale geographically distributed data centers.

    Science.gov (United States)

    Samadi, Payman; Wen, Ke; Xu, Junjie; Bergman, Keren

    2016-05-30

    The emergence of cloud computing and big data has rapidly increased the deployment of small and mid-sized data centers. Enterprises and cloud providers require an agile network among these data centers to empower application reliability and flexible scalability. We present a software-defined inter data center network to enable on-demand scale out of data centers on a metro-scale optical network. The architecture consists of a combined space/wavelength switching platform and a Software-Defined Networking (SDN) control plane equipped with a wavelength and routing assignment module. It enables establishing transparent and bandwidth-selective connections from L2/L3 switches, on-demand. The architecture is evaluated in a testbed consisting of 3 data centers, 5-25 km apart. We successfully demonstrated end-to-end bulk data transfer and Virtual Machine (VM) migrations across data centers with less than 100 ms connection setup time and close to full link capacity utilization.

  9. Emergent Complex Network Geometry

    CERN Document Server

    Wu, Zhihao; Rahmede, Christoph; Bianconi, Ginestra

    2014-01-01

    Networks are mathematical structures that are universally used to describe a large variety of complex systems such as the brain or the Internet. Characterizing the geometrical properties of these networks has become increasingly relevant for routing problems, inference and data mining. In real growing networks, topological, structural and geometrical properties emerge spontaneously from their dynamical rules. Nevertheless we still miss a model in which networks develop an emergent complex geometry. Here we show that a single two parameter network model, the growing geometrical network, can generate complex network geometries with non-trivial distribution of curvatures, combining exponential growth and small-world properties with finite spectral dimensionality. In one limit, the non-equilibrium dynamical rules of these networks can generate scale-free networks with clustering and communities, in another limit planar random geometries with non-trivial modularity. Finally we find that these properties of the geo...

  10. Weighted Multiplex Networks

    CERN Document Server

    Menichetti, Giulia; Panzarasa, Pietro; Mondragón, Raúl J; Bianconi, Ginestra

    2013-01-01

    One of the most important challenges in network science is to quantify the information encoded in complex network structures. Disentangling randomness from organizational principles is even more demanding when networks have a multiplex nature. Multiplex networks are multilayer systems of $N$ nodes that can be linked in multiple interacting and co-evolving layers. In these networks, relevant information might not be captured if the single layers were analyzed separately. Here we demonstrate that such partial analysis of layers fails to capture significant correlations between weights and topology of complex multiplex networks. To this end, we study two weighted multiplex co-authorship and citation networks involving the authors included in the American Physical Society. We show that in these networks weights are strongly correlated with multiplex structure, and provide empirical evidence in favor of the advantage of studying weighted measures of multiplex networks, such as multistrength and the inverse multipa...

  11. FOURNIER'S GANGRENE COMPLICATING VASECTOMY V.M. ...

    African Journals Online (AJOL)

    hi-tech

    2003-09-09

    Sep 9, 2003 ... The possible operational factors for the complications are explored and preventive ..... trauma, malignancy, malnutrition, renal failure, cortisone therapy, lupus ... second one depended on exogenous testosterone for "normal".

  12. Gradient networks

    Science.gov (United States)

    Toroczkai, Zoltán; Kozma, Balázs; Bassler, Kevin E.; Hengartner, N. W.; Korniss, G.

    2008-04-01

    Gradient networks are defined (Toroczkai and Bassler 2004 Nature 428 716) as directed graphs formed by local gradients of a scalar field distributed on the nodes of a substrate network G. We present the derivation for some of the general properties of gradient graphs and give an exact expression for the in-degree distribution R(l) of the gradient network when the substrate is a binomial (Erd{\\;\\kern -0.10em \\raise -0.35ex \\{{^{^{\\prime\\prime}}}}\\kern -0.57em \\o} s-Rényi) random graph, G_{N,p} , and the scalars are independent identically distributed (i.i.d.) random variables. We show that in the limit N \\to \\infty, p \\to 0, z = pN = \\mbox{const} \\gg 1, R(l)\\propto l^{-1} for l Bassler (2004 Nature 428 716).

  13. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  14. Forman curvature for directed networks

    CERN Document Server

    Sreejith, R P; Saucan, Emil; Samal, Areejit

    2016-01-01

    A goal in network science is the geometrical characterization of complex networks. In this direction, we have recently introduced the Forman's discretization of Ricci curvature to the realm of undirected networks. Investigation of Forman curvature in diverse model and real-world undirected networks revealed that this measure captures several aspects of the organization of complex undirected networks. However, many important real-world networks are inherently directed in nature, and the Forman curvature for undirected networks is unsuitable for analysis of such directed networks. Hence, we here extend the Forman curvature for undirected networks to the case of directed networks. The simple mathematical formula for the Forman curvature in directed networks elegantly incorporates node weights, edge weights and edge direction. By applying the Forman curvature for directed networks to a variety of model and real-world directed networks, we show that the measure can be used to characterize the structure of complex ...

  15. Fabrication of Triangular Nanobeam Waveguide Networks in Bulk diamond Using Single-Crystal Silicon Hard Masks

    CERN Document Server

    Bayn, I; Li, L; Goldstein, J A; Schröder, T; Zhang, J; Chen, E H; Gaathon, O; Lu, M; Stein, A; Ruggiero, C A; Salzman, J; Kalish, R; Englund, D

    2014-01-01

    A scalable approach for integrated photonic networks in single-crystal diamond using triangular etching of bulk samples is presented. We describe designs of high quality factor (Q=2.51x10^6) photonic crystal cavities with low mode volume (Vm=1.062x({\\lambda}/n)^3), which are connected via waveguides supported by suspension structures with predicted transmission loss of only 0.05 dB. We demonstrate the fabrication of these structures using transferred single-crystal silicon hard masks and angular dry etching, yielding photonic crystal cavities in the visible spectrum with measured quality factors in excess of Q=3x103.

  16. Influencia del tiempo de tratamiento de superficie con ácido fluorhídrico de la porcelana VITA VM 13 en la resistencia de unión a cemento de resina frente a fuerzas de tracción: Estudio in vitro Influence of surface treatment time with hydrofluoric acid of VITA VM13 porcelain on tensile bond strength to a luting resin cement: In vitro study

    Directory of Open Access Journals (Sweden)

    JP Guzmán Thoms

    2012-12-01

    Full Text Available Introducción: Los procedimientos restauradores indirectos son comunes en la clínica diaria actual. Se debe tener cuidado especial en la cementación, pues la gran mayoría de los fracasos ocurren en la interfase diente/restauración. Por esto es indispensable un adecuado tratamiento de superficie de la restauración para lograr una adhesión óptima a la superficie dentaria. Materiales y Métodos: Treinta cilindros de porcelana VITA VM 13 con dimensiones de 5 mm de altura y 7 mm de diámetro fueron separadas aleatoriamente en 3 grupos (n=10 de acuerdo con los tratamientos recibidos. Grupo I (control - sin acondicionamiento superficial; Grupo II - grabado con ácido fluorhídrico al 9.6% por 1 minuto; Grupo III - grabado con ácido fluorhídrico al 9.6% por 2 minutos. Estas fueron probadas en cuanto a su resistencia de unión a la tracción en una máquina universal para pruebas (INSTRON modelo 4411, 3M. Los valores, expresados en MPa, fueron analizados estadísticamente a un nivel de significación del 5%, usando el Análisis de la Varianza (ANOVA de un factor. Resultados: En relación con la prueba de resistencia de unión a la tracción, se encontraron los siguientes valores medios para cada grupo: Grupo I (control - x=3.35 MPa; Grupo II - x=4.64 MPa; Grupo III - x=3.80 MPa. Conclusiones: Según los resultados obtenidos, se puede concluir que el tratamiento de superficie con ácido fluorhídrico durante 1 minuto, promueve microrretenciones que aumentan significativamente los valores de resistencia a la tracción, que puede traducirse en un beneficio clínico mayor.Aim: Indirect restorative procedures are common in the current daily practice. Special care must be taken in the cement, as the vast majority of failures occurs at the interface tooth /restoration. Therefore a proper surface treatment of the restoration is essential to achieve optimum adhesion to the tooth surface. Materials and Methods: Thirty porcelain cylinders VITA VM 13 with

  17. GALVANIC CORROSION OF NICKEL ALLOY INCONEL 718 COUPLED WITH VM 80 SS STEEL IN A SIMULATED FORMATION WATER%镍基合金Inconel 718与抗硫油套管钢在模拟气田地层水中的电偶腐蚀

    Institute of Scientific and Technical Information of China (English)

    魏斌; 严密林; 白真权; 冯耀荣

    2007-01-01

    采用电化学方法研究了在模拟罗家寨气田地层水中镍基合金Inconel 718和抗硫管材VM80 SS之间的电偶腐蚀特征和电偶效应.结果表明,Inconel 718和VM80 SS的自腐蚀电位分别为-260 mV和-770 mV,当阴阳极面积比S=0.25,1,4,8时,电偶电位Eg处于-760 mV~-700 mV之间,随S增大,Eg正移,Ig/Aa的初始值、稳态值和平均值均增大;而Ig/Ac的初始值降低,稳态值变化不大.根据混合电位理论计算的VM80SS的电偶腐蚀效应γ随S增大而增大,γ=1.14~4.82.

  18. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  19. Identification of Topological Network Modules in Perturbed Protein Interaction Networks

    Science.gov (United States)

    Sardiu, Mihaela E.; Gilmore, Joshua M.; Groppe, Brad; Florens, Laurence; Washburn, Michael P.

    2017-01-01

    Biological networks consist of functional modules, however detecting and characterizing such modules in networks remains challenging. Perturbing networks is one strategy for identifying modules. Here we used an advanced mathematical approach named topological data analysis (TDA) to interrogate two perturbed networks. In one, we disrupted the S. cerevisiae INO80 protein interaction network by isolating complexes after protein complex components were deleted from the genome. In the second, we reanalyzed previously published data demonstrating the disruption of the human Sin3 network with a histone deacetylase inhibitor. Here we show that disrupted networks contained topological network modules (TNMs) with shared properties that mapped onto distinct locations in networks. We define TMNs as proteins that occupy close network positions depending on their coordinates in a topological space. TNMs provide new insight into networks by capturing proteins from different categories including proteins within a complex, proteins with shared biological functions, and proteins disrupted across networks. PMID:28272416

  20. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  1. Inferring Centrality from Network Snapshots

    OpenAIRE

    Haibin Shao; Mehran Mesbahi; Dewei Li; Yugeng Xi

    2017-01-01

    The topology and dynamics of a complex network shape its functionality. However, the topologies of many large-scale networks are either unavailable or incomplete. Without the explicit knowledge of network topology, we show how the data generated from the network dynamics can be utilised to infer the tempo centrality, which is proposed to quantify the influence of nodes in a consensus network. We show that the tempo centrality can be used to construct an accurate estimate of both the propagati...

  2. Robustness of airline route networks

    Science.gov (United States)

    Lordan, Oriol; Sallan, Jose M.; Escorihuela, Nuria; Gonzalez-Prieto, David

    2016-03-01

    Airlines shape their route network by defining their routes through supply and demand considerations, paying little attention to network performance indicators, such as network robustness. However, the collapse of an airline network can produce high financial costs for the airline and all its geographical area of influence. The aim of this study is to analyze the topology and robustness of the network route of airlines following Low Cost Carriers (LCCs) and Full Service Carriers (FSCs) business models. Results show that FSC hubs are more central than LCC bases in their route network. As a result, LCC route networks are more robust than FSC networks.

  3. Time and Citation Networks

    CERN Document Server

    Clough, James R

    2015-01-01

    Citation networks emerge from a number of different social systems, such as academia (from published papers), business (through patents) and law (through legal judgements). A citation represents a transfer of information, and so studying the structure of the citation network will help us understand how knowledge is passed on. What distinguishes citation networks from other networks is time; documents can only cite older documents. We propose that existing network measures do not take account of the strong constraint imposed by time. We will illustrate our approach with two types of causally aware analysis. We apply our methods to the citation networks formed by academic papers on the arXiv, to US patents and to US Supreme Court judgements. We show that our tools can reveal that citation networks which appear to have very similar structure by standard network measures turn out to have significantly different properties. We interpret our results as indicating that many papers in a bibliography were not directly...

  4. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network......The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  5. Vasculogenic mimicry:a novel target for glioma therapy

    Institute of Scientific and Technical Information of China (English)

    Yin-Sheng Chen; Zhong-Ping Chen

    2014-01-01

    Anti-angiogenic therapy has shown promising but insufficient efficacy on gliomas. Recent studies suggest that vasculogenic mimicry (VM), or the formation of non-endothelial, tumor-cel-lined microvascular channels, occurs in aggressive tumors, including gliomas. There is also evidence of a physiological connection between the endothelial-lined vasculature and VM channels. Tumor cels, by virtue of their high plasticity, can form vessel-like structures themselves, which may function as blood supply networks. Our previous study on gliomas showed that microvessel density was comparably less in VM-positive tumors than in VM-negative tumors. Thus, VM may act as a complement to ensure tumor blood supply, especialy in regions with less microvessel density. Patients with VM-positive gliomas survived a shorter period of time than did patients with VM-negative gliomas. Although the detailed molecular mechanisms for VM are not fuly understood, glioma stem cels might play a key role, since they are involved in tumor tissue remodeling and contribute to neovascularization via transdifferentiation. In the future, successful treatment of gliomas should involve targeting both VM and angiogenesis. In this review, we summarize the progress and chalenges of VM in gliomas.

  6. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  7. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  8. Opposing Effects of Intrinsic Conductance and Correlated Synaptic Input on V-Fluctuations during Network Activity

    DEFF Research Database (Denmark)

    Kolind, Jens; Hounsgaard, Jørn Dybkjær; Berg, Rune W

    2012-01-01

    Neurons often receive massive concurrent bombardment of synaptic inhibition and excitation during functional network activity. This increases membrane conductance and causes fluctuations in membrane potential (V(m)) and spike timing. The conductance increase is commonly attributed to synaptic...... conductance, but also includes the intrinsic conductances recruited during network activity. These two sources of conductance have contrasting dynamic properties at sub-threshold membrane potentials. Synaptic transmitter gated conductance changes abruptly and briefly with each presynaptic action potential....... If the spikes arrive at random times the changes in synaptic conductance are therefore stochastic and rapid during intense network activity. In comparison, sub-threshold intrinsic conductances vary smoothly in time. In the present study this discrepancy is investigated using two conductance-based models: a (1...

  9. Cheaters in mutualism networks.

    Science.gov (United States)

    Genini, Julieta; Morellato, L Patrícia C; Guimarães, Paulo R; Olesen, Jens M

    2010-08-23

    Mutualism-network studies assume that all interacting species are mutualistic partners and consider that all links are of one kind. However, the influence of different types of links, such as cheating links, on network organization remains unexplored. We studied two flower-visitation networks (Malpighiaceae and Bignoniaceae and their flower visitors), and divide the types of link into cheaters (i.e. robbers and thieves of flower rewards) and effective pollinators. We investigated if there were topological differences among networks with and without cheaters, especially with respect to nestedness and modularity. The Malpighiaceae network was nested, but not modular, and it was dominated by pollinators and had much fewer cheater species than Bignoniaceae network (28% versus 75%). The Bignoniaceae network was mainly a plant-cheater network, being modular because of the presence of pollen robbers and showing no nestedness. In the Malpighiaceae network, removal of cheaters had no major consequences for topology. In contrast, removal of cheaters broke down the modularity of the Bignoniaceae network. As cheaters are ubiquitous in all mutualisms, the results presented here show that they have a strong impact upon network topology.

  10. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  11. Dynamics of network motifs in genetic regulatory networks

    Institute of Scientific and Technical Information of China (English)

    Li Ying; Liu Zeng-Rong; Zhang Jian-Bao

    2007-01-01

    Network motifs hold a very important status in genetic regulatory networks. This paper aims to analyse the dynamical property of the network motifs in genetic regulatory networks. The main result we obtained is that the dynamical property of a single motif is very simple with only an asymptotically stable equilibrium point, but the combination of several motifs can make more complicated dynamical properties emerge such as limit cycles. The above-mentioned result shows that network motif is a stable substructure in genetic regulatory networks while their combinations make the genetic regulatory network more complicated.

  12. Scalable Virtual Network Mapping Algorithm for Internet-Scale Networks

    Science.gov (United States)

    Yang, Qiang; Wu, Chunming; Zhang, Min

    The proper allocation of network resources from a common physical substrate to a set of virtual networks (VNs) is one of the key technical challenges of network virtualization. While a variety of state-of-the-art algorithms have been proposed in an attempt to address this issue from different facets, the challenge still remains in the context of large-scale networks as the existing solutions mainly perform in a centralized manner which requires maintaining the overall and up-to-date information of the underlying substrate network. This implies the restricted scalability and computational efficiency when the network scale becomes large. This paper tackles the virtual network mapping problem and proposes a novel hierarchical algorithm in conjunction with a substrate network decomposition approach. By appropriately transforming the underlying substrate network into a collection of sub-networks, the hierarchical virtual network mapping algorithm can be carried out through a global virtual network mapping algorithm (GVNMA) and a local virtual network mapping algorithm (LVNMA) operated in the network central server and within individual sub-networks respectively with their cooperation and coordination as necessary. The proposed algorithm is assessed against the centralized approaches through a set of numerical simulation experiments for a range of network scenarios. The results show that the proposed hierarchical approach can be about 5-20 times faster for VN mapping tasks than conventional centralized approaches with acceptable communication overhead between GVNCA and LVNCA for all examined networks, whilst performs almost as well as the centralized solutions.

  13. Network Science

    Science.gov (United States)

    Barabási, Albert-László

    2016-07-01

    Preface; Personal introduction; 1. Introduction; 2. Graph theory; 3. Random networks; 4. The scale-free property; 5. The Barabási-Albert model; 6. Evolving networks; 7. Degree correlation; 8. Network robustness; 9. Communities; 10. Spreading phenomena; Index.

  14. QLab 3 show control projects for live performances & installations

    CERN Document Server

    Hopgood, Jeromy

    2013-01-01

    Used from Broadway to Britain's West End, QLab software is the tool of choice for many of the world's most prominent sound, projection, and integrated media designers. QLab 3 Show Control: Projects for Live Performances & Installations is a project-based book on QLab software covering sound, video, and show control. With information on both sound and video system basics and the more advanced functions of QLab such as MIDI show control, new OSC capabilities, networking, video effects, and microphone integration, each chapter's specific projects will allow you to learn the software's capabilitie

  15. Brief encounter networks

    CERN Document Server

    Kostakos, Vassilis; Penn, Alan

    2007-01-01

    Many complex human and natural phenomena can usefully be represented as networks describing the relationships between individuals. While these relationships are typically intermittent, previous research has used network representations that aggregate the relationships at discrete intervals. However, such an aggregation discards important temporal information, thus inhibiting our understanding of the networks dynamic behaviour and evolution. We have recorded patterns of human urban encounter using Bluetooth technology thus retaining the temporal properties of this network. Here we show how this temporal information influences the structural properties of the network. We show that the temporal properties of human urban encounter are scale-free, leading to an overwhelming proportion of brief encounters between individuals. While previous research has shown preferential attachment to result in scale-free connectivity in aggregated network data, we found that scale-free connectivity results from the temporal prope...

  16. Folksodriven Structure Network

    CERN Document Server

    Mas, Massimiliano Dal

    2011-01-01

    Nowadays folksonomy is used as a system derived from user-generated electronic tags or keywords that annotate and describe online content. But it is not a classification system as an ontology. To consider it as a classification system it would be necessary to share a representation of contexts by all the users. This paper is proposing the use of folksonomies and network theory to devise a new concept: a "Folksodriven Structure Network" to represent folksonomies. This paper proposed and analyzed the network structure of Folksodriven tags thought as folsksonomy tags suggestions for the user on a dataset built on chosen websites. It is observed that the Folksodriven Network has relative low path lengths checking it with classic networking measures (clustering coefficient). Experiment result shows it can facilitate serendipitous discovery of content among users. Neat examples and clear formulas can show how a "Folksodriven Structure Network" can be used to tackle ontology mapping challenges.

  17. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  18. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  19. Affinity driven social networks

    Science.gov (United States)

    Ruyú, B.; Kuperman, M. N.

    2007-04-01

    In this work we present a model for evolving networks, where the driven force is related to the social affinity between individuals of a population. In the model, a set of individuals initially arranged on a regular ordered network and thus linked with their closest neighbors are allowed to rearrange their connections according to a dynamics closely related to that of the stable marriage problem. We show that the behavior of some topological properties of the resulting networks follows a non trivial pattern.

  20. Global Networks of Expertise

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    to global networks of expertise through alumni network structures created in the 1960s. One significant and often overlooked outcome of technical assistance and overseas capacity development programs is the inclusion of experts from the south. The paper shows how the Japanese bilateral programs adapted...... the multilateral framework initiated in the 1950s to make networks of expertise global by enabling South-South and South-North connections....

  1. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  2. Exploring network organization in practice

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    that there are different logical considerations when designing a network organization to facilitate innovation. I identify three types of network organizations: market-led, directed and culture-led network organizations. Different types of network organizations show that organizations are dual and even ternary systems......Constructing a network organization for global R&D is presented as a common sense practice in existing literature. However, there are still queries about the network organization, such as the persistence of hierarchies which make a network organization merely a “bureaucracy-lite” organization....... Furthermore, in practice, we rarely see radical organizational change towards a network organization that adopts an internal market. The co-existence of market, hierarchy and network triggered research interest. A multiple case study of three transnational corporations’ global R&D organization shows...

  3. CNEM: Cluster Based Network Evolution Model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2015-01-01

    Full Text Available This paper presents a network evolution model, which is based on the clustering approach. The proposed approach depicts the network evolution, which demonstrates the network formation from individual nodes to fully evolved network. An agglomerative hierarchical clustering method is applied for the evolution of network. In the paper, we present three case studies which show the evolution of the networks from the scratch. These case studies include: terrorist network of 9/11 incidents, terrorist network of WMD (Weapons Mass Destruction plot against France and a network of tweets discussing a topic. The network of 9/11 is also used for evaluation, using other social network analysis methods which show that the clusters created using the proposed model of network evolution are of good quality, thus the proposed method can be used by law enforcement agencies in order to further investigate the criminal networks

  4. Green networking

    CERN Document Server

    Krief, Francine

    2012-01-01

    This book focuses on green networking, which is an important topic for the scientific community composed of engineers, academics, researchers and industrialists working in the networking field. Reducing the environmental impact of the communications infrastructure has become essential with the ever increasing cost of energy and the need for reducing global CO2 emissions to protect our environment.Recent advances and future directions in green networking are presented in this book, including energy efficient networks (wired networks, wireless networks, mobile networks), adaptive networ

  5. Quantitative Efficiency Evaluation Method for Transportation Networks

    Directory of Open Access Journals (Sweden)

    Jin Qin

    2014-11-01

    Full Text Available An effective evaluation of transportation network efficiency/performance is essential to the establishment of sustainable development in any transportation system. Based on a redefinition of transportation network efficiency, a quantitative efficiency evaluation method for transportation network is proposed, which could reflect the effects of network structure, traffic demands, travel choice, and travel costs on network efficiency. Furthermore, the efficiency-oriented importance measure for network components is presented, which can be used to help engineers identify the critical nodes and links in the network. The numerical examples show that, compared with existing efficiency evaluation methods, the network efficiency value calculated by the method proposed in this paper can portray the real operation situation of the transportation network as well as the effects of main factors on network efficiency. We also find that the network efficiency and the importance values of the network components both are functions of demands and network structure in the transportation network.

  6. Network Infrastructure Security

    CERN Document Server

    Wong, Angus

    2009-01-01

    Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. This book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions

  7. Online Networking Site

    Institute of Scientific and Technical Information of China (English)

    杨淑恬

    2011-01-01

    @@ According to surveies of what users do on the Internet, it shows that Internet usage falls into four main categories; information, entertainment,social networking,and business.I decided to de- velop an ultimate social networking website that can include all this functions.

  8. Sonet Network Design Problems

    CERN Document Server

    Pelleau, Marie; Truchet, Charlotte

    2009-01-01

    This paper presents a new method and a constraint-based objective function to solve two problems related to the design of optical telecommunication networks, namely the Synchronous Optical Network Ring Assignment Problem (SRAP) and the Intra-ring Synchronous Optical Network Design Problem (IDP). These network topology problems can be represented as a graph partitioning with capacity constraints as shown in previous works. We present here a new objective function and a new local search algorithm to solve these problems. Experiments conducted in Comet allow us to compare our method to previous ones and show that we obtain better results.

  9. Sonet Network Design Problems

    Directory of Open Access Journals (Sweden)

    Marie Pelleau

    2009-10-01

    Full Text Available This paper presents a new method and a constraint-based objective function to solve two problems related to the design of optical telecommunication networks, namely the Synchronous Optical Network Ring Assignment Problem (SRAP and the Intra-ring Synchronous Optical Network Design Problem (IDP. These network topology problems can be represented as a graph partitioning with capacity constraints as shown in previous works. We present here a new objective function and a new local search algorithm to solve these problems. Experiments conducted in Comet allow us to compare our method to previous ones and show that we obtain better results.

  10. Network Monitoring with Nagios

    CERN Document Server

    Dondich, Taylor

    2006-01-01

    Network monitoring can be a complex task to implement and maintain in your IT infrastructure. Nagios, an open-source host, service and network monitoring program can help you streamline your network monitoring tasks and reduce the cost of operation.With this shortcut guide, we'll go over how Nagios fits in the overall network monitoring puzzle. We'll also cover installation and basic usage. Finally, we'll show you how to extend Nagios with other tools to extend functionality.

  11. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  12. Lifetime maximization routing with network coding in wireless multihop networks

    Institute of Scientific and Technical Information of China (English)

    DING LiangHui; WU Ping; WANG Hao; PAN ZhiWen; YOU XiaoHu

    2013-01-01

    In this paper, we consider the lifetime maximization routing with network coding in wireless mul- tihop networks. We first show that lifetime maximization with network coding is different from pure routing, throughput maximization with network coding and energy minimization with network coding. Then we formulate lifetime maximization problems in three different cases of (i) no network coding, (ii) two-way network coding, and (iii) overhearing network coding. To solve these problems, we use flow augmenting routing (FA) for the first case, and then extend the FA with network coding (FANC) by using energy minimized one-hop network coding. After that, we investigate the influence of parameters of FANC, evaluate the performance of FANC with two-way and overhearing network coding schemes and compare it with that without network coding under two different power control models, namely, protocol and physical ones. The results show that the lifetime can be improved significantly by using network coding, and the performance gain of network coding decreases with the increase of flow asymmetry and the power control ability.

  13. Heterogeneous Economic Networks

    CERN Document Server

    Souma, W; Aoyama, H; Souma, Wataru; Fujiwara, Yoshi; Aoyama, Hideaki

    2005-01-01

    The Japanese shareholding network at the end of March 2002 is studied. To understand the characteristics of this network intuitively, we visualize it as a directed graph and an adjacency matrix. Especially detailed features of networks concerned with the automobile industry sector are discussed by using the visualized networks. The shareholding network is also considered as an undirected graph, because many quantities characterizing networks are defined for undirected cases. For this undirected shareholding network, we show that a degree distribution is well fitted by a power law function with an exponential tail. The exponent in the power law range is gamma=1.8. We also show that the spectrum of this network follows asymptotically the power law distribution with the exponent delta=2.6. By comparison with gamma and delta, we find a scaling relation delta=2gamma-1. The reason why this relation holds is attributed to the local tree-like structure of networks. To clarify this structure, the correlation between d...

  14. Measuring Political Polarization: Twitter shows the two sides of Venezuela

    CERN Document Server

    Morales, A J; Losada, J C; Benito, R M

    2015-01-01

    We say that a population is perfectly polarized when divided in two groups of the same size and opposite opinions. In this paper, we propose a methodology to study and measure the emergence of polarization from social interactions. We begin by proposing a model to estimate opinions in which a minority of influential individuals propagate their opinions through a social network. The result of the model is an opinion probability density function. Next, we propose an index to quantify the extent to which the resulting distribution is polarized. Finally, we apply the proposed methodology to a Twitter conversation about the late Venezuelan president, Hugo Ch\\'avez, finding a good agreement between our results and offline data. Hence, we show that our methodology can detect different degrees of polarization, depending on the structure of the network.

  15. Measuring political polarization: Twitter shows the two sides of Venezuela

    Science.gov (United States)

    Morales, A. J.; Borondo, J.; Losada, J. C.; Benito, R. M.

    2015-03-01

    We say that a population is perfectly polarized when divided in two groups of the same size and opposite opinions. In this paper, we propose a methodology to study and measure the emergence of polarization from social interactions. We begin by proposing a model to estimate opinions in which a minority of influential individuals propagate their opinions through a social network. The result of the model is an opinion probability density function. Next, we propose an index to quantify the extent to which the resulting distribution is polarized. Finally, we apply the proposed methodology to a Twitter conversation about the late Venezuelan president, Hugo Chávez, finding a good agreement between our results and offline data. Hence, we show that our methodology can detect different degrees of polarization, depending on the structure of the network.

  16. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  17. Cellular phone network and health: a pilot study. Design and first results; Mobilfunk und Befinden - eine Pilotstudie. Design und erste Ergebnisse

    Energy Technology Data Exchange (ETDEWEB)

    Spegel, H.; Meyer, N.; Ehrenstein, V.; Heinrich, S.; Schulze, A.; Klein, J.; Praml, G.; Nowak, D.; Radon, K. [Inst. und Poliklinik fuer Arbeits- und Umweltmedizin der Ludwig-Maximilians-Univ., Arbeitsgruppe Arbeits- und Umweltepidemiologie und NetTeaching, Muenchen (Germany); Brix, J. [Bayerisches Staatsministerium fuer Umwelt, Gesundheit und Verbraucherschutz, Muenchen (Germany); Kries, R. von [Inst. fuer Sozialpaediatrie und Jugendmedizin, der Ludwig-Maximilians-Univ., Muenchen (Germany)

    2006-07-01

    Background: we designed a cross-sectional population-based pilot study of possible acute health effects of cellular phone networks. We aimed to examine feasibility of such a study in the field and to assess adequacy of personal dosimetry. Methods: using personal dosimeters, we obtained a 24-hour exposure profile for each study participant. Exposure to frequencies within the mobile communication range (D-net, E-net, universal mobile telecommunications system (UMTS), and wireless local area networks (WLAN)) was measured and recorded every second. Simultaneously we used computer assisted personal interview (CAPI) to collect data on participants' symptoms, socio-demographic characteristics, and potential confounders. The initial results are now available for 42 children (ages 8-12 years), 57 adolescents (ages 13-17 years), and 64 adults (ages 18-65 years), all of them residents of Munich, Germany. Results: personal dosimetry proved to be an adequate and well accepted instrument for the use in the field. The duration of the cumulative exposure to all frequencies in excess of 0.1 V/m ranged from 0.1 to 96.5% of the 24-hour period, and the median daily duration across all age groups was 4.1%. The exposure was dominated by frequencies in the D-net range. Fatigue was the most prevalent symptom, reported by 47% of the children and adolescents and by 44% of the adults. Conclusions: this pilot study shows that both design and the questionnaire instrument are adequate for use in epidemiologic studies of association between exposure to high-frequency electromagnetic fields and health. Personal dosimeters have been optimised and fine-tuned through continuous use. The association between the exposure and health can now be further assessed in a dedicated study. (orig.)

  18. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  19. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  20. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  1. The robustness and restoration of a network of ecological networks.

    Science.gov (United States)

    Pocock, Michael J O; Evans, Darren M; Memmott, Jane

    2012-02-24

    Understanding species' interactions and the robustness of interaction networks to species loss is essential to understand the effects of species' declines and extinctions. In most studies, different types of networks (such as food webs, parasitoid webs, seed dispersal networks, and pollination networks) have been studied separately. We sampled such multiple networks simultaneously in an agroecosystem. We show that the networks varied in their robustness; networks including pollinators appeared to be particularly fragile. We show that, overall, networks did not strongly covary in their robustness, which suggests that ecological restoration (for example, through agri-environment schemes) benefitting one functional group will not inevitably benefit others. Some individual plant species were disproportionately well linked to many other species. This type of information can be used in restoration management, because it identifies the plant taxa that can potentially lead to disproportionate gains in biodiversity.

  2. Failure of classical traffic and transportation theory: The maximization of the network throughput maintaining free flow conditions in network

    CERN Document Server

    Kerner, Boris S

    2016-01-01

    We show that the minimization of travel times in a network as generally accepted in classical traffic and transportation theories deteriorates the traffic system through a considerable increase in the probability of traffic breakdown in the network. We introduce a network characteristic {\\it minimum network capacity} that shows that rather than the minimization of travel times in the network, the minimization of the probability of traffic breakdown in the network maximizes the network throughput at which free flow persists in the whole network.

  3. Hybrid Noncoherent Network Coding

    CERN Document Server

    Skachek, Vitaly; Nedic, Angelia

    2011-01-01

    We describe a novel extension of subspace codes for noncoherent networks, suitable for use when the network is viewed as a communication system that introduces both dimension and symbol errors. We show that when symbol erasures occur in a significantly large number of different basis vectors transmitted through the network and when the min-cut of the networks is much smaller then the length of the transmitted codewords, the new family of codes outperforms their subspace code counterparts. For the proposed coding scheme, termed hybrid network coding, we derive two upper bounds on the size of the codes. These bounds represent a variation of the Singleton and of the sphere-packing bound. We show that a simple concatenated scheme that represents a combination of subspace codes and Reed-Solomon codes is asymptotically optimal with respect to the Singleton bound. Finally, we describe two efficient decoding algorithms for concatenated subspace codes that in certain cases have smaller complexity than subspace decoder...

  4. Synthesis of Reliable Telecommunication Networks

    Directory of Open Access Journals (Sweden)

    Dusan Trstensky

    2005-01-01

    Full Text Available In many application, the network designer may to know to senthesise a reliable telecommunication network. Assume that a network, denoted Gm,e has the number of nodes n and the number of edges e, and the operational probability of each edge is known. The system reliability of the network is defined to be the reliability that every pair of nodes can communicate with each other. A network synthesis problem considered in this paper is to find a network G*n,e, that maximises system reliability over the class of all networks for the classes of networks Gn,n-1, Gn,m and Gn,n+1 respectively. In addition an upper bound of maximum reliability for the networks with n-node and e-edge (e>n+2 is derived in terms of node. Computational experiments for the reliability upper are also presented. the results show, that the proposed reliability upper bound is effective.

  5. Quartets and unrooted phylogenetic networks.

    Science.gov (United States)

    Gambette, Philippe; Berry, Vincent; Paul, Christophe

    2012-08-01

    Phylogenetic networks were introduced to describe evolution in the presence of exchanges of genetic material between coexisting species or individuals. Split networks in particular were introduced as a special kind of abstract network to visualize conflicts between phylogenetic trees which may correspond to such exchanges. More recently, methods were designed to reconstruct explicit phylogenetic networks (whose vertices can be interpreted as biological events) from triplet data. In this article, we link abstract and explicit networks through their combinatorial properties, by introducing the unrooted analog of level-k networks. In particular, we give an equivalence theorem between circular split systems and unrooted level-1 networks. We also show how to adapt to quartets some existing results on triplets, in order to reconstruct unrooted level-k phylogenetic networks. These results give an interesting perspective on the combinatorics of phylogenetic networks and also raise algorithmic and combinatorial questions.

  6. QUEUEING NETWORKS WITH INSTANTANEOUSSEQUENTIAL TRANSITIONS

    Institute of Scientific and Technical Information of China (English)

    Chao Xiuli

    2001-01-01

    We study queueing networks with instantaneous transitions of sequential batch departures and sequential batch arrivals. Unlike most of the existing models, this network is shown not to have a product form solution. An "extra arrival condition” is introduced under which the network is shown to possess a product form stationary distribution. Furthermore, the product form solution serves as a stochastic upper bound for the original network without the extra arrival process. The results include many queueing network models reported in the literature, e.g. the assembly transfer networks recently introduced by Miyazawa and Taylor, as special cases. We show that the network with the extra arrival process is "structurally reversible” in the sense that its reversed process has the same network structure. Local balances for this network are presented and discussed.

  7. Graph distance for complex networks

    Science.gov (United States)

    Shimada, Yutaka; Hirata, Yoshito; Ikeguchi, Tohru; Aihara, Kazuyuki

    2016-10-01

    Networks are widely used as a tool for describing diverse real complex systems and have been successfully applied to many fields. The distance between networks is one of the most fundamental concepts for properly classifying real networks, detecting temporal changes in network structures, and effectively predicting their temporal evolution. However, this distance has rarely been discussed in the theory of complex networks. Here, we propose a graph distance between networks based on a Laplacian matrix that reflects the structural and dynamical properties of networked dynamical systems. Our results indicate that the Laplacian-based graph distance effectively quantifies the structural difference between complex networks. We further show that our approach successfully elucidates the temporal properties underlying temporal networks observed in the context of face-to-face human interactions.

  8. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  9. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  10. Using RDF to describe networks

    NARCIS (Netherlands)

    Ham, J.J. van der; Dijkstra, F.; Travostino, F.; Andree, H.M.A.; Laat, C.T.A.M. de

    2006-01-01

    Conventions such as iGrid 2005 and SuperComputing show that there is increasing demand for more service options on networks. For such networks, large teams of experts are needed to configure and manage them. In order to make the full potential of hybrid networks available to the ordinary user, the c

  11. Communication in Animal Social Networks

    NARCIS (Netherlands)

    Snijders, Lysanne; Naguib, Marc

    2017-01-01

    Animal social networks and animal communication networks are key disciplines for understanding animal social behavior, yet these disciplines remain poorly integrated. In this review, we show how communication and social networks are inherently linked, with social signals reflecting and affecting

  12. Inferring Centrality from Network Snapshots

    Science.gov (United States)

    Shao, Haibin; Mesbahi, Mehran; Li, Dewei; Xi, Yugeng

    2017-01-01

    The topology and dynamics of a complex network shape its functionality. However, the topologies of many large-scale networks are either unavailable or incomplete. Without the explicit knowledge of network topology, we show how the data generated from the network dynamics can be utilised to infer the tempo centrality, which is proposed to quantify the influence of nodes in a consensus network. We show that the tempo centrality can be used to construct an accurate estimate of both the propagation rate of influence exerted on consensus networks and the Kirchhoff index of the underlying graph. Moreover, the tempo centrality also encodes the disturbance rejection of nodes in a consensus network. Our findings provide an approach to infer the performance of a consensus network from its temporal data. PMID:28098166

  13. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  14. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani;

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage...... buffering, scheduling, and processing over the network. On the other hand, NC has shown great potential for increasing robustness and performance when deployed on intermediate nodes in the network. This new paradigm changes the dynamics of network protocols, requiring new designs that exploit its potential....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  15. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter;

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987...... components in some detail. The egonets of three of the original 'founding fathers' are examined in detail, and we draw comparisons as to how their publishing strategies vary. Finally, the paper draws some more general conclusions as to the insights that SNA can bring to those working within business-to-business...... marketing....

  16. NASA Integrated Network COOP

    Science.gov (United States)

    Anderson, Michael L.; Wright, Nathaniel; Tai, Wallace

    2012-01-01

    Natural disasters, terrorist attacks, civil unrest, and other events have the potential of disrupting mission-essential operations in any space communications network. NASA's Space Communications and Navigation office (SCaN) is in the process of studying options for integrating the three existing NASA network elements, the Deep Space Network, the Near Earth Network, and the Space Network, into a single integrated network with common services and interfaces. The need to maintain Continuity of Operations (COOP) after a disastrous event has a direct impact on the future network design and operations concepts. The SCaN Integrated Network will provide support to a variety of user missions. The missions have diverse requirements and include anything from earth based platforms to planetary missions and rovers. It is presumed that an integrated network, with common interfaces and processes, provides an inherent advantage to COOP in that multiple elements and networks can provide cross-support in a seamless manner. The results of trade studies support this assumption but also show that centralization as a means of achieving integration can result in single points of failure that must be mitigated. The cost to provide this mitigation can be substantial. In support of this effort, the team evaluated the current approaches to COOP, developed multiple potential approaches to COOP in a future integrated network, evaluated the interdependencies of the various approaches to the various network control and operations options, and did a best value assessment of the options. The paper will describe the trade space, the study methods, and results of the study.

  17. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks......This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...

  18. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  19. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  20. Network neuroscience.

    Science.gov (United States)

    Bassett, Danielle S; Sporns, Olaf

    2017-02-23

    Despite substantial recent progress, our understanding of the principles and mechanisms underlying complex brain function and cognition remains incomplete. Network neuroscience proposes to tackle these enduring challenges. Approaching brain structure and function from an explicitly integrative perspective, network neuroscience pursues new ways to map, record, analyze and model the elements and interactions of neurobiological systems. Two parallel trends drive the approach: the availability of new empirical tools to create comprehensive maps and record dynamic patterns among molecules, neurons, brain areas and social systems; and the theoretical framework and computational tools of modern network science. The convergence of empirical and computational advances opens new frontiers of scientific inquiry, including network dynamics, manipulation and control of brain networks, and integration of network processes across spatiotemporal domains. We review emerging trends in network neuroscience and attempt to chart a path toward a better understanding of the brain as a multiscale networked system.

  1. Networked and Distributed Predictive Control

    CERN Document Server

    Christofides, Panagiotis D; De La Pena, David Munoz

    2011-01-01

    "Networked and Distributed Predictive Control" presents rigorous, yet practical, methods for the design of networked and distributed predictive control systems - the first book to do so. The design of model predictive control systems using Lyapunov-based techniques accounting for the influence of asynchronous and delayed measurements is followed by a treatment of networked control architecture development. This shows how networked control can augment dedicated control systems in a natural way and takes advantage of additional, potentially asynchronous and delayed measurements to main

  2. Structural complexity of quantum networks

    Energy Technology Data Exchange (ETDEWEB)

    Siomau, Michael [Physics Department, Jazan University, P.O.Box 114, 45142 Jazan (Saudi Arabia); Network Dynamics, Max Planck Institute for Dynamics and Self-Organization (MPIDS), 37077 Göttingen (Germany)

    2016-06-10

    Quantum network is a set of nodes connected with channels, through which the nodes communicate photons and classical information. Classical structural complexity of a quantum network may be defined through its physical structure, i.e. mutual position of nodes and channels connecting them. We show here that the classical structural complexity of a quantum network does not restrict the structural complexity of entanglement graphs, which may be created in the quantum network with local operations and classical communication. We show, in particular, that 1D quantum network can simulate both simple entanglement graphs such as lattices and random graphs and complex small-world graphs.

  3. Network science.

    Science.gov (United States)

    Barabási, Albert-László

    2013-03-28

    Professor Barabási's talk described how the tools of network science can help understand the Web's structure, development and weaknesses. The Web is an information network, in which the nodes are documents (at the time of writing over one trillion of them), connected by links. Other well-known network structures include the Internet, a physical network where the nodes are routers and the links are physical connections, and organizations, where the nodes are people and the links represent communications.

  4. Network class superposition analyses.

    Directory of Open Access Journals (Sweden)

    Carl A B Pearson

    Full Text Available Networks are often used to understand a whole system by modeling the interactions among its pieces. Examples include biomolecules in a cell interacting to provide some primary function, or species in an environment forming a stable community. However, these interactions are often unknown; instead, the pieces' dynamic states are known, and network structure must be inferred. Because observed function may be explained by many different networks (e.g., ≈ 10(30 for the yeast cell cycle process, considering dynamics beyond this primary function means picking a single network or suitable sample: measuring over all networks exhibiting the primary function is computationally infeasible. We circumvent that obstacle by calculating the network class ensemble. We represent the ensemble by a stochastic matrix T, which is a transition-by-transition superposition of the system dynamics for each member of the class. We present concrete results for T derived from boolean time series dynamics on networks obeying the Strong Inhibition rule, by applying T to several traditional questions about network dynamics. We show that the distribution of the number of point attractors can be accurately estimated with T. We show how to generate Derrida plots based on T. We show that T-based Shannon entropy outperforms other methods at selecting experiments to further narrow the network structure. We also outline an experimental test of predictions based on T. We motivate all of these results in terms of a popular molecular biology boolean network model for the yeast cell cycle, but the methods and analyses we introduce are general. We conclude with open questions for T, for example, application to other models, computational considerations when scaling up to larger systems, and other potential analyses.

  5. Fabrics China Creation Show Hold in Shanghai

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    @@ On August 5-6th.the 3rd Fabrics China Creation Show(one series events of Reach & Touch),organized by China National Textile & Apparel Council and National Textile Development Center,was held in Shanghai,aiming to providing textile producers and designers a platform to show their inspirations and creative ideas in fabric design.

  6. Serving Up Activities for TV Cooking Shows.

    Science.gov (United States)

    Katchen, Johanna E.

    This paper documents a presentation given on the use of English-language television cooking shows in English-as-a-Second-Language (ESL) and English-as-a-Foreign-Language (EFL) classrooms in Taiwan. Such shows can be ideal for classroom use, since they have a predictable structure consisting of short segments, are of interest to most students,…

  7. RNA-seq analysis of apical meristem reveals integrative regulatory network of ROS and chilling potentially related to flowering in Litchi chinensis.

    Science.gov (United States)

    Lu, Xingyu; Li, Jingjing; Chen, Houbin; Hu, Jiaqi; Liu, Pengxu; Zhou, Biyan

    2017-08-31

    Litchi is an important woody fruit tree. Floral initiation in litchi is triggered by low temperatures. However, defective flowering is a major challenge for litchi production in times of climate change and global warming. Previous studies have shown that the reactive oxygen species (ROS) generated by methyl viologen dichloride hydrate (MV) promotes flowering. In this study, potted trees were transferred to growth chambers for low-temperature (LT), medium-temperature (MT), and high-temperature (HT) treatments. Trees at MT were subjected to ROS treatment to promote flowering, and those at LT were induced to flower. RNA-sequencing was applied to obtain a global transcriptome of the apical meristem and reveal potential gene networks controlling the transformation from vegetative meristems (VM) into inflorescence meristems (IM). We assembled 73,117 unigenes with a mean size of 790 bp and 11741 unigenes were identified as both chilling and ROS responsive genes (CRRGs), of which 48 were identified as flowering-related CRRGs, 59 were plant hormone signal transduction CRRGs, and 146 were plant hormone biosynthesis-related CRRGs. Genes co-expression network analysis indicated inner relationships, suggesting that ROS and chilling promotes the VM to IM transition through a regulatory gene network of transcription factors, hormones, and flowering regulators.

  8. Voyeurismo Televisivo, Reality Shows e Brasilidade Televisiva

    Directory of Open Access Journals (Sweden)

    Suzana Kilpp

    2008-12-01

    Full Text Available In the last years we watched a boom of reality shows in the media and also in the academic production specialized in this subject. It remains, however, a epistemological gap related to the aesthetic and techniques (which are related to the televisions grammars that TV uses in these programs to enunciate ethics directions to its own voyeurism, that goes far beyond reality shows, having repercussions on social imaginary of transparency and surveillance, and the redesign of public and private spaces. In this gap, the article points out the debate of Brazilian reality shows in the perspective of the televisions grammars.

  9. Resource-constrained maximum network throughput on space networks

    Institute of Scientific and Technical Information of China (English)

    Yanling Xing; Ning Ge; Youzheng Wang

    2015-01-01

    This paper investigates the maximum network through-put for resource-constrained space networks based on the delay and disruption-tolerant networking (DTN) architecture. Specifical y, this paper proposes a methodology for calculating the maximum network throughput of multiple transmission tasks under storage and delay constraints over a space network. A mixed-integer linear programming (MILP) is formulated to solve this problem. Simula-tions results show that the proposed methodology can successful y calculate the optimal throughput of a space network under storage and delay constraints, as wel as a clear, monotonic relationship between end-to-end delay and the maximum network throughput under storage constraints. At the same time, the optimization re-sults shine light on the routing and transport protocol design in space communication, which can be used to obtain the optimal network throughput.

  10. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  11. Fecal Transplant Shows Early Promise Against Autism

    Science.gov (United States)

    ... 163263.html Fecal Transplant Shows Early Promise Against Autism Small study found giving healthy gut bacteria to ... study suggests a novel treatment for kids with autism: Give these young patients a fresh supply of ...

  12. Poverty Harder on Women's Hearts, Research Shows

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_163168.html Poverty Harder on Women's Hearts, Research Shows Poor females ... reduce the burden of cardiovascular disease around the world," Peters said. The study findings were published online ...

  13. Diabetes Drug Shows Promise Against Parkinson's

    Science.gov (United States)

    ... fullstory_167612.html Diabetes Drug Shows Promise Against Parkinson's Byetta improved symptoms of motor disease in small, ... may do double duty as a treatment for Parkinson's disease, a new study suggests. "This is a ...

  14. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  15. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  16. Fabrics China Creation Show Held in Shanghai

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    On August 5-6th,the 3rd Fabrics China Creation Show (one series events of Reach & Touch),organized by China National Textile & Apparel Council and National Textile Development Center,was held in Shanghai,

  17. Voyeurismo Televisivo, Reality Shows e Brasilidade Televisiva

    OpenAIRE

    Suzana Kilpp

    2008-01-01

    In the last years we watched a boom of reality shows in the media and also in the academic production specialized in this subject. It remains, however, a epistemological gap related to the aesthetic and techniques (which are related to the televisions grammars) that TV uses in these programs to enunciate ethics directions to its own voyeurism, that goes far beyond reality shows, having repercussions on social imaginary of transparency and surveillance, and the redesign of public and private s...

  18. On Network Functional Compression

    CERN Document Server

    Feizi, Soheil

    2010-01-01

    In this paper, we consider different aspects of the network functional compression problem where computation of a function (or, some functions) of sources located at certain nodes in a network is desired at receiver(s). The rate region of this problem has been considered in the literature under certain restrictive assumptions, particularly in terms of the network topology, the functions and the characteristics of the sources. In this paper, we present results that significantly relax these assumptions. Firstly, we consider this problem for an arbitrary tree network and asymptotically lossless computation. We show that, for depth one trees with correlated sources, or for general trees with independent sources, a modularized coding scheme based on graph colorings and Slepian-Wolf compression performs arbitrarily closely to rate lower bounds. For a general tree network with independent sources, optimal computation to be performed at intermediate nodes is derived. We introduce a necessary and sufficient condition...

  19. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  20. Sensor Network Motes:

    DEFF Research Database (Denmark)

    Leopold, Martin

    This dissertation describes our efforts to improve sensor network performance evaluation and portability, within the context of the sensor network project Hogthrob. In Hogthrob, we faced the challenge of building an sensor network architecture for sow monitoring. This application has hard...... requirements on price and performance, and shows great potential for using sensor networks. Throughout the project we let the application requirements guide our design choices, leading us to push the technologies further to meet the specific goal of the application. In this dissertation, we attack two key...... to investigate these challenges and apart from developing the methodologies, we also present the results of our experiments. In particular, we present a new vector based methodology for performance evaluation of sensor network devices (motes) and applications, based on application specific benchmarking...

  1. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  2. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  3. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  4. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage buffe...

  5. Networks model of the East Turkistan terrorism

    Science.gov (United States)

    Li, Ben-xian; Zhu, Jun-fang; Wang, Shun-guo

    2015-02-01

    The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis is adopted to reveal the network type and the network structure characteristics. We also find the crucial terrorist leader. Ultimately, some results show that the East Turkistan network has big hub nodes and small shortest path, and that the network follows a pattern of small world network with hierarchical structure.

  6. Finding communities in sparse networks

    CERN Document Server

    Singh, Abhinav

    2015-01-01

    Spectral algorithms based on matrix representations of networks are often used to detect communities but classic spectral methods based on the adjacency matrix and its variants fail to detect communities in sparse networks. New spectral methods based on non-backtracking random walks have recently been introduced that successfully detect communities in many sparse networks. However, the spectrum of non-backtracking random walks ignores hanging trees in networks that can contain information about the community structure of networks. We introduce the reluctant backtracking operators that explicitly account for hanging trees as they admit a small probability of returning to the immediately previous node unlike the non-backtracking operators that forbid an immediate return. We show that the reluctant backtracking operators can detect communities in certain sparse networks where the non-backtracking operators cannot while performing comparably on benchmark stochastic block model networks and real world networks. We...

  7. Binary Error Correcting Network Codes

    CERN Document Server

    Wang, Qiwen; Li, Shuo-Yen Robert

    2011-01-01

    We consider network coding for networks experiencing worst-case bit-flip errors, and argue that this is a reasonable model for highly dynamic wireless network transmissions. We demonstrate that in this setup prior network error-correcting schemes can be arbitrarily far from achieving the optimal network throughput. We propose a new metric for errors under this model. Using this metric, we prove a new Hamming-type upper bound on the network capacity. We also show a commensurate lower bound based on GV-type codes that can be used for error-correction. The codes used to attain the lower bound are non-coherent (do not require prior knowledge of network topology). The end-to-end nature of our design enables our codes to be overlaid on classical distributed random linear network codes. Further, we free internal nodes from having to implement potentially computationally intensive link-by-link error-correction.

  8. Active Versus Passive Academic Networking

    DEFF Research Database (Denmark)

    Goel, Rajeev K.; Grimpe, Christoph

    2013-01-01

    This paper examines determinants of networking by academics. Using information from a unique large survey of German researchers, the key contribution focuses on the active versus passive networking distinction. Is active networking by researchers a substitute or a complement to passive networking......? Other contributions include examining the role of geographic factors in networking and whether research bottlenecks affect a researcher's propensity to network. Are the determinants of European conference participation by German researchers different from conferences in rest of the world? Results show...... that some types of passive academic networking are complementary to active networking, while others are substitute. Further, we find differences in factors promoting participation in European conferences versus conferences in rest of the world. Finally, publishing bottlenecks as a group generally do...

  9. Online Italian fandoms of American TV shows

    Directory of Open Access Journals (Sweden)

    Eleonora Benecchi

    2015-06-01

    Full Text Available The Internet has changed media fandom in two main ways: it helps fans connect with each other despite physical distance, leading to the formation of international fan communities; and it helps fans connect with the creators of the TV show, deepening the relationship between TV producers and international fandoms. To assess whether Italian fan communities active online are indeed part of transnational online communities and whether the Internet has actually altered their relationship with the creators of the original text they are devoted to, qualitative analysis and narrative interviews of 26 Italian fans of American TV shows were conducted to explore the fan-producer relationship. Results indicated that the online Italian fans surveyed preferred to stay local, rather than using geography-leveling online tools. Further, the sampled Italian fans' relationships with the show runners were mediated or even absent.

  10. 2008 LHC Open Days Physics: the show

    CERN Document Server

    2008-01-01

    A host of events and activities await visitors to the LHC Open Days on 5 and 6 April. A highlight will be the physics shows funded by the European Physical Society (EPS), which are set to surprise and challenge children and adults alike! School children use their experience of riding a bicycle to understand how planets move around the sun (Copyright : Circus Naturally) Participating in the Circus Naturally show could leave a strange taste in your mouth! (Copyright : Circus Naturally) The Rino Foundation’s experiments with liquid nitrogen can be pretty exciting! (Copyright: The Rino Foundation)What does a bicycle have in common with the solar system? Have you ever tried to weigh air or visualise sound? Ever heard of a vacuum bazooka? If you want to discover the answers to these questions and more then come to the Physics Shows taking place at the CERN O...

  11. A balanced memory network.

    Directory of Open Access Journals (Sweden)

    Yasser Roudi

    2007-09-01

    Full Text Available A fundamental problem in neuroscience is understanding how working memory--the ability to store information at intermediate timescales, like tens of seconds--is implemented in realistic neuronal networks. The most likely candidate mechanism is the attractor network, and a great deal of effort has gone toward investigating it theoretically. Yet, despite almost a quarter century of intense work, attractor networks are not fully understood. In particular, there are still two unanswered questions. First, how is it that attractor networks exhibit irregular firing, as is observed experimentally during working memory tasks? And second, how many memories can be stored under biologically realistic conditions? Here we answer both questions by studying an attractor neural network in which inhibition and excitation balance each other. Using mean-field analysis, we derive a three-variable description of attractor networks. From this description it follows that irregular firing can exist only if the number of neurons involved in a memory is large. The same mean-field analysis also shows that the number of memories that can be stored in a network scales with the number of excitatory connections, a result that has been suggested for simple models but never shown for realistic ones. Both of these predictions are verified using simulations with large networks of spiking neurons.

  12. Optimal Phase Oscillatory Network

    Science.gov (United States)

    Follmann, Rosangela

    2013-03-01

    Important topics as preventive detection of epidemics, collective self-organization, information flow and systemic robustness in clusters are typical examples of processes that can be studied in the context of the theory of complex networks. It is an emerging theory in a field, which has recently attracted much interest, involving the synchronization of dynamical systems associated to nodes, or vertices, of the network. Studies have shown that synchronization in oscillatory networks depends not only on the individual dynamics of each element, but also on the combination of the topology of the connections as well as on the properties of the interactions of these elements. Moreover, the response of the network to small damages, caused at strategic points, can enhance the global performance of the whole network. In this presentation we explore an optimal phase oscillatory network altered by an additional term in the coupling function. The application to associative-memory network shows improvement on the correct information retrieval as well as increase of the storage capacity. The inclusion of some small deviations on the nodes, when solutions are attracted to a false state, results in additional enhancement of the performance of the associative-memory network. Supported by FAPESP - Sao Paulo Research Foundation, grant number 2012/12555-4

  13. Liquid Crystal Research Shows Deformation By Drying

    Science.gov (United States)

    2003-01-01

    These images, from David Weitz's liquid crystal research, show ordered uniform sized droplets (upper left) before they are dried from their solution. After the droplets are dried (upper right), they are viewed with crossed polarizers that show the deformation caused by drying, a process that orients the bipolar structure of the liquid crystal within the droplets. When an electric field is applied to the dried droplets (lower left), and then increased (lower right), the liquid crystal within the droplets switches its alignment, thereby reducing the amount of light that can be scattered by the droplets when a beam is shone through them.

  14. Toward Sustainable Networking: Storage Area Networks with Network Coding

    CERN Document Server

    Ferner, Ulric J; Soljanin, Emina

    2012-01-01

    This manuscript provides a model to characterize the energy savings of network coded storage (NCS) in storage area networks (SANs). We consider blocking probability of drives as our measure of performance. A mapping technique to analyze SANs as independent M/G/K/K queues is presented, and blocking probabilities for uncoded storage schemes and NCS are derived and compared. We show that coding operates differently than the amalgamation of file chunks and energy savings are shown to scale well with striping number. We illustrate that for enterprise-level SANs energy savings of 20-50% can be realized.

  15. A Talk Show from the Past.

    Science.gov (United States)

    Gallagher, Arlene F.

    1991-01-01

    Describes a two-day activity in which elementary students examine voting rights, the right to assemble, and women's suffrage. Explains the game, "Assemble, Reassemble," and a student-produced talk show with five students playing the roles of leaders of the women's suffrage movement. Profiles Elizabeth Cady Stanton, Lucretia Mott, Susan…

  16. The Last Great American Picture Show

    NARCIS (Netherlands)

    Elsaesser, Thomas; King, Noel; Horwath, Alexander

    2004-01-01

    The Last Great American Picture Show brings together essays by scholars and writers who chart the changing evaluations of the American cinema of the 1970s, sometimes referred to as the decade of the lost generation, but now more and more recognized as the first New Hollywood, without which the cinem

  17. Gene Therapy Shows Promise for Aggressive Lymphoma

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_163824.html Gene Therapy Shows Promise for Aggressive Lymphoma Over one-third ... TUESDAY, Feb. 28, 2017 (HealthDay News) -- An experimental gene therapy for aggressive non-Hodgkin lymphoma beat back more ...

  18. Show Them You Really Want the Job

    Science.gov (United States)

    Perlmutter, David D.

    2012-01-01

    Showing that one really "wants" the job entails more than just really wanting the job. An interview is part Broadway casting call, part intellectual dating game, part personality test, and part, well, job interview. When there are 300 applicants for a position, many of them will "fit" the required (and even the preferred) skills listed in the job…

  19. TV-Show Retrieval and Classification

    NARCIS (Netherlands)

    Musto, C.; Narducci, F.; Lops, P.; Semeraro G.; Gemmis, M. de; Barbieri, M.; Korst, J.H.M.; Pronk, S.P.P.; Clout, R.A.W.

    2012-01-01

    Recommender systems are becoming popular tools to aid users in finding interesting and relevant TV-shows and other digital video assets,based on implicitly learned user preferences. In this context, a common assumption is that user preferences can be specified by program types (movie, sports, ...) a

  20. The British Show in Australia, 1985

    Directory of Open Access Journals (Sweden)

    Anthony Bond

    2016-07-01

    Full Text Available In 1984–85, The British Show, an exhibition largely made up of New British Sculpture, was curated for Australia and New Zealand. This essay discusses the context and effects of the exhibition on art in Australia. It also seeks to define the sources of originality and innovation of the artists included.

  1. Laser entertainment and light shows in education

    Science.gov (United States)

    Sabaratnam, Andrew T.; Symons, Charles

    2002-05-01

    Laser shows and beam effects have been a source of entertainment since its first public performance May 9, 1969, at Mills College in Oakland, California. Since 1997, the Photonics Center, NgeeAnn Polytechnic, Singapore, has been using laser shows as a teaching tool. Students are able to exhibit their creative skills and learn at the same time how lasers are used in the entertainment industry. Students will acquire a number of skills including handling three- phase power supply, operation of cooling system, and laser alignment. Students also acquire an appreciation of the arts, learning about shapes and contours as they develop graphics for the shows. After holography, laser show animation provides a combination of the arts and technology. This paper aims to briefly describe how a krypton-argon laser, galvanometer scanners, a polychromatic acousto-optic modulator and related electronics are put together to develop a laser projector. The paper also describes how students are trained to make their own laser animation and beam effects with music, and at the same time have an appreciation of the operation of a Class IV laser and the handling of optical components.

  2. Random Boolean network models and the yeast transcriptional network

    Science.gov (United States)

    Kauffman, Stuart; Peterson, Carsten; Samuelsson, Björn; Troein, Carl

    2003-12-01

    The recently measured yeast transcriptional network is analyzed in terms of simplified Boolean network models, with the aim of determining feasible rule structures, given the requirement of stable solutions of the generated Boolean networks. We find that for ensembles of generated models, those with canalyzing Boolean rules are remarkably stable, whereas those with random Boolean rules are only marginally stable. Furthermore, substantial parts of the generated networks are frozen, in the sense that they reach the same state regardless of initial state. Thus, our ensemble approach suggests that the yeast network shows highly ordered dynamics.

  3. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm....... The inherent flexibility of both SDN and NC provides fertile ground to envision more efficient, robust, and secure networking designs, which may also incorporate content caching and storage, all of which are key challenges of the upcoming 5G networks. This article not only proposes the fundamentals...

  4. Thermodynamics of random reaction networks.

    Directory of Open Access Journals (Sweden)

    Jakob Fischer

    Full Text Available Reaction networks are useful for analyzing reaction systems occurring in chemistry, systems biology, or Earth system science. Despite the importance of thermodynamic disequilibrium for many of those systems, the general thermodynamic properties of reaction networks are poorly understood. To circumvent the problem of sparse thermodynamic data, we generate artificial reaction networks and investigate their non-equilibrium steady state for various boundary fluxes. We generate linear and nonlinear networks using four different complex network models (Erdős-Rényi, Barabási-Albert, Watts-Strogatz, Pan-Sinha and compare their topological properties with real reaction networks. For similar boundary conditions the steady state flow through the linear networks is about one order of magnitude higher than the flow through comparable nonlinear networks. In all networks, the flow decreases with the distance between the inflow and outflow boundary species, with Watts-Strogatz networks showing a significantly smaller slope compared to the three other network types. The distribution of entropy production of the individual reactions inside the network follows a power law in the intermediate region with an exponent of circa -1.5 for linear and -1.66 for nonlinear networks. An elevated entropy production rate is found in reactions associated with weakly connected species. This effect is stronger in nonlinear networks than in the linear ones. Increasing the flow through the nonlinear networks also increases the number of cycles and leads to a narrower distribution of chemical potentials. We conclude that the relation between distribution of dissipation, network topology and strength of disequilibrium is nontrivial and can be studied systematically by artificial reaction networks.

  5. Global Networks of Expertise

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    and experts dispatched from the countries supplying foreign aid, this article focuses on professionals and experts originating in developing countries. The main argument is that the overseas training programs financed partly or completely by Japanese ODA have provided experts from developing countries access...... to global networks of expertise through alumni network structures created in the 1960s. One significant and often overlooked outcome of technical assistance and overseas capacity development programs is the inclusion of experts from the south. The paper shows how the Japanese bilateral programs adapted...... the multilateral framework initiated in the 1950s to make networks of expertise global by enabling South-South and South-North connections....

  6. Global Alumni Networks

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    2015-01-01

    One significant and often overlooked outcome of technical assistance and overseas capacity development programmes is the inclusion of experts from developing countries in epistemic communities. The main argument of this article is that the formal network structure offered to alumni of Japanese...... technical assistance and capacity development programmes have provided experts from developing countries access to epistemic communities since the early 1960s. This exploration of an alternative way of understanding capacity development programmes shows how alumni have made the networks global by using...... the Japanese network structure responding to the multilateral UNEPTA framework, which enables South-South and South-North connections....

  7. La mujer, en los talk shows

    Directory of Open Access Journals (Sweden)

    Antrop. José Gamboa Cetina

    2001-01-01

    Full Text Available Dentro de los medios de comunicación, uno de los que más ha impactado a la población latinoamericana ha sido la televisión, y en la barra programática de las televisoras ha surgido un tipo de programas denominados talk shows. En los últimos meses, la sociedad mexicana ha vivido el "boom" de los talk shows, que en poco tiempo han saturado la barra de la programación vespertina de las dos principales empresas televisivas de la república mexicana. Este fenómeno puede estudiarse desde diversas perspectivas. Sin embargo, por motivos de espacio, en esta ocasión analizaremos su impacto en las mujeres, desde diferentes dimensiones.

  8. 2009 Hands Across Pacific Show Held

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    <正>The 2009 Hands Across the Pacific Show co-sponsored by the Canadian International Cultural Exchanges (CICEX) and Hunan Provincial People’s Association for Friendship with Foreign Countries(HPPAFFC) was held respectively in the Tower Hall of Tokyo,Japan from July 2 to 7 and in the Hunan Provincial Museum from August 1 to 5.Jing Dunquan,Vice President of the

  9. The People's Show: A Critical Analysis

    OpenAIRE

    Robin Francis

    1996-01-01

    The 1990s heralded a new form of museum exhibition: "The People's Show." A light-hearted celebration of popular culture, the concept has had phenomenal success throughout the United Kingdom. Beneath the humour, however, are more complex and radical agendas relating to cultural rights. The paper explores the issues associated with the rise and possible wane of this museum-based popular cultural phenomenon.

  10. Research on Evolutionary Mechanism of Agile Supply Chain Network via Complex Network Theory

    Directory of Open Access Journals (Sweden)

    Nai-Ru Xu

    2016-01-01

    Full Text Available The paper establishes the evolutionary mechanism model of agile supply chain network by means of complex network theory which can be used to describe the growth process of the agile supply chain network and analyze the complexity of the agile supply chain network. After introducing the process and the suitability of taking complex network theory into supply chain network research, the paper applies complex network theory into the agile supply chain network research, analyzes the complexity of agile supply chain network, presents the evolutionary mechanism of agile supply chain network based on complex network theory, and uses Matlab to simulate degree distribution, average path length, clustering coefficient, and node betweenness. Simulation results show that the evolution result displays the scale-free property. It lays the foundations of further research on agile supply chain network based on complex network theory.

  11. Reality, ficción o show

    Directory of Open Access Journals (Sweden)

    Sandra Ruíz Moreno

    2002-01-01

    Full Text Available Para tener un punto de vista claro y objetivo frente a la polémica establecida en torno al programa “Protagonistas de novela” y la tendiente proliferación de los reality show en las parrillas de programación de la televisión colombiana, se realizó un análisis de texto y contenido de dicho programa, intentando definirlo desde sus posibilidades de realidad, ficción y show. Las unidades de análisis y el estudio de su tratamiento arrojaron un alto contenido que gira en torno a las emociones del ser humano relacionadas con la convivencia, tratadas a manera de show y con algunos aportes textuales de ficción, pero sin su elemento mediador básico, el actor, quitándole toda la posibilidad de tener un tratamiento con la profundidad, distancia y ética que requieren los temas de esta índole. El resultado es un formato que sólo busca altos índices de sintonía y que pertenece más a la denominada televisión “trash”, que a una búsqueda de realidad del hombre y mucho menos de sociedad.

  12. Analysing degeneracies in networks spectra

    CERN Document Server

    Marrec, Loïc

    2016-01-01

    Many real-world networks exhibit a high degeneracy at few eigenvalues. We show that a simple transformation of the network's adjacency matrix provides an understanding of? the origins of occurrence of high multiplicities in the networks spectra. We find that the eigenvectors associated with the degenerate eigenvalues shed light on the structures contributing to the degeneracy. Since these degeneracies are rarely observed in model graphs, we present results for various cancer networks. This approach gives an opportunity to search for structures contributing to degeneracy which might have an important role in a network.

  13. Gossip algorithms in quantum networks

    Science.gov (United States)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up - in the best case exponentially - the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication.

  14. The Social Networks of Innovation

    DEFF Research Database (Denmark)

    Björk, Jennie; Bergenholtz, Carsten; Magnusson, Mats

    It is a well-known fact in the innovation management literature that social network structures both constrain and facilitate ideation activities within firm boundaries. Still, recent research shows how the impact of social network structures varies across different contexts, depending e......) the characteristics of individuals involved in the given ideation process and 3) the social network activities of these individuals. The dependent variables are based on the idea level. Our research objective is two-fold: We explore how different kinds of social networks develop around varying idea categories...... and explain how particular social network structures facilitate some ideas to fare more successfully than others....

  15. Tensor networks for dynamic spacetimes

    CERN Document Server

    May, Alex

    2016-01-01

    Existing tensor network models of holography are limited to representing the geometry of constant time slices of static spacetimes. We study the possibility of describing the geometry of a dynamic spacetime using tensor networks. We find it is necessary to give a new definition of length in the network, and propose a definition based on the mutual information. We show that by associating a set of networks with a single quantum state and making use of the mutual information based definition of length, a network analogue of the maximin formula can be used to calculate the entropy of boundary regions.

  16. The Social Networks of Innovation

    DEFF Research Database (Denmark)

    Björk, Jennie; Bergenholtz, Carsten; Magnusson, Mats

    It is a well-known fact in the innovation management literature that social network structures both constrain and facilitate ideation activities within firm boundaries. Still, recent research shows how the impact of social network structures varies across different contexts, depending e......) the characteristics of individuals involved in the given ideation process and 3) the social network activities of these individuals. The dependent variables are based on the idea level. Our research objective is two-fold: We explore how different kinds of social networks develop around varying idea categories...... and explain how particular social network structures facilitate some ideas to fare more successfully than others....

  17. Multilayer Networks

    CERN Document Server

    Kivelä, Mikko; Barthelemy, Marc; Gleeson, James P; Moreno, Yamir; Porter, Mason A

    2013-01-01

    Most real and engineered systems include multiple subsystems and layers of connectivity, and it is important to take such features into account to try to obtain a complete understanding of these systems. It is thus necessary to generalize "traditional" network theory by developing (and validating) a framework and associated tools to study multilayer systems in a comprehensive fashion. The origins of such efforts occurred several decades ago, but now the study of multilayer networks has become one of the major directions in network science. In this paper, we discuss the history of multilayer networks (and related concepts) and then review the exploding body of work on such networks. To unify the disparate terminology in the large body of recent work, we discuss a general framework for multilayer networks, construct a dictionary of terminology to relate the numerous existing concepts to each other, and provide a thorough discussion that compares, contrasts, and translates between related notions such as multila...

  18. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    , etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part......In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control...

  19. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  20. Centrality Measures in Networks

    CERN Document Server

    Bloch, Francis; Tebaldi, Pietro

    2016-01-01

    We show that although the prominent centrality measures in network analysis make use of different information about nodes' positions, they all process that information in an identical way: they all spring from a common family that are characterized by the same simple axioms. In particular, they are all based on a monotonic and additively separable treatment of a statistic that captures a node's position in the network.

  1. Network and adaptive sampling

    CERN Document Server

    Chaudhuri, Arijit

    2014-01-01

    Combining the two statistical techniques of network sampling and adaptive sampling, this book illustrates the advantages of using them in tandem to effectively capture sparsely located elements in unknown pockets. It shows how network sampling is a reliable guide in capturing inaccessible entities through linked auxiliaries. The text also explores how adaptive sampling is strengthened in information content through subsidiary sampling with devices to mitigate unmanageable expanding sample sizes. Empirical data illustrates the applicability of both methods.

  2. On Minimal Constraint Networks

    CERN Document Server

    Gottlob, Georg

    2011-01-01

    In a minimal binary constraint network, every tuple of a constraint relation can be extended to a solution. It was conjectured that computing a solution to such a network is NP complete. We prove this conjecture true and show that the problem remains NP hard even in case the total domain of all values that may appear in the constraint relations is bounded by a constant.

  3. Nanostructured cellular networks.

    Science.gov (United States)

    Moriarty, P; Taylor, M D R; Brust, M

    2002-12-01

    Au nanocrystals spin-coated onto silicon from toluene form cellular networks. A quantitative statistical crystallography analysis shows that intercellular correlations drive the networks far from statistical equilibrium. Spin-coating from hexane does not produce cellular structure, yet a strong correlation is retained in the positions of nanocrystal aggregates. Mechanisms based on Marangoni convection alone cannot account for the variety of patterns observed, and we argue that spinodal decomposition plays an important role in foam formation.

  4. Cognitive networks achieve throughput scaling of a homogeneous network

    CERN Document Server

    Jeon, Sang-Woon; Vu, Mai; Chung, Sae-Young; Tarokh, Vahid

    2008-01-01

    We study two distinct, but overlapping networks which operate at the same time, space and frequency. The first network consists of $n$ randomly distributed \\emph{primary users} which form either an ad hoc network, or an infrastructure-supported ad hoc network in which $l$ additional base stations support the primary users. The second network consists of $m$ randomly distributed \\emph{cognitive} users for both cases. The primary users have priority access to the spectrum and do not change their communication protocol in the presence of secondary users. The secondary network, however, needs to adjust its protocol based on knowledge about the locations of the primary nodes so as not to harm the primary network's scaling law. With the help of percolation theory, we show that surprisingly, when the secondary network is denser than the primary network, \\emph{both} networks can \\emph{simultaneously} achieve the same throughput-scaling law as a stand-alone ad hoc network. Specifically, for the ad hoc model we show th...

  5. Network Kriging

    OpenAIRE

    Chua, David B.; Kolaczyk, Eric D.; Crovella, Mark

    2005-01-01

    Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide measures can be difficult, due to the issues of scale involved. In particular, the number of paths grows too rapidly with the number of endpoints to make exhaustive measurement practical. As a result, it is of interest to explore the feasibility of methods that dramatically reduce the number of paths measured in such situati...

  6. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  7. Network medicine

    DEFF Research Database (Denmark)

    Pawson, Tony; Linding, Rune

    2008-01-01

    for new therapeutic intervention. We argue that by targeting the architecture of aberrant signaling networks associated with cancer and other diseases new therapeutic strategies can be implemented. Transforming medicine into a network driven endeavour will require quantitative measurements of cell...... signaling processes; we will describe how this may be performed and combined with new algorithms to predict the trajectories taken by a cellular system either in time or through disease states. We term this approach, network medicine....

  8. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence ...... the organizational forms discussed in the paper. It is asserted that the underlying organizational phenomena are not changing but that the manifestations and representations are shifting due to technological developments.......The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  9. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  10. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  11. Bite my art to show your love

    OpenAIRE

    Kim, Hye yeon

    2012-01-01

    Two years ago, I came to the States for MFA program in UCSD. At first, I started making instructions for performance to communicate with people in my clumsy English, but it soon became my general process of working. In this show, I present a room surrounded by five video projections and drawings. They are documentation of performances concerning the balance of relationship. I performed two with Josh Aaron, other two with Josh Tonies, and one by myself. The performance done by myself reveals t...

  12. Showing and Saying. An Aesthetic Difference

    Directory of Open Access Journals (Sweden)

    Vicente Sanfélix Vidarte

    2013-05-01

    Full Text Available Wittgenstein’s distinction between saying and showing and the associated thesis, what can be shown cannot be said, were crucial to his first philosophy, persisted throughout the evolution of his whole thought and played a key role in his views on aesthetics. The objective of art is access to the mystical, forcing us to become aware of the uniqueness of our own experience and life. When art is good is a perfect expression and the work of art becomes like a tautology. An important consequence of this understanding of art is the irreducibility of the aesthetic to the scientific perspective.

  13. Latest European coelacanth shows Gondwanan affinities.

    Science.gov (United States)

    Cavin, Lionel; Forey, Peter L; Buffetaut, Eric; Tong, Haiyan

    2005-06-22

    The last European fossil occurrence of a coelacanth is from the Mid-Cretaceous of the English Chalk (Turonian, 90 million years ago). Here, we report the discovery of a coelacanth from Late Cretaceous non-marine rocks in southern France. It consists of a left angular bone showing structures that imply close phylogenetic affinities with some extinct Mawsoniidae. The closest relatives are otherwise known from Cretaceous continental deposits of southern continents and suggest that the dispersal of freshwater organisms from Africa to Europe occurred in the Late Cretaceous.

  14. Sparsity Methods for Networked Control

    OpenAIRE

    Nagahara, Masaaki

    2014-01-01

    In this presentation, we introduce sparsity methods for networked control systems and show the effectiveness of sparse control. In networked control, efficient data transmission is important since transmission delay and error can critically deteriorate the stability and performance. We will show that this problem is solved by sparse control designed by recent sparse optimization methods.

  15. Energy Landscape of Cellular Networks

    Science.gov (United States)

    Wang, Jin

    2008-03-01

    Cellular Networks are in general quite robust and perform their biological functions against the environmental perturbations. Progresses have been made from experimental global screenings, topological and engineering studies. However, there are so far few studies of why the network should be robust and perform biological functions from global physical perspectives. In this work, we will explore the global properties of the network from physical perspectives. The aim of this work is to develop a conceptual framework and quantitative physical methods to study the global nature of the cellular network. The main conclusion of this presentation is that we uncovered the underlying energy landscape for several small cellular networks such as MAPK signal transduction network and gene regulatory networks, from the experimentally measured or inferred inherent chemical reaction rates. The underlying dynamics of these networks can show bi-stable as well as oscillatory behavior. The global shapes of the energy landscapes of the underlying cellular networks we have studied are robust against perturbations of the kinetic rates and environmental disturbances through noise. We derived a quantitative criterion for robustness of the network function from the underlying landscape. It provides a natural explanation of the robustness and stability of the network for performing biological functions. We believe the robust landscape is a global universal property for cellular networks. We believe the robust landscape is a quantitative realization of Darwinian principle of natural selection at the cellular network level. It may provide a novel algorithm for optimizing the network connections, which is crucial for the cellular network design and synthetic biology. Our approach is general and can be applied to other cellular networks.

  16. Figure of Beijing ABP Showing up

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Last year, there were many good news from Beijing Advanced Business Park(ABP): on October 29, 2005, Xu Weiping, Chairman of the Board of ABP, was chosen as the"2005 Ten Major Chinese Administrative Person in News";On November 8,2005,CCIM (American Certified Commercial Investment Member) invited 40 world famous real estate investors to visit ABS and they showed will to cooperate; On November 22, 2005, Johnson Controls, Inc., one of World Top 500, signed the contract with Zhongguan Village Fengtai Garden that the headquarter of JCI energy administration China Branch will move to ABP to improve the energy administration and radiate all the nation; on December 10,2005, "CEO Salon" co-organized by Phoenix Satellite Television and ABP, was held in the meeting room of ABP, over 120CEOs met here to discuss the trend of China economic development and the development opportunities brought by 11th Five-Year Plan for enterprises.

  17. Lemurs and macaques show similar numerical sensitivity

    Science.gov (United States)

    Jones, Sarah M.; Pearson, John; DeWind, Nicholas K.; Paulsen, David; Tenekedjieva, Ana-Maria; Brannon, Elizabeth M.

    2013-01-01

    We investigated the precision of the approximate number system (ANS) in three lemur species (Lemur catta, Eulemur mongoz, and Eulemur macaco flavifrons), one Old World monkey species (Macaca mulatta) and humans (Homo sapiens). In Experiment 1, four individuals of each nonhuman primate species were trained to select the numerically larger of two visual arrays on a touchscreen. We estimated numerical acuity by modeling Weber fractions (w) and found quantitatively equivalent performance among all four nonhuman primate species. In Experiment 2, we tested adult humans in a similar procedure, and they outperformed the four nonhuman species but showed qualitatively similar performance. These results indicate that the ANS is conserved over the primate order. PMID:24068469

  18. Star Shows It Has The Right Stuff

    Science.gov (United States)

    2004-01-01

    Astronomers have used an observation by NASA's Chandra X-ray Observatory to make the best case yet that a star can be engulfed by its companion star and survive. This discovery will help astronomers better understand how closely coupled stars, and perhaps even stars and planets, evolve when one of the stars expands enormously in its red giant phase. The binary star system known as V471 Tauri comprises a white dwarf star (the primary) in a close orbit -- one thirtieth of the distance between Mercury and the Sun -- with a normal Sun-like star (the secondary). Chandra's data showed that the hot upper atmosphere of the secondary star has a deficit of carbon atoms relative to nitrogen atoms. "This deficit of carbon atoms is the first clear observational evidence that the normal star was engulfed by its companion in the past," according to Jeremy Drake of the Smithsonian Astrophysical Observatory in Cambridge, MA, who coauthored an article on V471 in The Astrophysical Journal Letters with Marek Sarna of the N. Copernicus Astronomical Center in Poland. The white dwarf star was once a star several times as massive as the Sun. Nuclear fusion reactions in the core of such a star convert carbon into nitrogen over a period of about a billion years. When the fuel in the core of the star is exhausted, the core collapses, triggering more energetic nuclear reactions that cause the star to expand and transform into a red giant before eventually collapsing to become a white dwarf. The carbon-poor material in the core of the red giant is mixed with outer part of the star, so its atmosphere shows a deficit of carbon, as compared with Sun-like stars. The X-ray spectra of a red giant star (top panel) and a Sun-like star (bottom panel) show the large difference in the peaks due to carbon atoms in the two stars. Theoretical calculations indicate that a red giant in a binary system can completely envelop its companion star and dramatically affect its evolution. During this common envelope

  19. Ancient bacteria show evidence of DNA repair

    DEFF Research Database (Denmark)

    Johnson, Sarah Stewart; Hebsgaard, Martin B; Christensen, Torben R

    2007-01-01

    Recent claims of cultivable ancient bacteria within sealed environments highlight our limited understanding of the mechanisms behind long-term cell survival. It remains unclear how dormancy, a favored explanation for extended cellular persistence, can cope with spontaneous genomic decay over......-term survival of bacteria sealed in frozen conditions for up to one million years. Our results show evidence of bacterial survival in samples up to half a million years in age, making this the oldest independently authenticated DNA to date obtained from viable cells. Additionally, we find strong evidence...... that this long-term survival is closely tied to cellular metabolic activity and DNA repair that over time proves to be superior to dormancy as a mechanism in sustaining bacteria viability....

  20. Sensitive dependence of network dynamics on network structure

    CERN Document Server

    Nishikawa, Takashi; Motter, Adilson E

    2016-01-01

    The relation between network structure and dynamics is determinant for the behavior of complex systems in numerous domains. An important longstanding problem concerns the properties of the networks that optimize the dynamics with respect to a given performance measure. Here we show that such optimization can lead to sensitive dependence of the dynamics on the structure of the network. Specifically, we demonstrate that the stability of the dynamical state, as determined by the maximum Lyapunov exponent, can exhibit a cusp-like dependence on the number of nodes and links as well as on the size of perturbations applied to the network structure. As mechanisms underlying this sensitivity, we identify discontinuous transitions occurring in the complement of optimal networks and the prevalence of eigenvector degeneracy in these networks. These findings establish a unified characterization of networks optimized for dynamical stability in diffusively coupled systems, which we illustrate using Turing instability in act...

  1. Automated drawing of network plots in network meta-analysis.

    Science.gov (United States)

    Rücker, Gerta; Schwarzer, Guido

    2016-03-01

    In systematic reviews based on network meta-analysis, the network structure should be visualized. Network plots often have been drawn by hand using generic graphical software. A typical way of drawing networks, also implemented in statistical software for network meta-analysis, is a circular representation, often with many crossing lines. We use methods from graph theory in order to generate network plots in an automated way. We give a number of requirements for graph drawing and present an algorithm that fits prespecified ideal distances between the nodes representing the treatments. The method was implemented in the function netgraph of the R package netmeta and applied to a number of networks from the literature. We show that graph representations with a small number of crossing lines are often preferable to circular representations.

  2. When business networks “kill” social networks

    DEFF Research Database (Denmark)

    Jackson, Laurel; Young, L.

    2016-01-01

    that considers the changes to a community's social network and the associated norms emerging from the growing influence of a microfinance providers' network. A case study reports the impact of microfinance on a particular Bangladesh rural community. We show there is a breakdown in traditional social networks......Social networks are a key contributor to the economic and social fabric of life. There is evidence that the social cohesion that social networks provide is critical for societies to prosper economically and for development to be sustainable. These social networks and the functions they perform co......-exist with, influence and are influenced by the business networks of connected firms and other economic organisations that surround them. This is increasingly so in our ever-more-complex, internationalized and connected world. This paper explores the potential consequences of this influence via a case study...

  3. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  4. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  5. Network Flows

    Science.gov (United States)

    1988-12-01

    Researchers have suggested other solution strategies, using ideas from nonlinear progamming for solving this general separable convex cost flow problems. Some...plane methods and branch and bound procedures of integer programming, primal-dual methods of linear and nonlinear programming, and polyhedral methods...Combinatorial Optimization: Networks and Matroids), Bazaraa and Jarvis [1978] (Linear Programming and Network Flows), Minieka [1978] (Optimization Algorithms for

  6. Bibliometric Networks

    CERN Document Server

    Havemann, Frank

    2012-01-01

    This text is based on a translation of a chapter in a handbook about network analysis (published in German) where we tried to make beginners familiar with some basic notions and recent developments of network analysis applied to bibliometric issues (Havemann and Scharnhorst 2010). We have added some recent references.

  7. Organizational Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Grande, Bård

    1996-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed.......The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed....

  8. The great American medicine show revisited.

    Science.gov (United States)

    Tomes, Nancy

    2005-01-01

    Since the late 1800s, changes in the advertising and marketing of medicinal drugs have produced heated debates in the United States. With the emergence of the modern prescription drug between 1938 and 1951, concerns that once focused primarily on patients' use of over-the-counter drugs were broadened to include physicians and their "doctors' drugs" as well. The medical profession's growing control over their patients' drug choices inevitably heightened the scrutiny of their own performance as consumers. Although deeply divided over issues of the patient's role in medical decision making, consumer activists and physician reformers expressed similar concerns about the impact of aggressive pharmaceutical marketing and advertising on the doctor-patient relationship, and starting in the late 1950s they employed strikingly similar strategies to counter the new corporate "medicine show." Yet their efforts to promote a more rational use of prescription drugs have usually been too little and too late to offset the effectiveness of pharmaceutical advertising and mar-keting activities.

  9. Tetrahydrobiopterin shows chaperone activity for tyrosine hydroxylase.

    Science.gov (United States)

    Thöny, Beat; Calvo, Ana C; Scherer, Tanja; Svebak, Randi M; Haavik, Jan; Blau, Nenad; Martinez, Aurora

    2008-07-01

    Tyrosine hydroxylase (TH) is the rate-limiting enzyme in the synthesis of catecholamine neurotransmitters. Primary inherited defects in TH have been associated with l-DOPA responsive and non-responsive dystonia and infantile parkinsonism. In this study, we show that both the cofactor (6R)-l-erythro-5,6,7,8-tetrahydrobiopterin (BH(4)) and the feedback inhibitor and catecholamine product dopamine increase the kinetic stability of human TH isoform 1 in vitro. Activity measurements and synthesis of the enzyme by in vitro transcription-translation revealed a complex regulation by the cofactor including both enzyme inactivation and conformational stabilization. Oral BH(4) supplementation to mice increased TH activity and protein levels in brain extracts, while the Th-mRNA level was not affected. All together our results indicate that the molecular mechanisms for the stabilization are a primary folding-aid effect of BH(4) and a secondary effect by increased synthesis and binding of catecholamine ligands. Our results also establish that orally administered BH(4) crosses the blood-brain barrier and therapeutic regimes based on BH(4) supplementation should thus consider the effect on TH. Furthermore, BH(4) supplementation arises as a putative therapeutic agent in the treatment of brain disorders associated with TH misfolding, such as for the human TH isoform 1 mutation L205P.

  10. The earliest published electrocardiogram showing ventricular preexcitation.

    Science.gov (United States)

    Von Knorre, Georg H

    2005-03-01

    When in 1930, Wolff, Parkinson, and White published what is today known as the WPW, or preexcitation syndrome, they, and subsequently others, found few comparable cases in the preceding literature. Among these the report of Cohn and Fraser, published in 1913, was the earliest. However, another even earlier documentation in a 1909 article by Hoffmann escaped notice till now. The ECG of a patient with paroxysmal tachycardia reveals a short PR interval and a delta-wave-induced widening of the QRS complex, even though the reproduced tachycardia was not preexcitation related. The interpretation of this poorly reproduced ECG can be confirmed by another and more detailed description of the patient in an electrocardiography textbook published in 1914 by the same author. Thus, the earliest publication of an ECG showing ventricular preexcitation now can be dated back to 1909. Moreover, the Hoffmann monograph contains two additional examples of the WPW syndrome not noticed until now. All three cases published by Hoffmann had their first ECG recordings in 1912 or earlier.

  11. Ribavirin shows immunomodulatory effects on activated microglia.

    Science.gov (United States)

    Savic, Danijela; Stojiljkovic, Mirjana; Lavrnja, Irena; Parabucki, Ana; Bjelobaba, Ivana; Nedeljkovic, Nadezda; Herdegen, Thomas; Pekovic, Sanja

    2014-12-01

    Abstract Ribavirin (RBV) is synthetic purine nucleoside analogue, licensed as anti-viral drug that displays immunomodulatory actions on various immune cells. Our previous ex vivo studies have demonstrated immunosuppressive effects of RBV on reactive T-lymphocytes in experimental autoimmune encephalomyelitis. Here, we examined the effects of RBV on inflammatory response of microglia. RBV potency to down-regulate microglia inflammatory response was assessed by measuring microglia cell body size, and the production of nitric oxide (NO) and pro- and anti-inflammatory cytokines. RBV exerted cytotoxic effects on LPS-stimulated microglia, leaving non-stimulated microglia unaffected. The exposure of activated microglia to RBV led to: decrease in the level of NO as a result of decreased cell number, lower average cell surface, the reduction of membrane ruffling, the suppression of interleukin-6 release and promoted interleukin-10 production. On the other hand, RBV promoted LPS-induced interleukin-1 beta release. Our results imply that RBV is a complex immunomodulator showing both anti- and pro-inflammatory effects on activated microglia.

  12. Context-dependent metabolic networks

    CERN Document Server

    Beguerisse-Díaz, Mariano; Oyarzún, Diego; Picó, Jesús; Barahona, Mauricio

    2016-01-01

    Cells adapt their metabolism to survive changes in their environment. We present a framework for the construction and analysis of metabolic reaction networks that can be tailored to reflect different environmental conditions. Using context-dependent flux distributions from Flux Balance Analysis (FBA), we produce directed networks with weighted links representing the amount of metabolite flowing from a source reaction to a target reaction per unit time. Such networks are analyzed with tools from network theory to reveal salient features of metabolite flows in each biological context. We illustrate our approach with the directed network of the central carbon metabolism of Escherichia coli, and study its properties in four relevant biological scenarios. Our results show that both flow and network structure depend drastically on the environment: networks produced from the same metabolic model in different contexts have different edges, components, and flow communities, capturing the biological re-routing of metab...

  13. Controlling Congestion on Complex Networks

    CERN Document Server

    Buzna, Lubos

    2016-01-01

    From the Internet to road networks and the power grid, modern life depends on controlling flows on critical infrastructure networks that often operate in a congested state. Yet, we have a limited understanding of the relative performance of the control mechanisms available to manage congestion and of the interplay between network topology, path layout and congestion control algorithms. Here, we consider two flow algorithms (max-flow and uniform-flow), and two more realistic congestion control schemes (max-min fairness and proportional fairness). We analyse how the algorithms and network topology affect throughput, fairness and the location of bottleneck edges. Our results show that on large random networks a network operator can implement the trade-off (proportional fairness) instead of the fair allocation (max-min fairness) with little sacrifice in throughput. We illustrate how the previously studied uniform-flow approach leaves networks severely underutilised in comparison with congestion control algorithms...

  14. Community extraction for social networks

    CERN Document Server

    Zhao, Yunpeng; Zhu, Ji

    2010-01-01

    Analysis of networks and in particular discovering communities within networks has been a focus of recent work in several fields, with applications ranging from citation and friendship networks to food webs and gene regulatory networks. Most of the existing community detection methods focus on partitioning the entire network into communities, with the expectation of many ties within communities and few ties between. However, many networks contain nodes that do not fit in with any of the communities, and forcing every node into a community can distort results. Here we propose a new framework that focuses on community extraction instead of partition, extracting one community at a time. The main idea behind extraction is that the strength of a community should not depend on ties between members of other communities, but only on ties within that community and its ties to the outside world. We show that the new extraction criterion performs well on simulated and real networks, and establish asymptotic consistency ...

  15. Clustering Coefficients in Multiplex Networks

    CERN Document Server

    Cozzo, Emanuele; De Domenico, Manlio; Solé, Albert; Arenas, Alex; Gómez, Sergio; Porter, Mason A; Moreno, Yamir

    2013-01-01

    Recent advances in the study of complex networked systems has highlighted that our interconnected world is made of networks that are coupled together through different layers that each stand for one type of interaction or system. Despite this situation, it is traditional to aggregate multiplex data into a single weighted network in order take advantage of existing tools. This is admittedly convenient, but it is also extremely problematic. In this paper, we generalize the concept of clustering coefficients for multiplex networks. We show how the layered structure of multiplex networks introduces a new degree of freedom that has a fundamental effect on transitivity. We compute our new multiplex clustering coefficients for several real multiplex networks and illustrate why generalizing monoplex concepts to multiplex networks must be done with great care.

  16. Asynchronous Bounded Expected Delay Networks

    CERN Document Server

    Bakhshi, Rena; Fokkink, Wan; Pang, Jun

    2010-01-01

    The commonly used asynchronous bounded delay (ABD) network models assume a fixed bound on message delay. We propose a probabilistic network model, called asynchronous bounded expected delay (ABE) model. Instead of a strict bound, the ABE model requires only a bound on the expected message delay. While the conditions of ABD networks restrict the set of possible executions, in ABE networks all asynchronous executions are possible, but executions with extremely long delays are less probable. In contrast to ABD networks, ABE networks cannot be synchronised efficiently. At the example of an election algorithm, we show that the minimal assumptions of ABE networks are sufficient for the development of efficient algorithms. For anonymous, unidirectional ABE rings of known size N we devise a probabilistic leader election algorithm having average message and time complexity O(N).

  17. Flow Simulation of Urban Sewer Networks

    Institute of Scientific and Technical Information of China (English)

    佘云童; 茅泽育

    2003-01-01

    Flow in an urban drainage network is usually unsteady with backwater near junctions. The routing of hydrographs through a network is an important aspect of the design and analysis of urban drainage networks. Various numerical methods to analyze flow in urban drainage networks were compared and a new hybrid interpolation scheme was developed which combined time-line reachback interpolation, implicit interpolation and space-line interpolation. Numerical simulations show that the improved method more accurately models flows in urban drainage networks.

  18. Expression of the Components of the Renin-Angiotensin System in Venous Malformation

    Directory of Open Access Journals (Sweden)

    Sam eSiljee

    2016-05-01

    Full Text Available Background Venous malformation (VM is the most common form of vascular malformation, consisting of a network of thin-walled ectatic venous channels with deficient or absent media. This study investigated the expression of the components of the renin-angiotensin system (RAS, namely (prorenin receptor (PRR, angiotensin converting enzyme (ACE, angiotensin II receptor 1 (ATIIR1 and angiotensin II receptor 2 (AIITR2 in subcutaneous (SC and intramuscular (IM VM. Materials and Methods SC (n=7 and IM (n=7 VM were analyzed for the expression of PRR, ACE, ATIIR1, and ATIIR2 using 3,3-diaminobenzidine (DAB and immunofluorescent (IF immunohistochemical (IHC staining and NanoString gene expression analysis. Results IHC staining showed expression of PRR, ACE, ATIIR1 and faint expression of ATIIR2 in the endothelium of SC and IM VM. Furthermore, ATIIR2 was expressed by cells away from the endothelium in both SC and IM VM lesions examined. NanoString analysis demonstrated the presence of PRR, ACE and ATIIR1 but not ATIIR2.Conclusions The presence of PRR, ACE, ATIIR1 and potentially ATIIR2, in both SC and IM VM suggests a role for the RAS in the biology of VM. This novel finding may lead to a mechanism-based therapy for VM.

  19. Actively stressed marginal networks

    CERN Document Server

    Sheinman, M; MacKintosh, F C

    2012-01-01

    We study the effects of motor-generated stresses in disordered three dimensional fiber networks using a combination of a mean-field, effective medium theory, scaling analysis and a computational model. We find that motor activity controls the elasticity in an anomalous fashion close to the point of marginal stability by coupling to critical network fluctuations. We also show that motor stresses can stabilize initially floppy networks, extending the range of critical behavior to a broad regime of network connectivities below the marginal point. Away from this regime, or at high stress, motors give rise to a linear increase in stiffness with stress. Finally, we demonstrate that our results are captured by a simple, constitutive scaling relation highlighting the important role of non-affine strain fluctuations as a susceptibility to motor stress.

  20. Actively stressed marginal networks.

    Science.gov (United States)

    Sheinman, M; Broedersz, C P; MacKintosh, F C

    2012-12-07

    We study the effects of motor-generated stresses in disordered three-dimensional fiber networks using a combination of a mean-field theory, scaling analysis, and a computational model. We find that motor activity controls the elasticity in an anomalous fashion close to the point of marginal stability by coupling to critical network fluctuations. We also show that motor stresses can stabilize initially floppy networks, extending the range of critical behavior to a broad regime of network connectivities below the marginal point. Away from this regime, or at high stress, motors give rise to a linear increase in stiffness with stress. Finally, we demonstrate that our results are captured by a simple, constitutive scaling relation highlighting the important role of nonaffine strain fluctuations as a susceptibility to motor stress.

  1. Autocatalysis in reaction networks.

    Science.gov (United States)

    Deshpande, Abhishek; Gopalkrishnan, Manoj

    2014-10-01

    The persistence conjecture is a long-standing open problem in chemical reaction network theory. It concerns the behavior of solutions to coupled ODE systems that arise from applying mass-action kinetics to a network of chemical reactions. The idea is that if all reactions are reversible in a weak sense, then no species can go extinct. A notion that has been found useful in thinking about persistence is that of "critical siphon." We explore the combinatorics of critical siphons, with a view toward the persistence conjecture. We introduce the notions of "drainable" and "self-replicable" (or autocatalytic) siphons. We show that: Every minimal critical siphon is either drainable or self-replicable; reaction networks without drainable siphons are persistent; and nonautocatalytic weakly reversible networks are persistent. Our results clarify that the difficulties in proving the persistence conjecture are essentially due to competition between drainable and self-replicable siphons.

  2. Optical packet switched networks

    DEFF Research Database (Denmark)

    Hansen, Peter Bukhave

    1999-01-01

    Optical packet switched networks are investigated with emphasis on the performance of the packet switch blocks. Initially, the network context of the optical packet switched network is described showing that a packet network will provide transparency, flexibility and bridge the granularity gap...... between the electrical switched layer and the WDM transport layer. Analytical models are implemented to determine the signal quality ghrough the switch blocks in terms of power penalty and to assess the traffic performance of different switch block architectures. Further, a computer simulation model...... is used to investigate the influence on the traffic performance of asynchronous operation of the switch blocks. The signal quality investigation illustrates some of the component requirements in respect to gain saturation in SOA gates and crosstalk in order to obtain high cascadability of the switch...

  3. Undermining and Strengthening Social Networks through Network Modification

    Science.gov (United States)

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  4. MRI shows clodronate-liposomes attenuating liverinjuryinratswithsevereacutepancreatitis

    Institute of Scientific and Technical Information of China (English)

    Jian-Xin Zhang; Sheng-Chun Dang; Yong Zhang; Xin Sha; Li-Rong Zhang; Chuan-She Wei; Min Chen; De-Li Jiang

    2010-01-01

    BACKGROUND: Studies have revealed that macrophages play an important role in the development of severe acute pancreatitis (SAP). Activated macrophages can lead to a systemic inlfammatory response, induce lipid peroxidation, impair membrane structure, result in injury to the liver and the other extrahepatic organs, and eventually result in multiple organ dysfunction syndrome by promoting excessive secretion of cytokines. Liver injury can further aggravate the systemic inlfammatory response and increase mortality by affecting the metabolism of toxins and the release of excessive inlfammatory mediators. Clodronate is a synthetic bisphosphonate, which is often used for treating bone changes caused by osteoporosis and other factors. In the current study, we created liposomes containing superparamagnetic iron oxide particles (SPIOs) for macrophage labeling and magnetic resonance imaging, using a novel method that can bind the clodronate to induce apoptosis and deplete macrophages. METHODS: Superparamagnetic Fe3O4 nanoparticles were prepared by chemical coprecipitation. SPIO-containing liposomes and SPIO-clodronate-containing liposomes were prepared by the thin iflm method. SAP models were prepared by injection of sodium taurocholate (2 ml/kg body weight) into the subcapsular space of the pancreas. Sprague-Dawley rats were randomly divided into a control group, a SAP plus SPIO-liposome group, and a SAP plus SPIO-clodronate-containing group. Two and six hours after SAP models were available, T2-weighted MRI scans (in the same plane) of the livers of rats in each group were performed. At the end of the scans, 2 ml of blood was taken from the superior mesenteric vein to measure the levels of serum amylase, ALT, AST, TNF-α, and IL-6. Pathological changes in the liver and pancreas were assessed. RESULTS: Transmission electron microscopy showed that the liposomes had a uniform size. No pathological changes in the pancreata of rats in the control group were noted. The

  5. Attractor metabolic networks.

    Directory of Open Access Journals (Sweden)

    Ildefonso M De la Fuente

    Full Text Available BACKGROUND: The experimental observations and numerical studies with dissipative metabolic networks have shown that cellular enzymatic activity self-organizes spontaneously leading to the emergence of a Systemic Metabolic Structure in the cell, characterized by a set of different enzymatic reactions always locked into active states (metabolic core while the rest of the catalytic processes are only intermittently active. This global metabolic structure was verified for Escherichia coli, Helicobacter pylori and Saccharomyces cerevisiae, and it seems to be a common key feature to all cellular organisms. In concordance with these observations, the cell can be considered a complex metabolic network which mainly integrates a large ensemble of self-organized multienzymatic complexes interconnected by substrate fluxes and regulatory signals, where multiple autonomous oscillatory and quasi-stationary catalytic patterns simultaneously emerge. The network adjusts the internal metabolic activities to the external change by means of flux plasticity and structural plasticity. METHODOLOGY/PRINCIPAL FINDINGS: In order to research the systemic mechanisms involved in the regulation of the cellular enzymatic activity we have studied different catalytic activities of a dissipative metabolic network under different external stimuli. The emergent biochemical data have been analysed using statistical mechanic tools, studying some macroscopic properties such as the global information and the energy of the system. We have also obtained an equivalent Hopfield network using a Boltzmann machine. Our main result shows that the dissipative metabolic network can behave as an attractor metabolic network. CONCLUSIONS/SIGNIFICANCE: We have found that the systemic enzymatic activities are governed by attractors with capacity to store functional metabolic patterns which can be correctly recovered from specific input stimuli. The network attractors regulate the catalytic patterns

  6. Synchronization patterns: from network motifs to hierarchical networks

    Science.gov (United States)

    Krishnagopal, Sanjukta; Lehnert, Judith; Poel, Winnie; Zakharova, Anna; Schöll, Eckehard

    2017-03-01

    We investigate complex synchronization patterns such as cluster synchronization and partial amplitude death in networks of coupled Stuart-Landau oscillators with fractal connectivities. The study of fractal or self-similar topology is motivated by the network of neurons in the brain. This fractal property is well represented in hierarchical networks, for which we present three different models. In addition, we introduce an analytical eigensolution method and provide a comprehensive picture of the interplay of network topology and the corresponding network dynamics, thus allowing us to predict the dynamics of arbitrarily large hierarchical networks simply by analysing small network motifs. We also show that oscillation death can be induced in these networks, even if the coupling is symmetric, contrary to previous understanding of oscillation death. Our results show that there is a direct correlation between topology and dynamics: hierarchical networks exhibit the corresponding hierarchical dynamics. This helps bridge the gap between mesoscale motifs and macroscopic networks. This article is part of the themed issue 'Horizons of cybernetical physics'.

  7. Capacity Analysis for Dynamic Space Networks

    Institute of Scientific and Technical Information of China (English)

    Yang Lu; Bo Li; Wenjing Kang; Gongliang Liu; Xueting Li

    2015-01-01

    To evaluate transmission rate of highly dynamic space networks, a new method for studying space network capacity is proposed in this paper. Using graph theory, network capacity is defined as the maximum amount of flows ground stations can receive per unit time. Combined with a hybrid constellation model, network capacity is calculated and further analyzed for practical cases. Simulation results show that network capacity will increase to different extents as link capacity, minimum ground elevation constraint and satellite onboard processing capability change. Considering the efficiency and reliability of communication networks, how to scientifically design satellite networks is also discussed.

  8. 77 FR 29637 - Game Show Network, LLC v. Cablevision Systems Corp.

    Science.gov (United States)

    2012-05-18

    ... prices, terms, or conditions. Nor do the parties dispute that Cablevision has abided by the explicit..., to make adequate investments in content, promotion, and marketing, and to engage staff and talent... subscribers and, if so, the price, terms, and conditions thereof; and/or whether Cablevision should...

  9. Ethics Discussion on Network Pornography Shows%网络情色的伦理辨析

    Institute of Scientific and Technical Information of China (English)

    郑奕

    2006-01-01

    在人性的基础上,情色信息具有生命力,其中的道德争执不在于允许不允许公民是否有自由权利去选择自己观看的情色内容,而在于在什么样的范围与规范内享用情色内容或服务.个人权利义务的重视与现代生活环境的变化,使享有情色信息的方式更大便捷化和多样化.

  10. Molecular epidemiology of Neisseria gonorrhoeae in Amsterdam, The Netherlands, shows distinct heterosexual and homosexual networks.

    NARCIS (Netherlands)

    Kolader, Marion-Eliëtte; Dukers, Nicole H T M; Bij, Akke K van der; Dierdorp, Mirjam; Fennema, Johan S A; Coutinho, Roel A; Bruisten, Sylvia M

    2006-01-01

    Molecular typing, added to epidemiological data, can better identify transmission patterns of gonorrhea in Western countries, where the incidence has recently been rising. From September 2002 to September 2003, patients with a laboratory-confirmed diagnosis of gonorrhea at the Clinic for Sexually Tr

  11. Network-level optimization method for road network maintenance programming based on network efficiency

    Institute of Scientific and Technical Information of China (English)

    张林雪; 秦进; 贺钰昕; 叶勇; 倪玲霖

    2015-01-01

    To maintain their capacity, transportation infrastructures are in need of regular maintenance and rehabilitation. The major challenge facing transportation engineers is the network-level policies to maintain the deteriorating roads at an acceptable level of serviceability. In this work, a quantitative transportation network efficiency measure is presented and then how to determine optimally network-level road maintenance policy depending on the road importance to the network performance has been demonstrated. The examples show that the different roads should be set different maintenance time points in terms of the retention capacities of the roads, because the different roads play different roles in network and have different important degrees to the network performance. This network-level road maintenance optimization method could not only save lots of infrastructure investments, but also ensure the service level of the existing transportation system.

  12. Controllability of the better chosen partial networks

    Science.gov (United States)

    Liu, Xueming; Pan, Linqiang

    2016-08-01

    How to control large complex networks is a great challenge. Recent studies have proved that the whole network can be sufficiently steered by injecting control signals into a minimum set of driver nodes, and the minimum numbers of driver nodes for many real networks are high, indicating that it is difficult to control them. For some large natural and technological networks, it is impossible and not feasible to control the full network. For example, in biological networks like large-scale gene regulatory networks it is impossible to control all the genes. This prompts us to explore the question how to choose partial networks that are easy for controlling and important in networked systems. In this work, we propose a method to achieve this goal. By computing the minimum driver nodes densities of the partial networks of Erdös-Rényi (ER) networks, scale-free (SF) networks and 23 real networks, we find that our method performs better than random method that chooses nodes randomly. Moreover, we find that the nodes chosen by our method tend to be the essential elements of the whole systems, via studying the nodes chosen by our method of a real human signaling network and a human protein interaction network and discovering that the chosen nodes from these networks tend to be cancer-associated genes. The implementation of our method shows some interesting connections between the structure and the controllability of networks, improving our understanding of the control principles of complex systems.

  13. Latent geometry of bipartite networks

    Science.gov (United States)

    Kitsak, Maksim; Papadopoulos, Fragkiskos; Krioukov, Dmitri

    2017-03-01

    Despite the abundance of bipartite networked systems, their organizing principles are less studied compared to unipartite networks. Bipartite networks are often analyzed after projecting them onto one of the two sets of nodes. As a result of the projection, nodes of the same set are linked together if they have at least one neighbor in common in the bipartite network. Even though these projections allow one to study bipartite networks using tools developed for unipartite networks, one-mode projections lead to significant loss of information and artificial inflation of the projected network with fully connected subgraphs. Here we pursue a different approach for analyzing bipartite systems that is based on the observation that such systems have a latent metric structure: network nodes are points in a latent metric space, while connections are more likely to form between nodes separated by shorter distances. This approach has been developed for unipartite networks, and relatively little is known about its applicability to bipartite systems. Here, we fully analyze a simple latent-geometric model of bipartite networks and show that this model explains the peculiar structural properties of many real bipartite systems, including the distributions of common neighbors and bipartite clustering. We also analyze the geometric information loss in one-mode projections in this model and propose an efficient method to infer the latent pairwise distances between nodes. Uncovering the latent geometry underlying real bipartite networks can find applications in diverse domains, ranging from constructing efficient recommender systems to understanding cell metabolism.

  14. Network of networks in Linux operating system

    Science.gov (United States)

    Wang, Haoqin; Chen, Zhen; Xiao, Guanping; Zheng, Zheng

    2016-04-01

    Operating system represents one of the most complex man-made systems. In this paper, we analyze Linux Operating System (LOS) as a complex network via modeling functions as nodes and function calls as edges. It is found that for the LOS network and modularized components within it, the out-degree follows an exponential distribution and the in-degree follows a power-law distribution. For better understanding the underlying design principles of LOS, we explore the coupling correlations of components in LOS from aspects of topology and function. The result shows that the component for device drivers has a strong manifestation in topology while a weak manifestation in function. However, the component for process management shows the contrary phenomenon. Moreover, in an effort to investigate the impact of system failures on networks, we make a comparison between the networks traced from normal and failure status of LOS. This leads to a conclusion that the failure will change function calls which should be executed in normal status and introduce new function calls in the meanwhile.

  15. Spectral Networks and Snakes

    CERN Document Server

    Gaiotto, Davide; Neitzke, Andrew

    2012-01-01

    We apply and illustrate the techniques of spectral networks in a large collection of A_{K-1} theories of class S, which we call "lifted A_1 theories." Our construction makes contact with Fock and Goncharov's work on higher Teichmuller theory. In particular we show that the Darboux coordinates on moduli spaces of flat connections which come from certain special spectral networks coincide with the Fock-Goncharov coordinates. We show, moreover, how these techniques can be used to study the BPS spectra of lifted A_1 theories. In particular, we determine the spectrum generators for all the lifts of a simple superconformal field theory.

  16. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  17. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  18. Innovation network.

    Science.gov (United States)

    Acemoglu, Daron; Akcigit, Ufuk; Kerr, William R

    2016-10-11

    Technological progress builds upon itself, with the expansion of invention in one domain propelling future work in linked fields. Our analysis uses 1.8 million US patents and their citation properties to map the innovation network and its strength. Past innovation network structures are calculated using citation patterns across technology classes during 1975-1994. The interaction of this preexisting network structure with patent growth in upstream technology fields has strong predictive power on future innovation after 1995. This pattern is consistent with the idea that when there is more past upstream innovation for a particular technology class to build on, then that technology class innovates more.

  19. Chaotic Control of Network Traffic

    Institute of Scientific and Technical Information of China (English)

    YANG Tan; CUI Yi-Dong; JIN Yue-Hui; CHENG Shi-Duan

    2009-01-01

    A method of chaotic control on network traffic is presented.By this method,the chaotic network traffic can be controlled to a pre-assigned equilibrium point according to chaotic prediction and the largest Lyapunov exponent of the traffic on congested link is reduced,thereby the probability of traffic burst and network congestion can be reduced.Numerical examples show that this method is effective.

  20. Molecular ecological network analyses

    Directory of Open Access Journals (Sweden)

    Deng Ye

    2012-05-01

    Full Text Available Abstract Background Understanding the interaction among different species within a community and their responses to environmental changes is a central goal in ecology. However, defining the network structure in a microbial community is very challenging due to their extremely high diversity and as-yet uncultivated status. Although recent advance of metagenomic technologies, such as high throughout sequencing and functional gene arrays, provide revolutionary tools for analyzing microbial community structure, it is still difficult to examine network interactions in a microbial community based on high-throughput metagenomics data. Results Here, we describe a novel mathematical and bioinformatics framework to construct ecological association networks named molecular ecological networks (MENs through Random Matrix Theory (RMT-based methods. Compared to other network construction methods, this approach is remarkable in that the network is automatically defined and robust to noise, thus providing excellent solutions to several common issues associated with high-throughput metagenomics data. We applied it to determine the network structure of microbial communities subjected to long-term experimental warming based on pyrosequencing data of 16 S rRNA genes. We showed that the constructed MENs under both warming and unwarming conditions exhibited topological features of scale free, small world and modularity, which were consistent with previously described molecular ecological networks. Eigengene analysis indicated that the eigengenes represented the module profiles relatively well. In consistency with many other studies, several major environmental traits including temperature and soil pH were found to be important in determining network interactions in the microbial communities examined. To facilitate its application by the scientific community, all these methods and statistical tools have been integrated into a comprehensive Molecular Ecological

  1. Adaptive Dynamics of Regulatory Networks: Size Matters

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available To accomplish adaptability, all living organisms are constructed of regulatory networks on different levels which are capable to differentially respond to a variety of environmental inputs. Structure of regulatory networks determines their phenotypical plasticity, that is, the degree of detail and appropriateness of regulatory replies to environmental or developmental challenges. This regulatory network structure is encoded within the genotype. Our conceptual simulation study investigates how network structure constrains the evolution of networks and their adaptive abilities. The focus is on the structural parameter network size. We show that small regulatory networks adapt fast, but not as good as larger networks in the longer perspective. Selection leads to an optimal network size dependent on heterogeneity of the environment and time pressure of adaptation. Optimal mutation rates are higher for smaller networks. We put special emphasis on discussing our simulation results on the background of functional observations from experimental and evolutionary biology.

  2. Contagion on complex networks with persuasion

    Science.gov (United States)

    Huang, Wei-Min; Zhang, Li-Jie; Xu, Xin-Jian; Fu, Xinchu

    2016-03-01

    The threshold model has been widely adopted as a classic model for studying contagion processes on social networks. We consider asymmetric individual interactions in social networks and introduce a persuasion mechanism into the threshold model. Specifically, we study a combination of adoption and persuasion in cascading processes on complex networks. It is found that with the introduction of the persuasion mechanism, the system may become more vulnerable to global cascades, and the effects of persuasion tend to be more significant in heterogeneous networks than those in homogeneous networks: a comparison between heterogeneous and homogeneous networks shows that under weak persuasion, heterogeneous networks tend to be more robust against random shocks than homogeneous networks; whereas under strong persuasion, homogeneous networks are more stable. Finally, we study the effects of adoption and persuasion threshold heterogeneity on systemic stability. Though both heterogeneities give rise to global cascades, the adoption heterogeneity has an overwhelmingly stronger impact than the persuasion heterogeneity when the network connectivity is sufficiently dense.

  3. Interdependent network reciprocity in evolutionary games

    CERN Document Server

    Wang, Zhen; Perc, Matjaz

    2013-01-01

    Besides the structure of interactions within networks, also the interactions between networks are of the outmost importance. We therefore study the outcome of the public goods game on two interdependent networks that are connected by means of a utility function, which determines how payoffs on both networks jointly influence the success of players in each individual network. We show that an unbiased coupling allows the spontaneous emergence of interdependent network reciprocity, which is capable to maintain healthy levels of public cooperation even in extremely adverse conditions. The mechanism, however, requires simultaneous formation of correlated cooperator clusters on both networks. If this does not emerge or if the coordination process is disturbed, network reciprocity fails, resulting in the total collapse of cooperation. Network interdependence can thus be exploited effectively to promote cooperation past the limits imposed by isolated networks, but only if the coordination between the interdependent n...

  4. Adaptive Dynamics of Regulatory Networks: Size Matters

    Directory of Open Access Journals (Sweden)

    Martinetz Thomas

    2009-01-01

    Full Text Available To accomplish adaptability, all living organisms are constructed of regulatory networks on different levels which are capable to differentially respond to a variety of environmental inputs. Structure of regulatory networks determines their phenotypical plasticity, that is, the degree of detail and appropriateness of regulatory replies to environmental or developmental challenges. This regulatory network structure is encoded within the genotype. Our conceptual simulation study investigates how network structure constrains the evolution of networks and their adaptive abilities. The focus is on the structural parameter network size. We show that small regulatory networks adapt fast, but not as good as larger networks in the longer perspective. Selection leads to an optimal network size dependent on heterogeneity of the environment and time pressure of adaptation. Optimal mutation rates are higher for smaller networks. We put special emphasis on discussing our simulation results on the background of functional observations from experimental and evolutionary biology.

  5. Higher-order organization of complex networks.

    Science.gov (United States)

    Benson, Austin R; Gleich, David F; Leskovec, Jure

    2016-07-08

    Networks are a fundamental tool for understanding and modeling complex systems in physics, biology, neuroscience, engineering, and social science. Many networks are known to exhibit rich, lower-order connectivity patterns that can be captured at the level of individual nodes and edges. However, higher-order organization of complex networks--at the level of small network subgraphs--remains largely unknown. Here, we develop a generalized framework for clustering networks on the basis of higher-order connectivity patterns. This framework provides mathematical guarantees on the optimality of obtained clusters and scales to networks with billions of edges. The framework reveals higher-order organization in a number of networks, including information propagation units in neuronal networks and hub structure in transportation networks. Results show that networks exhibit rich higher-order organizational structures that are exposed by clustering based on higher-order connectivity patterns.

  6. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  7. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  8. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... of more than a million people in more than 100 countries have attended courses in Japan funded fully or partly by Japanese ODA since the inception of the technical assistance programs in 1954 through the Colombo Plan and since 1959 through the Association of Overseas Technical Scholarships (AOTS from 2009...... HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...

  9. Perturbation propagation in random and evolved Boolean networks

    Energy Technology Data Exchange (ETDEWEB)

    Fretter, Christoph [Instistut fuer Informatik, Martin-Luther-Universitaet Halle-Wittenberg, Von-Seckendorffplatz 1, 06120 Halle (Germany); Szejka, Agnes; Drossel, Barbara [Institut fuer Festkoerperphysik, Technische Universitaet Darmstadt, Hochschulstrasse 6, 64289 Darmstadt (Germany)], E-mail: Christoph.Fretter@informatik.uni-halle.de

    2009-03-15

    In this paper, we investigate the propagation of perturbations in Boolean networks by evaluating the Derrida plot and its modifications. We show that even small random Boolean networks agree well with the predictions of the annealed approximation, but nonrandom networks show a very different behaviour. We focus on networks that were evolved for high dynamical robustness. The most important conclusion is that the simple distinction between frozen, critical and chaotic networks is no longer useful, since such evolved networks can display the properties of all three types of networks. Furthermore, we evaluate a simplified empirical network and show how its specific state space properties are reflected in the modified Derrida plots.

  10. Network Performance Improvement under Epidemic Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    . First we identify the most vulnerable and the most strategic nodes in the network. Then, via extensive simulations we show that strategic placement of resources for improved failure recovery has better performance than randomly assigning lower repair times among the network nodes. Our OPNET simulation...

  11. Affective Networks

    Directory of Open Access Journals (Sweden)

    Jodi Dean

    2010-02-01

    Full Text Available This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  12. Afloat Networks

    Science.gov (United States)

    2012-03-01

    COP, ISR Data Management and full array of Warfare Network Storage Common Computing Environment (ISNS): 20 TB storage per enclave (up from 20 MB...Hardrive) CANES: 9.5 TB for apps alone Applications - Over 800 Connected or hosted (up from 3) CANES – Consolidated Afloat Networks and Enterprise...classified/unclassified) Immediate File Delivery (IFD) CWSP/CBSP JSIPS/JCA JWICS SIPRNET NIPRNET VTC POTS MSG TRAFFIC EHF MDR JWICS

  13. Emergent Hyperbolic Network Geometry

    Science.gov (United States)

    Bianconi, Ginestra; Rahmede, Christoph

    2017-02-01

    A large variety of interacting complex systems are characterized by interactions occurring between more than two nodes. These systems are described by simplicial complexes. Simplicial complexes are formed by simplices (nodes, links, triangles, tetrahedra etc.) that have a natural geometric interpretation. As such simplicial complexes are widely used in quantum gravity approaches that involve a discretization of spacetime. Here, by extending our knowledge of growing complex networks to growing simplicial complexes we investigate the nature of the emergent geometry of complex networks and explore whether this geometry is hyperbolic. Specifically we show that an hyperbolic network geometry emerges spontaneously from models of growing simplicial complexes that are purely combinatorial. The statistical and geometrical properties of the growing simplicial complexes strongly depend on their dimensionality and display the major universal properties of real complex networks (scale-free degree distribution, small-world and communities) at the same time. Interestingly, when the network dynamics includes an heterogeneous fitness of the faces, the growing simplicial complex can undergo phase transitions that are reflected by relevant changes in the network geometry.

  14. Statistical Mechanics of Temporal and Interacting Networks

    Science.gov (United States)

    Zhao, Kun

    a new framework to quantify the information encoded in these networks and to answer a fundamental problem in network science: how complex are temporal and growing networks. Finally, we consider two examples of critical phenomena in interacting networks. In particular, on one side we investigate the percolation of interacting networks by introducing antagonistic interactions. On the other side, we investigate a model of political election based on the percolation of antagonistic networks. The aim of this research is to show how antagonistic interactions change the physics of critical phenomena on interacting networks. We believe that the work presented in these thesis offers the possibility to appreciate the large variability of problems that can be addressed in the new framework of temporal and interacting networks.

  15. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  16. Breakdown of interdependent directed networks.

    Science.gov (United States)

    Liu, Xueming; Stanley, H Eugene; Gao, Jianxi

    2016-02-02

    Increasing evidence shows that real-world systems interact with one another via dependency connectivities. Failing connectivities are the mechanism behind the breakdown of interacting complex systems, e.g., blackouts caused by the interdependence of power grids and communication networks. Previous research analyzing the robustness of interdependent networks has been limited to undirected networks. However, most real-world networks are directed, their in-degrees and out-degrees may be correlated, and they are often coupled to one another as interdependent directed networks. To understand the breakdown and robustness of interdependent directed networks, we develop a theoretical framework based on generating functions and percolation theory. We find that for interdependent Erdős-Rényi networks the directionality within each network increases their vulnerability and exhibits hybrid phase transitions. We also find that the percolation behavior of interdependent directed scale-free networks with and without degree correlations is so complex that two criteria are needed to quantify and compare their robustness: the percolation threshold and the integrated size of the giant component during an entire attack process. Interestingly, we find that the in-degree and out-degree correlations in each network layer increase the robustness of interdependent degree heterogeneous networks that most real networks are, but decrease the robustness of interdependent networks with homogeneous degree distribution and with strong coupling strengths. Moreover, by applying our theoretical analysis to real interdependent international trade networks, we find that the robustness of these real-world systems increases with the in-degree and out-degree correlations, confirming our theoretical analysis.

  17. Sentient networks

    Energy Technology Data Exchange (ETDEWEB)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  18. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  19. Quantum social networks

    CERN Document Server

    Cabello, Adan; Lopez-Tarrida, Antonio J; Portillo, Jose R

    2011-01-01

    We introduce a physical approach to social networks (SNs) in which each actor is characterized by a yes-no test on a physical system. This is used to measure whether the interactions originating a SN obey pre-existing properties, as in a classical social network (CSN). As an example of SNs beyond CSNs, we introduce quantum social networks (QSNs) as those in which actor $i$ is characterized by a test of whether or not the system is in a quantum state $|\\psi_i>$. We show that QSNs outperform CSNs for a certain task and some graphs. We identify the simplest of these graphs and show that graphs in which QSNs outperform CSNs are increasingly frequent as the number of vertices increases. We also discuss more general SNs and identify the simplest graphs in which QSNs cannot be outperformed.

  20. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  1. Impact of reduced scale free network on wireless sensor network

    Science.gov (United States)

    Keshri, Neha; Gupta, Anurag; Mishra, Bimal Kumar

    2016-12-01

    In heterogeneous wireless sensor network (WSN) each data-packet traverses through multiple hops over restricted communication range before it reaches the sink. The amount of energy required to transmit a data-packet is directly proportional to the number of hops. To balance the energy costs across the entire network and to enhance the robustness in order to improve the lifetime of WSN becomes a key issue of researchers. Due to high dimensionality of an epidemic model of WSN over a general scale free network, it is quite difficult to have close study of network dynamics. To overcome this complexity, we simplify a general scale free network by partitioning all of its motes into two classes: higher-degree motes and lower-degree motes, and equating the degrees of all higher-degree motes with lower-degree motes, yielding a reduced scale free network. We develop an epidemic model of WSN based on reduced scale free network. The existence of unique positive equilibrium is determined with some restrictions. Stability of the system is proved. Furthermore, simulation results show improvements made in this paper have made the entire network have a better robustness to the network failure and the balanced energy costs. This reduced model based on scale free network theory proves more applicable to the research of WSN.

  2. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  3. Prisoner's Dilemma Applied and in the Classroom: The TV Game Show "Friend or Foe"

    Science.gov (United States)

    Coe, Paul R.; Alonzi, Loreto Peter; Condon, Daniel; Butterworth, William T.

    2007-01-01

    Prisoner's Dilemma is a common game theory scenario in which two players must choose between acting cooperatively or out of pure self-interest. What a player decides affects not only his own outcome but also that of the other player. "Friend or Foe," a TV game show that has appeared on the cable Game Show Network (GSN), places pairs of contestants…

  4. Complex Networks as Nash Equilibria of Navigation Games

    CERN Document Server

    Gulyás, András; Kőrösi, Attila; Rétvári, Gábor; Krioukov, Dmitri

    2014-01-01

    The common sense suggests that networks are not random mazes of purposeless connections, but that these connections are organised so that networks can perform their functions. One common function that many networks perform is targeted transport or navigation. Here with the help of game theory we show that minimalistic networks designed to maximise the navigation efficiency at minimal cost share basic structural properties of real networks. These idealistic networks are Nash equilibria of a network construction game whose purpose is to find an optimal trade-off between the network cost and navigability. They are navigation skeletons that we show are present in the Internet, {\\it E. coli} metabolic network, English word network, US airport network, and the Hungarian road network. The knowledge of these skeletons allows one to identify the minimal number of edges by altering which one can dramatically improve or paralyse the navigation in the network.

  5. Using Heavy Clique Base Coarsening to Enhance Virtual Network Embedding

    Directory of Open Access Journals (Sweden)

    Ashraf A. Shahin

    2015-01-01

    Full Text Available Network virtualization allows cloud infrastructure providers to accommodate multiple virtual networks on a single physical network. However, mapping multiple virtual network resources to physical network components, called virtual network embedding (VNE, is known to be non-deterministic polynomial-time hard (NP-hard. Effective virtual network embedding increases the revenue by increasing the number of accepted virtual networks. In this paper, we propose virtual network embedding algorithm, which improves virtual network embedding by coarsening virtual networks. Heavy Clique matching technique is used to coarsen virtual networks. Then, the coarsened virtual networks are enhanced by using a refined Kernighan-Lin algorithm. The performance of the proposed algorithm is evaluated and compared with existing algorithms using extensive simulations, which show that the proposed algorithm improves virtual network embedding by increasing the acceptance ratio and the revenue.

  6. Visual Mining of Epidemic Networks

    CERN Document Server

    Clémençon, Stéphan; Rossi, Fabrice; Tran, Viet Chi; 10.1007/978-3-642-21498-1_35

    2012-01-01

    We show how an interactive graph visualization method based on maximal modularity clustering can be used to explore a large epidemic network. The visual representation is used to display statistical tests results that expose the relations between the propagation of HIV in a sexual contact network and the sexual orientation of the patients.

  7. On Social and Economic Networks

    NARCIS (Netherlands)

    A. Galeotti

    2005-01-01

    textabstractYou can call it a clan, or a network, or a family, or a group of friends. The way you call it is not relevant. What matters is that it exists and often you will need one. A large body of empirical work shows that networks are pervasive in social and economic interactions. This book conta

  8. Application of Configurators in Networks

    DEFF Research Database (Denmark)

    Malis, Martin; Hvam, Lars

    2003-01-01

    a structured guideline, tools and methods on how to successfully develop configurators in a network perspective. Findings presented in this paper are supported by research in a case company. The results from the empirical work show a huge potential for the application of configurators in networks of companies....

  9. Network Science and Statistical Physics

    Institute of Scientific and Technical Information of China (English)

    FANG; Jin-qing; BI; Qiao

    2012-01-01

    <正>We wrote and published an academic monograph about the latest developments in the network science and the non-equilibrium statistical physics. A total of 30 chapters by three major compositions, gathered main achievements from authors, domestic and abroad in this field, involving important topics for the network science and the statistical physics; two major themes show respectively advantages,

  10. Performance improvement for applying network virtualization in fiber-wireless (FiWi) access networks

    Institute of Scientific and Technical Information of China (English)

    Qing-long DAI; Guo-chu SHOU; Yi-hong HU; Zhi-gang GUO

    2014-01-01

    Fiber-wireless (FiWi) access networks, which are a combination of fiber networks and wireless networks, have the advantages of both networks, such as high bandwidth, high security, low cost, and flexible access. However, with the increasing need for bandwidth and types of service from users, FiWi networks are still relatively incapable and ossified. To alleviate bandwidth tension and facilitate new service deployment, we attempt to apply network virtualization in FiWi networks, in which the network’s control plane and data plane are separated from each other. Based on a previously proposed hierarchical model and service model for FiWi network virtualization, the process of service implementation is described. The performances of the FiWi access networks applying network virtualization are analyzed in detail, including bandwidth for links, throughput for nodes, and multipath flow transmission. Simulation results show that the FiWi network with virtualization is superior to that without.

  11. A recurrent stochastic binary network

    Institute of Scientific and Technical Information of China (English)

    赵杰煜

    2001-01-01

    Stochastic neural networks are usually built by introducing random fluctuations into the network. A natural method is to use stochastic connections rather than stochastic activation functions. We propose a new model in which each neuron has very simple functionality but all the connections are stochastic. It is shown that the stationary distribution of the network uniquely exists and it is approximately a Boltzmann-Gibbs distribution. The relationship between the model and the Markov random field is discussed. New techniques to implement simulated annealing and Boltzmann learning are proposed. Simulation results on the graph bisection problem and image recognition show that the network is powerful enough to solve real world problems.

  12. Network interdiction with budget constraints

    Energy Technology Data Exchange (ETDEWEB)

    Santhi, Nankakishore [Los Alamos National Laboratory; Pan, Feng [Los Alamos National Laboratory

    2009-01-01

    Several scenarios exist in the modern interconnected world which call for efficient network interdiction algorithms. Applications are varied, including computer network security, prevention of spreading of Internet worms, policing international smuggling networks, controlling spread of diseases and optimizing the operation of large public energy grids. In this paper we consider some natural network optimization questions related to the budget constrained interdiction problem over general graphs. Many of these questions turn out to be computationally hard to tackle. We present a particularly interesting practical form of the interdiction question which we show to be computationally tractable. A polynomial time algorithm is then presented for this problem.

  13. [Artificial neural networks in Neurosciences].

    Science.gov (United States)

    Porras Chavarino, Carmen; Salinas Martínez de Lecea, José María

    2011-11-01

    This article shows that artificial neural networks are used for confirming the relationships between physiological and cognitive changes. Specifically, we explore the influence of a decrease of neurotransmitters on the behaviour of old people in recognition tasks. This artificial neural network recognizes learned patterns. When we change the threshold of activation in some units, the artificial neural network simulates the experimental results of old people in recognition tasks. However, the main contributions of this paper are the design of an artificial neural network and its operation inspired by the nervous system and the way the inputs are coded and the process of orthogonalization of patterns.

  14. Characteristic exponents of complex networks

    CERN Document Server

    Nicosia, Vincenzo; Latora, Vito

    2013-01-01

    We propose a method to characterize and classify complex networks based on the time series generated by random walks and different node properties. The analysis of the fluctuations of the time series reveals the presence of long-range correlations, and allows to define, for each network, a set of characteristic exponents that capture its essential structural properties. By considering a large data set of real-world networks, we show that the characteristic exponents can be used to classify complex networks according to their function, and are able to discriminate social from biological and technological systems.

  15. Minimal autocatalytic networks.

    Science.gov (United States)

    Steel, Mike; Hordijk, Wim; Smith, Joshua

    2013-09-07

    Self-sustaining autocatalytic chemical networks represent a necessary, though not sufficient condition for the emergence of early living systems. These networks have been formalised and investigated within the framework of RAF theory, which has led to a number of insights and results concerning the likelihood of such networks forming. In this paper, we extend this analysis by focussing on how small autocatalytic networks are likely to be when they first emerge. First we show that simulations are unlikely to settle this question, by establishing that the problem of finding a smallest RAF within a catalytic reaction system is NP-hard. However, irreducible RAFs (irrRAFs) can be constructed in polynomial time, and we show it is possible to determine in polynomial time whether a bounded size set of these irrRAFs contain the smallest RAFs within a system. Moreover, we derive rigorous bounds on the sizes of small RAFs and use simulations to sample irrRAFs under the binary polymer model. We then apply mathematical arguments to prove a new result suggested by those simulations: at the transition catalysis level at which RAFs first form in this model, small RAFs are unlikely to be present. We also investigate further the relationship between RAFs and another formal approach to self-sustaining and closed chemical networks, namely chemical organisation theory (COT).

  16. Optimal scales in weighted networks

    CERN Document Server

    Garlaschelli, Diego; Fink, Thomas M A; Caldarelli, Guido

    2013-01-01

    The analysis of networks characterized by links with heterogeneous intensity or weight suffers from two long-standing problems of arbitrariness. On one hand, the definitions of topological properties introduced for binary graphs can be generalized in non-unique ways to weighted networks. On the other hand, even when a definition is given, there is no natural choice of the (optimal) scale of link intensities (e.g. the money unit in economic networks). Here we show that these two seemingly independent problems can be regarded as intimately related, and propose a common solution to both. Using a formalism that we recently proposed in order to map a weighted network to an ensemble of binary graphs, we introduce an information-theoretic approach leading to the least biased generalization of binary properties to weighted networks, and at the same time fixing the optimal scale of link intensities. We illustrate our method on various social and economic networks.

  17. Multistage Relaying Using Interference Networks

    CERN Document Server

    Muthuramalingam, Bama; Thangaraj, Andrew

    2010-01-01

    Wireless networks with multiple nodes that relay information from a source to a destination are expected to be deployed in many applications. Therefore, understanding their design and performance under practical constraints is important. In this work, we propose and study three multihopping decode and forward (MDF) protocols for multistage half-duplex relay networks with no direct link between the source and destination nodes. In all three protocols, we assume no cooperation across relay nodes for encoding and decoding. Numerical evaluation in illustrative example networks and comparison with cheap relay cut-set bounds for half-duplex networks show that the proposed MDF protocols approach capacity in some ranges of channel gains. The main idea in the design of the protocols is the use of coding in interference networks that are created in different states or modes of a half-duplex network. Our results suggest that multistage half-duplex relaying with practical constraints on cooperation is comparable to point...

  18. Formal Women-only Networks

    DEFF Research Database (Denmark)

    Villesèche, Florence; Josserand, Emmanuel

    2017-01-01

    implications: The paper contributes to research showing that the social structure of interactions and context can impact women’s standing in the workplace. Originality/value: The paper sheds light on the under-studied and under-theorised phenomenon of formal women-only business networks. Beyond the individual...... internal and external women-only networks and use the broader social capital and network literature to frame their arguments and develop propositions. Findings: Propositions are developed regarding how both internal and external formal women-only business networks can be of value for members, firms....../organisations and the wider social group of women in business. Research limitations/implications: The authors focus on the distinction between external and internal formal women-only networks while also acknowledging the broader diversity that can characterise such networks. Their review provides the reader with an insight...

  19. Eradicating Computer Viruses on Networks

    CERN Document Server

    Huang, Jinyu

    2012-01-01

    Spread of computer viruses can be modeled as the SIS (susceptible-infected-susceptible) epidemic propagation. We show that in order to ensure the random immunization or the targeted immunization effectively prevent computer viruses propagation on homogeneous networks, we should install antivirus programs in every computer node and frequently update those programs. This may produce large work and cost to install and update antivirus programs. Then we propose a new policy called "network monitors" to tackle this problem. In this policy, we only install and update antivirus programs for small number of computer nodes, namely the "network monitors". Further, the "network monitors" can monitor their neighboring nodes' behavior. This mechanism incur relative small cost to install and update antivirus programs.We also indicate that the policy of the "network monitors" is efficient to protect the network's safety. Numerical simulations confirm our analysis.

  20. Stabilization of Branching Queueing Networks

    CERN Document Server

    Brázdil, Tomáš

    2011-01-01

    Queueing networks are gaining attraction for the performance analysis of parallel computer systems. A Jackson network is a set of interconnected servers, where the completion of a job at server i may result in the creation of a new job for server j. We propose to extend Jackson networks by "branching" and by "control" features. Both extensions are new and substantially expand the modelling power of Jackson networks. On the other hand, the extensions raise computational questions, particularly concerning the stability of the networks, i.e, the ergodicity of the underlying Markov chain. We show for our extended model that it is decidable in polynomial time if there exists a controller that achieves stability. Moreover, if such a controller exists, one can efficiently compute a static randomized controller which stabilizes the network in a very strong sense; in particular, all moments of the queue sizes are finite.

  1. Comparison between Networked Control System behaviour based on CAN and Switched Ethernet networks

    OpenAIRE

    Brahimi, Belynda; Rondeau, Eric; Aubrun, Christophe

    2006-01-01

    7 pages; International audience; The distributed control systems are more and more used in many industrial applications. These systems are often referred as “Networked control systems”. The goal of this paper is to show the network influence on feedback control systems. Two networks are considered: Switched Ethernet network and CAN fieldbus. The first one represents the non deterministic network and second one represents the deterministic one. Several scenarii are studied to analyse the stabi...

  2. Fuzzy Neural Network Based Traffic Prediction and Congestion Control in High-Speed Networks

    Institute of Scientific and Technical Information of China (English)

    费翔; 何小燕; 罗军舟; 吴介一; 顾冠群

    2000-01-01

    Congestion control is one of the key problems in high-speed networks, such as ATM. In this paper, a kind of traffic prediction and preventive congestion control scheme is proposed using neural network approach. Traditional predictor using BP neural network has suffered from long convergence time and dissatisfying error. Fuzzy neural network developed in this paper can solve these problems satisfactorily. Simulations show the comparison among no-feedback control scheme,reactive control scheme and neural network based control scheme.

  3. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    Ying-Cheng Lai; Adilson Motter; Takashi Nishikawa; Kwangho Park; Liang Zhao

    2005-04-01

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. In particular, we review two related problems: attack-induced cascading breakdown and range-based attacks on links. A cascade in a network means the failure of a substantial fraction of the entire network in a cascading manner, which can be induced by the failure of or attacks on only a few nodes. These have been reported for the internet and for the power grid (e.g., the August 10, 1996 failure of the western United States power grid). We study a mechanism for cascades in complex networks by constructing a model incorporating the flows of information and physical quantities in the network. Using this model we can also show that the cascading phenomenon can be understood as a phase transition in terms of the key parameter characterizing the node capacity. For a parameter value below the phase-transition point, cascading failures can cause the network to disintegrate almost entirely. We will show how to obtain a theoretical estimate for the phase-transition point. The second problem is motivated by the fact that most existing works on the security of complex networks consider attacks on nodes rather than on links. We address attacks on links. Our investigation leads to the finding that many scale-free networks are more sensitive to attacks on short-range than on long-range links. Considering that the small-world phenomenon in complex networks has been identified as being due to the presence of long-range links, i.e., links connecting nodes that would otherwise be separated by a long node-to-node distance, our result, besides its importance concerning network efficiency and security, has the striking implication that the small-world property of scale-free networks is mainly due to short-range links.

  4. Show Horse Welfare: Horse Show Competitors' Understanding, Awareness, and Perceptions of Equine Welfare.

    Science.gov (United States)

    Voigt, Melissa A; Hiney, Kristina; Richardson, Jennifer C; Waite, Karen; Borron, Abigail; Brady, Colleen M

    2016-01-01

    The purpose of this study was to gain a better understanding of stock-type horse show competitors' understanding of welfare and level of concern for stock-type show horses' welfare. Data were collected through an online questionnaire that included questions relating to (a) interest and general understanding of horse welfare, (b) welfare concerns of the horse show industry and specifically the stock-type horse show industry, (c) decision-making influences, and (d) level of empathic characteristics. The majority of respondents indicated they agree or strongly agree that physical metrics should be a factor when assessing horse welfare, while fewer agreed that behavioral and mental metrics should be a factor. Respondent empathy levels were moderate to high and were positively correlated with the belief that mental and behavioral metrics should be a factor in assessing horse welfare. Respondents indicated the inhumane practices that most often occur at stock-type shows include excessive jerking on reins, excessive spurring, and induced excessive unnatural movement. Additionally, respondents indicated association rules, hired trainers, and hired riding instructors are the most influential regarding the decisions they make related to their horses' care and treatment.

  5. Models and average properties of scale-free directed networks

    Science.gov (United States)

    Bernhardsson, Sebastian; Minnhagen, Petter

    2006-08-01

    We extend the merging model for undirected networks by Kim [Eur. Phys. J. B 43, 369 (2004)] to directed networks and investigate the emerging scale-free networks. Two versions of the directed merging model, friendly and hostile merging, give rise to two distinct network types. We uncover that some nontrivial features of these two network types resemble two levels of a certain randomization/nonspecificity in the link reshuffling during network evolution. Furthermore, the same features show up, respectively, in metabolic networks and transcriptional networks. We introduce measures that single out the distinguishing features between the two prototype networks, as well as point out features that are beyond the prototypes.

  6. Fractal and multifractal analyses of bipartite networks.

    Science.gov (United States)

    Liu, Jin-Long; Wang, Jian; Yu, Zu-Guo; Xie, Xian-Hua

    2017-03-31

    Bipartite networks have attracted considerable interest in various fields. Fractality and multifractality of unipartite (classical) networks have been studied in recent years, but there is no work to study these properties of bipartite networks. In this paper, we try to unfold the self-similarity structure of bipartite networks by performing the fractal and multifractal analyses for a variety of real-world bipartite network data sets and models. First, we find the fractality in some bipartite networks, including the CiteULike, Netflix, MovieLens (ml-20m), Delicious data sets and (u, v)-flower model. Meanwhile, we observe the shifted power-law or exponential behavior in other several networks. We then focus on the multifractal properties of bipartite networks. Our results indicate that the multifractality exists in those bipartite networks possessing fractality. To capture the inherent attribute of bipartite network with two types different nodes, we give the different weights for the nodes of different classes, and show the existence of multifractality in these node-weighted bipartite networks. In addition, for the data sets with ratings, we modify the two existing algorithms for fractal and multifractal analyses of edge-weighted unipartite networks to study the self-similarity of the corresponding edge-weighted bipartite networks. The results show that our modified algorithms are feasible and can effectively uncover the self-similarity structure of these edge-weighted bipartite networks and their corresponding node-weighted versions.

  7. Fractal and multifractal analyses of bipartite networks

    Science.gov (United States)

    Liu, Jin-Long; Wang, Jian; Yu, Zu-Guo; Xie, Xian-Hua

    2017-01-01

    Bipartite networks have attracted considerable interest in various fields. Fractality and multifractality of unipartite (classical) networks have been studied in recent years, but there is no work to study these properties of bipartite networks. In this paper, we try to unfold the self-similarity structure of bipartite networks by performing the fractal and multifractal analyses for a variety of real-world bipartite network data sets and models. First, we find the fractality in some bipartite networks, including the CiteULike, Netflix, MovieLens (ml-20m), Delicious data sets and (u, v)-flower model. Meanwhile, we observe the shifted power-law or exponential behavior in other several networks. We then focus on the multifractal properties of bipartite networks. Our results indicate that the multifractality exists in those bipartite networks possessing fractality. To capture the inherent attribute of bipartite network with two types different nodes, we give the different weights for the nodes of different classes, and show the existence of multifractality in these node-weighted bipartite networks. In addition, for the data sets with ratings, we modify the two existing algorithms for fractal and multifractal analyses of edge-weighted unipartite networks to study the self-similarity of the corresponding edge-weighted bipartite networks. The results show that our modified algorithms are feasible and can effectively uncover the self-similarity structure of these edge-weighted bipartite networks and their corresponding node-weighted versions. PMID:28361962

  8. Fractal and multifractal analyses of bipartite networks

    Science.gov (United States)

    Liu, Jin-Long; Wang, Jian; Yu, Zu-Guo; Xie, Xian-Hua

    2017-03-01

    Bipartite networks have attracted considerable interest in various fields. Fractality and multifractality of unipartite (classical) networks have been studied in recent years, but there is no work to study these properties of bipartite networks. In this paper, we try to unfold the self-similarity structure of bipartite networks by performing the fractal and multifractal analyses for a variety of real-world bipartite network data sets and models. First, we find the fractality in some bipartite networks, including the CiteULike, Netflix, MovieLens (ml-20m), Delicious data sets and (u, v)-flower model. Meanwhile, we observe the shifted power-law or exponential behavior in other several networks. We then focus on the multifractal properties of bipartite networks. Our results indicate that the multifractality exists in those bipartite networks possessing fractality. To capture the inherent attribute of bipartite network with two types different nodes, we give the different weights for the nodes of different classes, and show the existence of multifractality in these node-weighted bipartite networks. In addition, for the data sets with ratings, we modify the two existing algorithms for fractal and multifractal analyses of edge-weighted unipartite networks to study the self-similarity of the corresponding edge-weighted bipartite networks. The results show that our modified algorithms are feasible and can effectively uncover the self-similarity structure of these edge-weighted bipartite networks and their corresponding node-weighted versions.

  9. RESEARCH ON ADAPTIVE COMPRESSION CODING FOR NETWORK CODING IN WIRELESS SENSOR NETWORK

    Institute of Scientific and Technical Information of China (English)

    Liu Ying; Yang Zhen; Mei Zhonghui; Kong Yuanyuan

    2012-01-01

    Based on the sequence entropy of Shannon information theory,we work on the network coding technology in Wireless Sensor Network (WSN).In this paper,we take into account the similarity of the transmission sequences at the network coding node in the multi-sources and multi-receivers network in order to compress the data redundancy.Theoretical analysis and computer simulation results show that this proposed scheme not only further improves the efficiency of network transmission and enhances the throughput of the network,but also reduces the energy consumption of sensor nodes and extends the network life cycle.

  10. Binets: Fundamental Building Blocks for Phylogenetic Networks.

    Science.gov (United States)

    van Iersel, Leo; Moulton, Vincent; de Swart, Eveline; Wu, Taoyang

    2017-05-01

    Phylogenetic networks are a generalization of evolutionary trees that are used by biologists to represent the evolution of organisms which have undergone reticulate evolution. Essentially, a phylogenetic network is a directed acyclic graph having a unique root in which the leaves are labelled by a given set of species. Recently, some approaches have been developed to construct phylogenetic networks from collections of networks on 2- and 3-leaved networks, which are known as binets and trinets, respectively. Here we study in more depth properties of collections of binets, one of the simplest possible types of networks into which a phylogenetic network can be decomposed. More specifically, we show that if a collection of level-1 binets is compatible with some binary network, then it is also compatible with a binary level-1 network. Our proofs are based on useful structural results concerning lowest stable ancestors in networks. In addition, we show that, although the binets do not determine the topology of the network, they do determine the number of reticulations in the network, which is one of its most important parameters. We also consider algorithmic questions concerning binets. We show that deciding whether an arbitrary set of binets is compatible with some network is at least as hard as the well-known graph isomorphism problem. However, if we restrict to level-1 binets, it is possible to decide in polynomial time whether there exists a binary network that displays all the binets. We also show that to find a network that displays a maximum number of the binets is NP-hard, but that there exists a simple polynomial-time 1/3-approximation algorithm for this problem. It is hoped that these results will eventually assist in the development of new methods for constructing phylogenetic networks from collections of smaller networks.

  11. An new representation for interconnection network structures

    Institute of Scientific and Technical Information of China (English)

    刘丽华; 陈建二; 陈松乔; 贾维嘉

    2002-01-01

    An important theoretic interest is to study the relations between different interconnection networks, and to compare the capability and performance of the network structures. The most popular way to do the investigation is network emulation. Based on the classical voltage graph theory, the authors develop a new representation scheme for interconnection network structures. The new approach is a combination of algebraic methods and combinatorial methods. The results demonstrate that the voltage graph theory is a powerful tool for representing well-known interconnection networks and in implementing optimal network emulation algorithms, and in particular, show that all popular interconnection networks have very simple and intuitive representations under the new scheme. The new representation scheme also offers powerful tools for the study of network routings and emulations. For example, we present very simple constructions for optimal network emulations from the cube-connected cycles networks to the butterfly networks, and from the butterfly networks to the hypercube networks. Compared with the most popular way of network emulation, this new scheme is intuitive and easy to realize, and easy to apply to other network structures.

  12. Basketball teams as strategic networks.

    Science.gov (United States)

    Fewell, Jennifer H; Armbruster, Dieter; Ingraham, John; Petersen, Alexander; Waters, James S

    2012-01-01

    We asked how team dynamics can be captured in relation to function by considering games in the first round of the NBA 2010 play-offs as networks. Defining players as nodes and ball movements as links, we analyzed the network properties of degree centrality, clustering, entropy and flow centrality across teams and positions, to characterize the game from a network perspective and to determine whether we can assess differences in team offensive strategy by their network properties. The compiled network structure across teams reflected a fundamental attribute of basketball strategy. They primarily showed a centralized ball distribution pattern with the point guard in a leadership role. However, individual play-off teams showed variation in their relative involvement of other players/positions in ball distribution, reflected quantitatively by differences in clustering and degree centrality. We also characterized two potential alternate offensive strategies by associated variation in network structure: (1) whether teams consistently moved the ball towards their shooting specialists, measured as "uphill/downhill" flux, and (2) whether they distributed the ball in a way that reduced predictability, measured as team entropy. These network metrics quantified different aspects of team strategy, with no single metric wholly predictive of success. However, in the context of the 2010 play-offs, the values of clustering (connectedness across players) and network entropy (unpredictability of ball movement) had the most consistent association with team advancement. Our analyses demonstrate the utility of network approaches in quantifying team strategy and show that testable hypotheses can be evaluated using this approach. These analyses also highlight the richness of basketball networks as a dataset for exploring the relationships between network structure and dynamics with team organization and effectiveness.

  13. Basketball teams as strategic networks.

    Directory of Open Access Journals (Sweden)

    Jennifer H Fewell

    Full Text Available We asked how team dynamics can be captured in relation to function by considering games in the first round of the NBA 2010 play-offs as networks. Defining players as nodes and ball movements as links, we analyzed the network properties of degree centrality, clustering, entropy and flow centrality across teams and positions, to characterize the game from a network perspective and to determine whether we can assess differences in team offensive strategy by their network properties. The compiled network structure across teams reflected a fundamental attribute of basketball strategy. They primarily showed a centralized ball distribution pattern with the point guard in a leadership role. However, individual play-off teams showed variation in their relative involvement of other players/positions in ball distribution, reflected quantitatively by differences in clustering and degree centrality. We also characterized two potential alternate offensive strategies by associated variation in network structure: (1 whether teams consistently moved the ball towards their shooting specialists, measured as "uphill/downhill" flux, and (2 whether they distributed the ball in a way that reduced predictability, measured as team entropy. These network metrics quantified different aspects of team strategy, with no single metric wholly predictive of success. However, in the context of the 2010 play-offs, the values of clustering (connectedness across players and network entropy (unpredictability of ball movement had the most consistent association with team advancement. Our analyses demonstrate the utility of network approaches in quantifying team strategy and show that testable hypotheses can be evaluated using this approach. These analyses also highlight the richness of basketball networks as a dataset for exploring the relationships between network structure and dynamics with team organization and effectiveness.

  14. Global Alumni Networks

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    2015-01-01

    technical assistance and capacity development programmes have provided experts from developing countries access to epistemic communities since the early 1960s. This exploration of an alternative way of understanding capacity development programmes shows how alumni have made the networks global by using......One significant and often overlooked outcome of technical assistance and overseas capacity development programmes is the inclusion of experts from developing countries in epistemic communities. The main argument of this article is that the formal network structure offered to alumni of Japanese...

  15. Japanese VLBI Network

    CERN Document Server

    Doi, A; Harada, K; Nagayama, T; Suematsu, K; Sugiyama, K; Habe, A; Honma, M; Kawaguchi, N; Kobayashi, H; Koyama, Y; Murata, Y; Omodaka, T; Sorai, K; Sudou, H; Takaba, H; Takashima, K; Wakamatsu, K; Doi, Akihiro; Fujisawa, Kenta; Harada, Keiichiro; Nagayama, Takumi; Suematsu, Kousuke; Sugiyama, Koichiro; Habe, Asao; Honma, Mareki; Kawaguchi, Noriyuki; Kobayashi, Hideyuki; Koyama, Yasuhiro; Murata, Yasuhiro; Omodaka, Toshihiro; Sorai, Kazuo; Sudou, Hiroshi; Takaba, Hiroshi; Takashima, Kazuhiro; Wakamatsu, Ken-ichi

    2006-01-01

    We present the basic features and the activities of Japanese VLBI network (JVN), a newly-established VLBI network with baselines ranging from 50 to 2560 km spreading across the Japanese islands, and capable of observing at 6.7, 8.4, and 22 GHz. We show a number of results of JVN observations: 8.4-GHz continuum images of a Giga-hertz Peaked Spectrum (GPS) source and radio-loud Narrow-Line Seyfert 1 galaxies (NLS1s), the spatial and velocity structures of water masers in NML Cygni as well as methanol masers in Cep A, and demonstrative observations with the bigradient phase referencing.

  16. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Technical Assistance courses have many functions apart from disseminating knowledge and information, one such function is to engender networks. During the course period, participants meet and establish contact and some of these contacts remain connections between alumni for many years after...... that their personal networks engage not only their families, but also their home communities and by extension Nepal. The two women constitute weak links between their country and other countries and as such they function as bridges or channels for transmission of practices, ideas, knowledge, and artefacts. However...... the courses are finished. The alumni networks depend on the uses they are put to by the individual alumni and the support they get from alumni and host countries. The United Nations initiated technical assistance courses in the late 1940s in order to train nationals from developing countries as a means...

  17. Network dismantling

    CERN Document Server

    Braunstein, Alfredo; Semerjian, Guilhem; Zdeborová, Lenka

    2016-01-01

    We study the problem of network dismantling, that is of finding a minimal set of vertices whose removal leaves the network broken in connected components of sub-extensive size. For a large class of random graphs this problem is tightly connected to the decycling problem (the removal of vertices leaving the graph acyclic). Exploiting this connection and recent works on epidemic spreading we present precise predictions for the minimal size of a dismantling set in a large random graph with a prescribed (light-tailed) degree distribution. Building on the statistical mechanics perspective we propose a three-stage Min-Sum algorithm for efficiently dismantling networks, including heavy-tailed ones for which the dismantling and decycling problems are not equivalent. We also provide insight into the dismantling problem concluding that it is an intrinsically collective problem and optimal dismantling sets cannot be viewed as a collection of individually well performing nodes.

  18. Innovation networks

    CERN Document Server

    Ahrweiler, Petra

    2013-01-01

    This paper advances a framework for modeling the component interactions between cognitive and social aspects of scientific creativity and technological innovation. Specifically, it aims to characterize Innovation Networks; those networks that involve the interplay of people, ideas and organizations to create new, technologically feasible, commercially-realizable products, processes and organizational structures. The tri-partite framework captures networks of ideas (Concept Level), people (Individual Level) and social structures (Social-Organizational Level) and the interactions between these levels. At the concept level, new ideas are the nodes that are created and linked, kept open for further investigation or closed if solved by actors at the individual or organizational levels. At the individual level, the nodes are actors linked by shared worldviews (based on shared professional, educational, experiential backgrounds) who are the builders of the concept level. At the social-organizational level, the nodes...

  19. Network interruptions

    CERN Multimedia

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  20. Transcriptome characterization of Ishige okamurae (Phaeophyceae) shows strong environmental acclimation

    Institute of Scientific and Technical Information of China (English)

    QU Jieqiong; WANG Xumin; CHI Shan; WU Shuangxiu; SUN Jing; LIU Cui; CHEN Shengping; YU Jun; LIU Tao

    2014-01-01

    Ishige okamurae, with leathery branched narrow fronds consisting of cylindrical hairs, is the typical species of the genus Ishige, which is considered as one of the most basal genera in the phylogeny of the Phaeophy-ceae. Apart from great public interest from the evolutionary respect, more attention has been brought on the abundant bioactive compounds in I. okamurae for therapeutic or economic considerations, such as di-phlorethohydroxycarmalol and ishigoside. Yet little is known about related key genes or metabolic pathways involved in I. okamurae, which calls upon us to carry out global analyses of transcriptome by next generation sequencing. Altogether, we obtained 78 583 assembled scaffolds with N50 of 1 709 nucleotides, and 25 357 unigenes with significant BLAST matches (E-value cutoff of 10-5). In terms of characterization of the tran-scriptome of I. okamurae, we focused on anti-stress metabolic pathways and synthetic routes of bioactive compounds in an attempt to obtain a better understanding of the interactive organism-environment regula-tory networks. Pathway-based analysis helped us to deepen our comprehension of the interaction between I. okamurae and its surroundings, with MAPK signal pathway as an example. Furthermore, we discovered a wide range of novel putative functional proteins that could be of wide application, such as Rab family, using sequence-based transcriptome. In conclusion, transcriptome characterization of I. okamurae (Phaeophy-ceae) shows strong environmental acclimation.

  1. Transport optimization on complex networks

    CERN Document Server

    Danila, Bogdan; Marsh, John A; Bassler, Kevin E

    2007-01-01

    We present a comparative study of the application of a recently introduced heuristic algorithm to the optimization of transport on three major types of complex networks. The algorithm balances network traffic iteratively by minimizing the maximum node betweenness with as little path lengthening as possible. We show that by using this optimal routing, a network can sustain significantly higher traffic without jamming than in the case of shortest path routing. A formula is proved that allows quick computation of the average number of hops along the path and of the average travel times once the betweennesses of the nodes are computed. Using this formula, we show that routing optimization preserves the small-world character exhibited by networks under shortest path routing, and that it significantly reduces the average travel time on congested networks with only a negligible increase in the average travel time at low loads. Finally, we study the correlation between the weights of the links in the case of optimal ...

  2. Network reconstruction from infection cascades

    CERN Document Server

    Braunstein, Alfredo

    2016-01-01

    Reconstructing propagation networks from observations is a fundamental inverse problem, and it's crucial to understand and control dynamics in complex systems. Here we show that it is possible to reconstruct the whole structure of an interaction network and to simultaneously infer the complete time course of activation spreading, relying just on single snapshots of a small number of activity cascades. The method, that we called Inverse Dynamics Network Reconstruction (IDNR), is shown to work successfully on several synthetic and real networks, inferring the networks and the sources of infection based on sparse observations, including single snapshots. IDNR is built on a Belief Propagation approximation, that has an impressive performance in a wide variety of topological structures. The method can be applied in absence of complete time-series data by providing a detailed modeling of the posterior distribution of trajectories conditioned to the observations. Furthermore, we show by experiments that the informat...

  3. Distributed Assessment of Network Centrality

    CERN Document Server

    Wehmuth, Klaus

    2011-01-01

    We propose a method for the Distributed Assessment of Network CEntrality (DANCE) in complex networks. DANCE attributes to each node a volume-based centrality computed using only localized information, thus not requiring knowledge of the full network topology. We show DANCE is simple, yet efficient, in assessing node centrality in a distributed way. Our proposal also provides a way for locating the most central nodes, again using only the localized information at each node. We also show that the node rankings based on DANCE's centrality and the traditional closeness centrality correlate very well. This is quite useful given the vast potential applicability of closeness centrality, which is however limited by its high computational costs. We experimentally evaluate DANCE against a state-of-the-art proposal to distributively assess network centrality. Results attest that DANCE achieves similar effectiveness in assessing network centrality, but with a significant reduction in the associated costs for practical ap...

  4. Dynamical Convergence Trajectory in Networks

    Institute of Scientific and Technical Information of China (English)

    TAN Ning; ZHANG Yun-Jun; OUYANG Qi; GENG Zhi

    2005-01-01

    @@ It is well known that topology and dynamics are two major aspects to determine the function of a network. We study one of the dynamic properties of a network: trajectory convergence, i.e. how a system converges to its steady state. Using numerical and analytical methods, we show that in a logical-like dynamical model, the occurrence of convergent trajectory in a network depends mainly on the type of the fixed point and the ratio between activation and inhibition links. We analytically proof that this property is induced by the competition between two types of state transition structures in phase space: tree-like transition structure and star-like transition structure. We show that the biological networks, such as the cell cycle network in budding yeast, prefers the tree-like transition structures and suggest that this type of convergence trajectories may be universal.

  5. Control of collective network chaos

    Energy Technology Data Exchange (ETDEWEB)

    Wagemakers, Alexandre, E-mail: alexandre.wagemakers@urjc.es; Sanjuán, Miguel A. F., E-mail: miguel.sanjuan@urjc.es [Departamento de Física, Universidad Rey Juan Carlos, Tulipán s/n, 28933 Móstoles, Madrid (Spain); Barreto, Ernest, E-mail: ebarreto@gmu.edu; So, Paul, E-mail: paso@gmu.edu [School of Physics, Astronomy, and Computational Sciences and The Krasnow Institute for Advanced Study, George Mason University, Fairfax, Virginia 22030 (United States)

    2014-06-01

    Under certain conditions, the collective behavior of a large globally-coupled heterogeneous network of coupled oscillators, as quantified by the macroscopic mean field or order parameter, can exhibit low-dimensional chaotic behavior. Recent advances describe how a small set of “reduced” ordinary differential equations can be derived that captures this mean field behavior. Here, we show that chaos control algorithms designed using the reduced equations can be successfully applied to imperfect realizations of the full network. To systematically study the effectiveness of this technique, we measure the quality of control as we relax conditions that are required for the strict accuracy of the reduced equations, and hence, the controller. Although the effects are network-dependent, we show that the method is effective for surprisingly small networks, for modest departures from global coupling, and even with mild inaccuracy in the estimate of network heterogeneity.

  6. Control of collective network chaos

    Science.gov (United States)

    Wagemakers, Alexandre; Barreto, Ernest; Sanjuán, Miguel A. F.; So, Paul

    2014-06-01

    Under certain conditions, the collective behavior of a large globally-coupled heterogeneous network of coupled oscillators, as quantified by the macroscopic mean field or order parameter, can exhibit low-dimensional chaotic behavior. Recent advances describe how a small set of "reduced" ordinary differential equations can be derived that captures this mean field behavior. Here, we show that chaos control algorithms designed using the reduced equations can be successfully applied to imperfect realizations of the full network. To systematically study the effectiveness of this technique, we measure the quality of control as we relax conditions that are required for the strict accuracy of the reduced equations, and hence, the controller. Although the effects are network-dependent, we show that the method is effective for surprisingly small networks, for modest departures from global coupling, and even with mild inaccuracy in the estimate of network heterogeneity.

  7. Synchronizability on complex networks via pinning control

    Indian Academy of Sciences (India)

    Yi Liang; Xingyuan Wang

    2013-04-01

    It is proved that the maximum eigenvalue sequence of the principal submatrices of coupling matrix is decreasing. The method of calculating the number of pinning nodes is given based on this theory. The findings reveal the relationship between the decreasing speed of maximum eigenvalue sequence of the principal submatrices for coupling matrix and the synchronizability on complex networks via pinning control. We discuss the synchronizability on some networks, such as scale-free networks and small-world networks. Numerical simulations show that different pinning strategies have different pinning synchronizability on the same complex network, and the synchronizability with pinning control is consistent with one without pinning control in various complex networks.

  8. Multigradient for Neural Networks for Equalizers

    Directory of Open Access Journals (Sweden)

    Chulhee Lee

    2003-06-01

    Full Text Available Recently, a new training algorithm, multigradient, has been published for neural networks and it is reported that the multigradient outperforms the backpropagation when neural networks are used as a classifier. When neural networks are used as an equalizer in communications, they can be viewed as a classifier. In this paper, we apply the multigradient algorithm to train the neural networks that are used as equalizers. Experiments show that the neural networks trained using the multigradient noticeably outperforms the neural networks trained by the backpropagation.

  9. Python passive network mapping P2NMAP

    CERN Document Server

    Hosmer, Chet

    2015-01-01

    Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important

  10. Task scheduling and vir tual machine allocation policy in cloud computing environment

    Institute of Scientific and Technical Information of China (English)

    Xiong Fu; Yeliang Cang

    2015-01-01

    Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com-puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How-ever, most of the current resource al ocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource al ocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM al ocation policy that considers bandwidth between storage nodes and hosts. The VM al ocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple-tion time and keep good load balance of physical hosts at the same time.

  11. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies.......Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...

  12. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    the focus of operations management from managing the own organization to continuously developing and managing a network of external and internal resources forming a production system. This perspective may be called managing an “extraprise” rather than an “enterprise.” It should be noted that “an industrial...... network” should not be seen as an organizational form but as a perspective that can be used to enrich one's understanding of organizations. The industrial network perspective has three basic building blocks: actors, resources, and activities. The three building blocks and their relations constitute...

  13. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  14. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xin Guan

    2012-04-01

    Full Text Available Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs. Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR.We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  15. Evolution Properties of Modules in Complex Networks

    Institute of Scientific and Technical Information of China (English)

    LI Ke-Ping; GAO Zi-You

    2008-01-01

    In complex networks, network modules play a center role, which carry out a key function. In this paper, we introduce the spatial correlation function to describe the relationships among the network modules. Our focus is to investigate how the network modules evolve, and what the evolution properties of the modules are. In order to test the proposed method, as the examples, we use our method to analyze and discuss the ER random network and scale-free network. Rigorous analysis of the existing data shows that the introduced correlation function is suitable for describing the evolution properties of network modules. Remarkably, the numerical simulations indicate that the ER random network and scale-free network have different evolution properties.

  16. Epidemic and Cascading Survivability of Complex Networks

    CERN Document Server

    Manzano, Marc; Ripoll, Jordi; Fagertun, Anna Manolova; Torres-Padrosa, Victor; Pahwa, Sakshi; Scoglio, Caterina

    2014-01-01

    Our society nowadays is governed by complex networks, examples being the power grids, telecommunication networks, biological networks, and social networks. It has become of paramount importance to understand and characterize the dynamic events (e.g. failures) that might happen in these complex networks. For this reason, in this paper, we propose two measures to evaluate the vulnerability of complex networks in two different dynamic multiple failure scenarios: epidemic-like and cascading failures. Firstly, we present \\emph{epidemic survivability} ($ES$), a new network measure that describes the vulnerability of each node of a network under a specific epidemic intensity. Secondly, we propose \\emph{cascading survivability} ($CS$), which characterizes how potentially injurious a node is according to a cascading failure scenario. Then, we show that by using the distribution of values obtained from $ES$ and $CS$ it is possible to describe the vulnerability of a given network. We consider a set of 17 different compl...

  17. Measurement methods on the complexity of network

    Institute of Scientific and Technical Information of China (English)

    LIN Lin; DING Gang; CHEN Guo-song

    2010-01-01

    Based on the size of network and the number of paths in the network,we proposed a model of topology complexity of a network to measure the topology complexity of the network.Based on the analyses of the effects of the number of the equipment,the types of equipment and the processing time of the node on the complexity of the network with the equipment-constrained,a complexity model of equipment-constrained network was constructed to measure the integrated complexity of the equipment-constrained network.The algorithms for the two models were also developed.An automatic generator of the random single label network was developed to test the models.The results show that the models can correctly evaluate the topology complexity and the integrated complexity of the networks.

  18. Contagion on complex networks with persuasion

    CERN Document Server

    Huang, Wei-Min; Xu, Xin-Jian; Fu, Xinchu

    2016-01-01

    The threshold model has been widely adopted as a classic model for studying contagion processes on social networks. We consider asymmetric individual interactions in social networks and introduce a persuasion mechanism into the threshold model. Specifically, we study a combination of adoption and persuasion in cascading processes on complex networks. It is found that with the introduction of the persuasion mechanism, the system may become more vulnerable to global cascades, and the effects of persuasion tend to be more significant in heterogeneous networks than those in homogeneous networks: a comparison between heterogeneous and homogeneous networks shows that under weak persuasion, heterogeneous networks tend to be more robust against random shocks than homogeneous networks; whereas under strong persuasion, homogeneous networks are more stable. Finally, we study the effects of adoption and persuasion threshold heterogeneity on systemic stability. Though both heterogeneities give rise to global cascades, the...

  19. Software engineering and scale-free networks.

    Science.gov (United States)

    Wen, Lian; Dromey, R Geoff; Kirk, Diana

    2009-08-01

    Complex-network theory is a new approach in studying different types of large systems in both the physical and the abstract worlds. In this paper, we have studied two kinds of network from software engineering: the component dependence network and the sorting comparison network (SCN). It is found that they both show the same scale-free property under certain conditions as complex networks in other fields. These results suggest that complex-network theory can be a useful approach to the study of software systems. The special properties of SCNs provide a more repeatable and deterministic way to study the evolution and optimization of complex networks. They also suggest that the closer a sorting algorithm is to the theoretical optimal limit, the more its SCN is like a scale-free network. This may also indicate that, to store and retrieve information efficiently, a concept network might need to be scale-free.

  20. Inferring network topology via the propagation process

    CERN Document Server

    Zeng, An

    2013-01-01

    Inferring the network topology from the dynamics is a fundamental problem with wide applications in geology, biology and even counter-terrorism. Based on the propagation process, we present a simple method to uncover the network topology. The numerical simulation on artificial networks shows that our method enjoys a high accuracy in inferring the network topology. We find the infection rate in the propagation process significantly influences the accuracy, and each network is corresponding to an optimal infection rate. Moreover, the method generally works better in large networks. These finding are confirmed in both real social and nonsocial networks. Finally, the method is extended to directed networks and a similarity measure specific for directed networks is designed.

  1. Revealing the Hidden Language of Complex Networks

    Science.gov (United States)

    Yaveroğlu, Ömer Nebil; Malod-Dognin, Noël; Davis, Darren; Levnajic, Zoran; Janjic, Vuk; Karapandza, Rasa; Stojmirovic, Aleksandar; Pržulj, Nataša

    2014-04-01

    Sophisticated methods for analysing complex networks promise to be of great benefit to almost all scientific disciplines, yet they elude us. In this work, we make fundamental methodological advances to rectify this. We discover that the interaction between a small number of roles, played by nodes in a network, can characterize a network's structure and also provide a clear real-world interpretation. Given this insight, we develop a framework for analysing and comparing networks, which outperforms all existing ones. We demonstrate its strength by uncovering novel relationships between seemingly unrelated networks, such as Facebook, metabolic, and protein structure networks. We also use it to track the dynamics of the world trade network, showing that a country's role of a broker between non-trading countries indicates economic prosperity, whereas peripheral roles are associated with poverty. This result, though intuitive, has escaped all existing frameworks. Finally, our approach translates network topology into everyday language, bringing network analysis closer to domain scientists.

  2. Gossip in random networks

    CERN Document Server

    Malarz, K; Szekfu, B; Kulakowski, K

    2006-01-01

    We consider the average probability X of being informed on a gossip in a given social network. The network is modeled within the random graph theory of Erdos and Renyi. In this theory, a network is characterized by two parameters: the size N and the link probability p. Our experimental data suggest three levels of social inclusion of friendship. The critical value p_c, for which half of agents are informed, scales with the system size as N^{-\\gamma} with \\gamma\\approx 0.68. Computer simulations show that the probability X varies with p as a sigmoidal curve. Influence of the correlations between neighbors is also evaluated: with increasing clustering coefficient C, X decreases.

  3. Fitness for synchronization of network motifs

    DEFF Research Database (Denmark)

    Vega, Y.M.; Vázquez-Prada, M.; Pacheco, A.F.

    2004-01-01

    We study the synchronization of Kuramoto's oscillators in small parts of networks known as motifs. We first report on the system dynamics for the case of a scale-free network and show the existence of a non-trivial critical point. We compute the probability that network motifs synchronize, and fi...

  4. Applications of Coding in Network Communications

    Science.gov (United States)

    Chang, Christopher SungWook

    2012-01-01

    This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…

  5. Scaling in topological properties of brain networks

    NARCIS (Netherlands)

    Singh, S.S.; Khundrakpam, B.; Reid, A.T.; Lewis, J.D.; Evans, A.C.; Ishrat, R.; Sharma, B.I.; Singh, R.K.B.

    2016-01-01

    The organization in brain networks shows highly modular features with weak inter-modular interaction. The topology of the networks involves emergence of modules and sub-modules at different levels of constitution governed by fractal laws that are signatures of self-organization in complex networks.

  6. Application framework for programmable network control

    NARCIS (Netherlands)

    Strijkers, R.; Cristea, M.; de Laat, C.; Meijer, R.; Clemm, A.; Wolter, R.

    2011-01-01

    We present a framework that enables application developers to create complex and application specific network services. The essence of our approach is to utilize programmable network elements to create a software representation of network elements in the application. We show that the typical pattern

  7. Characterization of Polymer Networks by Swelling

    DEFF Research Database (Denmark)

    Frankær, Sarah Maria; Jensen, Mette Krog; Bejenariu, Anca Gabriela;

    2009-01-01

    The linear dynamic response of crosslinked PDMS samples with different stoichiometries, as well as the sol and network fractions, was investigated. It was found that all the networks showed similar properties after removal of the sol indicating only small deviations in the network structure upon...

  8. Personalized Network-Based Treatments in Oncology

    DEFF Research Database (Denmark)

    Robin, Xavier; Creixell, Pau; Radetskaya, Oxana;

    2013-01-01

    Network medicine aims at unraveling cell signaling networks to propose personalized treatments for patients suffering from complex diseases. In this short review, we show the relevance of network medicine to cancer treatment by outlining the potential convergence points of the most recent technol...

  9. Topological Effects on the Performance of Transportation Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Xiao-Mei; GAO Zi-You

    2007-01-01

    @@ We investigate the influence of the network topology on the performance (characterized by the total system cost and maximal traffic volume) of transportation networks, where the weights are not static (constant), but dynamic (a function of the flow on the link). Four classes of networks are used in the simulation, including regular networks, random networks, small-world networks and scale-free networks. The initial simulation results show that topologies play important roles on the performance of transportation networks, and random networks have better performance than other networks. Also, we find that there are distinct difference of the link flow distribution for various networks in both the distribution function form and the span between the minimum and the maximum of the link flow, explaining the difference of the performance among distinct networks. These findings will be useful in network design problems of transportation systems.

  10. Power Laws and Fragility in Flow Networks

    CERN Document Server

    Shore, Jesse; Bianchi, Matt T

    2013-01-01

    What makes economic and ecological networks so unlike other highly skewed networks in their tendency toward turbulence and collapse? Here, we explore the consequences of a defining feature of these networks: their nodes are tied together by flow. We show that flow networks tend to the power law degree distribution (PLDD) due to a self-reinforcing process involving position within the global network structure, and thus present the first random graph model for PLDDs that does not depend on a rich-get-richer function of nodal degree. We also show that in contrast to non-flow networks, PLDD flow networks are dramatically more vulnerable to catastrophic failure than non-PLDD flow networks, a finding with potential explanatory power in our age of resource- and financial-interdependence and turbulence.

  11. Social Network Infiltration

    Science.gov (United States)

    Plait, Philip

    2008-05-01

    Social networks are websites (or software that distributes media online) where users can distribute content to either a list of friends on that site or to anyone who surfs onto their page, and where those friends can interact and discuss the content. By linking to friends online, the users’ personal content (pictures, songs, favorite movies, diaries, websites, and so on) is dynamically distributed, and can "become viral", that is, get spread rapidly as more people see it and spread it themselves. Social networks are immensely popular around the planet, especially with younger users. The biggest social networks are Facebook and MySpace; an IYA2009 user already exists on Facebook, and one will be created for MySpace (in fact, several NASA satellites such as GLAST and Swift already have successful MySpace pages). Twitter is another network where data distribution is more limited; it is more like a mini-blog, but is very popular. IYA2009 already has a Twitter page, and will be updated more often with relevant information. In this talk I will review the existing social networks, show people how and why they are useful, and give them the tools they need to contribute meaningfully to IYA's online reach.

  12. Network modularity promotes cooperation.

    Science.gov (United States)

    Marcoux, Marianne; Lusseau, David

    2013-05-01

    Cooperation in animals and humans is widely observed even if evolutionary biology theories predict the evolution of selfish individuals. Previous game theory models have shown that cooperation can evolve when the game takes place in a structured population such as a social network because it limits interactions between individuals. Modularity, the natural division of a network into groups, is a key characteristic of all social networks but the influence of this crucial social feature on the evolution of cooperation has never been investigated. Here, we provide novel pieces of evidence that network modularity promotes the evolution of cooperation in 2-person prisoner's dilemma games. By simulating games on social networks of different structures, we show that modularity shapes interactions between individuals favouring the evolution of cooperation. Modularity provides a simple mechanism for the evolution of cooperation without having to invoke complicated mechanisms such as reputation or punishment, or requiring genetic similarity among individuals. Thus, cooperation can evolve over wider social contexts than previously reported.

  13. Oscillations of simple networks

    CERN Document Server

    Caputo, Jean-Guy; Simo, Elie

    2011-01-01

    To describe the flow of a miscible quantity on a network, we introduce the graph wave equation where the standard continuous Laplacian is replaced by the graph Laplacian. This is a natural description of an array of inductances and capacities, of fluid flow in a network of ducts and of a system of masses and springs. The structure of the graph influences strongly the dynamics which is naturally described using the basis of the eigenvectors. In particular, we show that if two outer nodes are connected to a common third node with the same coupling, then this coupling is an eigenvalue of the Laplacian. Assuming the graph is forced and damped at specific nodes, we derive the amplitude equations. These are analyzed for two simple non trivial networks: a tree and a graph with a cycle. Forcing the network at a resonant frequency reveals that damping can be ineffective if applied to the wrong node, leading to a disastrous resonance and destruction of the network. These results could be useful for complex physical net...

  14. Network Physiology: Mapping Interactions Between Networks of Physiologic Networks

    Science.gov (United States)

    Ivanov, Plamen Ch.; Bartsch, Ronny P.

    The human organism is an integrated network of interconnected and interacting organ systems, each representing a separate regulatory network. The behavior of one physiological system (network) may affect the dynamics of all other systems in the network of physiologic networks. Due to these interactions, failure of one system can trigger a cascade of failures throughout the entire network. We introduce a systematic method to identify a network of interactions between diverse physiologic organ systems, to quantify the hierarchical structure and dynamics of this network, and to track its evolution under different physiologic states. We find a robust relation between network structure and physiologic states: every state is characterized by specific network topology, node connectivity and links strength. Further, we find that transitions from one physiologic state to another trigger a markedly fast reorganization in the network of physiologic interactions on time scales of just a few minutes, indicating high network flexibility in response to perturbations. This reorganization in network topology occurs simultaneously and globally in the entire network as well as at the level of individual physiological systems, while preserving a hierarchical order in the strength of network links. Our findings highlight the need of an integrated network approach to understand physiologic function, since the framework we develop provides new information which can not be obtained by studying individual systems. The proposed system-wide integrative approach may facilitate the development of a new field, Network Physiology.

  15. Game Analysis and Optimization of T PL & VM I Supply Chain Decisions%TPL & VMI 在供应链决策中之博弈分析与优化

    Institute of Scientific and Technical Information of China (English)

    陈静; 丁涛; 何远远

    2015-01-01

    Based on the complete and perfect information of dynamic game methods ,TPL & VMI Dy‐namic Game Model of Supply Chain Cooperation Mechanism is established .After the introduction of TPL (TPL) for a single manufacturer‐one supplier of VMI (Vendor Managed Inventory) supply chain decision analysis model was constructed and solved .TPL were not involved in the analysis of the sup‐ply chain inventory decision and participate in the profits of the supply chain inventory decision after parties in the supply chain ,decentralized decision and centralized control of profit under the parties . The use of centralized control of finishing profit TPL & VMI supply chain optimization analysis ,opti‐mization results show that centralized control of the supply chain could achieve optimal profits .%基于完全且完美信息动态博弈方法,建立了 TPL&VMI(引入第三方物流的供应商管理库存)供应链合作机制的非零和动态博弈模型。引入 T PL (第三方物流企业)后对单制造商—单供应商的VMI(供应商管理库存)供应链决策模型进行分析、构建与求解。分别分析了 TPL不参与供应链库存决策和参与供应链库存决策后供应链中各方的利润情况,即分散决策和集中控制下各方的利润。利用集中控制对TPL&VMI供应链的整理利润进行优化分析,优化结果表明集中控制能使供应链的利润达到最优。

  16. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...

  17. Classy Network

    OpenAIRE

    Karítas Ólafsdóttir 1992; Sveinn Dal Björnsson 1984

    2015-01-01

    In this report we discuss a B.Sc project; Classy Network This work was conducted at Reykjavik University in the fall of 2015 in collaboration with Classy Sound and Jökulá ehf. The report introduces a new dashboard that is an overhead for the business protocols of the company Classy Sound.

  18. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2017-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  19. Community Detection in Complex Networks

    Institute of Scientific and Technical Information of China (English)

    Nan Du; Bai Wang; Bin Wu

    2008-01-01

    With the rapidly growing evidence that various systems in nature and society can be modeled as complex networks, community detection in networks becomes a hot research topic in physics, sociology, computer society, etc. Although this investigation of community structures has motivated many diverse algorithms, most of them are unsuitable when dealing with large networks due to their computational cost. In this paper, we present a faster algorithm ComTeetor,which is more efficient for the community detection in large complex networks based on the nature of overlapping cliques.This algorithm does not require any priori knowledge about the number or the original division of the communities. With respect to practical applications, ComTector is challenging with five different types of networks including the classic Zachary Karate Club, Scientific Collaboration Network, South Florida Free Word Association Network, Urban Traffic Network, North America Power Grid and the Telecomnmnication Call Network. Experimental results show that our algorithm can discover meaningful communities that meet both the objective basis and our intuitions.

  20. Remote Synchronization in Complex Networks

    CERN Document Server

    Gambuzza, Lucia Valentina; Fiasconaro, Alessandro; Fortuna, Luigi; Gómez-Gardeñes, Jesús; Frasca, Mattia

    2013-01-01

    We show the existence of a novel dynamical state called remote synchronization in general networks of coupled oscillators. This state is characterized by the synchronization of pairs of nodes that are not directly connected via a physical link or any sequence of synchronized nodes. This phenomenon cannot be observed in networks of phase oscillators as its underlying mechanism is the modulation of the amplitude of those intermediary nodes between the remotely synchronized units. Our findings thus show the ubiquity and robustness of these states and bridge the gap from their recent observation in simple toy graphs to complex networks.

  1. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  2. Distance metric learning for complex networks: Towards size-independent comparison of network structures

    Science.gov (United States)

    Aliakbary, Sadegh; Motallebi, Sadegh; Rashidian, Sina; Habibi, Jafar; Movaghar, Ali

    2015-02-01

    Real networks show nontrivial topological properties such as community structure and long-tail degree distribution. Moreover, many network analysis applications are based on topological comparison of complex networks. Classification and clustering of networks, model selection, and anomaly detection are just some applications of network comparison. In these applications, an effective similarity metric is needed which, given two complex networks of possibly different sizes, evaluates the amount of similarity between the structural features of the two networks. Traditional graph comparison approaches, such as isomorphism-based methods, are not only too time consuming but also inappropriate to compare networks with different sizes. In this paper, we propose an intelligent method based on the genetic algorithms for integrating, selecting, and weighting the network features in order to develop an effective similarity measure for complex networks. The proposed similarity metric outperforms state of the art methods with respect to different evaluation criteria.

  3. Breakdown of an Inhomogeneous Scale- Free Network Under Intentional Attack

    Institute of Scientific and Technical Information of China (English)

    LIN Guo-Ji; CHENG Xiang; OU-YANG Qi

    2003-01-01

    Using a recently introduced network model with node and connection diversity, we study the breakdown of different scale-free networks under intentional attacks. Our simulation results show that inhomogeneous networks are more sensitive to intentional attack than the homogeneous ones and that the centralization of the networks is an important variable, reflecting the characteristics of the network under intentional attack. Using a recently introduced method we can theoretically develop the critical point of the inhomogeneous networks.

  4. Building a Chaotic Proved Neural Network

    CERN Document Server

    Bahi, Jacques M; Salomon, Michel

    2011-01-01

    Chaotic neural networks have received a great deal of attention these last years. In this paper we establish a precise correspondence between the so-called chaotic iterations and a particular class of artificial neural networks: global recurrent multi-layer perceptrons. We show formally that it is possible to make these iterations behave chaotically, as defined by Devaney, and thus we obtain the first neural networks proven chaotic. Several neural networks with different architectures are trained to exhibit a chaotical behavior.

  5. Associative memory in phasing neuron networks

    Energy Technology Data Exchange (ETDEWEB)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  6. FLOOD ROUTING BASED ON NETWORK CODING (NCF)

    OpenAIRE

    HOSSEIN BALOOCHIAN; MOZAFAR BAGMOHAMMADI

    2010-01-01

    Most of the energy in a sensor network is used for transmission of data packets. For this reason, optimization of energy consumption is of utmost importance in these networks. This paper presents NCF, a flood routing protocol based on network coding. Simulations show that in addition to eliminating the drawbacks of traditional flooding methods, like the explosion phenomenon, NCF increases the lifetime of the network by at least 20% and decreases the number of packet transmissions. Another adv...

  7. Process Neural Networks Theory and Applications

    CERN Document Server

    He, Xingui

    2010-01-01

    "Process Neural Networks - Theory and Applications" proposes the concept and model of a process neural network for the first time, showing how it expands the mapping relationship between the input and output of traditional neural networks, and enhancing the expression capability for practical problems, with broad applicability to solving problems relating to process in practice. Some theoretical problems such as continuity, functional approximation capability, and computing capability, are strictly proved. The application methods, network construction principles, and optimization alg

  8. Approximate Capacity of Gaussian Relay Networks

    CERN Document Server

    Avestimehr, Amir Salman; Tse, David N C

    2008-01-01

    We present an achievable rate for general Gaussian relay networks. We show that the achievable rate is within a constant number of bits from the information-theoretic cut-set upper bound on the capacity of these networks. This constant depends on the topology of the network, but not the values of the channel gains. Therefore, we uniformly characterize the capacity of Gaussian relay networks within a constant number of bits, for all channel parameters.

  9. Percolation of secret in a network

    CERN Document Server

    Leverrier, Anthony

    2011-01-01

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks, more precisely the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a classical context.

  10. Decentralized network management based on mobile agent

    Institute of Scientific and Technical Information of China (English)

    李锋; 冯珊

    2004-01-01

    The mobile agent technology can be employed effectively for the decentralized management of complex networks. We show how the integration of mobile agent with legacy management protocol, such as simple network management protocol (SNMP), leads to decentralized management architecture. HostWatcher is a framework that allows mobile agents to roam network, collect and process data, and perform certain adaptive actions. A prototype system is built and a quantitative analysis underlines the benefits in respect to reducing network load.

  11. Evolving networks:from topology to dynamics

    Institute of Scientific and Technical Information of China (English)

    Zhengping FAN; Guanrong CHEN; King Tim KO

    2004-01-01

    A multi-local-world model is introduced to describe the evolving networks that have a localization property such as the Intemet. Based on this model, we show that the traffic load defined by "betweenness centrality" on the multi-local-world scale-free networks' model also follows a power law form. In this kind of network, a few vertices have heavier loads and so play more important roles than the others in the network.

  12. Social networks in primates: smart and tolerant species have more efficient networks

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J. J.; Pelé, Marie; Bergstrom, Mackenzie L.; Borgeaud, Christèle; Brosnan, Sarah F.; Crofoot, Margaret C.; Fedigan, Linda M.; Fichtel, Claudia; Hopper, Lydia M.; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-01-01

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities. PMID:25534964

  13. Measuring the evolutionary rewiring of biological networks.

    Directory of Open Access Journals (Sweden)

    Chong Shou

    Full Text Available We have accumulated a large amount of biological network data and expect even more to come. Soon, we anticipate being able to compare many different biological networks as we commonly do for molecular sequences. It has long been believed that many of these networks change, or "rewire", at different rates. It is therefore important to develop a framework to quantify the differences between networks in a unified fashion. We developed such a formalism based on analogy to simple models of sequence evolution, and used it to conduct a systematic study of network rewiring on all the currently available biological networks. We found that, similar to sequences, biological networks show a decreased rate of change at large time divergences, because of saturation in potential substitutions. However, different types of biological networks consistently rewire at different rates. Using comparative genomics and proteomics data, we found a consistent ordering of the rewiring rates: transcription regulatory, phosphorylation regulatory, genetic interaction, miRNA regulatory, protein interaction, and metabolic pathway network, from fast to slow. This ordering was found in all comparisons we did of matched networks between organisms. To gain further intuition on network rewiring, we compared our observed rewirings with those obtained from simulation. We also investigated how readily our formalism could be mapped to other network contexts; in particular, we showed how it could be applied to analyze changes in a range of "commonplace" networks such as family trees, co-authorships and linux-kernel function dependencies.

  14. Universality in complex networks: random matrix analysis.

    Science.gov (United States)

    Bandyopadhyay, Jayendra N; Jalan, Sarika

    2007-08-01

    We apply random matrix theory to complex networks. We show that nearest neighbor spacing distribution of the eigenvalues of the adjacency matrices of various model networks, namely scale-free, small-world, and random networks follow universal Gaussian orthogonal ensemble statistics of random matrix theory. Second, we show an analogy between the onset of small-world behavior, quantified by the structural properties of networks, and the transition from Poisson to Gaussian orthogonal ensemble statistics, quantified by Brody parameter characterizing a spectral property. We also present our analysis for a protein-protein interaction network in budding yeast.

  15. Tomato Fruits Show Wide Phenomic Diversity but Fruit Developmental Genes Show Low Genomic Diversity.

    Science.gov (United States)

    Mohan, Vijee; Gupta, Soni; Thomas, Sherinmol; Mickey, Hanjabam; Charakana, Chaitanya; Chauhan, Vineeta Singh; Sharma, Kapil; Kumar, Rakesh; Tyagi, Kamal; Sarma, Supriya; Gupta, Suresh Kumar; Kilambi, Himabindu Vasuki; Nongmaithem, Sapana; Kumari, Alka; Gupta, Prateek; Sreelakshmi, Yellamaraju; Sharma, Rameshwar

    2016-01-01

    Domestication of tomato has resulted in large diversity in fruit phenotypes. An intensive phenotyping of 127 tomato accessions from 20 countries revealed extensive morphological diversity in fruit traits. The diversity in fruit traits clustered the accessions into nine classes and identified certain promising lines having desirable traits pertaining to total soluble salts (TSS), carotenoids, ripening index, weight and shape. Factor analysis of the morphometric data from Tomato Analyzer showed that the fruit shape is a complex trait shared by several factors. The 100% variance between round and flat fruit shapes was explained by one discriminant function having a canonical correlation of 0.874 by stepwise discriminant analysis. A set of 10 genes (ACS2, COP1, CYC-B, RIN, MSH2, NAC-NOR, PHOT1, PHYA, PHYB and PSY1) involved in various plant developmental processes were screened for SNP polymorphism by EcoTILLING. The genetic diversity in these genes revealed a total of 36 non-synonymous and 18 synonymous changes leading to the identification of 28 haplotypes. The average frequency of polymorphism across the genes was 0.038/Kb. Significant negative Tajima'D statistic in two of the genes, ACS2 and PHOT1 indicated the presence of rare alleles in low frequency. Our study indicates that while there is low polymorphic diversity in the genes regulating plant development, the population shows wider phenotype diversity. Nonetheless, morphological and genetic diversity of the present collection can be further exploited as potential resources in future.

  16. Airborne Network Optimization with Dynamic Network Update

    Science.gov (United States)

    2015-03-26

    AIRBORNE NETWORK OPTIMIZATION WITH DYNAMIC NETWORK UPDATE THESIS Bradly S. Paul, Capt, USAF AFIT-ENG-MS-15-M-030 DEPARTMENT OF THE AIR FORCE AIR...to copyright protection in the United States. AFIT-ENG-MS-15-M-030 AIRBORNE NETWORK OPTIMIZATION WITH DYNAMIC NETWORK UPDATE THESIS Presented to the...NETWORK OPTIMIZATION WITH DYNAMIC NETWORK UPDATE Bradly S. Paul, B.S.C.P. Capt, USAF Committee Membership: Maj Thomas E. Dube Chair Dr. Kenneth M. Hopkinson

  17. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  18. A random network based, node attraction facilitated network evolution method

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-03-01

    Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.

  19. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  20. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies