Science.gov

Sample records for access networks based

  1. Performance analysis of electronic code division multiple access based virtual private networks over passive optical networks

    NASA Astrophysics Data System (ADS)

    Nadarajah, Nishaanthan; Nirmalathas, Ampalavanapillai

    2008-03-01

    A solution for implementing multiple secure virtual private networks over a passive optical network using electronic code division multiple access is proposed and experimentally demonstrated. The multiple virtual private networking capability is experimentally demonstrated with 40 Mb/s data multiplexed with a 640 Mb/s electronic code that is unique to each of the virtual private networks in the passive optical network, and the transmission of the electronically coded data is carried out using Fabry-Perot laser diodes. A theoretical scalability analysis for electronic code division multiple access based virtual private networks over a passive optical network is also carried out to identify the performance limits of the scheme. Several sources of noise such as optical beat interference and multiple access interference that are present in the receiver are considered with different operating system parameters such as transmitted optical power, spectral width of the broadband optical source, and processing gain to study the scalability of the network.

  2. Amplified CWDM-based Next Generation Broadband Access Networks

    NASA Astrophysics Data System (ADS)

    Peiris, Sasanthi Chamarika

    The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed

  3. Distributed policy based access to networked heterogeneous ISR data sources

    NASA Astrophysics Data System (ADS)

    Bent, G.; Vyvyan, D.; Wood, David; Zerfos, Petros; Calo, Seraphin

    2010-04-01

    Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inherent restrictions on how it will interact with the others. These are usually stated as a set of policies, including security and privacy policies. The capability that we want to enable for a coalition operation is to provide access to information from any coalition partner in conformance with the policies of all. One of the challenges in supporting such ad-hoc coalition operations is that of providing efficient access to distributed sources of data, where the applications requiring the data do not have knowledge of the location of the data within the network. To address this challenge the International Technology Alliance (ITA) program has been developing the concept of a Dynamic Distributed Federated Database (DDFD), also know as a Gaian Database. This type of database provides a means for accessing data across a network of distributed heterogeneous data sources where access to the information is controlled by a mixture of local and global policies. We describe how a network of disparate ISR elements can be expressed as a DDFD and how this approach enables sensor and other information sources to be discovered autonomously or semi-autonomously and/or combined, fused formally defined local and global policies.

  4. Regional Webgis User Access Patterns Based on a Weighted Bipartite Network

    NASA Astrophysics Data System (ADS)

    Li, R.; Shen, Y.; Huang, W.; Wu, H.

    2015-07-01

    With the rapid development of geographic information services, Web Geographic Information Systems (WebGIS) have become an indispensable part of everyday life; correspondingly, map search engines have become extremely popular with users and WebGIS sites receive a massive volume of requests for access. These WebGIS users and the content accessed have regional characteristics; to understand regional patterns, we mined regional WebGIS user access patterns based on a weighted bipartite network. We first established a weighted bipartite network model for regional user access to a WebGIS. Then, based on the massive user WebGIS access logs, we clustered geographic information accessed and thereby identified hot access areas. Finally we quantitatively analyzed the access interests of regional users and the visitation volume characteristics of regional user access to these hot access areas in terms of user access permeability, user usage rate, and user access viscosity. Our research results show that regional user access to WebGIS is spatially aggregated, and the hot access areas that regional users accessed are associated with specific periods of time. Most regional user contact with hot accessed areas is variable and intermittent but for some users, their access to certain areas is continuous as it is associated with ongoing or recurrent objectives. The weighted bipartite network model for regional user WebGIS access provides a valid analysis method for studying user behaviour in WebGIS and the proposed access pattern exhibits access interest of regional user is spatiotemporal aggregated and presents a heavy-tailed distribution. Understanding user access patterns is good for WebGIS providers and supports better operational decision-making, and helpful for developers when optimizing WebGIS system architecture and deployment, so as to improve the user experience and to expand the popularity of WebGIS.

  5. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-05-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  6. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New

    2005-04-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  7. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  8. A quantum access network.

    PubMed

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-09-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology. PMID:24005413

  9. Scheduling of network access for feedback-based embedded systems

    NASA Astrophysics Data System (ADS)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  10. Ethernet access network based on free-space optic deployment technology

    NASA Astrophysics Data System (ADS)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  11. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-03-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  12. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks

    Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology

    Submission Deadline: 1 June 2005

    Background

    With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the

  13. Setting Access Permission through Transitive Relationship in Web-based Social Networks

    NASA Astrophysics Data System (ADS)

    Hong, Dan; Shen, Vincent Y.

    The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.

  14. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  15. A secure WDM ring access network employing silicon micro-ring based remote node

    NASA Astrophysics Data System (ADS)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Xu, Ke; Hsu, Chin-Wei; Su, Hong-Quan; Tsang, Hon-Ki

    2014-08-01

    A secure and scalable wavelength-division-multiplexing (WDM) ring-based access network is proposed and demonstrated using proof-of-concept experiments. In the remote node (RN), wavelength hopping for specific optical networking unit (ONU) is deployed by using silicon micro-ring resonators (SMR). Using silicon-based devices could be cost-effective for the cost-sensitive access network. Hence the optical physical layer security is introduced. The issues of denial of service (DOS) attacks, eavesdropping and masquerading can be made more difficult in the proposed WDM ring-based access network. Besides, the SMRs with different dropped wavelengths can be cascaded, such that the signals pass through the preceding SMRs can be dropped by a succeeding SMR. This can increase the scalability of the RN for supporting more ONUs for future upgrade. Here, error-free 10 Gb/s downlink and 1.25 Gb/s uplink transmission are demonstrated to show the feasibility of the proposed network.

  16. Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Zheng, Jun; Ansari, Nirwan

    2005-02-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  17. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  18. Remotely amplified combined ring-tree dense access network architecture using reflective RSOA-based ONU

    NASA Astrophysics Data System (ADS)

    Lazaro, Jose A.; Bock, Carlos; Polo, Victor; Martinez, Reynaldo I.; Prat, Josep

    2007-06-01

    A highly scalable access architecture achieving high density and featuring resiliency, centralized light-generation control, remote amplification, and colorless optical network unit with reflective semiconductor optical amplifier (RSOA) for upstream modulation is presented and experimentally demonstrated. It is based on a user-single-fiber completely passive outside plant and provides broadband connections to >1000 users distributed along large distances. It is believed to represent an intermediate step toward metro-access convergence and offers flexible configurations covering high- and low-density population areas.

  19. Fixed Access Network Sharing

    NASA Astrophysics Data System (ADS)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  20. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  1. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  2. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  3. A Time-constrained Network Voronoi Construction and Accessibility Analysis in Location-based Service Technology

    NASA Astrophysics Data System (ADS)

    Yu, W.; Ai, T.

    2014-11-01

    Accessibility analysis usually requires special models of spatial location analysis based on some geometric constructions, such as Voronoi diagram (abbreviated to VD). There are many achievements in classic Voronoi model research, however suffering from the following limitations for location-based services (LBS) applications. (1) It is difficult to objectively reflect the actual service areas of facilities by using traditional planar VDs, because human activities in LBS are usually constrained only to the network portion of the planar space. (2) Although some researchers have adopted network distance to construct VDs, their approaches are used in a static environment, where unrealistic measures of shortest path distance based on assumptions about constant travel speeds through the network were often used. (3) Due to the computational complexity of the shortest-path distance calculating, previous researches tend to be very time consuming, especially for large datasets and if multiple runs are required. To solve the above problems, a novel algorithm is developed in this paper. We apply network-based quadrat system and 1-D sequential expansion to find the corresponding subnetwork for each focus. The idea is inspired by the natural phenomenon that water flow extends along certain linear channels until meets others or arrives at the end of route. In order to accommodate the changes in traffic conditions, the length of network-quadrat is set upon the traffic condition of the corresponding street. The method has the advantage over Dijkstra's algorithm in that the time cost is avoided, and replaced with a linear time operation.

  4. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    PubMed

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile. PMID:23389228

  5. DataBus-based hybrid routing approach for orbit access networks in lunar exploration

    NASA Astrophysics Data System (ADS)

    Zeng, Hui; Meng, Ke; Deng, Julia

    2012-06-01

    One of the major challenges for lunar exploration missions is how to achieve dynamic and robust routing. To reduce the development cost, it is desirable to leverage existing technologies, such as routing in mobile ad hoc networks (MANETs) and delay tolerant networks (DTN). However, these technologies are developed for the Earth environment and hence need further investigation for the lunar environment. To support robust access and dynamic mission operations, we propose a DataBus-based Hybrid Routing (DBHR) approach that combines MANET reactive routing protocol (such as AODV) and DTN-based bundle delivery. Our DBHR approach is designed for a tiered architecture where remote nodes communicate with upper-tier gateways through data carriers (DataBus) using short-range radio interfaces. Our scheme explores the (non)availability of the end-to-end path between two peers using MANET routing and provides diverse route options based upon different parameters. This interaction between hop-by-hop DTN technologies and end-to-end MANET protocol will result in a reliable and robust routing protocol for orbit access and improve the overall communication capabilities. To evaluate its performance, we implemented our proposed scheme on commercial-off-theshelf (COTS) routers with the custom OpenWRT and tailored IBR-DTN bundle protocol distribution. The on-demand service request and grant mechanisms are also developed in our implementation to allow certain DTN nodes to reserve the future access opportunities. Finally, we demonstrate the achieved capabilities and performance gains through experiments on a hardware test bed that consists of several COTS routers with our implementation.

  6. The Cybermobile: A Gateway for Public Access to Network-Based Information.

    ERIC Educational Resources Information Center

    Drumm, John E.; Groom, Frank M.

    1997-01-01

    Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…

  7. Reducing the power consumption in LTE-Advanced wireless access networks by a capacity based deployment tool

    NASA Astrophysics Data System (ADS)

    Deruyck, Margot; Joseph, Wout; Tanghe, Emmeric; Martens, Luc

    2014-09-01

    As both the bit rate required by applications on mobile devices and the number of those mobile devices are steadily growing, wireless access networks need to be expanded. As wireless networks also consume a lot of energy, it is important to develop energy-efficient wireless access networks in the near future. In this study, a capacity-based deployment tool for the design of energy-efficient wireless access networks is proposed. Capacity-based means that the network responds to the instantaneous bit rate requirements of the users active in the selected area. To the best of our knowledge, such a deployment tool for energy-efficient wireless access networks has never been presented before. This deployment tool is applied to a realistic case in Ghent, Belgium, to investigate three main functionalities incorporated in LTE-Advanced: carrier aggregation, heterogeneous deployments, and Multiple-Input Multiple-Output (MIMO). The results show that it is recommended to introduce femtocell base stations, supporting both MIMO and carrier aggregation, into the network (heterogeneous deployment) to reduce the network's power consumption. For the selected area and the assumptions made, this results in a power consumption reduction up to 70%. Introducing femtocell base stations without MIMO and carrier aggregation can already result in a significant power consumption reduction of 38%.

  8. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    NASA Astrophysics Data System (ADS)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  9. Electrical Spreading Code-Based OFDM Optical Access Networks for Budget Enhancement and Reduced System Bandwidth Requirement

    NASA Astrophysics Data System (ADS)

    Kumar, Pravindra; Srivastava, Anand

    2015-12-01

    Passive optical networks based on orthogonal frequency division multiplexing (OFDM-PON) give better performance in high-speed optical access networks. For further improvement in performance, a new architecture of OFDM-PON based on spreading code in electrical domain is proposed and analytically analyzed in this paper. This approach is referred as hybrid multi-carrier code division multiple access-passive optical network (MC-CDMA-PON). Analytical results show that at bit error rate (BER) of 10-3, there is 9.4 dB and 14.2 dB improvement in optical power budget for downstream and upstream, respectively, with MC-CDMA-PON system as compared to conventional OFDM-PON system for the same number of optical network units (ONUs).

  10. Editorial: Next Generation Access Networks

    NASA Astrophysics Data System (ADS)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  11. A New Regulatory Policy for FTTx-Based Next-Generation Access Networks

    NASA Astrophysics Data System (ADS)

    Makarovič, Boštjan

    2013-07-01

    This article critically assesses the latest European Commission policies in relation to next-generation access investment that put focus on regulated prices and relaxing of wholesale access obligations. Pointing at the vital socio-legal and economic arguments, it further challenges the assumptions of the current EU regulatory framework and calls for a more contractual utility-based model of regulation instead of the current system that overly relies on market-driven infrastructure-based competition.

  12. Multi-channel access technology based on wavelength division multiplexing in wireless UV communication mesh network

    NASA Astrophysics Data System (ADS)

    Zhao, Tai-fei; Zhang, Ai-li; Xue, Rong-li

    2013-05-01

    In this paper, the multi-channel access technology of wavelength division multiplexing (WDM) in the wireless ultraviolet (UV) scattering communication is studied. A multi-interface and multi-channel device is deployed in each UV transceiver node. The band-pass filter is configured in the receiving node so as to realize the multi-channel access by use of the UV WDM technology. Both the UV communication node model and the UV channel model are established. Three types of UV no-line-of-sight (NLOS) multi-channel communications are simulated in the mesh topologies with NS2. The results show that the UV multi-channel access technology can increase network throughput effectively with using WDM.

  13. [Informatics in the School of Medicine of the University of Chile. II. The school network and access to data bases].

    PubMed

    Vivaldi, E A

    1990-12-01

    Projects on informatics at the School of Medicine of the University of Chile are being brought about in accordance with both its institutional goals and present trends in technology. Prominent among the latter are the widespread distribution of autonomous processing power represented by low-cost computers and the ease of communication at local and worldwide levels. Our main project has been the design and start of a computer network that integrates the School's Departments and the geographically dispersed teaching hospitals. The principal services provided by the network are local and international electronic mail, access to data bases, and emulation of mainframe terminals (eg, to run remotely a mainframe's statistics software). Automated bibliographic search has been made available both through remote access to Medline data base and through local usage of compact disc (CD-ROM) versions. Since our network is open, it should become a forceful mean of assisting and integrating the biomedical community throughout the country. PMID:2152674

  14. Next generation 3-D OFDM based optical access networks using FEC under various system impairments

    NASA Astrophysics Data System (ADS)

    Kumar, Pravindra; Srivastava, Anand

    2013-12-01

    Passive optical network based on orthogonal frequency division multiplexing (OFDM-PON) exhibits excellent performance in optical access networks due to its greater resistance to fiber dispersion, high spectral efficiency and exibility on both multiple services and dynamic bandwidth allocation. The major elements of conventional OFDM communication system are two-dimensional (2-D) signal mapper and one-dimensional (1-D) inverse fast fourier transform (IFFT). Three dimensional (3-D) OFDM use the concept of 3-D signal mapper and 2-D IFFT. With 3-D OFDM, minimum Euclidean distance (MED) is increased which results in BER performance improvement. As bit error rate (BER) depends on minimum Euclidean distance (MED) which is 15.46 % more in case of 3-D OFDM as compared to 2-D OFDM. Forward error correction (FEC) coding is a technique where redundancy is added to original bit sequence to increase the reliability of communication system. In this paper, we propose and analytically analyze a new PON architecture based on 3-D OFDM with convolutional coding and Viterbi decoding and is compared with conventional 2-D OFDM under various system impairments for coherent optical orthogonal frequency division multiplexing (CO-OFDM) without using any optical dispersion compensation. Analytical result show that at BER of 10-9, there is 2.7 dB, 3.8 dB and 9.3 dB signal-to-noise ratio (SNR) gain with 3-D OFDM, 3-D OFDM combined with convolutional coding and Viterbi hard decision decoding (CC-HDD) and 3-D OFDM combined with convolutional coding and Viterbi soft decision decoding (CC-SDD) respectively as compared to 2-D OFDM-PON. At BER of 10-9, 3-D OFDM-PON with CC-HDD gives 2.8 dB improvement in optical budget for both upstream and downstream path and gives 5.7 dB improvement in optical budget using 3-D OFDM-PON combined with CC-SDD as compared to conventional OFDM-PON system.

  15. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  16. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  17. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  18. Multi-service small-cell cloud wired/wireless access network based on tunable optical frequency comb

    NASA Astrophysics Data System (ADS)

    Xiang, Yu; Zhou, Kun; Yang, Liu; Pan, Lei; Liao, Zhen-wan; Zhang, Qiang

    2015-11-01

    In this paper, we demonstrate a novel multi-service wired/wireless integrated access architecture of cloud radio access network (C-RAN) based on radio-over-fiber passive optical network (RoF-PON) system, which utilizes scalable multiple- frequency millimeter-wave (MF-MMW) generation based on tunable optical frequency comb (TOFC). In the baseband unit (BBU) pool, the generated optical comb lines are modulated into wired, RoF and WiFi/WiMAX signals, respectively. The multi-frequency RoF signals are generated by beating the optical comb line pairs in the small cell. The WiFi/WiMAX signals are demodulated after passing through the band pass filter (BPF) and band stop filter (BSF), respectively, whereas the wired signal can be received directly. The feasibility and scalability of the proposed multi-service wired/wireless integrated C-RAN are confirmed by the simulations.

  19. Study on the energy-efficient scheme based on the interconnection of optical-network-units for next generation optical access network

    NASA Astrophysics Data System (ADS)

    Lv, Yunxin; Jiang, Ning; Qiu, Kun; Xue, Chenpeng

    2014-12-01

    An energy-efficient scheme based on the interconnection of optical network unit (ONU) is introduced, which can significantly reduce the energy consumption of the low-traffic operation. The energy consumption model for the ONU-interconnected optical access network (OAN) based on the electronic switch (ES) technology is established, and the energy efficiency of the proposed scheme is analyzed and compared with that of the OAN using optical switch (OS). The simulation results demonstrate that the ONU-interconnected scheme can efficiently reduce the energy consumption of OAN, and it shows a good energy consumption performance under daily traffic model.

  20. A Spectrum Access Based on Quality of Service (QoS) in Cognitive Radio Networks

    PubMed Central

    Zhai, Linbo; Wang, Hua; Gao, Chuangen

    2016-01-01

    The quality of service (QoS) is important issue for cognitive radio networks. In the cognitive radio system, the licensed users, also called primary users (PUs), are authorized to utilize the wireless spectrum, while unlicensed users, also called secondary users (SUs), are not authorized to use the wireless spectrum. SUs access the wireless spectrum opportunistically when the spectrum is idle. While SUs use an idle channel, the instance that PUs come back makes SUs terminate their communications and leave the current channel. Therefore, quality of service (QoS) is difficult to be ensured for SUs. In this paper, we first propose an analysis model to obtain QoS for cognitive radio networks such as blocking probability, completed traffic and termination probability of SUs. When the primary users use the channels frequently, QoS of SUs is difficult to be ensured, especially the termination probability. Then, we propose a channel reservation scheme to improve QoS of SUs. The scheme makes the terminated SUs move to the reserved channels and keep on communications. Simulation results show that our scheme can improve QoS of SUs especially the termination probability with a little cost of blocking probability in dynamic environment. PMID:27171196

  1. A Spectrum Access Based on Quality of Service (QoS) in Cognitive Radio Networks.

    PubMed

    Zhai, Linbo; Wang, Hua; Gao, Chuangen

    2016-01-01

    The quality of service (QoS) is important issue for cognitive radio networks. In the cognitive radio system, the licensed users, also called primary users (PUs), are authorized to utilize the wireless spectrum, while unlicensed users, also called secondary users (SUs), are not authorized to use the wireless spectrum. SUs access the wireless spectrum opportunistically when the spectrum is idle. While SUs use an idle channel, the instance that PUs come back makes SUs terminate their communications and leave the current channel. Therefore, quality of service (QoS) is difficult to be ensured for SUs. In this paper, we first propose an analysis model to obtain QoS for cognitive radio networks such as blocking probability, completed traffic and termination probability of SUs. When the primary users use the channels frequently, QoS of SUs is difficult to be ensured, especially the termination probability. Then, we propose a channel reservation scheme to improve QoS of SUs. The scheme makes the terminated SUs move to the reserved channels and keep on communications. Simulation results show that our scheme can improve QoS of SUs especially the termination probability with a little cost of blocking probability in dynamic environment. PMID:27171196

  2. Performance Analysis of OCDMA Based on AND Detection in FTTH Access Network Using PIN & APD Photodiodes

    NASA Astrophysics Data System (ADS)

    Aldouri, Muthana; Aljunid, S. A.; Ahmad, R. Badlishah; Fadhil, Hilal A.

    2011-06-01

    In order to comprise between PIN photo detector and avalanche photodiodes in a system used double weight (DW) code to be a performance of the optical spectrum CDMA in FTTH network with point-to-multi-point (P2MP) application. The performance of PIN against APD is compared through simulation by using opt system software version 7. In this paper we used two networks designed as follows one used PIN photo detector and the second using APD photo diode, both two system using with and without erbium doped fiber amplifier (EDFA). It is found that APD photo diode in this system is better than PIN photo detector for all simulation results. The conversion used a Mach-Zehnder interferometer (MZI) wavelength converter. Also we are study, the proposing a detection scheme known as AND subtraction detection technique implemented with fiber Bragg Grating (FBG) act as encoder and decoder. This FBG is used to encode and decode the spectral amplitude coding namely double weight (DW) code in Optical Code Division Multiple Access (OCDMA). The performances are characterized through bit error rate (BER) and bit rate (BR) also the received power at various bit rate.

  3. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  4. Novel Scheme of Carrier Tri-reuse and Distribution Fiber Protection Based on Round Shift Method in Optical Access Network

    NASA Astrophysics Data System (ADS)

    Chen, Haibin; Gan, Chaoqin; Yin, Maojun; Ni, Cuiping

    2015-06-01

    A novel architecture of optical access network based on round shift method is proposed. Round shift method is composed by round service mode of carriers and cycle characteristic of 2×N arrayed waveguide grating (AWG). By utilizing the round service mode, every carrier is tri-reused to provide service for three different optical network units. Besides, in remote node, the 2×3N AWG can be replaced by three 2×N AWGs and AWGs' channel spacing is increased. So, the demand on RN's AWGs is decreased. Furthermore, based on the cycle characteristic of 2×N AWG, a 1+1 protection scheme is presented to provide independent protection for distribution fibers. Simulation and analysis show the proposed scheme works well.

  5. Electro-optical time gating based on Mach-Zehnder modulator for multiple access interference elimination in optical code-division multiple access networks

    NASA Astrophysics Data System (ADS)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zheng, Jilin; Zhu, Huatao

    2014-05-01

    An electro-optical time gating technique, which is based on an electrical return-to-zero (RZ) pulse driven Mach-Zehnder modulator (MZM) for eliminating multiple access interference (MAI) in optical code-division multiple access (OCDMA) networks is proposed. This technique is successfully simulated in an eight-user two-dimensional wavelength-hopping time-spreading system, as well as in a three-user temporal phase encoding system. Results show that in both systems the MAI noise is efficiently removed and the average received power penalty improved. Both achieve error-free transmissions at a bit rate of 2.5 Gb/s. In addition, we also individually discuss effects of parameters in two systems, such as the extinction ratio of the MZM, the duty cycle of the driven RZ pulse, and the time misalignment between the driven pulse and the decoded autocorrelation peak, on the output bit error rate performance. Our work shows that employing a common MZM as a thresholder provides another probability and an interesting cost-effective choice for a smart size, low energy, and less complex thresholding technique for integrated detection in OCDMA networks.

  6. Outline of a multiple-access communication network based on adaptive arrays

    NASA Technical Reports Server (NTRS)

    Zohar, S.

    1982-01-01

    Attention is given to a narrow-band communication system consisting of a central station trying to receive signals simultaneously from K spatially distinct mobile users sharing the same frequencies. One example of such a system is a group of aircraft and ships transmitting messages to a communication satellite. A reasonable approach to such a multiple access system may be based on equipping the central station with an n-element antenna array where n is equal to or greater than K. The array employs K sets of n weights to segregate the signals received from the K users. The weights are determined by direct computation based on position information transmitted by the users. A description is presented of an improved technique which makes it possible to reduce significantly the number of required computer operations in comparison to currently known techniques.

  7. Placement of Base Stations in Broadband Power Line Communications Access Networks by Means of Multi-criteria Optimization

    NASA Astrophysics Data System (ADS)

    Haidine, Abdelfatteh; Lehnert, Ralf

    Broadband Power Line Communications (B-PLC) technology is an alternative for broadband access networks, allowing bit rates up to currently 200Mbps. This technique uses the wiring of the low-voltage grid in order to offer to the users the telecommunications services, such as Internet, VoIP, VoD, etc. The B-PLC design process is sub-divided into two parts: the Generalized Base Station Placement (GBSP) problem and the PLC Channel Allocation Problem (P-CAP). This paper focuses on GBSP that is modeled as multi-criteria combinatorial optimization problem. Based on our published mathematical modeling, this paper supplies more numerical experiments for the evaluation of Multi-Objective Evolutionary Algorithms (MOEAs) in solving GBSP. Their performance is compared with the single-objective optimization.

  8. Auxiliary graph based protection for survivable Fiber-Wireless (FiWi) access network considering different levels of failures

    NASA Astrophysics Data System (ADS)

    Liu, Yejun; Guo, Lei; Ma, Rui; Hou, Weigang

    2012-12-01

    Survivability is one of the key issues in Fiber-Wireless (FiWi) access network because network component failures may cause huge data loss, especially when the failures in optical back-end. According to the failure severity, we categorize the failures in optical back-end into two levels, that is, Optical-Network-Unit (ONU)-level failure and segment-level failure. In this paper, instead of the expensive fiber duplication approach traditionally, we propose a novel protection approach for FiWi against ONU-level failure by assigning each ONU several alternate ONUs in the same segment and against the segment-level failure by deploying backup fibers among different segments. On one hand, we optimize the assignment of alternate ONUs, aiming to maximize the amount of protected traffic and minimize the number of wireless hops. On the other hand, we optimize the deployment of backup fibers, aiming to maximize the amount of protected traffic and minimize the length of backup fibers. We mathematically formulate these two objectives as Maximum Protection and Minimum Hops Number (MPMHN) problem and the Maximum Protection and Minimum backup Fibers Length (MPMFL) problem, respectively. An efficient algorithm called Auxiliary Graph based Protection (AGP) is proposed to solve the MPMHN and MPMFL problems. In the simulation, we investigate the performance of AGP in various scenarios and demonstrate the cost-efficiency of the proposed protection approach.

  9. Analysis and Benchmark of Hydrological Network Representation Models for Improved Access and Query in Web-based System

    NASA Astrophysics Data System (ADS)

    Demir, I.; Szczepanek, R.

    2015-12-01

    Web based systems allow users to delineate watersheds on interactive map environments using server side processing and databases. With increasing resolution of hydrological networks, optimized methods for storage of network representation in databases, and efficient queries and actions on the river network structure become critical. This presentation provides a comprehensive study on analysis of network models in relational databases for hydrological networks, and benchmarking common queries and operations on the network structure using these methods. The analysis has been applied to the hydrological network of the State of Iowa based on 90m DEM consist of 600,000 network nodes. The application results indicate that certain representation methods provide massive improvements on query times and storage of network structure in the database. Suggested method allows watershed delineation tools running on the client-side with desktop-like performance. This will allow users to carry out large scale analysis and visualizations tasks on the web.

  10. File access prediction using neural networks.

    PubMed

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors. PMID:20421183

  11. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  12. Small Satellite Access of the Space Network

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Minnix, Timothy O.; Vigil, J. S.

    1999-01-01

    Small satellites have been perceived as having limited access to NASA's Space Network (SN). The potential for satellite access of the space network when the design utilizes a fixed antenna configuration and low-power, coded transmission is analyzed. From the analysis, satellites using this configuration in high-inclination orbits are shown to have a daily data throughput in the 100 to 1000 Mbit range using the multiple access communications service.

  13. Optical access: networks and components (overview)

    NASA Astrophysics Data System (ADS)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  14. Structuring waveguide-grating-based wavelength-division multiplexing/optical code division multiple access network codecs over topology of concentric circles

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Nieh, Ta-Chun; Chen, Kai-Sheng

    2013-01-01

    The cyclic period and free spectral range of arrayed-waveguide gratings (AWG) in a wavelength-division multiplexing/optical code division multiple access optical code division multiple access network are exploited. The total optical network unit (ONU) of network capacity is partitioned into groups of different wavelength in accordance with the geographical location of subscribers based on the radial distance of the ONU to the optical line terminal. Combining concentric circles round by round for ONU groups enables a fixed round-trip time in the data transmission and a significant increase in system performance. Using AWG router, the proposed topology of concentric circles retains signature orthogonality and minimizes wavelength collisions on the photo-detector. Furthermore, the adoption of extended M-sequence codes corresponding to the AWG codec provides a simpler, more efficient coding procedure and accommodates more users in a single group.

  15. Novel wavelength division multiplex-radio over fiber-passive optical network architecture for multiple access points based on multitone generation and triple sextupling frequency

    NASA Astrophysics Data System (ADS)

    Cheng, Guangming; Guo, Banghong; Liu, Songhao; Huang, Xuguang

    2014-01-01

    An innovative wavelength division multiplex-radio over fiber-passive optical network architecture for multiple access points (AP) based on multitone generation and triple sextupling frequency is proposed and demonstrated. A dual-drive Mach-Zehnder modulator (DD-MZM) is utilized to realize the multitone generation. Even sidebands are suppressed to make the adjacent frequency separation twice the frequency of the local oscillator by adjusting the modulation voltage of the DD-MZM. Due to adopting three fiber Bragg gratings to reflect the unmodulated sidebands for uplink communications source free at optical network unit (ONU), is achieved. The system can support at least three APs at one ONU simultaneously with a 30 km single-mode fiber (SMF) transmission and 5 Gb/s data rate both for uplink and downlink communications. The theoretical analysis and simulation results show the architecture has an excellent performance and will be a promising candidate in future hybrid access networks.

  16. Impairments Computation for Routing Purposes in a Transparent-Access Optical Network Based on Optical CDMA and WDM

    NASA Astrophysics Data System (ADS)

    Musa, Ahmed

    2016-06-01

    Optical access networks are becoming more widespread and the use of multiple services might require a transparent optical network (TON). Multiplexing and privacy could benefit from the combination of wavelength division multiplexing (WDM) and optical coding (OC) and wavelength conversion in optical switches. The routing process needs to be cognizant of different resource types and characteristics such as fiber types, fiber linear impairments such as attenuation, dispersion, etc. as well as fiber nonlinear impairments such as four-wave mixing, cross-phase modulation, etc. Other types of impairments, generated by optical nodes or photonic switches, also affect the signal quality (Q) or the optical signal to noise ratio (OSNR), which is related to the bit error rate (BER). Therefore, both link and switch impairments must be addressed and somehow incorporated into the routing algorithm. However, it is not practical to fully integrate all photonic-specific attributes in the routing process. In this study, new routing parameters and constraints are defined that reflect the distinct characteristics of photonic networking. These constraints are applied to the design phase of TON and expressed as a cost or metric form that will be used in the network routing algorithm.

  17. Optical solutions for unbundled access network

    NASA Astrophysics Data System (ADS)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  18. Network accessible multi-terabyte archive

    NASA Technical Reports Server (NTRS)

    Rybczynski, Fred

    1991-01-01

    The viewgraphs of a discussion on Network Accessible Multi-terabyte Archive presented at the National Space Science Data Center (NSSDC) Mass Storage Workshop is included. Topics covered in the presentation include the rotary storage system (RSS) including RSS data access, data management, administration, and hardware and software architecture.

  19. Space division multiplexing in access networks

    NASA Astrophysics Data System (ADS)

    Effenberger, Frank J.

    2015-01-01

    Space division multiplexing (SDM) has received a lot of attention in the past years, as it is seen as the final frontier of fiber optic capacity improvement for long haul transmission. Its use in access networks is even more interesting, due to the different design optimization goals in access versus transport. This paper explores some of the applications of SDM in access that have the potential for early adoption.

  20. Test-Bed Design and Implementation of High-Definition Multimedia Interface Based 3D Broadcast Coarse Wavelength-Division Multiplexing Access Network

    NASA Astrophysics Data System (ADS)

    Mizusawa, Jun-Ichi

    2011-10-01

    Test-bed operations of three real-time transmission types are described: a three-dimensional (+two-dimensional) high-definition multimedia interface broadcast on point-to-multi-point connections, a two-dimensional high-definition multimedia interface broadcast on multi-point-to-multi-point connections, and a three-dimensional high-definition multimedia interface full duplex on a point-to-point connection. The network design has an optical broadcast topology centered with an "optical hub." This article first introduces the design and implementation, then explains the issues and further considerations for implementing a high-definition multimedia interface based three-dimensional broadcast access network.

  1. Experimental demonstration of a full-duplex high-speed visible light communication access network architecture based on frequency division multiplexing

    NASA Astrophysics Data System (ADS)

    Wang, Yiguang; Wang, Yuanquan; Tao, Li; Shi, Jianyang; Chi, Nan

    2014-11-01

    We propose and experimentally demonstrate a full-duplex high-speed visible light communication (VLC) access network based on star topology architecture to offer high-speed optical wireless access for a large number of users. Optical fiber is used as the backbone of the VLC network and directly connected to the light-emitting diode lamps. Frequency division multiplexing (FDM) is utilized for both the downlink and uplink. The bidirectional transmission of 32 quadrature amplitude modulation orthogonal FDM signals at an overall throughput of 4 Gb/s is successfully achieved to support four users access, and each user is offered 500 Mb/s downstream and 500 Mb/s upstream. The measured bit error rates of the downlink and uplink for all four users are <7% pre-forward error correction limit of 3.8×10-3 after a 25 km standard single-mode fiber and 65 cm free space, which clearly validates the promising potential of the proposed VLC network architecture to offer more than 10 Gb/s wireless access.

  2. Scalable and reconfigurable generation of flat optical comb for WDM-based next-generation broadband optical access networks

    NASA Astrophysics Data System (ADS)

    Chen, Chen; Zhang, Chongfu; Zhang, Wei; Jin, Wei; Qiu, Kun

    2014-06-01

    A tunable comb generator (TCG) by cascading a single phase modulator (PM) with two identical intensity modulators (IMs) is proposed for the scalable and reconfigurable generation of flat optical comb. Detailed theoretical analysis is performed to find out the optimized condition for flat optical comb generation using the proposed TCG and the scalability of the generated optical comb is also analyzed under the optimized condition. An experiment is conducted to verify the feasibility of the TCG and the experimental results agree well with the theoretical prediction. The reconfigurability and stability of the obtained optical comb are discussed as well in the experiment. After that, the obtained optical comb is utilized as the optical source for a wavelength-division multiplexed radio-over-fiber (WDM-RoF) system and a hybrid WDM orthogonal frequency-division multiple access passive optical network (WDM-OFDMA-PON). Two corresponding experimental demonstrations are presented to verify the feasibility of employing the obtained flat optical comb as the WDM optical source, respectively. In the WDM-RoF system, 17 WDM channels each carrying 16×5 Gb/s non-return-to-zero (NRZ) data have been up-converted to 10 GHz simultaneously. In the hybrid WDM-OFDMA-PON, 17-channel OFDM-WDM double-sideband (DSB) signal achieving 10.85 Gb/s traffic per channel is successfully transmitted for both wired baseband OFDM access and wireless 10 GHz OFDM access.

  3. Multiple-Access Quantum-Classical Networks

    NASA Astrophysics Data System (ADS)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  4. Sierra Stars Observatory Network: An Accessible Global Network

    NASA Astrophysics Data System (ADS)

    Williams, Richard; Beshore, Edward

    2011-03-01

    The Sierra Stars Observatory Network (SSON) is a unique partnership among professional observatories that provides its users with affordable high-quality calibrated image data. SSON comprises observatories in the Northern and Southern Hemisphere and is in the process of expanding to a truly global network capable of covering the entire sky 24 hours a day in the near future. The goal of SSON is to serve the needs of science-based projects and programs. Colleges, universities, institutions, and individuals use SSON for their education and research projects. The mission of SSON is to promote and expand the use of its facilities among the thousands of colleges and schools worldwide that do not have access to professional-quality automated observatory systems to use for astronomy education and research. With appropriate leadership and guidance educators can use SSON to help teach astronomy and do meaningful scientific projects. The relatively small cost of using SSON for this type of work makes it affordable and accessible for educators to start using immediately. Remote observatory services like SSON need to evolve to better support education and research initiatives of colleges, institutions and individual investigators. To meet these needs, SSON is developing a sophisticated interactive scheduling system to integrate among the nodes of the observatory network. This will enable more dynamic observations, including immediate priority interrupts, acquiring moving objects using ephemeris data, and more.

  5. Quantum secured gigabit optical access networks.

    PubMed

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Tam, Simon W-B; Yuan, Zhiliang; Shields, Andrew J

    2015-01-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future. PMID:26656307

  6. Quantum secured gigabit optical access networks

    NASA Astrophysics Data System (ADS)

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-12-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future.

  7. Quantum secured gigabit optical access networks

    PubMed Central

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-01-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future. PMID:26656307

  8. Building new access network using reconfigurable optical grid network and wireless network

    NASA Astrophysics Data System (ADS)

    Qiu, Yinghui; Wu, Runze; Ji, Yuefeng; Xu, Daxiong

    2007-11-01

    Recently wireless mesh network has been gaining increasing attention and early versions are being deployed as municipal access solutions to eliminate the wired drop to every wireless router at customer premise. In this paper, we propose a novel access network using reconfigurable optical burst switching grid network and wireless mesh network. The proposed access network architecture saves network deployment cost because fiber need not penetrate to each end user. We also propose a hierarchical routing protocol to enhance the routing efficiency.

  9. Network and Nodal Accessibility Teaching Exercise.

    ERIC Educational Resources Information Center

    Wheeler, James O.

    1988-01-01

    Presents an exercise, for use in college-level economic geography courses, which teaches the concept of nodal and network accessibility with an application to manufacturing locations. Intended to guide students to think spatially and to generalize from numeric data, this out-of-class activity teaches students to discover results, to do simple…

  10. Research resource: Gonadotropin-releasing hormone receptor-mediated signaling network in LbetaT2 cells: a pathway-based web-accessible knowledgebase.

    PubMed

    Fink, Marc Y; Pincas, Hanna; Choi, Soon Gang; Nudelman, German; Sealfon, Stuart C

    2010-09-01

    The GnRH receptor (GnRHR), expressed at the cell surface of the anterior pituitary gonadotrope, is critical for normal secretion of gonadotropins LH and FSH, pubertal development, and reproduction. The signaling network downstream of the GnRHR and the molecular bases of the regulation of gonadotropin expression have been the subject of intense research. The murine LbetaT2 cell line represents a mature gonadotrope and therefore is an important model for the study of GnRHR-signaling pathways and modulation of the gonadotrope cell by physiological regulators. In order to facilitate access to the information contained in this complex and evolving literature, we have developed a pathway-based knowledgebase that is web hosted. At present, using 106 relevant primary publications, we curated a comprehensive knowledgebase of the GnRHR signaling in the LbetaT2 cell in the form of a process diagram. Positive and negative controls of gonadotropin gene expression, which included GnRH itself, hypothalamic factors, gonadal steroids and peptides, as well as other hormones, were illustrated. The knowledgebase contains 187 entities and 206 reactions. It was assembled using CellDesigner software, which provides an annotated graphic representation of interactions, stored in Systems Biology Mark-up Language. We then utilized Biological Pathway Publisher, a software suite previously developed in our laboratory, to host the knowledgebase in a web-accessible format as a public resource. In addition, the network entities were linked to a public wiki, providing a forum for discussion, updating, and error correction. The GnRHR-signaling network is openly accessible at http://tsb.mssm.edu/pathwayPublisher/GnRHR_Pathway/GnRHR_Pathway_ index.html. PMID:20592162

  11. A novel PON based UMTS broadband wireless access network architecture with an algorithm to guarantee end to end QoS

    NASA Astrophysics Data System (ADS)

    Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir

    2007-09-01

    In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness

  12. Physical-layer energy-efficient receiving method based on selective sampling in orthogonal frequency division multiplexing access passive optical network

    NASA Astrophysics Data System (ADS)

    Li, Jun; He, Hao; Bi, Meihua; Hu, Weisheng

    2014-05-01

    We propose a physical-layer energy-efficient receiving method based on selective sampling in an orthogonal frequency division multiplexing access passive optical network (OFDMA-PON). By using the special designed frame head, the receiver within an optical network unit (ONU) can identify the destination of the incoming frame. The receiver only samples at the time when the destination is in agreement with the ONU, while it stays in standby during the rest of the time. We clarify its feasibility through an experiment and analyze the downstream traffic delay by simulation. The results indicate that under limited delay conditions, ˜60% energy can be saved compared with the traditional receiving method in the OFDMA-PON system with 512 ONUs.

  13. Auditing Medical Records Accesses via Healthcare Interaction Networks

    PubMed Central

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Healthcare organizations are deploying increasingly complex clinical information systems to support patient care. Traditional information security practices (e.g., role-based access control) are embedded in enterprise-level systems, but are insufficient to ensure patient privacy. This is due, in part, to the dynamic nature of healthcare, which makes it difficult to predict which care providers need access to what and when. In this paper, we show that modeling operations at a higher level of granularity (e.g., the departmental level) are stable in the context of a relational network, which may enable more effective auditing strategies. We study three months of access logs from a large academic medical center to illustrate that departmental interaction networks exhibit certain invariants, such as the number, strength, and reciprocity of relationships. We further show that the relations extracted from the network can be leveraged to assess the extent to which a patient’s care satisfies expected organizational behavior. PMID:23304277

  14. Auditing medical records accesses via healthcare interaction networks.

    PubMed

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Healthcare organizations are deploying increasingly complex clinical information systems to support patient care. Traditional information security practices (e.g., role-based access control) are embedded in enterprise-level systems, but are insufficient to ensure patient privacy. This is due, in part, to the dynamic nature of healthcare, which makes it difficult to predict which care providers need access to what and when. In this paper, we show that modeling operations at a higher level of granularity (e.g., the departmental level) are stable in the context of a relational network, which may enable more effective auditing strategies. We study three months of access logs from a large academic medical center to illustrate that departmental interaction networks exhibit certain invariants, such as the number, strength, and reciprocity of relationships. We further show that the relations extracted from the network can be leveraged to assess the extent to which a patient's care satisfies expected organizational behavior. PMID:23304277

  15. An access alternative for mobile satellite networks

    NASA Technical Reports Server (NTRS)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  16. An evaluation of Access Tier local area network switches.

    SciTech Connect

    Eldridge, John M.; Olsberg, Ronald R.

    2004-06-01

    This reports tabulates the Test and Evaluation results of the Access Class Switch tests conducted by members of Department 9336. About 15 switches were reviewed for use in the enterprise network as access tier switches as defined in a three tier architecture. The Access Switch Tier has several functions including: aggregate customer desktop ports, preserve and apply QoS tags, provide switched LAN access, provide VLAN assignment, as well as others. The typical switch size is 48 or less user ports. The evaluation team reviewed network switch evaluation reports from the Tolly Group as well as other sources. We then used these reports as a starting point to identify particular switches for evaluation. In general we reviewed the products of dominant equipment manufacturers. Also, based on architectural design requirements, the majority of the switches tested were of relatively small monolithic unit variety.

  17. Network accessible multi-terabyte archive

    NASA Technical Reports Server (NTRS)

    Rybczynski, Fred

    1992-01-01

    Features of the Rotary Storage System (RSS), developed by Metrum Information Storage, are presented in vugraph format. The RSS makes use of the T-120 Super-VHS media with 10.4 GB per cartridge. Other features of the RSS are as follows: (1) Very Large Data Store (VLDS) tape drives; (2) robots with on-line capacity to 6.2 TB; (3) bar code reader; (4) data management computer; and (5) network accessible.

  18. Experimental demonstration of wavelength domain rogue-free ONU based on wavelength-pairing for TDM/WDM optical access networks.

    PubMed

    Lee, Jie Hyun; Park, Heuk; Kang, Sae-Kyoung; Lee, Joon Ki; Chung, Hwan Seok

    2015-11-30

    In this study, we propose and experimentally demonstrate a wavelength domain rogue-free ONU based on wavelength-pairing of downstream and upstream signals for time/wavelength division-multiplexed optical access networks. The wavelength-pairing tunable filter is aligned to the upstream wavelength channel by aligning it to one of the downstream wavelength channels. Wavelength-pairing is implemented with a compact and cyclic Si-AWG integrated with a Ge-PD. The pairing filter covered four 100 GHz-spaced wavelength channels. The feasibility of the wavelength domain rogue-free operation is investigated by emulating malfunction of the misaligned laser. The wavelength-pairing tunable filter based on the Si-AWG blocks the upstream signal in the non-assigned wavelength channel before data collision with other ONUs. PMID:26698745

  19. Economic viability of access broadband multiservice networks

    NASA Astrophysics Data System (ADS)

    Castelli, Francesco; Dammicco, Giacinto; Mocci, Ugo

    1995-02-01

    In this paper the economic viability of alternative architectures for optical access networks providing broad band services to different subscriber classes in a metropolitan environment, is investigated by a specific tool, NEVE (Network Economic Viability Evaluator), developed for broad band multiservice network planning, service evolutionary scenarios assessment, evaluation of tariff strategies and other actions taken at stimulating the demand growth. As the viability target can be achieved in different ways, different studies can be carried out by NEVE. In the paper some of them are discussed, particularly the ones addressed: to evaluate the impact on viability of alternative service scenarios; to determine the critical mass of broad band subscribers and the critical joint service adoption cost; to evaluate cross subsidiary policies among different subscriber classes and services; to perform sensitivity analysis with respect to variations of demand parameters and tariffs.

  20. Fiber-wireless (FiWi) access networks for a green video-dominated future internet

    NASA Astrophysics Data System (ADS)

    Maier, Martin

    2010-12-01

    We report on our ongoing research activities on integrated EPON and WLAN-based wireless mesh networks with a focus on reducing the CO2 footprint and improving the bandwidth-efficient video transport of fiber-wireless (FiWi) access networks. Various power saving techniques and mechanisms for efficient video transport in FiWi access networks are discussed.

  1. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    PubMed Central

    Islam, Mohammad Tariqul

    2014-01-01

    Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA) for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP) owners' satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners' satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network. PMID:24782662

  2. Dynamic resource allocation in hybrid access femtocell network.

    PubMed

    Ahmed, Afaz Uddin; Islam, Mohammad Tariqul; Ismail, Mahamod; Ghanbarisabagh, Mohammad

    2014-01-01

    Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA) for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP) owners' satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners' satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network. PMID:24782662

  3. On-the-field performance of quintuple-play long-reach OFDM-based WDM-PON optical access networks.

    PubMed

    Llorente, Roberto; Morant, Maria; Pellicer, Eloy; Herman, Milan; Nagy, Zsolt; Alves, Tiago; Cartaxo, Adolfo; Herrera, Javier; Correcher, Jose; Quinlan, Terence; Walker, Stuart; Rodrigues, Cláudio; Cluzeaud, Pierre; Schmidt, Axel; Piesiewicz, Radoslaw; Sambaraju, Rakesh

    2014-03-24

    In this paper the on-the-field performance of a WDM-PON optical access providing quintuple-play services using orthogonal frequency division multiplexing (OFDM) modulation is evaluated in a real fiber-to-the-home (FTTH) network deployed by Towercom operator in Bratislava (Slovakia). A bundle of quintuple-play services comprising full-standard OFDM-based signals (LTE, WiMAX, UWB and DVB-T) and an ad-hoc OFDM-GbE signal is transmitted in coexistence per single user. Both downstream and upstream transmission performances are evaluated in different on-the-field long-reach optical link distance configurations. Four wavelength multi-user transmission of quintuple-play OFDM services is demonstrated exceeding 60.8 km reach in standard single mode fiber. PMID:24663968

  4. Hybrid bidirectional radio-over-fiber-based orthogonal frequency division multiple access-passive optical network supporting 60/120 GHz using offset quadrate phase shift keying

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Qiu, Kun

    2015-09-01

    A hybrid bidirectional orthogonal frequency division multiple access-passive optical network (OFDMA-PON) based on offset quadrate phase shift keying (OQPSK) to support 60- and 120-GHz radio-over-fiber system is proposed. The system can support wired/wireless applications and enable the dynamic bandwidth allocation according to a subscriber's application. It is successfully achieved by using the millimeter waves (MMWs) generation and the carrier-reuse technique. In the proposed scheme, the MMW bands used for downlink (DL) and uplink transmissions are generated at the optical line terminal by the dual-arm Mach-Zehnder modulators. Both 60- and 120-GHz MMWs are obtained for the transmission of the high bit-rate services in source-free optical network units (ONUs), only using a single 15-GHz sinusoidal wave source. The Rayleigh backscattering effect is considered in the proposed OQPSK-based OFDMA-PON. For DL transmission over a 30-km single-mode fiber, the power penalties are less than 0.8 and 1 dB for the OQPSK-OFDM wired data at 10 Gb/s and the OQPSK-OFDM wireless data at 5 Gb/s, respectively.

  5. Optical networks, last mile access and applications

    NASA Astrophysics Data System (ADS)

    Leitgeb, E.; Gebhart, M.; Birnbacher, U.

    topology, reliability and availability. The advantages and disadvantages of different FSO technologies, as well as the backbone technology are discussed in this respect. Furthermore, the last mile access using FSO will be investigated for different environment areas (e.g., urban, rural, mountain) and climate zones. The availability of the FSO link is mainly determined by the local atmospheric conditions and distance and will be examined for the last mile. Results of various studies will complete these investigations. Finally, an example for realizing a FSO network for the last mile will be shown. In this example FSO transmitters with light emitting diodes (LED) instead of laser diodes will be described. By using LEDs, problems with laser-and eye safety are minimized. Some multimedia applications (like video-conferences, live TV-transmissions, etc.) will illustrate the range of applications for FSO last mile networks.

  6. Delay guaranteed VoD services over group-based integrated fiber-wireless (FiWi) access networks with energy efficiency

    NASA Astrophysics Data System (ADS)

    Li, Yan; Dai, Shifang; Chang, Xiangmao

    2015-08-01

    In group-based fiber-wireless (FiWi) access networks, where wireless clients are divided into several groups according to their interested Internet services, VoD services will meet new challenges considering the diversity of video requesting probability for each wireless group. In this paper, we categorize wireless groups into "video-hot" group with great interest in VoD services and "video-cold" group with infrequent video requesting. For video requests from "video-hot" groups, we firstly propose an energy-efficient optical network unit (ONU) selection approach to reduce ONU power consumption by selecting a subset of ONUs to support such requests, then our previously proposed rebroadcast and patching scheme can be effectively applied. For video requests from "video-cold" groups, a batched multicasting scheme is presented for energy and bandwidth saving. Both of the VoD schemes mentioned in this study are with the aim to minimize worst-case playback delay (WPD) which is particularly important as Internet users. In view of that some ONUs may need to handle video requests from two kinds of group, optimal ONU channel assignment aims to minimize weighted overall WPD is also studied. The efficiency of the work is finally demonstrated by the simulations.

  7. A network access control framework for 6LoWPAN networks.

    PubMed

    Oliveira, Luís M L; Rodrigues, Joel J P C; de Sousa, Amaro F; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  8. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  9. NSSDC provides network access to key data via NDADS

    NASA Technical Reports Server (NTRS)

    Behnke, Jeanne; King, Joseph

    1994-01-01

    The National Space Science Data Center (NSSDC) is making a growing fraction of its most customer-desirable data electronically accessible via both the local and wide area networks. NSSDC is witnessing a great increase in its data dissemination owing to this network accessibility. To provide its customers the best data accessibility, the NSSDC makes data available from a nearline, mass storage system, the NSSDC Data Archive and Dissemination Service (NDADS). The NDADS, the initial version was made available in January 1992, is a customized system of hardware and software that provides users access to the nearline data via ANONYMOUS FTP, an e-mail interface (ARMS), and a C-based software library. In January 1992, the NDADS registered 416 requests for 1,957 files. By December of 1994, NDADS had been populated with 800 gigabytes of electronically accessible data and had registered 1458 requests for 20,887 files. In this report we describe the NDADS system, both hardware and software. Later in the report, we discuss some of the lessons that were learned as a result of operating NDADS, particularly in the area of ingest and dissemination.

  10. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  11. Design and manufacturing of band-rejection filters based on long period gratings for applications in next generation access networks

    NASA Astrophysics Data System (ADS)

    Dybka, Kamil; Śmietana, Bartosz; Szarniak, Przemysław; Dłubek, Michał

    2015-12-01

    An engineering tool for designing LPG-based filters is reported. Band-rejection filters for telecom applications have been designed and manufactured and an automated mass production technology has been developed. The technology utilizes single-shot LPG writing with a double CO2 laser beam. The paper discusses also the critical process parameters controlled to shape the spectral characteristics of manufactured filters.

  12. Optimal access to large databases via networks

    SciTech Connect

    Munro, J.K.; Fellows, R.L.; Phifer, D. Carrick, M.R.; Tarlton, N.

    1997-10-01

    A CRADA with Stephens Engineering was undertaken in order to transfer knowledge and experience about access to information in large text databases, with results of queries and searches provided using the multimedia capabilities of the World Wide Web. Data access is optimized by the use of intelligent agents. Technology Logic Diagram documents published for the DOE facilities in Oak Ridge (K-25, X-10, Y-12) were chosen for this effort because of the large number of technologies identified, described, evaluated, and ranked for possible use in the environmental remediation of these facilities. Fast, convenient access to this information is difficult because of the volume and complexity of the data. WAIS software used to provide full-text, field-based search capability can also be used, through the development of an appropriate hierarchy of menus, to provide tabular summaries of technologies satisfying a wide range of criteria. The menu hierarchy can also be used to regenerate dynamically many of the tables that appeared in the original hardcopy publications, all from a single text database of the technology descriptions. Use of the Web environment permits linking many of the Technology Logic Diagram references to on-line versions of these publications, particularly the DOE Orders and related directives providing the legal requirements that were the basis for undertaking the Technology Logic Diagram studies in the first place.

  13. Success with Web-based image access.

    PubMed

    Harrison, Sean W

    2003-01-01

    The University of Mississippi Medical Center in Jackson, Miss., is the only medical school in the state. We performed 235,000 procedures in the 2001-02 fiscal year. All imaging services within the radiology department are networked to a PACS and are filmless. The elimination of film required that we decentralize our traditional file room to allow easy access to our radiology network across the campus. In our facility, there are three levels of image access: Diagnostic Quality, Review Quality and Web Access. Diagnostic Quality requires top-of-the-line workstations and monitors and is the most expensive. Review Quality workstations represent some savings over Diagnostic and are used in the ICU, orthopedics and surgery. Web Access appears to satisfy most areas outside the main diagnostic department. The account set-up procedure is simple because it uses our intranet email system. Images are easily pasted into presentation applications for articles and conferences. However, the main advantage of Web Access is the low cost. The downside of Web Access is that the images are for review only and are limited by the quality of the monitor in use. It is also somewhat cumbersome to retrieve old or comparison images via this method. The Web only holds approximately 45 days of the most recent images, therefore older studies may not be available. The deployment of this Web-based service has aided in our efforts to reduce the amount of film we print and has also been beneficial in improving patient care through faster service. PMID:12800563

  14. 47 CFR 36.213 - Network access services revenues.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Network access services revenues. 36.213 Section 36.213 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... Income Accounts Operating Revenues § 36.213 Network access services revenues. (a) End User...

  15. 47 CFR 36.213 - Network access services revenues.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access services revenues. 36.213 Section 36.213 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... Income Accounts Operating Revenues § 36.213 Network access services revenues. (a) End User...

  16. 47 CFR 36.213 - Network access services revenues.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 2 2013-10-01 2013-10-01 false Network access services revenues. 36.213 Section 36.213 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... Income Accounts Operating Revenues § 36.213 Network access services revenues. (a) End User...

  17. 47 CFR 36.213 - Network access services revenues.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Network access services revenues. 36.213 Section 36.213 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... Income Accounts Operating Revenues § 36.213 Network access services revenues. (a) End User...

  18. 47 CFR 36.213 - Network access services revenues.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Network access services revenues. 36.213 Section 36.213 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... Income Accounts Operating Revenues § 36.213 Network access services revenues. (a) End User...

  19. Broadband Access Network Planning Optimization Considering Real Copper Cable Lengths

    NASA Astrophysics Data System (ADS)

    Peternel, Blaž Kos, Andrej

    Broadband access network planning strategies with techno-economic calculations are important topics, when optimal broadband network deployments are considered. This paper analyzes optimal deployment combination of digital subscriber line technologies (xDSL) and fiber to the home technologies (FTTx), following different user bandwidth demand scenarios. For this reason, optimal placement of remote digital subscriber line multiplexer (RDSLAM) is examined. Furthermore, the article also discusses the economy of investments, depending on certain investment threshold and the reach of different xDSL technologies. Finally, the difference between broadband network deployment in a characteristic urban and rural area in Republic of Slovenia, in terms of required optical cable dig length per household is shown. A tree structure network model of a traditional copper access network is introduced. A dynamic programming logic, with recursion as a basis of a tree structure examination and evaluation of optimal network elements placement is used. The tree structure network model considers several real network parameters (e. g.: copper cable lengths, user coordinates, node coordinates). The main input for the optimization is a local loop distance between each user and a candidate node for RDSLAM placement. Modelling of copper access networks with a tree structure makes new extensions in planning optimization of broadband access networks. Optimization of network elements placement has direct influence on efficiency and profitability of broadband access telecommunication networks.

  20. Shared Access Optical Networks For The Local Loop

    NASA Astrophysics Data System (ADS)

    Payne, D. B.; Stern, J. R.

    1988-09-01

    The application of single mode fibre to the local network environment opens up major opportunities for service provision via shared access networks. Previous technologies (copper pair, coaxial cable and multimode fibre) had bandwidth limitation problems that placed a severe restriction on both the level of resource sharing and the service package that could be delivered. The enormous bandwidth capability of single mode fibre can be used to provide significant resource sharing without incurring fundamental restrictions on the capacity of the services carried. The paper briefly outlines some of the activities within British Telecom on shared access systems. Early systems concepts were either based on fibre feeders to remote multiplexers for the delivery of telephony and data services to large customers or the use of advanced wavelength multiplexing techniques over passive optical networks for the transmission of wideband services to business and residential customers. Recently activity has concentrated on a passive optical network that shows good potential for the economic provision of telephony services. The structure of the network allows the later addition of broadband services via additional wavelengths without disturbing existing telephony/data customers. The basic network has a fibre feeder from the exchange to passive optical splitters housed at the Cabinet and Distribution Points (DP). Each customer receives a fibre from DP and via this a TDM multiplex broadcast from the exchange which carries the customer's traffic. The customer equipment accesses the time slots destined for the customer and delivers the data via a suitable interface to provide the services required. Customers transmit back to the exchange in a time multiplex synchronised by a ranging protocol that sets an appropriate delay in the customer equipment to avoid collisions at the optical combiners in the DPs and Cabinet. Present studies are considering a total optical split of 128 ways with a

  1. Unfolding Accessibility Provides a Macroscopic Approach to Temporal Networks

    NASA Astrophysics Data System (ADS)

    Lentz, Hartmut H. K.; Selhorst, Thomas; Sokolov, Igor M.

    2013-03-01

    An accessibility graph of a network contains a link wherever there is a path of arbitrary length between two nodes. We generalize the concept of accessibility to temporal networks. Building an accessibility graph by consecutively adding paths of growing length (unfolding), we obtain information about the distribution of shortest path durations and characteristic time scales in temporal networks. Moreover, we define causal fidelity to measure the goodness of their static representation. The practicability of our proposed methods is demonstrated for three examples: networks of social contacts, livestock trade, and sexual contacts.

  2. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  3. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  4. Experimental realization of an entanglement access network and secure multi-party computation.

    PubMed

    Chang, X-Y; Deng, D-L; Yuan, X-X; Hou, P-Y; Huang, Y-Y; Duan, L-M

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  5. Symmetric reconfigurable capacity assignment in a bidirectional DWDM access network.

    PubMed

    Ortega, Beatriz; Mora, José; Puerto, Gustavo; Capmany, José

    2007-12-10

    This paper presents a novel architecture for DWDM bidirectional access networks providing symmetric dynamic capacity allocation for both downlink and uplink signals. A foldback arrayed waveguide grating incorporating an optical switch enables the experimental demonstration of flexible assignment of multiservice capacity. Different analog and digital services, such as CATV, 10 GHz-tone, 155Mb/s PRBS and UMTS signals have been transmitted in order to successfully test the system performance under different scenarios of total capacity distribution from the Central Station to different Base Stations with two reconfigurable extra channels for each down and upstream direction. PMID:19550967

  6. Fiber Access Networks: Reliability Analysis and Swedish Broadband Market

    NASA Astrophysics Data System (ADS)

    Wosinska, Lena; Chen, Jiajia; Larsen, Claus Popp

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  7. Easy Access: Auditing the System Network

    ERIC Educational Resources Information Center

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  8. Software Defined Networking for Next Generation Converged Metro-Access Networks

    NASA Astrophysics Data System (ADS)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  9. Network access to PCDS (SPAN, ESN, SESNET, ARPANET)

    NASA Technical Reports Server (NTRS)

    Green, J.

    1986-01-01

    One of the major goals of the National Space Science Data Center is to increase access to NASA data systems by enhancing networking activities. The activities are centered around three basic networking systems: the Space Physics Analysis Network (SPAN); the Earth Science Network (ESN); and the NASA Packet Switched System (NPSS). Each system is described, linkages among systems are explained, and future plans are announced. The inclusion of several new climate nodes on SPAN or ESN are also mentioned. Presently, the Pilot Climate Data System is accessible through SPAN and will be accessible through NPSS by summer and ESN by the end of 1986. Ambitious plans for implementation are underway. The implementation of these plans will represent a major advance in the utilization and accessibility of data worldwide.

  10. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  11. Implementation of levels of services on broadband networks with cable modem access

    NASA Astrophysics Data System (ADS)

    Campos, Luis A.; Yu, Che-Fn

    1997-10-01

    Residential broadband access networks using technologies such as ADSL and cable modems have enabled the provisioning of emerging Internet applications such as Internet telephony, video conferencing and interactive games. These applications have specific end-to-end performance requirements from the network in order to have an acceptable performance. Currently the Internet is a best effort network which doesn't provide levels of service. There are many elements of an end-to-end network which are currently suitable to provide quality-of- service guaranties such as ATM links. Nevertheless, only with recent deployments of broadband access technologies and the introduction of Internet protocols such as RSVP, providing levels of service becomes feasible without the use expensive links to the customer site. This paper examines several network implementation options for introducing levels of service using cable modem access. Limitations imposed by the applications on the network as well as the contribution of the different network elements to level of service parameters such as end-to-end delay, throughput and jitter are examined. Concentration network architectures as well as proposed backbone configuration options for end-to-end level of service provisioning are presented. At the access network, provisioning of level of service using bandwidth control through packet throttling and through access network design providing excess bandwidth to customers are presented. HFC protocol dependent means to provide level of services including reservation and ATM based protocols are examined as well.

  12. Demonstrations of 10 and 40 Gbps upstream transmissions using 1.2 GHz RSOA-based ONU in long-reach access networks

    NASA Astrophysics Data System (ADS)

    Yeh, C. H.; Chow, C. W.; Wu, Y. F.; Chen, H. Y.

    2012-03-01

    Carrier-distributed long-reach passive optical network (LR-PON) is a promising candidate for future access networks. In this work, we analyze and compare the 4 × 2.5 Gb/s and 4 × 10 Gb/s upstream traffics in a carrier-distributed LR-PON using four wavelength-multiplexed 2.5 Gb/s on-off keying (OOK) and 10 Gb/s optical orthogonal frequency division multiplexing-quadrature amplitude modulation (OFDM-QAM) signals. Four commercial 1.2 GHz bandwidth reflective semiconductor optical amplifiers (RSOAs) are used in each optical networking unit (ONU) for the generation of the upstream signal. Due to the limited bandwidth of the RSOA, only up to 2.5 Gb/s upstream OOK signal can be generated. However, by using the spectral efficient modulation, such as OFDM-QAM, 10 Gb/s data rate can be achieved. 20, 50 and 75 km fiber transmissions are also compared using the two different kinds of modulation respectively.

  13. User Procedures Standardization for Network Access. NBS Technical Note 799.

    ERIC Educational Resources Information Center

    Neumann, A. J.

    User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…

  14. Accessibility and Integrity of Networked Information Collections. Background Paper.

    ERIC Educational Resources Information Center

    Lynch, Clifford A.

    This paper considers questions related to the integrity and accessibility of new electronic information resources. It begins with a review of recent developments in networked information resources and the tools to identify, navigate, and use such resources. An overview is then given of the issues involved in access and integrity questions. Links…

  15. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  16. Multi-access in packet radio networks

    NASA Astrophysics Data System (ADS)

    Arikan, E.

    1982-09-01

    A PRN (packet radio network) is a collection of geographically distributed, possibly mobile users where each user is capable of transmitting and receiving messages over a shared broadcast medium. In a PRN, messages are divided into packets, which may be fixed or variable in length, and each packet is transmitted through the network individually. Packets are assembled at their destinations to reconstruct the original messages. The data traffic in a PRN is characterized by specifying the average message arrival rates to the network for each o-d (origin-destination) pair. A set of o-d rates is called feasible if there exist network protocols under which the number of packets in the network still not delivered to their destinations remains finite with probability one. The capacity region of a PRN is defined to be the set of all feasible sets of o-d rates. In this thesis, PRNs are studied from the viewpoint of feasibility, i.e., we take an arbitrary set of message input rates as given and try to determine if it is feasible. Our main conclusion is that, unless P = NP, there exists no practical algorithm for characterizing the capacity region of a PRN, in the sense that the decision problem regarding the feasibility of a given set of o-d rates is NP-complete.

  17. Simulation and measurement of optical access network with different types of optical-fiber amplifiers

    NASA Astrophysics Data System (ADS)

    Latal, Jan; Vogl, Jan; Koudelka, Petr; Vitasek, Jan; Siska, Petr; Liner, Andrej; Papes, Martin; Vasinek, Vladimir

    2012-01-01

    The optical access networks are nowadays swiftly developing in the telecommunications field. These networks can provide higher data transfer rates, and have great potential to the future in terms of transmission possibilities. Many local internet providers responded to these facts and began gradually installing optical access networks into their originally built networks, mostly based on wireless communication. This allowed enlargement of possibilities for end-users in terms of high data rates and also new services such as Triple play, IPTV (Internet Protocol television) etc. However, with this expansion and building-up is also related the potential of reach in case of these networks. Big cities, such as Prague, Brno, Ostrava or Olomouc cannot be simply covered, because of their sizes and also because of their internal regulations given by various organizations in each city. Standard logical and also physical reach of EPON (IEEE 802.3ah - Ethernet Passive Optical Network) optical access network is about 20 km. However, for networks based on Wavelength Division Multiplex the reach can be up to 80 km, if the optical-fiber amplifier is inserted into the network. This article deals with simulation of different types of amplifiers for WDM-PON (Wavelength Division Multiplexing-Passive Optical Network) network in software application Optiwave OptiSystem and than are the values from the application and from real measurement compared.

  18. Access protocols and network architectures for very high-speed optical fiber local area networks

    NASA Astrophysics Data System (ADS)

    Ganti, Sudhaker N. M.

    1993-10-01

    The single mode optical fiber possesses an enormous bandwidth of more than 30 THz in the low-loss optical region of 1.3 and 1.5 microns. Through wavelength division multiplexing (WDM), the optical fiber bandwidth can be divided into a set of high-speed channels, where each channel is assigned its own unique wavelength. An M x M passive optical star coupler is a simple broadcast medium, in which light energy incident at any input is uniformly coupled (or distributed) to all the outputs. Thus, a passive star along with the WDM channels can be used to configure a local area network (LAN). In this LAN, users require tunable devices to access a complete or a partial set of the WDM channels. Due to these multiple channels, many concurrent packet transmissions corresponding to different user pairs are possible and thus the total system throughput can be much higher than the data rates of each individual channel. To fairly arbitrate the data channels among the users, media access protocols are needed. Depending upon the number of data channels and the number of users, two possible situations arise. In the first case, the number of users is much larger than the number of data channels and in the second, the number of users equals the number of channels. In both cases, data channel contention may arise if multiple users access the same given channel and must be resolved. This thesis proposes media access protocols for passive optical star networks. All the proposed protocols are slotted in nature, i.e., the time axis on each channel is divided into slots. The well known Slotted-ALOHA and Reservation ALOHA protocols are extended to the multichannel network environment. The thesis also proposes switching protocols (equal number of channels and users), contention-based reservation protocols for this network architecture. To interconnect these star networks, a multi-control channel protocol is also proposed along with two interconnecting techniques. Since there are multiple data

  19. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  20. Minimal full-access networks: Enumeration and characterization

    NASA Astrophysics Data System (ADS)

    Sridhar, M. A.; Raghavendra, C. S.

    1990-08-01

    Minimal full-access (MFA) networks are the class of all interconnection networks for 2N = 2n+1 inputs and outputs that require a minimum number of switching elements and provide full access capability. In this paper, MFA networks with 2 × 2 switching elements are studied. Graph-theoretic ideas used in developing previous results concerning uniform MFA networks [M. A. Sridhar and C. S. Raghavendra, J. Parallel Distrib. Comput. 5, (1988), 383-403] are generalized to show how to enumerate a large class of MFA networks. An exponential lower bound on the number of such networks is derived, and routing algorithms are outlined. In the process, a characterization of the set of automorphisms of the Omega network is derived. A characterization of the permutations realizable by a certain subclass of these networks is also derived. Finally, it is shown that a simple self-routing algorithm exists for the class of networks introduced here. This author's research is supported in part by NSF Grant MIP 8452003 with matching funds from AT&T and TRW, DARPA/ARO Contract DAAG 29-84-K-0066, and ONR Contract N00014-86-K-0602.

  1. Phenotype accessibility and noise in random threshold gene regulatory networks.

    PubMed

    Pinho, Ricardo; Garcia, Victor; Feldman, Marcus W

    2014-01-01

    Evolution requires phenotypic variation in a population of organisms for selection to function. Gene regulatory processes involved in organismal development affect the phenotypic diversity of organisms. Since only a fraction of all possible phenotypes are predicted to be accessed by the end of development, organisms may evolve strategies to use environmental cues and noise-like fluctuations to produce additional phenotypic diversity, and hence to enhance the speed of adaptation. We used a generic model of organismal development --gene regulatory networks-- to investigate how different levels of noise on gene expression states (i.e. phenotypes) may affect access to new, unique phenotypes, thereby affecting phenotypic diversity. We studied additional strategies that organisms might adopt to attain larger phenotypic diversity: either by augmenting their genome or the number of gene expression states. This was done for different types of gene regulatory networks that allow for distinct levels of regulatory influence on gene expression or are more likely to give rise to stable phenotypes. We found that if gene expression is binary, increasing noise levels generally decreases phenotype accessibility for all network types studied. If more gene expression states are considered, noise can moderately enhance the speed of discovery if three or four gene expression states are allowed, and if there are enough distinct regulatory networks in the population. These results were independent of the network types analyzed, and were robust to different implementations of noise. Hence, for noise to increase the number of accessible phenotypes in gene regulatory networks, very specific conditions need to be satisfied. If the number of distinct regulatory networks involved in organismal development is large enough, and the acquisition of more genes or fine tuning of their expression states proves costly to the organism, noise can be useful in allowing access to more unique phenotypes

  2. Phenotype Accessibility and Noise in Random Threshold Gene Regulatory Networks

    PubMed Central

    Feldman, Marcus W.

    2015-01-01

    Evolution requires phenotypic variation in a population of organisms for selection to function. Gene regulatory processes involved in organismal development affect the phenotypic diversity of organisms. Since only a fraction of all possible phenotypes are predicted to be accessed by the end of development, organisms may evolve strategies to use environmental cues and noise-like fluctuations to produce additional phenotypic diversity, and hence to enhance the speed of adaptation. We used a generic model of organismal development --gene regulatory networks-- to investigate how different levels of noise on gene expression states (i.e. phenotypes) may affect access to new, unique phenotypes, thereby affecting phenotypic diversity. We studied additional strategies that organisms might adopt to attain larger phenotypic diversity: either by augmenting their genome or the number of gene expression states. This was done for different types of gene regulatory networks that allow for distinct levels of regulatory influence on gene expression or are more likely to give rise to stable phenotypes. We found that if gene expression is binary, increasing noise levels generally decreases phenotype accessibility for all network types studied. If more gene expression states are considered, noise can moderately enhance the speed of discovery if three or four gene expression states are allowed, and if there are enough distinct regulatory networks in the population. These results were independent of the network types analyzed, and were robust to different implementations of noise. Hence, for noise to increase the number of accessible phenotypes in gene regulatory networks, very specific conditions need to be satisfied. If the number of distinct regulatory networks involved in organismal development is large enough, and the acquisition of more genes or fine tuning of their expression states proves costly to the organism, noise can be useful in allowing access to more unique phenotypes

  3. High speed OFDM-CDMA optical access network.

    PubMed

    Guo, X; Wang, Q; Zhou, L; Fang, L; Wonfor, A; Penty, R V; White, I H

    2016-04-15

    We demonstrate the feasibility of a 16×3.75  Gb/s (60 Gb/s aggregate) Orthogonal frequency division multiplexing-code division multiple access passive optical network for next-generation access applications. 3.75 Gb/s PON channel transmission over 25 km single-mode fiber shows 0.1 dB dispersion and 0.9 dB crosstalk penalties. Advantages of the system include high capacity, enhanced spectral efficiency, coding gain, and networking functions such as increased security and single-wavelength operation. PMID:27082351

  4. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  5. Effective number of accessed nodes in complex networks.

    PubMed

    Viana, Matheus P; Batista, João L B; Costa, Luciano da F

    2012-03-01

    The measurement called accessibility has been proposed as a means to quantify the efficiency of the communication between nodes in complex networks. This article reports results regarding the properties of accessibility, including its relationship with the average minimal time to visit all nodes reachable after h steps along a random walk starting from a source, as well as the number of nodes that are visited after a finite period of time. We characterize the relationship between accessibility and the average number of walks required in order to visit all reachable nodes (the exploration time), conjecture that the maximum accessibility implies the minimal exploration time, and confirm the relationship between the accessibility values and the number of nodes visited after a basic time unit. The latter relationship is investigated with respect to three types of dynamics: traditional random walks, self-avoiding random walks, and preferential random walks. PMID:22587147

  6. Adaptive coded spreading OFDM signal for dynamic-λ optical access network

    NASA Astrophysics Data System (ADS)

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun

    2015-12-01

    This paper proposes and experimentally demonstrates a novel adaptive coded spreading (ACS) orthogonal frequency division multiplexing (OFDM) signal for dynamic distributed optical ring-based access network. The wavelength can be assigned to different remote nodes (RNs) according to the traffic demand of optical network unit (ONU). The ACS can provide dynamic spreading gain to different signals according to the split ratio or transmission length, which offers flexible power budget for the network. A 10×13.12 Gb/s OFDM access with ACS is successfully demonstrated over two RNs and 120 km transmission in the experiment. The demonstrated method may be viewed as one promising for future optical metro access network.

  7. Large optical 3D MEMS switches in access networks

    NASA Astrophysics Data System (ADS)

    Madamopoulos, Nicholas; Kaman, Volkan; Yuan, Shifu; Jerphagnon, Olivier; Helkey, Roger; Bowers, John E.

    2007-09-01

    Interest is high among residential customers and businesses for advanced, broadband services such as fast Internet access, electronic commerce, video-on-demand, digital broadcasting, teleconferencing and telemedicine. In order to satisfy such growing demand of end-customers, access technologies such as fiber-to-the-home/building (FTTH/B) are increasingly being deployed. Carriers can reduce maintenance costs, minimize technology obsolescence and introduce new services easily by reducing active elements in the fiber access network. However, having a passive optical network (PON) also introduces operational and maintenance challenges. Increased diagnostic monitoring capability of the network becomes a necessity as more and more fibers are provisioned to deliver services to the end-customers. This paper demonstrates the clear advantages that large 3D optical MEMS switches offer in solving these access network problems. The advantages in preventative maintenance, remote monitoring, test and diagnostic capability are highlighted. The low optical insertion loss for all switch optical connections of the switch enables the monitoring, grooming and serving of a large number of PON lines and customers. Furthermore, the 3D MEMS switch is transparent to optical wavelengths and data formats, thus making it easy to incorporate future upgrades, such higher bit rates or DWDM overlay to a PON.

  8. Network-Accessible Resources and the Redefinition of Technical Services.

    ERIC Educational Resources Information Center

    Jones, Neil

    1998-01-01

    Discussion of the use of computer networks in academic libraries focuses on a technical-services perspective in the United Kingdom. Topics include access to electronic resources; standards; change management; the changing nature of the library catalog; redefining the local catalog; cataloging versus indexing; the Z39.50 information retrieval…

  9. Energy challenges in optical access and aggregation networks.

    PubMed

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-01

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. PMID:26809581

  10. A metro-access integrated network with all-optical virtual private network function using DPSK/ASK modulation format

    NASA Astrophysics Data System (ADS)

    Tian, Yue; Leng, Lufeng; Su, Yikai

    2008-11-01

    All-optical virtual private network (VPN), which offers dedicated optical channels to connect users within a VPN group, is considered a promising approach to efficient internetworking with low latency and enhanced security implemented in the physical layer. On the other hand, time-division multiplexed (TDM) / wavelength-division multiplexed (WDM) network architecture based on a feeder-ring with access-tree topology, is considered a pragmatic migration scenario from current TDM-PONs to future WDM-PONs and a potential convergence scheme for access and metropolitan networks, due to its efficiently shared hardware and bandwidth resources. All-optical VPN internetworking in such a metro-access integrated structure is expected to cover a wider service area and therefore is highly desirable. In this paper, we present a TDM/WDM metro-access integrated network supporting all-optical VPN internetworking among ONUs in different sub- PONs based on orthogonal differential-phase-shift keying (DPSK) / amplitude-shift keying (ASK) modulation format. In each ONU, no laser but a single Mach-Zehnder modulator (MZM) is needed for the upstream and VPN signal generation, which is cost-effective. Experiments and simulations are performed to verify its feasibility as a potential solution to the future access service.

  11. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  12. An Easily Accessible Self-Healing Transparent Film Based on a 2D Supramolecular Network of Hydrogen-Bonding Interactions between Polymeric Chains.

    PubMed

    Roy, Nabarun; Tomović, Željko; Buhler, Eric; Lehn, Jean-Marie

    2016-09-12

    Self-healing polymers hold great promise for the future, enhancing in particular the longevity of polymeric materials. We describe a self-healing covalent polymer, presenting an extensive array of hydrogen-bonding sites based on the combination of urea, urethane, and bis-acyl-hydrazine units. Solvent-cast thin-films prepared by polycondensation of a commercially available dihydrazide and a diisocyanate prepolymer exhibited excellent room temperature autonomous healing with almost full recovery of mechanical properties when two parts of a cut film were overlapped and gently pressed together. This autonomous healing upon damage may be attributed to the supramolecular dynamics of multiple lateral inter-chain hydrogen-bonding interactions between the polymer chains. The solid-state structure of a model compound incorporating the same structural backbone corroborates the existence of an extensive two-dimensional supramolecular hydrogen-bonding network. PMID:27226034

  13. 47 CFR 51.311 - Nondiscriminatory access to unbundled network elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Nondiscriminatory access to unbundled network... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an...

  14. 47 CFR 51.311 - Nondiscriminatory access to unbundled network elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Nondiscriminatory access to unbundled network... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an...

  15. Analysis of physical layer performance of hybrid optical-wireless access network

    NASA Astrophysics Data System (ADS)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  16. Alternatives for Monitoring and Limiting Network Access to Students in Network-Connected Classrooms

    ERIC Educational Resources Information Center

    Almeroth, Kevin; Zhang, Hangjin

    2013-01-01

    With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…

  17. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  18. Highball: A high speed, reserved-access, wide area network

    NASA Technical Reports Server (NTRS)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  19. Improved small satellite access of the space network

    NASA Technical Reports Server (NTRS)

    Horan, Stephen; Osborne, William P.; Minnix, Timothy

    1994-01-01

    This report contains the results of a study performed under the sponsorship of the National Aeronautics and Space Administration (NASA) made as a grant to the Center for Space Telemetering and Telecommunication Systems at New Mexico State University. The purpose of this phase of the grant is to increase user access to the Space Network (SN) run by NASA for supplying space-to-ground communications for satellites and associated control centers. The identified need is to bring more users into the community of those accessing the SN, especially those in the small satellite class of users. The initial phase of the study concerned the potential for modifications to the standard transponder used in the SN. The results of that investigation are summarized in Section 4. As the hardware modifications were being investigated, a second option was developed, namely to consider changes to the operational mode for the small satellites. This operational concept was to use a single, fixed-pointing antenna in a spin-stabilized satellite and let the antenna pattern sweep past the Tracking and Data Relay Satellites (TDRS) in the SN. The question to be answered by this phase of the study was twofold: could enough contact time per day be made available using this simple operating mode and could the data rate be high enough to allow for sufficient data throughput to satisfy the user community using existing components. Section 2 outlines the methodology and simulation results to answer these questions. Section 3 contains a summary of an operational simulation of a simple satellite payload using these contact scenarios. The simulation is not all inclusive but shows how a payload simulation could be configured to utilize variable contact times. The answer to both of the questions desired to be answered is affirmative. By carefully choosing the correct system transmission power and antenna pattern, the system will allow support to the 50th percentile of expected systems. It is recommended

  20. High speed infrared optical wireless for home access networks

    NASA Astrophysics Data System (ADS)

    O'Brien, Dominic C.

    2013-12-01

    The availability of high-bandwidth internet connections to home gateways will place increasing demands on the home access network that provides connections to computers and other devices. In this paper the use of infrared optical wireless to provide connections to user appliances and terminals is discussed. The design and implementation of two demonstration systems operating at hundreds of Mbit/s and above are detailed. Future challenges are also discussed.

  1. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  2. A novel ECDM-OFDM-PON architecture for next-generation optical access network.

    PubMed

    Zhang, Lijia; Xin, Xiangjun; Liu, Bo; Yu, Jianjun; Zhang, Qi

    2010-08-16

    This paper proposes a novel architecture for next-generation passive optical network (PON) based on electrical code division multiplexing orthogonal frequency division multiplexing (ECDM-OFDM) access. The feasibility of bidirectional transmission with the same wavelength has been experimentally demonstrated under this architecture. An error-free transmission of two PON channels has been successfully demonstrated in the experiment. PMID:20721227

  3. Full-duplex RoF link with broadband mm-wave signal in W-band based on WDM-PON access network with optical mm-wave local oscillator broadcasting

    NASA Astrophysics Data System (ADS)

    Ma, Jianxin; Zhang, Ruijiao; Li, Yanjie; Zhang, Qi; Yu, Jianguo

    2015-02-01

    A novel full-duplex link with an optical mm-wave local oscillator broadcasting for broadband millimeter (mm)-wave wireless access in W-band is proposed based on the WDM-PON-RoF. In our scheme, a universal optical mm-wave local oscillator in W-band is distributed over the whole network to up-convert the downlink IF optical signal, which not only improves the spectrum efficiency by reducing the bandwidth requirement of each downlink, but also decreases the degradation caused by the fiber chromatic dispersion. Moreover, since the incoherently down-converted uplink signal is modulated on the reused blank optical carrier extracted from the downlink signal, the base stations (BSs) need no optical source, and so its structure is simplified. The numerical simulation results agree well with the theoretical analysis and show that the proposed full-duplex link for the W-band wireless access based on WDM-PON-RoF maintains good performance with cost effective implement.

  4. A physical layer perspective on access network sharing

    NASA Astrophysics Data System (ADS)

    Pfeiffer, Thomas

    2015-12-01

    Unlike in copper or wireless networks, there is no sharing of resources in fiber access networks yet, other than bit stream access or cable sharing, in which the fibers of a cable are let to one or multiple operators. Sharing optical resources on a single fiber among multiple operators or different services has not yet been applied. While this would allow for a better exploitation of installed infrastructures, there are operational issues which still need to be resolved, before this sharing model can be implemented in networks. Operating multiple optical systems and services over a common fiber plant, autonomously and independently from each other, can result in mutual distortions on the physical layer. These distortions will degrade the performance of the involved systems, unless precautions are taken in the infrastructure hardware to eliminate or to reduce them to an acceptable level. Moreover, the infrastructure needs to be designed such as to support different system technologies and to ensure a guaranteed quality of the end-to-end connections. In this paper, suitable means are proposed to be introduced in fiber access infrastructures that will allow for shared utilization of the fibers while safeguarding the operational needs and business interests of the involved parties.

  5. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  6. Free-space optical mesh-connected bus networks using wavelength-division multiple access.

    PubMed

    Li, Y; Lohmann, A W; Rao, S B

    1993-11-10

    A novel optical free-space mesh-connected bus interconnect network architecture is proposed. A mesh-connected bus [IEEE Trans. Comput. C-30, 264-273 (1981)] is known to have the capability of interconnecting, with a three-stage switching, N nodes with a power distribution loss proportional to √N and is therefore advantageous for networking a large number, say over 1000, of communicating ports. Based on conventional space-invariant optical components in a compact and efficient geometry, the proposed optical mesh-connected bus system concept can be used to build either free-space optical interconnect links for parallel processing applications or central switching systems for local or global lightwave communication networks. The proposed architecture lends itself to networking under both the wavelength-division multiple access and other multiple-access environments. In this paper, based on the wavelength-division multiple-access environment, various optical system implementation and performance issues are discused and parameters are analyzed. It was found that by use of a reasonably compact three-dimensional free-space volume, more than 100,000 dispersion-limited communication nodes at a uniform channel spacing of 0.75 nm can be linked with a moderate power distribution loss of 28 dB. Some preliminary optical wavelength-division multiple-access mesh-connected bus experiments based on a 27 × 27 panchromatic optical source array were performed to confirm the operational principle of the proposed concept. PMID:20856480

  7. Multi-core fiber technology for highly reliable optical network in access areas

    NASA Astrophysics Data System (ADS)

    Tanaka, Ken-ichi; Lee, Yong; Nomoto, Etsuko; Arimoto, Hideo; Sugawara, Toshiki

    2015-03-01

    A failure recovery system utilizing a multi-core fiber (MCF) link with field programmable gate array-based optical switch units was developed to achieve high capacity and highly reliable optical networks in access areas. We describe the novel MCF link based on a multi-ring structure and a protection scheme to prevent link failures. Fan-in/ -out devices and connectors are also presented to demonstrate the development status of the MCF connection technology for the link. We demonstrated path recovery by switching operation within a sufficiently short time, which is required by ITU-T. The selection of a protecting path as a failure working path was also optimized as the minimum passage of units for low loss transmission. The results we obtained indicate that our proposed link has potential for the network design of highly reliable network topologies in access areas such as data centers, systems in business areas, and fiber to the home systems in residential areas.

  8. Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks

    SciTech Connect

    Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

    2012-08-01

    As early as 2014, mobile network operators’ spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

  9. Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect

    NASA Astrophysics Data System (ADS)

    von Helden, Josef; Bente, Ingo

    Network Access Control (NAC) is the most promising approach to provide protection against sophisticated attacks that first compromise endpoints to subsequently continue their evil work in networks accessible via the compromised endpoint. Trusted Network Connect (TNC) is a NAC approach featuring interoperability and unforgeability due to its openness, broad vendor support and integration of Trusted Computing functions.

  10. Access to Max '91 information via computer networks

    NASA Technical Reports Server (NTRS)

    Kiplinger, Alan L.

    1989-01-01

    Various types of flare information, activity, active region reports, x ray plots and daily Campaign Action notices are now available on SPAN, and INTERNET. Although this system was developed for use by Max '91 participants during campaigns, it is updated daily and maintained at times outside of campaigns. Thus it is available for general use outside of campaigns. The Space Environment Laboratory maintains VAX and Apollo systems, both of which are on INTERNET. The VAX is also on the SPAN network as node SELVAX or 9555. Details of access to files on the VAX are given.

  11. Bandpass sampling in heterodyne receivers for coherent optical access networks.

    PubMed

    Bakopoulos, Paraskevas; Dris, Stefanos; Schrenk, Bernhard; Lazarou, Ioannis; Avramopoulos, Hercules

    2012-12-31

    A novel digital receiver architecture for coherent heterodyne-detected optical signals is presented. It demonstrates the application of bandpass sampling in an optical communications context, to overcome the high sampling rate requirement of conventional receivers (more than twice the signal bandwidth). The concept is targeted for WDM coherent optical access networks, where applying heterodyne detection constitutes a promising approach to reducing optical hardware complexity. The validity of the concept is experimentally assessed in a 76 km WDM-PON scenario, where the developed DSP achieves a 50% ADC rate reduction with penalty-free operation. PMID:23388768

  12. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    NASA Astrophysics Data System (ADS)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  13. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  14. Optical interconnection network for parallel access to multi-rank memory in future computing systems.

    PubMed

    Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun

    2015-08-10

    With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent. PMID:26367901

  15. "This Site Is Blocked": K-12 Teachers and the Challenge of Accessing Peer-to-Peer Networks for Education

    ERIC Educational Resources Information Center

    Ching, Cynthia Carter; Hursh, Anthony W.

    2010-01-01

    This article examines a little-discussed phenomenon in the study of both peer-to-peer collaborative networks and teaching with technology: that of teachers caught in the middle between open public networks as teaching resources and highly restrictive school policies regarding internet content and online access. Based on their experiences as…

  16. New broadband access technology: Ethernet passive optical network (EPON)

    NASA Astrophysics Data System (ADS)

    Zhu, Lili; Fan, Xiliang; He, Yan

    2004-04-01

    A newly broadband access technology comes into being with the combination of IP and access technique, which is considered as EPON (Ethernet passive optical network). EPON system resolves the limitation of point-to-point, instead uses the topology architecture of point-to-multipoint. It extends the fiber cable to the last mile, so we can get the end-to-end network system with high efficiency, well expansibility and low maintenance cost. There are many key techniques and problems in EPON system, for example, CDR (Clock and data recovery), RTT (Round-Trip Time), DBA (Dynamic Bandwidth Allocation) and ULSLE (Upper-Layer Shared LAN Emulation). The essential character of MPCP (Multi-Point Control Protocol) used in EPON is to schedule the transmission of the upstream data packets, and to avoid data collision. A central counter is applied to synchronize the upstream data through a time-stamp flag. A REPORT control frame is transmitted, which give the length of the different priority queues. On receiving this control frame, central office device modifies the bandwidth allocation in the grant table. The function relating to the ULSLE protocol is similar with IEEE802.1D Bridge, and also includes point-to-multipoint, therefore so many problems are resolved, such as the frame reflection, the communication among different ONUs.

  17. An energy-efficient and elastic optical multiple access system based on coherent interleaved frequency division multiple access.

    PubMed

    Yoshida, Yuki; Maruta, Akihiro; Ishii, Kenji; Akiyama, Yuji; Yoshida, Tsuyoshi; Suzuki, Naoki; Koguchi, Kazuumi; Nakagawa, Junichi; Mizuochi, Takashi; Kitayama, Ken-ichi

    2013-05-20

    This paper proposes a novel bandwidth-elastic and energy-efficient passive optical network (PON) based on the coherent interleaved frequency division multiple access (IFDMA) scheme. We experimentally demonstrate the coherent IFDMA-PON uplink transmission up-to 30 Gbps over a 30 km standard single-mode fiber with 2 × optical network units (ONUs). A low-complexity digital carrier synchronization technique enables multiple access of the ONUs on the basis of 78.1 MHz narrow band orthogonal subcarriers without any guard-bands. PMID:23736447

  18. Network-Based Electronic Serials.

    ERIC Educational Resources Information Center

    Bailey, Charles W., Jr.

    1992-01-01

    Discusses electronic serials that are available on noncommercial international computer networks such as BITNET and Internet. Issues affecting libraries are discussed, including access and ownership; computer conferences are considered; examples of electronic newsletters and electronic journals are described; and the possible future of electronic…

  19. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    PubMed

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-01-01

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks. PMID:26633421

  20. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    PubMed Central

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-01-01

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95% of the theoretical optimal throughput and 0.97 of fairness index especially in dynamic and dense networks. PMID:26633421

  1. Network-Based Management Procedures.

    ERIC Educational Resources Information Center

    Buckner, Allen L.

    Network-based management procedures serve as valuable aids in organizational management, achievement of objectives, problem solving, and decisionmaking. Network techniques especially applicable to educational management systems are the program evaluation and review technique (PERT) and the critical path method (CPM). Other network charting…

  2. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  3. First demonstration of OFDM ECDMA for low cost optical access networks.

    PubMed

    Guo, X; Wang, Q; Li, X; Zhou, L; Fang, L; Wonfor, A; Wei, J L; von Lindeiner, J; Penty, R V; White, I H

    2015-05-15

    We demonstrate for the first time to the best of our knowledge an analogue orthogonal frequency division multiplexing (OFDM) based electrical code division multiplexing access (ECDMA) passive optical network (PON) for next generation access applications. Advantages of the system include low cost, high capacity, and enhanced spectral efficiency. A proof-of-principle 16 QAM OFDM ECDMA PON downlink experiment is used to show the transmission of an aggregate data rate of 24.8  Gb/s within an eight-user system. Transmission is achieved over 25 km of single-mode telecommunications fiber (SMF) with negligible dispersion and crosstalk penalties. PMID:26393737

  4. 47 CFR 51.307 - Duty to provide access on an unbundled basis to network elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... network elements. 51.307 Section 51.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.307 Duty to provide access on an unbundled basis to network elements. (a) An incumbent LEC... service, nondiscriminatory access to network elements on an unbundled basis at any technically...

  5. 47 CFR 51.307 - Duty to provide access on an unbundled basis to network elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... network elements. 51.307 Section 51.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.307 Duty to provide access on an unbundled basis to network elements. (a) An incumbent LEC... service, nondiscriminatory access to network elements on an unbundled basis at any technically...

  6. 47 CFR 51.307 - Duty to provide access on an unbundled basis to network elements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... network elements. 51.307 Section 51.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.307 Duty to provide access on an unbundled basis to network elements. (a) An incumbent LEC... service, nondiscriminatory access to network elements on an unbundled basis at any technically...

  7. 47 CFR 51.307 - Duty to provide access on an unbundled basis to network elements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... network elements. 51.307 Section 51.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.307 Duty to provide access on an unbundled basis to network elements. (a) An incumbent LEC... service, nondiscriminatory access to network elements on an unbundled basis at any technically...

  8. 47 CFR 51.307 - Duty to provide access on an unbundled basis to network elements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... network elements. 51.307 Section 51.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.307 Duty to provide access on an unbundled basis to network elements. (a) An incumbent LEC... service, nondiscriminatory access to network elements on an unbundled basis at any technically...

  9. 47 CFR 51.311 - Nondiscriminatory access to unbundled network elements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... elements. 51.311 Section 51.311 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an...

  10. 47 CFR 51.311 - Nondiscriminatory access to unbundled network elements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... elements. 51.311 Section 51.311 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an...

  11. 47 CFR 51.311 - Nondiscriminatory access to unbundled network elements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... elements. 51.311 Section 51.311 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an...

  12. Directory Enabled Policy Based Networking

    SciTech Connect

    KELIIAA, CURTIS M.

    2001-10-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking.

  13. Geoscience Information Network (USGIN) Solutions for Interoperable Open Data Access Requirements

    NASA Astrophysics Data System (ADS)

    Allison, M. L.; Richard, S. M.; Patten, K.

    2014-12-01

    The geosciences are leading development of free, interoperable open access to data. US Geoscience Information Network (USGIN) is a freely available data integration framework, jointly developed by the USGS and the Association of American State Geologists (AASG), in compliance with international standards and protocols to provide easy discovery, access, and interoperability for geoscience data. USGIN standards include the geologic exchange language 'GeoSciML' (v 3.2 which enables instant interoperability of geologic formation data) which is also the base standard used by the 117-nation OneGeology consortium. The USGIN deployment of NGDS serves as a continent-scale operational demonstration of the expanded OneGeology vision to provide access to all geoscience data worldwide. USGIN is developed to accommodate a variety of applications; for example, the International Renewable Energy Agency streams data live to the Global Atlas of Renewable Energy. Alternatively, users without robust data sharing systems can download and implement a free software packet, "GINstack" to easily deploy web services for exposing data online for discovery and access. The White House Open Data Access Initiative requires all federally funded research projects and federal agencies to make their data publicly accessible in an open source, interoperable format, with metadata. USGIN currently incorporates all aspects of the Initiative as it emphasizes interoperability. The system is successfully deployed as the National Geothermal Data System (NGDS), officially launched at the White House Energy Datapalooza in May, 2014. The USGIN Foundation has been established to ensure this technology continues to be accessible and available.

  14. 42 CFR 423.124 - Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Part D drugs at out-of-network pharmacies. 423.124 Section 423.124 Public Health CENTERS FOR MEDICARE... for out-of-network access to covered Part D drugs at out-of-network pharmacies. (a) Out-of-network access to covered part D drugs—(1) Out-of-network pharmacy access. A Part D sponsor must ensure that...

  15. Dynamic characteristics of undoped and p-doped Fabry-Perot InAs/InP quantum dash based ridge waveguide lasers for access/metro networks

    SciTech Connect

    Mollet, O. Martinez, A.; Merghem, K.; Ramdane, A.; Joshi, S.; Provost, J.-G.; Lelarge, F.

    2014-10-06

    In this paper, we report the characteristics of InAs/InP quantum dashes (QDash) based lasers emitting around 1.55 μm. An unprecedented high modal gain of ∼100 cm{sup −1} is obtained for an optimized active structure by stacking 12 QDash layers. Directly modulated lasers allowed achieving a modulation bandwidth of ∼10 GHz and a Henry factor around 5. Thanks to p-type doping, the Henry factor value is reduced down to 2.7 while the modulation bandwidth still amounts to ∼10 GHz. This shows that doping of the active region is important to improve the dynamic characteristics of QDash lasers.

  16. On the Evaluation of a Secure Solution to Access 802.11 Networks

    NASA Astrophysics Data System (ADS)

    da Costa, Fernando; Gaspary, Luciano; Barbosa, Jorge; Cavalheiro, Gerson; Pfitscher, Luciano; Ramos, José Dirceu G.

    Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.

  17. Convergent optical wired and wireless long-reach access network using high spectral-efficient modulation.

    PubMed

    Chow, C W; Lin, Y H

    2012-04-01

    To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed. PMID:22513636

  18. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    NASA Astrophysics Data System (ADS)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  19. 47 CFR 51.318 - Eligibility criteria for access to certain unbundled network elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... unbundled network elements. 51.318 Section 51.318 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Exchange Carriers § 51.318 Eligibility criteria for access to certain unbundled network elements. (a... network elements and combinations of unbundled network elements without regard to whether the...

  20. 47 CFR 51.318 - Eligibility criteria for access to certain unbundled network elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... unbundled network elements. 51.318 Section 51.318 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Exchange Carriers § 51.318 Eligibility criteria for access to certain unbundled network elements. (a... network elements and combinations of unbundled network elements without regard to whether the...

  1. 47 CFR 51.318 - Eligibility criteria for access to certain unbundled network elements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... unbundled network elements. 51.318 Section 51.318 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Exchange Carriers § 51.318 Eligibility criteria for access to certain unbundled network elements. (a... network elements and combinations of unbundled network elements without regard to whether the...

  2. 47 CFR 51.318 - Eligibility criteria for access to certain unbundled network elements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... unbundled network elements. 51.318 Section 51.318 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Exchange Carriers § 51.318 Eligibility criteria for access to certain unbundled network elements. (a... network elements and combinations of unbundled network elements without regard to whether the...

  3. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    NASA Astrophysics Data System (ADS)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  4. Social Capital for College: Network Composition and Access to Selective Institutions among Urban High School Students

    ERIC Educational Resources Information Center

    Hill, Lori Diane; Bregman, Allyson; Andrade, Fernando

    2015-01-01

    This study examines the relationship between networks that provide high school students with "social capital for college" (SCFC) and their access to selective institutions. It also explores the link between racial disparities in access to selective colleges and the composition of students' SCFC networks. Findings indicate that while…

  5. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  6. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    SciTech Connect

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  7. Dynamic TWDM-PON for mobile radio access networks.

    PubMed

    Iida, Daisuke; Kuwano, Shigeru; Kani, Jun-ichi; Terada, Jun

    2013-11-01

    In recent years, the diffusion of mobile terminals has brought about an explosive increase in communication traffic of mobile RANs. The number of radio base stations and optical fiber lines between them is becoming larger. For this reason, we studied effective optical network technologies for mobile RANs and propose the use of TWDM-PON as a means of enabling RANs to be operated flexibly and have wideband communication capability. We confirmed the feasibility of TWDM-PON for this application by numerical simulation. The results show that TWDM-PON can accommodate the bandwidth more than TDM-PON and completely eliminate unused bandwidth in TDM-PON. PMID:24216845

  8. Combining Social Networks and Semantic Web Technologies for Personalizing Web Access

    NASA Astrophysics Data System (ADS)

    Carminati, Barbara; Ferrari, Elena; Perego, Andrea

    The original purpose of Web metadata was to protect end-users from possible harmful content and to simplify search and retrieval. However they can also be also exploited in more enhanced applications, such as Web access personalization on the basis of end-users’ preferences. In order to achieve this, it is however necessary to address several issues. One of the most relevant is how to assess the trustworthiness of Web metadata. In this paper, we discuss how such issue can be addressed through the use of collaborative and Semantic Web technologies. The system we propose is based on a Web-based Social Network, where members are able not only to specify labels, but also to rate existing labels. Both labels and ratings are then used to assess the trustworthiness of resources’ descriptions and to enforce Web access personalization.

  9. Safety management of Ethernet broadband access based on VLAN aggregation

    NASA Astrophysics Data System (ADS)

    Wang, Li

    2004-04-01

    With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.

  10. Basset: learning the regulatory code of the accessible genome with deep convolutional neural networks.

    PubMed

    Kelley, David R; Snoek, Jasper; Rinn, John L

    2016-07-01

    The complex language of eukaryotic gene expression remains incompletely understood. Despite the importance suggested by many noncoding variants statistically associated with human disease, nearly all such variants have unknown mechanisms. Here, we address this challenge using an approach based on a recent machine learning advance-deep convolutional neural networks (CNNs). We introduce the open source package Basset to apply CNNs to learn the functional activity of DNA sequences from genomics data. We trained Basset on a compendium of accessible genomic sites mapped in 164 cell types by DNase-seq, and demonstrate greater predictive accuracy than previous methods. Basset predictions for the change in accessibility between variant alleles were far greater for Genome-wide association study (GWAS) SNPs that are likely to be causal relative to nearby SNPs in linkage disequilibrium with them. With Basset, a researcher can perform a single sequencing assay in their cell type of interest and simultaneously learn that cell's chromatin accessibility code and annotate every mutation in the genome with its influence on present accessibility and latent potential for accessibility. Thus, Basset offers a powerful computational approach to annotate and interpret the noncoding genome. PMID:27197224

  11. Basset: learning the regulatory code of the accessible genome with deep convolutional neural networks

    PubMed Central

    Kelley, David R.; Snoek, Jasper; Rinn, John L.

    2016-01-01

    The complex language of eukaryotic gene expression remains incompletely understood. Despite the importance suggested by many noncoding variants statistically associated with human disease, nearly all such variants have unknown mechanisms. Here, we address this challenge using an approach based on a recent machine learning advance—deep convolutional neural networks (CNNs). We introduce the open source package Basset to apply CNNs to learn the functional activity of DNA sequences from genomics data. We trained Basset on a compendium of accessible genomic sites mapped in 164 cell types by DNase-seq, and demonstrate greater predictive accuracy than previous methods. Basset predictions for the change in accessibility between variant alleles were far greater for Genome-wide association study (GWAS) SNPs that are likely to be causal relative to nearby SNPs in linkage disequilibrium with them. With Basset, a researcher can perform a single sequencing assay in their cell type of interest and simultaneously learn that cell's chromatin accessibility code and annotate every mutation in the genome with its influence on present accessibility and latent potential for accessibility. Thus, Basset offers a powerful computational approach to annotate and interpret the noncoding genome. PMID:27197224

  12. Context-Based E-Health System Access Control Mechanism

    NASA Astrophysics Data System (ADS)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  13. IP-based mobility management for heterogeneous wireless access

    NASA Astrophysics Data System (ADS)

    Einsiedler, H. J.; von Hugo, D.

    2012-10-01

    Future high quality communication services will be offered in an integrated or converged network infrastructure maintaining both fixed wireless and mobile access via multi-mode user terminals. A support of various scenarios of user and/or terminal mobility within a common IP-based infrastructure requires intelligently designed control protocols. A major challenge is to provide seamless (i.e. lossless and low delay) handover between different radio cells and operator domains to enable continuation of unicast and multicast sessions while using network resources most efficiently. IETF (Internet Engineering Task Force) is specifying related IP mobility management protocols to be applicable also to a flat architecture as envisaged by Next Generation (Mobile) Networks (NGNs/NGMNs). The contribution will describe operator requirements towards such an approach. Both single-domain and multi-domain scenarios will be discussed based on federation ideas. Already existing solutions are taken into consideration and application of solution proposals towards a Distributed Mobility Management (DMM) currently under evaluation within IETF will be outlined.

  14. UMLS-based access to CPR data.

    PubMed

    van Mulligen, E M

    1998-01-01

    This paper describes the results of a project that explores the use the Unified Medical Language System (UMLS) for knowledge-driven tasks, such as browsing a computer-based patient record (CPR). The project consisted of a number of steps: the mapping between CPR terms and UMLS concepts, the development of an algorithm that explores the CPR data using this mapping, and the implementation of a first prototype browser that visualizes "found" data. A second task addressed in this project has been the direct access to online medical literature (MEDLINE) using the UMLS concepts found in the CPR data. In this project, we used a preliminary version of the Open Records for Patient Care (ORCA) CPR that consisted only of the history and physical examination data of patient suffering from heart failure. PMID:10384441

  15. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    PubMed Central

    Kartsakli, Elli; Antonopoulos, Angelos; Alonso, Luis; Verikoukis, Christos

    2014-01-01

    Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on random linear network coding (RLNC), are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC) and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels. PMID:24618727

  16. Systems requirements for cable modems in high-speed access networks

    NASA Astrophysics Data System (ADS)

    Campos, Luis A.; Su, Shing-Fong

    1996-11-01

    Cable modems play an important role in turning the hybrid fiber coax (HFC) networks from pure broadcast video service to high-speed access networks. Many CATV companies and telephone companies are experimenting with high-speed data services over HFC. With today's technology, cable modems can easily run at a data rate of 10 Mbps or above. They allow subscribers fast access to on-line services and the Internet. A variety of cable modems have been developed and marketed by cable modem vendors. Selection of right cable modems for deployment in HFC access networks has become a nontrivial matter. Different HFC systems may require different types of cable modems. In this paper, we review the development of HFC systems and discuss data networking using approaches that include connectionless data networking and connection-oriented data networking systems. The system requirements for cable modems in terms of throughput, robustness, ease of operation, protocol efficiency, reliability, network management, and cost are addressed.

  17. The Role of Social Network Locations in the College Access Mentoring of Urban Youth

    ERIC Educational Resources Information Center

    Ahn, June

    2010-01-01

    This study uses social network analysis to describe the social network of college mentors in a college access program. Urban students in the program are paired with college mentors-students, professors, and other institutional agents-to help improve their college going process. The study analyzes the social networks within which the mentors are…

  18. Optical access network using centralized light source, single-mode fiber + broad wavelength window multimode fiber

    NASA Astrophysics Data System (ADS)

    Yam, Scott S.-H.; Kim, Jaedon; Gutierrez, David; Achten, Frank

    2006-08-01

    Access networks based on a single-mode fiber (SMF) using a centralized light source (CLS) have attracted much attention recently due to their wavelength management flexibility and potential for cost reduction at customers' premises. Future networks, in addition, are likely to contain segments of multimode fiber (MMF), whose core dimension is relatively large in comparison with its single-mode counterpart, substantially reducing fiber alignment constraints and the subsequent network construction and installation cost. In this study, a CLS-based passive optical network (PON) is proposed, which will use a new generation of high-performance MMF optimized for a broad wavelength transmission window spanning from 1300to1550 nm, with a bandwidth distance product (BDP) of 40 Gbit/s-km. The proposed architecture is implemented in a test bed, and its performance is verified by bit error ratio (BER) measurement. Results show that we can implement high-performance CLS-based PONs containing both an SMF and an MMF infrastructure, simultaneously.

  19. Seamless generation and provisioning of broadcasting and independent services in WDMPON access networks.

    PubMed

    Tang, Ming; Fu, Songnian; Shum, Perry Ping

    2009-06-01

    A novel broadcasting scheme for WDM-PON based fiber access networks is proposed in this paper and downstream system experiments has been demonstrated. The broadcasting data is generated via subcarrier modulation technique. By using a delayed interferometer, the un-modulated continuous-wave carrier is separated and acts as the seeder for FP-LD injection locking and direct modulation, which is compatible with current WDM-PON infrastructures. In experiments, 2.5 Gb/s broadcasting data and 2.5 Gb/s point-to-point data are successfully integrated and transmitted in a typical WDM-PON structure with good performance. PMID:19506612

  20. Medium Access in Spread-Spectrum Ad Hoc Networks with Multiuser Detection

    NASA Astrophysics Data System (ADS)

    Kusume, Katsutoshi; Vilzmann, Robert; Müller, Andreas; Hartmann, Christian; Bauch, Gerhard

    2008-12-01

    Conventional medium access control protocols are designed to avoid simultaneous transmissions, based on a simple collision model in the underlying physical layer. Recently, strong physical layer capabilities, enabled by multiuser detection techniques, have been studied in connection with simple medium access control protocols, for example, slotted ALOHA. We think that neither of these extreme approaches is optimum, particularly in general scenarios where network nodes with different signal processing capabilities coexist. Instead of dealing with interferences in either of the two layers alone, both medium access control and physical layer functionalities should be designed to cooperate and complement each other. We discuss several key aspects for designing such a protocol, especially with an emphasis on iterative multiuser detection, which can provide a good tradeoff between performance and complexity. We propose a new protocol called MUD-MAC which satisfies these key aspects. We analyze its throughput bound and also perform numerical simulations. The simulation results show excellent throughput improvements. It is also demonstrated that the MUD-MAC protocol provides certain fairness among network nodes with different signal processing capabilities.

  1. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  2. A cost model for broadband access networks: FTTx versus WiMAX

    NASA Astrophysics Data System (ADS)

    Pereira, João Paulo Ribeiro

    2007-09-01

    Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario

  3. A Novel Coordinated Edge Caching with Request Filtration in Radio Access Network

    PubMed Central

    Li, Yang; Xu, Yuemei; Lin, Tao; Wang, Xiaohui; Ci, Song

    2013-01-01

    Content caching at the base station of the Radio Access Network (RAN) is a way to reduce backhaul transmission and improve the quality of experience. So it is crucial to manage such massive microcaches to store the contents in a coordinated manner, in order to increase the overall mobile network capacity to support more number of requests. We achieve this goal in this paper with a novel caching scheme, which reduces the repeating traffic by request filtration and asynchronous multicast in a RAN. Request filtration can make the best use of the limited bandwidth and in turn ensure the good performance of the coordinated caching. Moreover, the storage at the mobile devices is also considered to be used to further reduce the backhaul traffic and improve the users' experience. In addition, we drive the optimal cache division in this paper with the aim of reducing the average latency user perceived. The simulation results show that the proposed scheme outperforms existing algorithms. PMID:24459440

  4. Position Estimation of Access Points in 802.11 Wireless Networks

    SciTech Connect

    Kent, C A; Dowla, F U; Atwal, P K; Lennon, W J

    2003-12-05

    We developed a technique to locate wireless network nodes using multiple time-of-flight range measurements in a position estimate. When used with communication methods that allow propagation through walls, such as Ultra-Wideband and 802.11, we can locate network nodes in buildings and in caves where GPS is unavailable. This paper details the implementation on an 802.11a network where we demonstrated the ability to locate a network access point to within 20 feet.

  5. Design mobile satellite system architecture as an integral part of the cellular access digital network

    NASA Technical Reports Server (NTRS)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  6. Guaranteed Access to Campus Network Resources: Policies and Issues.

    ERIC Educational Resources Information Center

    Hassler, Ardoth A.

    1998-01-01

    Reports on a options and issues discussion at a December 1997 Orlando (Florida) meeting of CAUSE97 on providing access to campus technology resources. Options discussed included departmentally and/or university-owned modems, third-party provider contracts, and using wireless access. Issues included providing authentication, assuring network…

  7. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    NASA Astrophysics Data System (ADS)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  8. 42 CFR 423.124 - Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 3 2013-10-01 2013-10-01 false Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies. 423.124 Section 423.124 Public Health CENTERS FOR MEDICARE... for out-of-network access to covered Part D drugs at out-of-network pharmacies. (a)...

  9. 42 CFR 423.124 - Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 3 2014-10-01 2014-10-01 false Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies. 423.124 Section 423.124 Public Health CENTERS FOR MEDICARE... for out-of-network access to covered Part D drugs at out-of-network pharmacies. (a)...

  10. Infections on Temporal Networks--A Matrix-Based Approach.

    PubMed

    Koher, Andreas; Lentz, Hartmut H K; Hövel, Philipp; Sokolov, Igor M

    2016-01-01

    We extend the concept of accessibility in temporal networks to model infections with a finite infectious period such as the susceptible-infected-recovered (SIR) model. This approach is entirely based on elementary matrix operations and unifies the disease and network dynamics within one algebraic framework. We demonstrate the potential of this formalism for three examples of networks with high temporal resolution: networks of social contacts, sexual contacts, and livestock-trade. Our investigations provide a new methodological framework that can be used, for instance, to estimate the epidemic threshold, a quantity that determines disease parameters, for which a large-scale outbreak can be expected. PMID:27035128

  11. Router Agent Technology for Policy-Based Network Management

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  12. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  13. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  14. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  15. The Changing Role of Community Networks in Providing Citizen Access to the Internet.

    ERIC Educational Resources Information Center

    Keenan, Thomas P.; Trotter, David Mitchell

    1999-01-01

    Examines the changing role of community network associations or freenets in providing Internet access by examining the case of the Calgary Community Network Association (CCNA) in Alberta, Canada. Discusses the withdrawal of states from the telecommunications field, priorities of the Canadian government, and the role of the private sector.…

  16. 47 CFR 51.318 - Eligibility criteria for access to certain unbundled network elements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... unbundled network elements. 51.318 Section 51.318 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Exchange Carriers § 51.318 Eligibility criteria for access to certain unbundled network elements. (a... telecommunications carrier has received state certification to provide local voice service in the area being...

  17. Accessibility

    MedlinePlus

    ... www.nlm.nih.gov/medlineplus/accessibility.html MedlinePlus Accessibility To use the sharing features on this page, ... Subscribe to RSS Follow us Disclaimers Copyright Privacy Accessibility Quality Guidelines Viewers & Players MedlinePlus Connect for EHRs ...

  18. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  19. Dispersion-flattened-fiber based optical thresholder for multiple-access-interference suppression in OCDMA system.

    PubMed

    Wang, Xu; Hamanaka, Taro; Wada, Naoya; Kitayama, Ken-Ichi

    2005-07-11

    An optical thresholding technique based on super-continuum generation in dispersion flattened fiber is proposed and experimentally demonstrated to enable data-rate detection in optical code division multiple access networks. The proposed scheme exhibits an excellent discrimination between a desired signal and interference signals with features of pulse reshaping, low insertion loss, polarization independency as well as reasonable operation power. PMID:19498545

  20. Flexible OFDM-based access systems with intrinsic function of chromatic dispersion compensation

    NASA Astrophysics Data System (ADS)

    Konishi, Tsuyoshi; Murakawa, Takuya; Nagashima, Tomotaka; Hasegawa, Makoto; Shimizu, Satoshi; Hattori, Kuninori; Okuno, Masayuki; Mino, Shinji; Himeno, Akira; Uenohara, Hiroyuki; Wada, Naoya; Cincotti, Gabriella

    2015-12-01

    Cost-effective and tunable chromatic dispersion compensation in a fiber link are still an open issue in metro and access networks to cope with increasing costs and power consumption. Intrinsic chromatic dispersion compensation functionality of optical fractional orthogonal frequency division multiplexing is discussed and experimentally demonstrated using dispersion-tunable transmitter and receiver based on wavelength selective switching devices.

  1. Host Event Based Network Monitoring

    SciTech Connect

    Jonathan Chugg

    2013-01-01

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  2. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  3. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  4. A study on new nursing information accessibility mechanism using the digital broadcasting network.

    PubMed

    Oh, Jina

    2006-01-01

    There have been efforts to add an interoperability function to TV systems. The digital technology has changed all our lifestyles. Now TV systems do indeed have interoperability functions. However, this means more than interoperable TV. It announces the birth of a digital broadcasting network (one-source and many-destination digital communication mechanism)--the new digital communication network as a broadcasting style. As a viewpoint of nursing informatics, this mechanism provides a new accessibility mechanism to structured and interoperable data. This paper introduces the technology and the basic scenarios on the data accessibility mechanism using the digital broadcasting network. PMID:17102340

  5. Network fingerprint: a knowledge-based characterization of biomedical networks

    PubMed Central

    Cui, Xiuliang; He, Haochen; He, Fuchu; Wang, Shengqi; Li, Fei; Bo, Xiaochen

    2015-01-01

    It can be difficult for biomedical researchers to understand complex molecular networks due to their unfamiliarity with the mathematical concepts employed. To represent molecular networks with clear meanings and familiar forms for biomedical researchers, we introduce a knowledge-based computational framework to decipher biomedical networks by making systematic comparisons to well-studied “basic networks”. A biomedical network is characterized as a spectrum-like vector called “network fingerprint”, which contains similarities to basic networks. This knowledge-based multidimensional characterization provides a more intuitive way to decipher molecular networks, especially for large-scale network comparisons and clustering analyses. As an example, we extracted network fingerprints of 44 disease networks in the Kyoto Encyclopedia of Genes and Genomes (KEGG) database. The comparisons among the network fingerprints of disease networks revealed informative disease-disease and disease-signaling pathway associations, illustrating that the network fingerprinting framework will lead to new approaches for better understanding of biomedical networks. PMID:26307246

  6. Next generation communications satellites: Multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Stern, T. E.; Schwartz, M.; Meadows, H. E.; Ahmadi, H. K.; Gadre, J. G.; Gopal, I. S.; Matsmo, K.

    1980-01-01

    Following an overview of issues involved in the choice of promising system architectures for efficient communication with multiple small inexpensive Earth stations serving hetergeneous user populations, performance evaluation via analysis and simulation for six SS/TDMA (satellite-switched/time-division multiple access) system architectures is discussed. These configurations are chosen to exemplify the essential alternatives available in system design. Although the performance evaluation analyses are of fairly general applicability, whenever possible they are considered in the context of NASA's 30/20 GHz studies. Packet switched systems are considered, with the assumption that only a part of transponder capacit is devoted to packets, the integration of circuit and packet switched traffic being reserved for further study. Three types of station access are distinguished: fixed (FA), demand (DA), and random access (RA). Similarly, switching in the satellite can be assigned on a fixed (FS) or demand (DS) basis, or replaced by a buffered store-and-forward system (SF) onboard the satellite. Since not all access/switching combinations are practical, six systems are analyzed in detail: three FS SYSTEMS, FA/FS, DA/ES, RA/FS; one DS system, DA/DS; and two SF systems, FA/SF, DA/SF. Results are presented primarily in terms of delay-throughput characteristics.

  7. Public Access; Public Interest. The Network Project. Notebook Number 11.

    ERIC Educational Resources Information Center

    Columbia Univ., New York, NY. Network Project.

    The transcript of a panel discussion and an essay on public access to and control of society's information resources are presented. It is contended that the electronic Media--including radio, television, and communication satellites--are controlled by a select group of individuals and corporations and that they are not meeting the public interest.…

  8. Homeless Families' Education Networks: An Examination of Access and Mobilization

    ERIC Educational Resources Information Center

    Miller, Peter M.

    2011-01-01

    Purpose: This study sought deeper understanding of how sheltered families accessed and mobilized educationally related relationships and resources during periods of homelessness. Such work is posited to be especially relevant considering that there is a growing crisis of family homelessness in the United States and school- and community-based…

  9. Assessment methodology of protection schemes for next generation optical access networks

    NASA Astrophysics Data System (ADS)

    Mas Machuca, Carmen; Wosinska, Lena; Chen, Jiajia

    2015-12-01

    Optical access networks are evolving towards next generation solutions offering much higher bandwidth per end point. Moreover, the uninterrupted access to the network services is becoming crucial and therefore operators are now considering protecting their access networks. However, the cost factor is still very important due to the relatively low cost sharing in access segment. For this purpose, this paper proposes an assessment methodology that can be used to compare different protection schemes and help to identify the suitable solution for a given scenario. The assessment criteria includes some reliability measures such as Failure Impact Factor (FIF) and connection availability, as well as cost parameters such as the investment required in greenfield and brownfield scenarios and the increase in power consumption compared to the unprotected network. The proposed criteria have been used to compare 7 representative protection schemes shown in literature, which differ mainly in the number of protected network elements and the technology used for protection (fiber, wireless, etc.). The considered protection schemes have been applied to a hybrid wavelength division multiplexing/time division multiplexing Passive Optical Network (Hybrid PON) architecture in an urban area. It has been shown that it is difficult to identify the absolute best scheme with respect to all the considered criteria. However, depending on the requirements from the operator regarding the targeted reliability performance in the network, an appropriate protection scheme can be recommended for either a greenfield or a brownfield scenario.

  10. Accessibility and Use of Web-Based Electronic Resources by Physicians in a Psychiatric Institution in Nigeria

    ERIC Educational Resources Information Center

    Oduwole, Adebambo Adewale; Oyewumi, Olatundun

    2010-01-01

    Purpose: This study aims to examine the accessibility and use of web-based electronic databases on the Health InterNetwork Access to Research Initiative (HINARI) portal by physicians in the Neuropsychiatric Hospital, Aro--a psychiatry health institution in Nigeria. Design/methodology/approach: Collection of data was through the use of a three-part…

  11. An Open-Access Modeled Passenger Flow Matrix for the Global Air Network in 2010

    PubMed Central

    Huang, Zhuojie; Wu, Xiao; Garcia, Andres J.; Fik, Timothy J.; Tatem, Andrew J.

    2013-01-01

    The expanding global air network provides rapid and wide-reaching connections accelerating both domestic and international travel. To understand human movement patterns on the network and their socioeconomic, environmental and epidemiological implications, information on passenger flow is required. However, comprehensive data on global passenger flow remain difficult and expensive to obtain, prompting researchers to rely on scheduled flight seat capacity data or simple models of flow. This study describes the construction of an open-access modeled passenger flow matrix for all airports with a host city-population of more than 100,000 and within two transfers of air travel from various publicly available air travel datasets. Data on network characteristics, city population, and local area GDP amongst others are utilized as covariates in a spatial interaction framework to predict the air transportation flows between airports. Training datasets based on information from various transportation organizations in the United States, Canada and the European Union were assembled. A log-linear model controlling the random effects on origin, destination and the airport hierarchy was then built to predict passenger flows on the network, and compared to the results produced using previously published models. Validation analyses showed that the model presented here produced improved predictive power and accuracy compared to previously published models, yielding the highest successful prediction rate at the global scale. Based on this model, passenger flows between 1,491 airports on 644,406 unique routes were estimated in the prediction dataset. The airport node characteristics and estimated passenger flows are freely available as part of the Vector-Borne Disease Airline Importation Risk (VBD-Air) project at: www.vbd-air.com/data. PMID:23691194

  12. An open-access modeled passenger flow matrix for the global air network in 2010.

    PubMed

    Huang, Zhuojie; Wu, Xiao; Garcia, Andres J; Fik, Timothy J; Tatem, Andrew J

    2013-01-01

    The expanding global air network provides rapid and wide-reaching connections accelerating both domestic and international travel. To understand human movement patterns on the network and their socioeconomic, environmental and epidemiological implications, information on passenger flow is required. However, comprehensive data on global passenger flow remain difficult and expensive to obtain, prompting researchers to rely on scheduled flight seat capacity data or simple models of flow. This study describes the construction of an open-access modeled passenger flow matrix for all airports with a host city-population of more than 100,000 and within two transfers of air travel from various publicly available air travel datasets. Data on network characteristics, city population, and local area GDP amongst others are utilized as covariates in a spatial interaction framework to predict the air transportation flows between airports. Training datasets based on information from various transportation organizations in the United States, Canada and the European Union were assembled. A log-linear model controlling the random effects on origin, destination and the airport hierarchy was then built to predict passenger flows on the network, and compared to the results produced using previously published models. Validation analyses showed that the model presented here produced improved predictive power and accuracy compared to previously published models, yielding the highest successful prediction rate at the global scale. Based on this model, passenger flows between 1,491 airports on 644,406 unique routes were estimated in the prediction dataset. The airport node characteristics and estimated passenger flows are freely available as part of the Vector-Borne Disease Airline Importation Risk (VBD-Air) project at: www.vbd-air.com/data. PMID:23691194

  13. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  14. On Tree-Based Phylogenetic Networks.

    PubMed

    Zhang, Louxin

    2016-07-01

    A large class of phylogenetic networks can be obtained from trees by the addition of horizontal edges between the tree edges. These networks are called tree-based networks. We present a simple necessary and sufficient condition for tree-based networks and prove that a universal tree-based network exists for any number of taxa that contains as its base every phylogenetic tree on the same set of taxa. This answers two problems posted by Francis and Steel recently. A byproduct is a computer program for generating random binary phylogenetic networks under the uniform distribution model. PMID:27228397

  15. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  16. Fairness problems at the media access level for high-speed networks

    NASA Technical Reports Server (NTRS)

    Maly, Kurt J.; Zhang, L.; Game, David

    1990-01-01

    Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.

  17. Location-Based Services in Vehicular Networks

    ERIC Educational Resources Information Center

    Wu, Di

    2013-01-01

    Location-based services have been identified as a promising communication paradigm in highly mobile and dynamic vehicular networks. However, existing mobile ad hoc networking cannot be directly applied to vehicular networking due to differences in traffic conditions, mobility models and network topologies. On the other hand, hybrid architectures…

  18. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  19. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    PubMed

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  20. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    PubMed Central

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  1. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    NASA Astrophysics Data System (ADS)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  2. Network-based production quality control

    NASA Astrophysics Data System (ADS)

    Kwon, Yongjin; Tseng, Bill; Chiou, Richard

    2007-09-01

    This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.

  3. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  4. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  5. Strategies for P2P connectivity in reconfigurable converged wired/wireless access networks.

    PubMed

    Puerto, Gustavo; Mora, José; Ortega, Beatriz; Capmany, José

    2010-12-01

    This paper presents different strategies to define the architecture of a Radio-Over-Fiber (RoF) Access networks enabling Peer-to-Peer (P2P) functionalities. The architectures fully exploit the flexibility of a wavelength router based on the feedback configuration of an Arrayed Waveguide Grating (AWG) and an optical switch to broadcast P2P services among diverse infrastructures featuring dynamic channel allocation and enabling an optical platform for 3G and beyond wireless backhaul requirements. The first architecture incorporates a tunable laser to generate a dedicated wavelength for P2P purposes and the second architecture takes advantage of reused wavelengths to enable the P2P connectivity among Optical Network Units (ONUs) or Base Stations (BS). While these two approaches allow the P2P connectivity in a one at a time basis (1:1), the third architecture enables the broadcasting of P2P sessions among different ONUs or BSs at the same time (1:M). Experimental assessment of the proposed architecture shows approximately 0.6% Error Vector Magnitude (EVM) degradation for wireless services and 1 dB penalty in average for 1 x 10(-12) Bit Error Rate (BER) for wired baseband services. PMID:21164969

  6. Internet access in the libraries of the National Network of Libraries of Medicine.

    PubMed Central

    Lyon, B J; Stavri, P Z; Hochstein, D C; Nardini, H G

    1998-01-01

    As the National Library of Medicine expands access to its products and services by making them available on the Internet, more accurate information about current and future access in medical libraries is needed. The National Network Office of the National Library of Medicine conducted a survey of all network member libraries to determine the extent of connectivity and the barriers preventing 100% connectivity. Respondents called a toll-free number and, using interactive voice technology, answered questions concerning Internet access in their library. Seventy-eight percent of the network member libraries responded. Four percent of academic libraries, 27% of hospital libraries, and 10% of "other" libraries reported that they were not connected. Computer cost, lack of in-house expertise, and lack of management support were the highest ranked barriers to connecting. The National Library of Medicine and the Regional Medical Libraries will use information from this survey to develop strategies to help all member libraries achieve full connectivity. PMID:9803289

  7. Knowledge-Based Network Operations

    NASA Astrophysics Data System (ADS)

    Wu, Chuan-lin; Hung, Chaw-Kwei; Stedry, Steven P.; McClure, James P.; Yeh, Show-Way

    1988-03-01

    An expert system is being implemented for enhancing operability of the Ground Communication Facility (GCF) of Jet Propulsion Laboratory's (JPL) Deep Space Network (DSN). The DSN is a tracking network for all of JPL's spacecraft plus a subset of spacecrafts launched by other NASA centers. A GCF upgrade task is set to replace the current GCF aging system with new, modern equipments which are capable of using knowledge-based monitor and control approach. The expert system, implemented in terms of KEE and SUN workstation, is used for performing network fault management, configuration management, and performance management in real-time. Monitor data are collected from each processor and DSCC's in every five seconds. In addition to serving as input parameters of the expert system, extracted management information is used to update a management information database. For the monitor and control purpose, software of each processor is divided into layers following the OSI standard. Each layer is modeled as a finite state machine. A System Management Application Process (SMAP) is implemented at application layer, which coordinates layer managers of the same processor and communicates with peer SMAPs of other processors. The expert system will be tuned by augmenting the production rules as the operation is going on, and its performance will be measured.

  8. UPM: unified policy-based network management

    NASA Astrophysics Data System (ADS)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  9. Dynamic QoS Provisioning for Ethernet-based Networks

    NASA Astrophysics Data System (ADS)

    Angelopoulos, J.; Kanonakis, K.; Leligou, H. C.; Orfanoudakis, Th.; Katsigiannis, M.

    2008-11-01

    The evolution towards packet-based access networks and the importance of quality of experience brings the need for access networks that support the offer of a wide range of multimedia services not currently available to the desired extent. Legacy networks based on circuit switching used explicit signalling that travelled to all nodes along the path to book resources before the launce of the media stream. This approach does not scale well and is not in line with the philosophy of packet networks. Still, the need to reserve resources in advance remains since real-time services have limited if any means of adjusting their rates to the prevailing network conditions and to preserve customer satisfaction the traditional preventive approach that needs accurate estimates of resource needs for the duration of the session is the only option. The paper describes a possible CAC solution based on measuring flows and enriches the network with implicit admission control (without obviating explicit control if available) and can manage resource allocation to protect quality-demanding services from degradation. The basis is a flow measurement system, which will estimate the traffic load produced by the flow and activate admission control. However, because in most cases these initial indication may well be misleading, it will be cross checked against a database of previously recorded flows per customer interface which can provide long term data on the flows leaving only a few cases that have to be corrected on the fly. The overall product is a self-learning autonomic system that supports QoS in the access network for services that do not communicate with the network layer such as, for example, peer-to-peer real-time multimedia applications.

  10. Next generation communications satellites: multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Meadows, H. E.; Schwartz, M.; Stern, T. E.; Ganguly, S.; Kraimeche, B.; Matsuo, K.; Gopal, I.

    1982-01-01

    Efficient resource allocation and network design for satellite systems serving heterogeneous user populations with large numbers of small direct-to-user Earth stations are discussed. Focus is on TDMA systems involving a high degree of frequency reuse by means of satellite-switched multiple beams (SSMB) with varying degrees of onboard processing. Algorithms for the efficient utilization of the satellite resources were developed. The effect of skewed traffic, overlapping beams and batched arrivals in packet-switched SSMB systems, integration of stream and bursty traffic, and optimal circuit scheduling in SSMB systems: performance bounds and computational complexity are discussed.

  11. Performance evaluation of multi-access strategies for an integrated voice/data CDMA packet radio network

    NASA Astrophysics Data System (ADS)

    Geraniotis, Evaggelos; Soroushnejad, Mohsen

    1990-11-01

    The problem of voice/data integration in a random-access radio network employing the ALOHA protocol in conjunction with retransmission control is investigated. Channel-access control strategies are introduced that take advantage of the capability of the code-division multiple-access (CDMA) channel to accommodate several voice calls simultaneously, while the data users contend for the remaining (if any) multiple-access capability of that channel. The retransmission probabilities of the backlogged data users are updated based on estimates of data backlog and number of established voice calls, which are obtained from the side information about the state of channel activities. A two-dimensional Markovian model is developed for the voice and data traffic. Based on this model, the voice-call blocking probability, the throughput of both traffic types, and the delay of the data packets are evaluated and the tradeoffs between the parameters of different traffic types are quantified. It is observed that by taking advantage of the multiple-access capability of the CDMA channel in the control of data traffic, we may achieve movable-boundary channel access in the code domain.

  12. Tunable directly modulated fiber ring laser using a reflective semiconductor optical amplifier for WDM access networks.

    PubMed

    Lin, Zih-Rong; Liu, Cheng-Kuang; Jhang, Yu-Jhu; Keiser, Gerd

    2010-08-16

    We have proposed a stable, wideband, and tunable directly modulated fiber ring laser (TDMFRL) by using a reflective semiconductor optical amplifier (RSOA) and an optical tunable filter (OTF). For use in a bidirectional access network, the TDMFRL not only generates downstream data traffic but also serves as the wavelength-selecting injection light source for the Fabry-Pérot laser diode (FP-LD) located at the subscriber site. We experimentally demonstrated a bidirectional transmission at 1.25-Gb/s direct modulation over a 25-km single-mode fiber (SMF), thereby showing good performance in a wavelength division multiplexing (WDM) access network. PMID:20721147

  13. Random access to mobile networks with advanced error correction

    NASA Technical Reports Server (NTRS)

    Dippold, Michael

    1990-01-01

    A random access scheme for unreliable data channels is investigated in conjunction with an adaptive Hybrid-II Automatic Repeat Request (ARQ) scheme using Rate Compatible Punctured Codes (RCPC) Forward Error Correction (FEC). A simple scheme with fixed frame length and equal slot sizes is chosen and reservation is implicit by the first packet transmitted randomly in a free slot, similar to Reservation Aloha. This allows the further transmission of redundancy if the last decoding attempt failed. Results show that a high channel utilization and superior throughput can be achieved with this scheme that shows a quite low implementation complexity. For the example of an interleaved Rayleigh channel and soft decision utilization and mean delay are calculated. A utilization of 40 percent may be achieved for a frame with the number of slots being equal to half the station number under high traffic load. The effects of feedback channel errors and some countermeasures are discussed.

  14. ONU power saving modes in next generation optical access networks: progress, efficiency and challenges.

    PubMed

    Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet

    2012-12-10

    The optical network unit (ONU), installed at a customer's premises, accounts for about 60% of power in current fiber-to-the-home (FTTH) networks. We propose a power consumption model for the ONU and evaluate the ONU power consumption in various next generation optical access (NGOA) architectures. Further, we study the impact of the power savings of the ONU in various low power modes such as power shedding, doze and sleep. PMID:23262897

  15. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  16. Optical Shared Memory Computing and Multiple Access Protocols for Photonic Networks

    NASA Astrophysics Data System (ADS)

    Li, Kuang-Yu.

    In this research we investigate potential applications of optics in massively parallel computer systems, especially focusing on design issues in three-dimensional optical data storage and free-space photonic networks. An optical implementation of a shared memory uses a single photorefractive crystal and can realize the set of memory modules in a digital shared memory computer. A complete instruction set consists of R sc EAD, W sc RITE, S sc ELECTIVE E sc RASE, and R sc EFRESH, which can be applied to any memory module independent of (and in parallel with) instructions to the other memory modules. In addition, a memory module can execute a sequence of R sc EAD operations simultaneously with the execution of a W sc RITE operation to accommodate differences in optical recording and readout times common to optical volume storage media. An experimental shared memory system is demonstrated and its projected performance is analyzed. A multiplexing technique is presented to significantly reduce both grating- and beam-degeneracy crosstalk in volume holographic systems, by incorporating space, angle, and wavelength as the multiplexing parameters. In this approach, each hologram, which results from the interference between a single input node and an object array, partially overlaps with the other holograms in its neighborhood. This technique can offer improved interconnection density, optical throughput, signal fidelity, and space-bandwidth product utilization. Design principles and numerical simulation results are presented. A free-space photonic cellular hypercube parallel computer, with emphasis on the design of a collisionless multiple access protocol, is presented. This design incorporates wavelength-, space-, and time-multiplexing to achieve multiple access, wavelength reuse, dense connectivity, collisionless communications, and a simple control mechanism. Analytic models based on semi-Markov processes are employed to analyze this protocol. The performance of the

  17. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  18. Block-based neural networks.

    PubMed

    Moon, S W; Kong, S G

    2001-01-01

    This paper presents a novel block-based neural network (BBNN) model and the optimization of its structure and weights based on a genetic algorithm. The architecture of the BBNN consists of a 2D array of fundamental blocks with four variable input/output nodes and connection weights. Each block can have one of four different internal configurations depending on the structure settings, The BBNN model includes some restrictions such as 2D array and integer weights in order to allow easier implementation with reconfigurable hardware such as field programmable logic arrays (FPGA). The structure and weights of the BBNN are encoded with bit strings which correspond to the configuration bits of FPGA. The configuration bits are optimized globally using a genetic algorithm with 2D encoding and modified genetic operators. Simulations show that the optimized BBNN can solve engineering problems such as pattern classification and mobile robot control. PMID:18244385

  19. Throughput and Packet Delay Analysis of the Intermittent DCF for Overlay Access Networks

    NASA Astrophysics Data System (ADS)

    Adamis, Athanassios V.; Maliatsos, Konstantinos N.; Constantinou, Philip

    Overlay Access Technology can compensate for the spectrum underutilization problem by exploiting Cognitive Radios capabilities. MAC design is an important aspect of Overlay Access research. In this paper we present the overlay access environment and the challenges it poses to MAC design. Then, we propose the use of a modified Distributed Coordination Function as the MAC protocol for distributed Overlay Access networks. The resulted Intermittent DCF performs with robustness in the demanding overlay access environment, which is characterized by frequent spectrum scan procedure interruptions and low achievable transmission rates. The most recent DCF Markov Chain Model is extended in order to include the overlay operation modifications. Our extension concerns the slot duration expectations calculation which, in the overlay environment, have not constant values but depend on overlay operation parameters. Using the analytical model we evaluate the performance of the DCF under the effect of certain overlay access parameters. The new analytical model predictions are validated with simulations, and are found to accurately capture many interesting features of the overlay operation. Our model can be used in feasibility studies of realistic overlay scenarios and in admission control algorithms of QoS enabled distributed overlay access networks that engage the Intermittent DCF.

  20. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    PubMed Central

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  1. Advanced mobility handover for mobile IPv6 based wireless networks.

    PubMed

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  2. A network-accessible repository for petroleum reservoir information

    SciTech Connect

    Ford, R.; Thompson, D.; Braun, J.

    1996-06-01

    Researchers from Montana Tech, the University of Montana, and Montana State University are currently collaborating with commercial partners to collect and analyze data from the Rabbit Hills oil field near Chinook, Montana. The data accumulated from this project are in various familiar forms, such as 3-D seismic datasets, 35 mm slides of outcroppings and core samples, imagery of rock/core thin sections, well logs, production history datasets, and computer generated maps derived from seismic and well log analysis. Also included is computer generated imagery representing the visualization of various datasets, in the form of animations (with accompanying audio) that depict fly-throughs of geologic structures, cumulative oil production over time from wells in the field, and fanning through seismic time slices. It is critical to the project`s success to establish a way for participants that are widely distributed geographically to contribute information and access information contributed by others. Modern Internet/World Wide Web technology makes this sort of data contribution and dissemination feasible for all the types of information listed above. The presentation will focus on the key technical decisions made in structuring and maintaining a Web site with these diverse types of data.

  3. Enhanced Access Polynomial Based Self-healing Key Distribution

    NASA Astrophysics Data System (ADS)

    Dutta, Ratna; Mukhopadhyay, Sourav; Dowling, Tom

    A fundamental concern of any secure group communication system is that of key management. Wireless environments create new key management problems and requirements to solve these problems. One such core requirement in these emerging networks is that of self-healing. In systems where users can be offline and miss updates self healing allows a user to recover lost keys and get back into the secure communication without putting extra burden on the group manager. Clearly self healing must be only available to authorized users and this creates more challenges in that we must ensure unauthorized or revoked users cannot, themselves or by means of collusion, avail of self healing. To this end we enhance the one-way key chain based self-healing key distribution of Dutta et al. by introducing a collusion resistance property between the revoked users and the newly joined users. Our scheme is based on the concept of access polynomials. These can be loosely thought of as white lists of authorized users as opposed to the more widely used revocation polynomials or black lists of revoked users. We also allow each user a pre-arranged life cycle distributed by the group manager. Our scheme provides better efficiency in terms of storage, and the communication and computation costs do not increase as the number of sessions grows as compared to most current schemes. We analyze our scheme in an appropriate security model and prove that the proposed scheme is computationally secure and not only achieving forward and backward secrecy, but also resisting collusion between the new joined users and the revoked users. Unlike most existing schemes the new scheme allows temporary revocation. Also unlike existing schemes, our construction does not collapse if the number of revoked users crosses a threshold value. This feature increases resilience against revocation based denial of service (DOS) attacks and thus improves availability of communication channel.

  4. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    PubMed Central

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime. PMID:22666045

  5. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  6. Assessing Individual Social Capital Capacity: The Development and Validation of a Network Accessibility Scale

    ERIC Educational Resources Information Center

    Hatala, John-Paul

    2009-01-01

    Any organization that is able to promote the importance of increased levels of social capital and individuals who can leverage and use the resources that exist within the network may experience higher levels of performance. This study sought to add to our knowledge about individuals' accessing social resources for the purpose of accomplishing…

  7. On-demand virtual optical network access using 100 Gb/s Ethernet.

    PubMed

    Ishida, Osamu; Takamichi, Toru; Arai, Sachine; Kawate, Ryusuke; Toyoda, Hidehiro; Morita, Itsuro; Araki, Soichiro; Ichikawa, Toshiyuki; Hoshida, Takeshi; Murai, Hitoshi

    2011-12-12

    Our Terabit LAN initiatives attempt to enhance the scalability and utilization of lambda resources. This paper describes bandwidth-on-demand virtualized 100GE access to WDM networks on a field fiber test-bed using multi-domain optical-path provisioning. PMID:22274022

  8. Optical receiver sensitivity analysis for electronic code division multiple access over passive optical network

    NASA Astrophysics Data System (ADS)

    Han, Yamei; Liang, Siyuan; Wang, Liqian; Chen, Xue

    2010-12-01

    Optical receiver sensitivity for electronic code division multiple access over a passive optical network (ECDMA-PON) is analyzed theoretically. Compared with TDM system, ECDMA-PON offers better receiver sensitivity due to coding gain. Fundamental simulation results are provided to show its validity.

  9. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  10. Computer-Based Information Networks: Selected Examples.

    ERIC Educational Resources Information Center

    Hardesty, Larry

    The history, purpose, and operation of six computer-based information networks are described in general and nontechnical terms. In the introduction the many definitions of an information network are explored. Ohio College Library Center's network (OCLC) is the first example. OCLC began in 1963, and since early 1973 has been extending its services…

  11. Disparate access to treatment regimens in chronic hepatitis C patients: data from the TRIO network.

    PubMed

    Younossi, Z M; Bacon, B R; Dieterich, D T; Flamm, S L; Kowdley, K; Milligan, S; Tsai, N; Nezam, A

    2016-06-01

    Despite the clinical success in the real-world of all oral hepatitis C virus (HCV) therapy with response rates approaching that seen in the clinical trials, access has been limited by many payers with discussion of prioritization of treatment based upon AASLD guidelines. We evaluated patients in the TRIO network who were prescribed sofosbuvir (SOF)-based regimens to determine reasons for not starting treatment. Trio Health is a disease management company that works in partnership with academic medical centres, community physicians and specialty pharmacies in the United States to optimize care for HCV. Data for 3841 patients prescribed a sofosbuvir-containing regimen between December 2013 and September 2014 were obtained through this programme. Of the entire group, 315 (8%) patients did not start the prescribed sofosbuvir-containing therapy. A total of 141 (45%) of the nonstart patients had a commercial plan as their primary insurance, 137 (44%) were primarily covered by Medicaid, 17 (5%) were primarily covered by Medicare, and 20 (6%) were either without coverage or coverage was not specified. Reasons for nonstarts were varied and overlapping. Only 15 patients (5% of nonstarts) did not start because they were unreachable or failed to complete required testing. Another 39 patients who did not start (12%) were following their physicians' direction to either wait for new treatment options or to hold treatment for an unspecified reason. Insurance-related processes and financial reasons accounted for 254 (81%) of the 315 nonstarts. The remaining 7 (2%) patients did not have a specified reason for not starting treatment. Nonstart rates were highest in the Medicaid-covered population at 35%. Medicare and Commercial nonstart rates were 2% and 6%, respectively. In a matched comparison, patients with commercial coverage were 6.5 times as likely to start SOF-based therapy compared to patients with Medicaid. Despite high SVR rates of SOF-based regimens in clinical practice

  12. Novel cost-effective PON-to-RoF photonic bridge for multigigabit access networks.

    PubMed

    Aldaya, Ivan; Campuzano, Gabriel; Castañón, Gerardo; Gosset, Christophe

    2013-12-30

    Telecommunication operators are investing significant resources in developing passive optical networks (PONs) to meet the increasing capacity requirements. Therefore, wireless transmission has become the bottleneck for the wireless broadband internet access due to the spectrum saturation. This issue can be solved taking advantage of the huge portions of unused spectrum at high-microwave / millimeter-wave (mm-wave) bands, but their generation is power consuming. Radio over fiber (RoF) is a cost-efficient solution for the distribution of high-frequency broadband signals to remote base stations. We present a novel photonic PON-to-RoF bridge based on heterodyning a PON signal with an unmodulated tone generated by an independent laser. The proposed scheme is transparent to modulation format and can generate RF signals in the entire microwave band. The feasibility of the bridge is experimentally shown converting a 2-Gbps orthogonal frequency division multiplexing PON signal using inexepensive distributed feedback lasers, whose phase noise is cancelled employing an envelope detection based mobile terminal. PMID:24514776

  13. Louisiana coastal GIS network: Graphical user interface for access to spatial data

    USGS Publications Warehouse

    Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.

    1991-01-01

    Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in

  14. Experimental demonstration of large capacity WSDM optical access network with multicore fibers and advanced modulation formats.

    PubMed

    Li, Borui; Feng, Zhenhua; Tang, Ming; Xu, Zhilin; Fu, Songnian; Wu, Qiong; Deng, Lei; Tong, Weijun; Liu, Shuang; Shum, Perry Ping

    2015-05-01

    Towards the next generation optical access network supporting large capacity data transmission to enormous number of users covering a wider area, we proposed a hybrid wavelength-space division multiplexing (WSDM) optical access network architecture utilizing multicore fibers with advanced modulation formats. As a proof of concept, we experimentally demonstrated a WSDM optical access network with duplex transmission using our developed and fabricated multicore (7-core) fibers with 58.7km distance. As a cost-effective modulation scheme for access network, the optical OFDM-QPSK signal has been intensity modulated on the downstream transmission in the optical line terminal (OLT) and it was directly detected in the optical network unit (ONU) after MCF transmission. 10 wavelengths with 25GHz channel spacing from an optical comb generator are employed and each wavelength is loaded with 5Gb/s OFDM-QPSK signal. After amplification, power splitting, and fan-in multiplexer, 10-wavelength downstream signal was injected into six outer layer cores simultaneously and the aggregation downstream capacity reaches 300 Gb/s. -16 dBm sensitivity has been achieved for 3.8 × 10-3 bit error ratio (BER) with 7% Forward Error Correction (FEC) limit for all wavelengths in every core. Upstream signal from ONU side has also been generated and the bidirectional transmission in the same core causes negligible performance degradation to the downstream signal. As a universal platform for wired/wireless data access, our proposed architecture provides additional dimension for high speed mobile signal transmission and we hence demonstrated an upstream delivery of 20Gb/s per wavelength with QPSK modulation formats using the inner core of MCF emulating a mobile backhaul service. The IQ modulated data was coherently detected in the OLT side. -19 dBm sensitivity has been achieved under the FEC limit and more than 18 dB power budget is guaranteed. PMID:25969194

  15. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    NASA Astrophysics Data System (ADS)

    Gibbon, T. B.; Osadchiy, A. V.; Kjær, R.; Jensen, J. B.; Monroy, I. Tafur

    2009-06-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 2 31-1 PRBS pattern. The results suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient control in WDM access networks.

  16. Ensemble-Based Network Aggregation Improves the Accuracy of Gene Network Reconstruction

    PubMed Central

    Xiao, Guanghua; Xie, Yang

    2014-01-01

    Reverse engineering approaches to constructing gene regulatory networks (GRNs) based on genome-wide mRNA expression data have led to significant biological findings, such as the discovery of novel drug targets. However, the reliability of the reconstructed GRNs needs to be improved. Here, we propose an ensemble-based network aggregation approach to improving the accuracy of network topologies constructed from mRNA expression data. To evaluate the performances of different approaches, we created dozens of simulated networks from combinations of gene-set sizes and sample sizes and also tested our methods on three Escherichia coli datasets. We demonstrate that the ensemble-based network aggregation approach can be used to effectively integrate GRNs constructed from different studies – producing more accurate networks. We also apply this approach to building a network from epithelial mesenchymal transition (EMT) signature microarray data and identify hub genes that might be potential drug targets. The R code used to perform all of the analyses is available in an R package entitled “ENA”, accessible on CRAN (http://cran.r-project.org/web/packages/ENA/). PMID:25390635

  17. Unified web-based network management based on distributed object orientated software agents

    NASA Astrophysics Data System (ADS)

    Djalalian, Amir; Mukhtar, Rami; Zukerman, Moshe

    2002-09-01

    This paper presents an architecture that provides a unified web interface to managed network devices that support CORBA, OSI or Internet-based network management protocols. A client gains access to managed devices through a web browser, which is used to issue management operations and receive event notifications. The proposed architecture is compatible with both the OSI Management reference Model and CORBA. The steps required for designing the building blocks of such architecture are identified.

  18. Implementing context and team based access control in healthcare intranets.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users. PMID:12507264

  19. Highly Reliable PON Optical Splitters for Optical Access Networks in Outside Environments

    NASA Astrophysics Data System (ADS)

    Watanabe, Hiroshi; Araki, Noriyuki; Fujimoto, Hisashi

    Broadband optical access services are spreading throughout the world, and the number of fiber to the home (FTTH) subscribers is increasing rapidly. Telecom operators are constructing passive optical networks (PONs) to provide optical access services. Externally installed optical splitters for PONs are very important passive devices in optical access networks, and they must provide satisfactory performance as outdoor plant over long periods. Therefore, we calculate the failure rate of optical access networks and assign a failure rate to the optical splitters in optical access networks. The maximum cumulative failure rate of 1 × 8 optical splitters was calculated as 0.025 for an optical access fiber length of 2.1km and a 20-year operating lifetime. We examined planar lightwave circuit (PLC) type optical splitters for use as outside plant in terms of their optical characteristics and environmental reliability. We confirmed that PLC type optical splitters have sufficient optical performance for a PON splitter and sufficient reliability as outside plant in accordance with ITU-T standard values. We estimated the lifetimes of three kinds of PLC type optical splitters by using accelerated aging tests. The estimated failure rate of these splitters installed in optical access networks was below the target value for the cumulative failure rate, and we confirmed that they have sufficient reliability to maintain the quality of the network service. We developed 1 × 8 optical splitter modules with plug and socket type optical connectors and optical fiber cords for optical aerial closures designed for use as outside plant. These technologies make it easy to install optical splitters in an aerial optical closure. The optical splitter modules have sufficient optical performance levels for PONs because the insertion loss at the commercially used wavelengths of 1.31 and 1.55µm is less than the criterion established by ITU-T Recommendation G.671 for optical splitters. We performed a

  20. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  1. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  2. CONTEXT PHOTOGRAPH OF BASE END STATIONS FROM ACCESS ROAD AT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    CONTEXT PHOTOGRAPH OF BASE END STATIONS FROM ACCESS ROAD AT MIDSLOPE, FACING NORTH. FROM LEFT TO RIGHT ARE STATIONS BARLOW, SAXTON, LEARY, MERRIAM (OUT OF VIEW BEHIND WW n ERA CONSTRUCTION), OSGOOD, AND FARLEY - White's Point Reservation, Base End Stations, Bounded by Voyager Circle & Mariner Drive, San Pedro, Los Angeles County, CA

  3. Survey of Online Access to Social Science Data Bases.

    ERIC Educational Resources Information Center

    Donati, Robert

    Until very recently there was little computer access to comprehensive bibliographic data bases in the social sciences. Now online searching of several directly relevant files is made possible through services such as the Lockheed DIALOG system. These data bases are briefly surveyed, with emphasis on content, structure, and strategy appropriate for…

  4. Signalprint-Based Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Mitchell, Rob; Chen, Ing-Ray; Eltoweissy, Mohamed

    Wireless networks are a critical part of global communication for which intrusion detection techniques should be applied to secure network access, or the cost associated with successful attacks will overshadow the benefits that wireless networks offer. In this paper we investigate a new scheme called Nodeprints to extend the existing centralized Signalprints design for authentication to a distributed voting-based design for intrusion detection. We analyze the effect of voting-based intrusion detection designs, the probability of an individual node voting incorrectly, the ratio of mobile nodes to base stations, and the rate at which nodes are compromised, on the system performance measured by the probability that the intrusion detection system yields a false result. We develop a performance model for evaluating our Nodeprints design and identify conditions under which Nodeprints outperforms the existing Signalprints design.

  5. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  6. Network Medicine: A Network-based Approach to Human Diseases

    NASA Astrophysics Data System (ADS)

    Ghiassian, Susan Dina

    With the availability of large-scale data, it is now possible to systematically study the underlying interaction maps of many complex systems in multiple disciplines. Statistical physics has a long and successful history in modeling and characterizing systems with a large number of interacting individuals. Indeed, numerous approaches that were first developed in the context of statistical physics, such as the notion of random walks and diffusion processes, have been applied successfully to study and characterize complex systems in the context of network science. Based on these tools, network science has made important contributions to our understanding of many real-world, self-organizing systems, for example in computer science, sociology and economics. Biological systems are no exception. Indeed, recent studies reflect the necessity of applying statistical and network-based approaches in order to understand complex biological systems, such as cells. In these approaches, a cell is viewed as a complex network consisting of interactions among cellular components, such as genes and proteins. Given the cellular network as a platform, machinery, functionality and failure of a cell can be studied with network-based approaches, a field known as systems biology. Here, we apply network-based approaches to explore human diseases and their associated genes within the cellular network. This dissertation is divided in three parts: (i) A systematic analysis of the connectivity patterns among disease proteins within the cellular network. The quantification of these patterns inspires the design of an algorithm which predicts a disease-specific subnetwork containing yet unknown disease associated proteins. (ii) We apply the introduced algorithm to explore the common underlying mechanism of many complex diseases. We detect a subnetwork from which inflammatory processes initiate and result in many autoimmune diseases. (iii) The last chapter of this dissertation describes the

  7. Reputation-based collaborative network biology.

    PubMed

    Binder, Jean; Boue, Stephanie; Di Fabio, Anselmo; Fields, R Brett; Hayes, William; Hoeng, Julia; Park, Jennifer S; Peitsch, Manuel C

    2015-01-01

    A pilot reputation-based collaborative network biology platform, Bionet, was developed for use in the sbv IMPROVER Network Verification Challenge to verify and enhance previously developed networks describing key aspects of lung biology. Bionet was successful in capturing a more comprehensive view of the biology associated with each network using the collective intelligence and knowledge of the crowd. One key learning point from the pilot was that using a standardized biological knowledge representation language such as BEL is critical to the success of a collaborative network biology platform. Overall, Bionet demonstrated that this approach to collaborative network biology is highly viable. Improving this platform for de novo creation of biological networks and network curation with the suggested enhancements for scalability will serve both academic and industry systems biology communities. PMID:25592588

  8. An energy-efficient media access control protocol for chain-type wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Chen, Chang Wen

    2005-06-01

    We present in this paper an energy efficient media access control (MAC) protocol for chain-type wireless sensor networks. The chain-type sensor networks are fundamentally different from traditional sensor networks in that the sensor nodes in this class of networks are deployed along narrow and elongated geographical areas and form a chain-type topology. Recently, we have successfully developed hierarchical network architecture, sensor deployment strategy, and corresponding network initialization and operation protocols for this class of sensor networks. In this paper, we present a novel TDMA scheduling protocol that takes full advantages of the available channel reuse inherent in the chain-type sensor networks to develop energy efficient and high data throughput MAC protocols for sensor data transmission. The synchronized TDMA scheduling allows the nodes to power on only when it is scheduled to send and receive and therefore results in additional energy saving. Within a cluster, parallel transmission is made possible because of the linear distribution of nodes within the chain-type topology and this yields the desired high throughput. Preliminary simulations have been carried out to show that the proposed TDMA scheduling outperforms the well-know SMAC scheme in terms of energy efficiency and data throughput under various duty cycles.

  9. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    NASA Astrophysics Data System (ADS)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  10. Access, engagement, networks, and norms: Dimensions of social capital at work in a first grade classroom

    NASA Astrophysics Data System (ADS)

    Wexler-Robock, Stephanie

    Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level

  11. Green survivability in Fiber-Wireless (FiWi) broadband access network

    NASA Astrophysics Data System (ADS)

    Liu, Yejun; Guo, Lei; Gong, Bo; Ma, Rui; Gong, Xiaoxue; Zhang, Lincong; Yang, Jiangzi

    2012-03-01

    Fiber-Wireless (FiWi) broadband access network is a promising "last mile" access technology, because it integrates wireless and optical access technologies in terms of their respective merits, such as high capacity and stable transmission from optical access technology, and easy deployment and flexibility from wireless access technology. Since FiWi is expected to carry a large amount of traffic, numerous traffic flows may be interrupted by the failure of network components. Thus, survivability in FiWi is a key issue aiming at reliable and robust service. However, the redundant deployment of backup resource required for survivability usually causes huge energy consumption, which aggravates the global warming and accelerates the incoming of energy crisis. Thus, the energy-saving issue should be considered when it comes to survivability design. In this paper, we focus on the green survivability in FiWi, which is an innovative concept and remains untouched in the previous works to our best knowledge. We first review and discuss some challenging issues about survivability and energy-saving in FiWi, and then we propose some instructive solutions for its green survivability design. Therefore, our work in this paper will provide the technical references and research motivations for the energy-efficient and survivable FiWi development in the future.

  12. Mapping the accessibility of the disulfide crosslink network in the wool fiber cortex.

    PubMed

    Deb-Choudhury, Santanu; Plowman, Jeffrey E; Rao, Kelsey; Lee, Erin; van Koten, Chikako; Clerens, Stefan; Dyer, Jolon M; Harland, Duane P

    2015-02-01

    The disulfide bond network within the cortex of mammalian hair has a critical influence on the physical and mechanical characteristics of the fiber. The location, pattern, and accessibility of free and crosslinked cysteines underpin the properties of this network, but have been very difficult to map and understand, because traditional protein extraction techniques require the disruption of these disulfide bonds. Cysteine accessibility in both trichocyte keratins and keratin associated proteins (KAPs) of wool was investigated using staged labeling, where reductants and chaotropic agents were used to expose cysteines in a stepwise fashion according to their accessibility. Cysteines thus exposed were labeled with distinguishable alkylation agents. Proteomic profiling was used to map peptide modifications and thereby explore the role of KAPs in crosslinking keratins. Labeled cysteines from KAPs were detected when wool was extracted with reductant only. Among them were sequences from the end domains of KAPs, indicating that those cysteines were easily accessible in the fiber and could be involved in forming interdisulfide linkages with keratins or with other KAPs. Some of the identified peptides were from the rod domains of Types I and II keratins, with their cysteines positioned on the exposed surface of the α-helix. Peptides were also identified from keratin head and tail domains, demonstrating that they are not buried within the filament structure and, hence, have a possible role in forming disulfide linkages. From this study, a deeper understanding of the accessibility and potential reactivity of cysteine residues in the wool fiber cortex was obtained. PMID:25402195

  13. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1989-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  14. Satellite-matrix-switched, time-division-multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Andro, Monty; Nagy, Lawrence A.; Budinger, James M.; Shalkhauser, Mary JO

    1990-01-01

    A versatile experimental Ka-band network simulator has been implemented at the NASA Lewis Research Center to demonstrate and evaluate a satellite-matrix-switched, time-division-multiple-access (SMS-TDMA) network and to evaluate future digital ground terminals and radiofrequency (RF) components. The simulator was implemented by using proof-of-concept RF components developed under NASA contracts and digital ground terminal and link simulation hardware developed at Lewis. This simulator provides many unique capabilities such as satellite range delay and variation simulation and rain fade simulation. All network parameters (e.g., signal-to-noise ratio, satellite range variation rate, burst density, and rain fade) are controlled and monitored by a central computer. The simulator is presently configured as a three-ground-terminal SMS-TDMA network.

  15. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    NASA Astrophysics Data System (ADS)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  16. Topology-selective jamming of fully-connected, code-division random-access networks

    NASA Technical Reports Server (NTRS)

    Polydoros, Andreas; Cheng, Unjeng

    1990-01-01

    The purpose is to introduce certain models of topology selective stochastic jamming and examine its impact on a class of fully-connected, spread-spectrum, slotted ALOHA-type random access networks. The theory covers dedicated as well as half-duplex units. The dominant role of the spatial duty factor is established, and connections with the dual concept of time selective jamming are discussed. The optimal choices of coding rate and link access parameters (from the users' side) and the jamming spatial fraction are numerically established for DS and FH spreading.

  17. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  18. Slotted Aloha multiple access and error control coding for land mobile satellite networks

    NASA Astrophysics Data System (ADS)

    Lutz, Erich

    1992-10-01

    This paper considers a satellite network with data messages being transmitted by land mobile users according to slotted Aloha multiple access. The mobile communication links suffering from multipath fading and signal shadowing are modelled as Gilbert-Elliott channels. FEC block coding is used to correct transmission errors. The maximum achievable information throughput and the mean packet delay are derived from a combined analysis of the multiple access and FEC/ARQ protocol. The results show that the additional overhead necessary for FEC is outweighed by the benefit in throughput and delay. Finally, the capture effect and its consequences are discussed.

  19. A University-Based Electronic Publishing Network.

    ERIC Educational Resources Information Center

    Yavarkovsky, Jerome

    1990-01-01

    Based on a presentation at the Coalition for Networked Information (CNI), this article discusses a university-based computer network that would support electronic publishing. Highlights include the influence on libraries and librarians; technical and operational standards; economic factors; and institutional planning. Six sidebars address other…

  20. Content-Based Networking: DTN, AMS, Sharednet

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott

    2006-01-01

    A detailed viewgraph presentation on DTN, AMS, and Sharednet content-based networking is shown. The contents include: 1) DARPA Content-Based Networking Summary of Requirements; 2) Concept; 3) Key Features of AMS; 4) Overview of Sharednet; 5) SharedNet Deployment History; 6) SharedNet AMS DTN; 7) Detailed Structure; and 8) Bottom line.

  1. BioSYNTHESIS: access to a knowledge network of health sciences databases.

    PubMed

    Broering, N C; Hylton, J S; Guttmann, R; Eskridge, D

    1991-04-01

    Users of the IAIMS Knowledge Network at the Georgetown University Medical Center have access to multiple in-house and external databases from a single point of entry through BioSYNTHESIS. The IAIMS project has developed a rich environment of biomedical information resources that represent a medical decision support system for campus physicians and students. The BioSYNTHESIS system is an information navigator that provides transparent access to a Knowledge Network of over a dozen databases. These multiple health sciences databases consist of bibliographic, informational, diagnostic, and research systems which reside on diverse computers such as DEC VAXs, SUN 490, AT&T 3B2s, Macintoshes, IBM PC/PS2s and the AT&T ISN and SYTEK network systems. Ethernet and TCP/IP protocols are used in the network architecture. BioSYNTHESIS also provides network links to the other campus libraries and to external institutions. As additional knowledge resources and technological advances have become available. BioSYNTHESIS has evolved from a two phase to a three phase program. Major components of the system including recent achievements and future plans are described. PMID:1661772

  2. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    ERIC Educational Resources Information Center

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  3. Accessing technical data bases using STDS: A collection of scenarios

    NASA Technical Reports Server (NTRS)

    Hardgrave, W. T.

    1975-01-01

    A line by line description is given of sessions using the set-theoretic data system (STDS) to interact with technical data bases. The data bases contain data from actual applications at NASA Langley Research Center. The report is meant to be a tutorial document that accompanies set processing in a network environment.

  4. Performance of an optical equalizer in a 10 G wavelength converting optical access network.

    PubMed

    Mendinueta, José Manuel D; Cao, Bowen; Thomsen, Benn C; Mitchell, John E

    2011-12-12

    A centralized optical processing unit (COPU) that functions both as a wavelength converter (WC) and optical burst equaliser in a 10 Gb/s wavelength-converting optical access network is proposed and experimentally characterized. This COPU is designed to consolidate drifting wavelengths generated with an uncooled laser in the upstream direction into a stable wavelength channel for WDM backhaul transmission and to equalize the optical loud/soft burst power in order to relax the burst-mode receiver dynamic range requirement. The COPU consists of an optical power equaliser composed of two cascaded SOAs followed by a WC. Using an optical packet generator and a DC-coupled PIN-based digital burst-mode receiver, the COPU is characterized in terms of payload-BER for back-to-back and backhaul transmission distances of 22, 40, and 62 km. We show that there is a compromise between the receiver sensitivity and overload points that can be optimized tuning the WC operating point for a particular backhaul fiber transmission distance. Using the optimized settings, sensitivities of -30.94, -30.17, and -27.26 dBm with overloads of -9.3, -5, and >-5 dBm were demonstrated for backhaul transmission distances of 22, 40 and 62 km, respectively. PMID:22274023

  5. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel

    PubMed Central

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes. PMID:27347526

  6. Performance of a random access packet network with time-capture capability

    NASA Technical Reports Server (NTRS)

    Lin, Y. H.

    1983-01-01

    The Joint Tactical Information Distribution System (JTIDS) is applied to a digital network supporting the command, control and communication requirements of 105 highly mobile users. User data traffic is bursty and the slotted ALOHA channel access scheme is therefore employed. This paper focuses on the determination of JTIDS system performance in this particular application. Emphasis is directed at the specific time-capture capability of JTIDS. Significant system performance parameters are quantified with analysis and simulation.

  7. Object based data access at the D0 experiment

    SciTech Connect

    Fuess, S.; D0 Collaboration

    1995-11-01

    The D{O} Experiment at Fermilab is currently participating in the FNAL Computing Division`s ``Computing for Analysis Project`` (CAP) to investigate object based data storage and access. Following a short description of the CAP system architecture, the D{O} data model is explored. A brief discussion of the method of operation of the CAP system leads into a concluding section.

  8. Mobile Access to the Internet: A Mediator-Based Solution.

    ERIC Educational Resources Information Center

    Alanko, Timo; Kojo, Markku; Liljeberg, Mika; Raatikainen, Kimmo

    1999-01-01

    Provides an overview of problems related to wireless mobility, specifically the use of cellular telephones to access remote information stores, such as the Internet, and computing services. Presents a new software architecture and discusses a new paradigm for designing mobile-distributed applications based on a mediator, a distributed intelligent…

  9. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  10. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  11. Inference of Gene Regulatory Network Based on Local Bayesian Networks

    PubMed Central

    Liu, Fei; Zhang, Shao-Wu; Guo, Wei-Feng; Chen, Luonan

    2016-01-01

    The inference of gene regulatory networks (GRNs) from expression data can mine the direct regulations among genes and gain deep insights into biological processes at a network level. During past decades, numerous computational approaches have been introduced for inferring the GRNs. However, many of them still suffer from various problems, e.g., Bayesian network (BN) methods cannot handle large-scale networks due to their high computational complexity, while information theory-based methods cannot identify the directions of regulatory interactions and also suffer from false positive/negative problems. To overcome the limitations, in this work we present a novel algorithm, namely local Bayesian network (LBN), to infer GRNs from gene expression data by using the network decomposition strategy and false-positive edge elimination scheme. Specifically, LBN algorithm first uses conditional mutual information (CMI) to construct an initial network or GRN, which is decomposed into a number of local networks or GRNs. Then, BN method is employed to generate a series of local BNs by selecting the k-nearest neighbors of each gene as its candidate regulatory genes, which significantly reduces the exponential search space from all possible GRN structures. Integrating these local BNs forms a tentative network or GRN by performing CMI, which reduces redundant regulations in the GRN and thus alleviates the false positive problem. The final network or GRN can be obtained by iteratively performing CMI and local BN on the tentative network. In the iterative process, the false or redundant regulations are gradually removed. When tested on the benchmark GRN datasets from DREAM challenge as well as the SOS DNA repair network in E.coli, our results suggest that LBN outperforms other state-of-the-art methods (ARACNE, GENIE3 and NARROMI) significantly, with more accurate and robust performance. In particular, the decomposition strategy with local Bayesian networks not only effectively reduce

  12. Inference of Gene Regulatory Network Based on Local Bayesian Networks.

    PubMed

    Liu, Fei; Zhang, Shao-Wu; Guo, Wei-Feng; Wei, Ze-Gang; Chen, Luonan

    2016-08-01

    The inference of gene regulatory networks (GRNs) from expression data can mine the direct regulations among genes and gain deep insights into biological processes at a network level. During past decades, numerous computational approaches have been introduced for inferring the GRNs. However, many of them still suffer from various problems, e.g., Bayesian network (BN) methods cannot handle large-scale networks due to their high computational complexity, while information theory-based methods cannot identify the directions of regulatory interactions and also suffer from false positive/negative problems. To overcome the limitations, in this work we present a novel algorithm, namely local Bayesian network (LBN), to infer GRNs from gene expression data by using the network decomposition strategy and false-positive edge elimination scheme. Specifically, LBN algorithm first uses conditional mutual information (CMI) to construct an initial network or GRN, which is decomposed into a number of local networks or GRNs. Then, BN method is employed to generate a series of local BNs by selecting the k-nearest neighbors of each gene as its candidate regulatory genes, which significantly reduces the exponential search space from all possible GRN structures. Integrating these local BNs forms a tentative network or GRN by performing CMI, which reduces redundant regulations in the GRN and thus alleviates the false positive problem. The final network or GRN can be obtained by iteratively performing CMI and local BN on the tentative network. In the iterative process, the false or redundant regulations are gradually removed. When tested on the benchmark GRN datasets from DREAM challenge as well as the SOS DNA repair network in E.coli, our results suggest that LBN outperforms other state-of-the-art methods (ARACNE, GENIE3 and NARROMI) significantly, with more accurate and robust performance. In particular, the decomposition strategy with local Bayesian networks not only effectively reduce

  13. Ontology-based Semantic Support to Improve Accessibility of Graphics.

    PubMed

    Murillo-Morales, Tomás; Miesenberger, Klaus

    2015-01-01

    We aim to ease the process of authoring accessible graphics as well as taking a first step towards the long-term goal of allowing blind persons to access graphics autonomously. We are developing and experimenting with a hierarchical set of knowledge bases related to the presentation of visual objects and cues in the form of ontologies that will act as the formal, axiomatic underpinnings of an accessibility layer or, later on, a graphics reader/browser for blind and visually impaired people. The concept and prototypes of smart (or communicative) graphics [1], in which readers obtain information about the syntactic and semantic content through the use of e.g. a natural language interface, should be expanded by exploiting the benefits of formal semantics supported by domain- and task-aware ontologies describing the elements, visual cues and relations used for visualization or visual display. PMID:26294481

  14. Network-based reading system for lung cancer screening CT

    NASA Astrophysics Data System (ADS)

    Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio

    2006-03-01

    This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.

  15. Support networks and people with physical disabilities: social inclusion and access to health services.

    PubMed

    Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva

    2015-01-01

    This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses) and people outside the family (friends and neighbors). However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental. PMID:25650611

  16. A Scalable Long-Reach Wavelength-Division Multiplexing Access Network Sharing Both Fiber Protection and Broadcasting Services

    NASA Astrophysics Data System (ADS)

    Feng, Chen; Gan, Chaoqin; Gao, Ziyue; Guo, Su; Li, Wei; Fang, Yiqin

    2014-07-01

    A novel scalable wavelength-division multiplexing access network is proposed in this article. By newly designing the remote node, this network can not only support the long-reach transmission and broadcasting services, it can also have flexible scalability and the ability of sharing fiber protection. These make this network have great resilient capability. Also, this scheme still has the characteristic of Rayleigh backscattering mitigation and shared-seeding light of upstream signals. The simulation results indicate this network has good performance.

  17. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services. PMID:27240842

  18. Neural network based architectures for aerospace applications

    NASA Technical Reports Server (NTRS)

    Ricart, Richard

    1987-01-01

    A brief history of the field of neural networks research is given and some simple concepts are described. In addition, some neural network based avionics research and development programs are reviewed. The need for the United States Air Force and NASA to assume a leadership role in supporting this technology is stressed.

  19. Network-Based Classrooms: Promises and Realities.

    ERIC Educational Resources Information Center

    Bruce, Bertram C., Ed.; And Others

    Exploring how new technologies and new pedagogies transform and are transformed by existing institutions, this book presents 14 essays that discuss network-based classrooms in which students use communications software on computer networks to converse in writing. The first part of the book discusses general themes and issues of the ENFI…

  20. MaNIDA: Insight into the German Marine Network for Integrated Data Access

    NASA Astrophysics Data System (ADS)

    Schäfer, Angela; Scientific MaNIDA Team

    2013-04-01

    The Marine Network for Integrated Data Access (MaNIDA) builds a sustainable e-Infrastructure to support discovery and re-use of data from distinct marine and earth science data providers in Germany (see ESSI1.2 and ESSI2.2). Thereby we implement the "Data Portal of German Marine Research" for coherent discovery, view, download and dissemination of aggregated content. MaNIDA receives a unique momentum from the cooperation and financial partnership between main German marine research institutes (AWI, MARUM, HZG, GEOMAR, Uni Hamburg, Uni Kiel, Uni Bremen) and the Federal Maritime and Hydrographic Agency as well as active participation in international and major EU-initiatives (ICSU, GEOSS, SeaDataNet, EMODNET, ODIP). Together with a coherent management strategy coordinated by the Alfred Wegener Institute, Helmholtz Center for Polar and Marine Research, sustainability will be achieved via the long-term commitment of framework funding by the Helmholtz Association, Germany's largest scientific research organization for large-scale facilities and scientific infrastructure. Strategic Aims The installation of the "Data Portal of German Marine Research" will address the urgent demands of the German research community for reliable and easy access to marine research data at one single point of access and truth. Primary focus will be given to data derived from nationally operated research and monitoring facilities (vessels, observatories, alert systems, etc), whereby related contextual content and publications will become an integral part of the aggregation effort. For the scientific community we define responsibilities and commitments across partners while complementing existing data repositories and the new portal with well-articulated workflows from the instrument to the data product. Necessary level of quality assurance and user support will be implemented to achieve substantial enhancements in the whole lifecycle management of marine scientific data. The creation of a data

  1. Dynamics-based centrality for directed networks

    NASA Astrophysics Data System (ADS)

    Masuda, Naoki; Kori, Hiroshi

    2010-11-01

    Determining the relative importance of nodes in directed networks is important in, for example, ranking websites, publications, and sports teams, and for understanding signal flows in systems biology. A prevailing centrality measure in this respect is the PageRank. In this work, we focus on another class of centrality derived from the Laplacian of the network. We extend the Laplacian-based centrality, which has mainly been applied to strongly connected networks, to the case of general directed networks such that we can quantitatively compare arbitrary nodes. Toward this end, we adopt the idea used in the PageRank to introduce global connectivity between all the pairs of nodes with a certain strength. Numerical simulations are carried out on some networks. We also offer interpretations of the Laplacian-based centrality for general directed networks in terms of various dynamical and structural properties of networks. Importantly, the Laplacian-based centrality defined as the stationary density of the continuous-time random walk with random jumps is shown to be equivalent to the absorption probability of the random walk with sinks at each node but without random jumps. Similarly, the proposed centrality represents the importance of nodes in dynamics on the original network supplied with sinks but not with random jumps.

  2. XRootd, disk-based, caching proxy for optimization of data access, data placement and data replication

    NASA Astrophysics Data System (ADS)

    Bauerdick, L. A. T.; Bloom, K.; Bockelman, B.; Bradley, D. C.; Dasu, S.; Dost, J. M.; Sfiligoi, I.; Tadel, A.; Tadel, M.; Wuerthwein, F.; Yagil, A.; Cms Collaboration

    2014-06-01

    Following the success of the XRootd-based US CMS data federation, the AAA project investigated extensions of the federation architecture by developing two sample implementations of an XRootd, disk-based, caching proxy. The first one simply starts fetching a whole file as soon as a file open request is received and is suitable when completely random file access is expected or it is already known that a whole file be read. The second implementation supports on-demand downloading of partial files. Extensions to the Hadoop Distributed File System have been developed to allow for an immediate fallback to network access when local HDFS storage fails to provide the requested block. Both cache implementations are in pre-production testing at UCSD.

  3. Pharma Pricing & Market Access Europe 2016--Health Network Communications' Tenth Annual Conference (February 23-25, 2016--London, UK).

    PubMed

    D'Souza, P

    2016-03-01

    Tighter national budgets and escalating drug prices continue to present challenges for pharmaceutical market access strategies and societal cost of care. As pharmaceutical companies and medical governmental advisory organizations enter tougher negotiations, hospital trusts and other dispensary firms face barriers to receiving the best medical treatment, and as a result patient access is limited. The 2016 HealthNetwork Communications' Pharma Pricing & Market Access Europe meeting brought together pharmaceutical, medical governmental advisory and stakeholders and market access/pricing consultants, to encourage discussions and negotiations into how to improve the drug pricing system and consequential market access strategies while achieving the respective reimbursement and affordability objectives. PMID:27186595

  4. A Rewritable, Random-Access DNA-Based Storage System

    PubMed Central

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-01-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications. PMID:26382652

  5. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  6. A Rewritable, Random-Access DNA-Based Storage System.

    PubMed

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-01-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications. PMID:26382652

  7. A Rewritable, Random-Access DNA-Based Storage System

    NASA Astrophysics Data System (ADS)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  8. On the Design of an Architecture for Partitioned Knowledge Management in Autonomic Multimedia Access and Aggregation Networks

    NASA Astrophysics Data System (ADS)

    Latré, Steven; Verstichel, Stijn; de Vleeschauwer, Bart; de Turck, Filip; Demeester, Piet

    The recent emergence of multimedia services, such as Network Based Personal Video Recording and Broadcast TV over traditional DSL based access networks, has introduced stringent Quality of Experience (QoE) requirements. It is generally assumed that the wide variety of services and user profiles introduces the need for a per-user or per-subscriber QoE management. Such a complex QoE management requires real-time knowledge about the managed services, which is available amongst the different nodes in the network. However, even for managing a few services, a relatively large amount of, constantly updated, knowledge is needed. Propagating all the knowledge to all nodes is therefore not feasible. As not all knowledge is relevant to all nodes, it is important to perform an intelligent knowledge distribution and management. In this position paper, we introduce the concept of a cognitive model that describes the knowledge requirements of each node. Based on the information stated in this cognitive model, we discuss how filter queries, that typically describe what needs to be queried from other nodes, can be automatically generated leading to an efficient partitioning of the knowledge through the distributed nodes.

  9. Access to In-Network Emergency Physicians and Emergency Departments Within Federally Qualified Health Plans in 2015

    PubMed Central

    Dorner, Stephen C.; Camargo, Carlos A.; Schuur, Jeremiah D.; Raja, Ali S.

    2016-01-01

    Introduction Under regulations established by the Affordable Care Act, insurance plans must meet minimum standards in order to be sold through the federal Marketplace. These standards to become a qualified health plan (QHP) include maintaining a provider network sufficient to assure access to services. However, the complexity of emergency physician (EP) employment practices – in which the EPs frequently serve as independent contractors of emergency departments, independently establish insurance contracts, etc… – and regulations governing insurance repayment may hinder the application of network adequacy standards to emergency medicine. As such, we hypothesized the existence of QHPs without in-network access to EPs. The objective is to identify whether there are QHPs without in-network access to EPs using information available through the federal Marketplace and publicly available provider directories. Results In a national sample of Marketplace plans, we found that one in five provider networks lacks identifiable in-network EPs. QHPs lacking EPs spanned nearly half (44%) of the 34 states using the federal Marketplace. Conclusion Our data suggest that the present regulatory framework governing network adequacy is not generalizable to emergency care, representing a missed opportunity to protect patient access to in-network physicians. These findings and the current regulations governing insurance payment to EPs dis-incentivize the creation of adequate physician networks, incentivize the practice of balance billing, and shift the cost burden to patients. PMID:26823925

  10. Using real-estate-based financing to access capital.

    PubMed

    Tobin, W C; Kryzaniak, L A

    1998-07-01

    One strategy employed by healthcare organizations to increase their market presence is the construction of new facilities. Accessing capital to fund such construction, however, has become more of a challenge. One relatively untapped source of building capital is real-estate-based financing. Nonrecourse mortgages, turnkey net leases, and synthetic leases can provide several advantages to healthcare organizations seeking capital, assuming issues related to building ownership, debt and balance sheet effects, and tax-exempt status have been thoroughly explored first. PMID:10180896

  11. Genetic variability of watermelon accessions based on microsatellite markers.

    PubMed

    de S Gama, R N C; Santos, C A F; de C S Dias, R

    2013-01-01

    We analyzed the genetic variability of 40 watermelon accessions collected from 8 regions of Northeastern Brazil using microsatellite markers, in order to suggest strategies of conservation and utilization of genetic variability in this species. These accessions are not commercial cultivars. They were sampled in areas of traditional farmers that usually keep their own seeds for future plantings year after year. An UPGMA dendrogram was generated from a distance matrix of the Jaccard coefficient, based on 41 alleles of 13 microsatellite loci. Analysis of molecular variance was made by partitioning between and within geographical regions. The similarity coefficient between accessions ranged from 37 to 96%; the dendrogram gave a co-phenetic value of 0.80. The among population genetic variability was high ( (^)ϕST = 0.319). Specific clusters of accessions sampled in 3 regions of Maranhão were observed while the other 5 regions did not presented specific clusters by regions. We conclude that watermelon genetic variability is not uniformly dispersed in the regions analyzed, indicating that geographical barriers or edaphoclimatic conditions have limited open mating. We suggest sampling a greater number of populations, so regional species diversity will be better represented and preserved in the germplasm bank. PMID:23546958

  12. Dynamic Network-Based Epistasis Analysis: Boolean Examples

    PubMed Central

    Azpeitia, Eugenio; Benítez, Mariana; Padilla-Longoria, Pablo; Espinosa-Soto, Carlos; Alvarez-Buylla, Elena R.

    2011-01-01

    In this article we focus on how the hierarchical and single-path assumptions of epistasis analysis can bias the inference of gene regulatory networks. Here we emphasize the critical importance of dynamic analyses, and specifically illustrate the use of Boolean network models. Epistasis in a broad sense refers to gene interactions, however, as originally proposed by Bateson, epistasis is defined as the blocking of a particular allelic effect due to the effect of another allele at a different locus (herein, classical epistasis). Classical epistasis analysis has proven powerful and useful, allowing researchers to infer and assign directionality to gene interactions. As larger data sets are becoming available, the analysis of classical epistasis is being complemented with computer science tools and system biology approaches. We show that when the hierarchical and single-path assumptions are not met in classical epistasis analysis, the access to relevant information and the correct inference of gene interaction topologies is hindered, and it becomes necessary to consider the temporal dynamics of gene interactions. The use of dynamical networks can overcome these limitations. We particularly focus on the use of Boolean networks that, like classical epistasis analysis, relies on logical formalisms, and hence can complement classical epistasis analysis and relax its assumptions. We develop a couple of theoretical examples and analyze them from a dynamic Boolean network model perspective. Boolean networks could help to guide additional experiments and discern among alternative regulatory schemes that would be impossible or difficult to infer without the elimination of these assumption from the classical epistasis analysis. We also use examples from the literature to show how a Boolean network-based approach has resolved ambiguities and guided epistasis analysis. Our article complements previous accounts, not only by focusing on the implications of the hierarchical and

  13. Embedded GIS based on the convergenced network

    NASA Astrophysics Data System (ADS)

    Chen, Zhaiwei; Qi, Qingwen

    2007-06-01

    With the development of modern information technology, Telecommunication network, Computer network and TVBroadcast network are converging rapidly. And the three networks form the base of the modern information industry. Although this convergence is considered a support of all services, their convergence doesn't indicate that physical networks will integrate completely. No one of these networks can take the place of others. In fact, this concept inclines to the convergence of services and the infiltration of function among these three networks. This paper give a deep analysis about the characteristic of GIS in this convergenced environment, and discuss the difference compared with traditional WebGIS. Suppose iTV is the terminal service platform of the three networks' fusion, this paper make a discussion about frame and modules of this kind of GIS. The key techology about iTV-GIS includes embedded operation system, middleware and so on. Set-top box as the most important device to run iTV-GIS program has its particularity. A development phase in virtual mechine before hardware importing is necessary. Then a antetype design of iTV-GIS is given as an example at the end of this paper. This research is just a beginning for developmeing GIS on the platform of the three networks' convergence. The subjects mentoined in this paper is just one implement on iTV virual platform, but wish such attempt will bring GIS to a new circumstance, and supply some material for the research later.

  14. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  15. Enabling Broadband as Commodity within Access Networks: A QoS Recipe

    NASA Astrophysics Data System (ADS)

    Areizaga, Enrique; Foglar, Andreas; Elizondo, Antonio J.; Geilhardt, Frank

    This paper describes the QoS features that will transform the access networks landscape in order to bring “Broadband” as a commodity while setting up the pillars of the “Future Media Internet”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today’s networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer’s needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.

  16. Price-Based Information Routing in Complex Satellite Networks for

    NASA Astrophysics Data System (ADS)

    Hussein, I.; Su, J.; Wang, Y.; Wyglinski, A.

    Future space-based situational awareness and space surveillance systems are envisioned to include a large array of satellites that seek to cooperatively achieve full awareness over given space and terrestrial domains. Given the complexity of the communication network architecture of such a system, in this paper we build on the system architecture that was proposed by the presenting author in the 2008 AMOS conference and propose an efficient, adaptable and scalable price-based routing and bandwidth allocation algorithm for the generation, routing and delivery of surveillance information in distributed wireless satellite networks. Due to the potentially large deployments of these satellites, the access points employed in a centralized network control scheme would easily be overwhelmed due to lack of spectral bandwidth, synchronization issues, and multiple access coordination. Alternatively, decentralized schemes could facilitate the flow and transference of information between data gatherers and data collectors via mechanisms such as (multi-hop) routing, allocation of spectral bandwidths per relaying node, and coordination between adjacent nodes. Although there are numerous techniques and concepts focusing on the network operations, control, and management of sensor networks, existing solution approaches require the use of information for routing, allocation, and decision-making that may not be readily available to the satellites in a timely fashion. This is especially true in the literature on price-based routing, where the approach is almost always game theoretic or relies on optimization techniques. Instead of seeking such techniques, in this paper we present algorithms that will (1) be energy-aware, (2) be highly adaptable and responsive to demands and seek delivery of information to desired nodes despite the fact that the source and destination are not globally known, (3) be secure, (4) be efficient in allocating bandwidth, (5) be decentralized and allow for

  17. Morning REM Sleep Naps Facilitate Broad Access to Emotional Semantic Networks

    PubMed Central

    Carr, Michelle; Nielsen, Tore

    2015-01-01

    Study Objectives: The goals of the study were to assess semantic priming to emotion and nonemotion cue words using a novel measure of associational breadth for participants who either took rapid eye movement (REM) or nonrapid eye movement (NREM) naps or who remained awake, and to assess the relation of priming to REM sleep consolidation and REM sleep inertia effects. Design: The associational breadth task was applied in both a priming condition, where cue words were signaled to be memorized prior to sleep (primed), and a nonpriming condition, where cue words were not memorized (nonprimed). Cue words were either emotional (positive, negative) or nonemotional. Participants were randomly assigned to either an awake (WAKE) or a sleep condition, which was subsequently split into NREM or REM groups depending on stage at awakening. Setting: Hospital-based sleep laboratory. Participants: Fifty-eight healthy participants (22 male) ages 18 to 35 y (mean age = 23.3 ± 4.08 y). Measurements and Results: The REM group scored higher than the NREM or WAKE groups on primed, but not nonprimed emotional cue words; the effect was stronger for positive than for negative cue words. However, REM time and percent correlated negatively with degree of emotional priming. Priming occurred for REM awakenings but not for NREM awakenings, even when the latter sleep episodes contained some REM sleep. Conclusions: Associational breadth may be selectively consolidated during REM sleep for stimuli that have been tagged as important for future memory retrieval. That priming decreased with REM time and was higher only for REM sleep awakenings is consistent with two explanatory REM sleep processes: REM sleep consolidation serving emotional downregulation and REM sleep inertia. Citation: Carr M, Nielsen T. Morning REM sleep naps facilitate broad access to emotional semantic networks. SLEEP 2015;38(3):433–443. PMID:25409100

  18. Telemedicine with integrated data security in ATM-based networks

    NASA Astrophysics Data System (ADS)

    Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas

    1997-05-01

    Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.

  19. A graph-based system for network-vulnerability analysis

    SciTech Connect

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  20. Forward error correcting codes in fiber-optic synchronous code-division multiple access networks

    NASA Astrophysics Data System (ADS)

    Srivastava, Anand; Kar, Subrat; Jain, V. K.

    2002-02-01

    In optical code-division multiple access (OCDMA) networks, the performance is limited by optical multiple access interference (OMAI), amplified spontaneous emission (ASE) noise and receiver noise. To reduce OMAI and noise effects, use of forward error correcting (FEC) (18880, 18865) and (2370, 2358) Hamming codes are explored for STM-1 (155 Mbps) bit stream. The encoding is carried out at the multiplex-section layer. The check bits are embedded in the unused bytes of multiplex section overhead (MSOH). The expression for probability of error is derived taking into consideration OMAI, various sources of noise and effect of group velocity dispersion (GVD). It is observed that for a BER of 10 -9, use of FEC gives a coding gain of 1.4-2.1 dB depending upon the type of coding scheme used. It is also seen that there is a sensitivity improvement of about 3 dB if the source is suitably pre-chirped.

  1. 42 CFR 423.124 - Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 3 2011-10-01 2011-10-01 false Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies. 423.124 Section 423.124 Public Health CENTERS FOR MEDICARE... PRESCRIPTION DRUG BENEFIT Benefits and Beneficiary Protections § 423.124 Special rules for...

  2. 42 CFR 423.124 - Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Special rules for out-of-network access to covered Part D drugs at out-of-network pharmacies. 423.124 Section 423.124 Public Health CENTERS FOR MEDICARE... PRESCRIPTION DRUG BENEFIT Benefits and Beneficiary Protections § 423.124 Special rules for...

  3. NASDA knowledge-based network planning system

    NASA Technical Reports Server (NTRS)

    Yamaya, K.; Fujiwara, M.; Kosugi, S.; Yambe, M.; Ohmori, M.

    1993-01-01

    One of the SODS (space operation and data system) sub-systems, NP (network planning) was the first expert system used by NASDA (national space development agency of Japan) for tracking and control of satellite. The major responsibilities of the NP system are: first, the allocation of network and satellite control resources and, second, the generation of the network operation plan data (NOP) used in automated control of the stations and control center facilities. Up to now, the first task of network resource scheduling was done by network operators. NP system automatically generates schedules using its knowledge base, which contains information on satellite orbits, station availability, which computer is dedicated to which satellite, and how many stations must be available for a particular satellite pass or a certain time period. The NP system is introduced.

  4. Access Control of Cloud Service Based on UCON

    NASA Astrophysics Data System (ADS)

    Danwei, Chen; Xiuli, Huang; Xunyi, Ren

    Cloud computing is an emerging computing paradigm, and cloud service is also becoming increasingly relevant. Most research communities have recently embarked in the area, and research challenges in every aspect. This paper mainly discusses cloud service security. Cloud service is based on Web Services, and it will face all kinds of security problems including what Web Services face. The development of cloud service closely relates to its security, so the research of cloud service security is a very important theme. This paper introduces cloud computing and cloud service firstly, and then gives cloud services access control model based on UCON and negotiation technologies, and also designs the negotiation module.

  5. Network based sky Brightness Monitor

    NASA Astrophysics Data System (ADS)

    McKenna, Dan; Pulvermacher, R.; Davis, D. R.

    2009-01-01

    We have developed and are currently testing an autonomous 2 channel photometer designed to measure the night sky brightness in the visual wavelengths over a multi-year campaign. The photometer uses a robust silicon sensor filtered with Hoya CM500 glass. The Sky brightness is measured every minute at two elevation angles typically zenith and 20 degrees to monitor brightness and transparency. The Sky Brightness monitor consists of two units, the remote photometer and a network interface. Currently these devices use 2.4 Ghz transceivers with a free space range of 100 meters. The remote unit is battery powered with day time recharging using a solar panel. Data received by the network interface transmits data via standard POP Email protocol. A second version is under development for radio sensitive areas using an optical fiber for data transmission. We will present the current comparison with the National Park Service sky monitoring camera. We will also discuss the calibration methods used for standardization and temperature compensation. This system is expected to be deployed in the next year and be operated by the International Dark Sky Association SKYMONITOR project.

  6. Access Analysis-Based Tight Localization of Abstract Memories

    NASA Astrophysics Data System (ADS)

    Oh, Hakjoo; Brutschy, Lucas; Yi, Kwangkeun

    On-the-fly localization of abstract memory states is vital for economical abstract interpretation of imperative programs. Such localization is sometimes called "abstract garbage collection" or "framing". In this article we present a new memory localization technique that is more effective than the conventional reachability-based approach. Our technique is based on a key observation that collecting the reachable memory parts is too conservative and the accessed parts are usually tiny subsets of the reachable. Our technique first estimates, by an efficient pre-analysis, the set of locations that will be accessed during the analysis of each code block. Then the main analysis uses the access-set results to trim the memory entries before analyzing code blocks. In experiments with an industrial-strength global C static analyzer, the technique is applied right before analyzing each procedure's body and reduces the average analysis time and memory by 92.1% and 71.2%, respectively, without sacrificing the analysis precision. Localizing more frequently such as at loop bodies and basic blocks as well as procedure bodies, the generalized localization additionally reduces analysis time by an average of 31.8%.

  7. Accessibility, searchability, transparency and engagement of soil carbon data: The International Soil Carbon Network

    NASA Astrophysics Data System (ADS)

    Harden, Jennifer W.; Hugelius, Gustaf; Koven, Charlie; Sulman, Ben; O'Donnell, Jon; He, Yujie

    2016-04-01

    Soils are capacitors for carbon and water entering and exiting through land-atmosphere exchange. Capturing the spatiotemporal variations in soil C exchange through monitoring and modeling is difficult in part because data are reported unevenly across spatial, temporal, and management scales and in part because the unit of measure generally involves destructive harvest or non-recurrent measurements. In order to improve our fundamental basis for understanding soil C exchange, a multi-user, open source, searchable database and network of scientists has been formed. The International Soil Carbon Network (ISCN) is a self-chartered, member-based and member-owned network of scientists dedicated to soil carbon science. Attributes of the ISCN include 1) Targeted ISCN Action Groups which represent teams of motivated researchers that propose and pursue specific soil C research questions with the aim of synthesizing seminal articles regarding soil C fate. 2) Datasets to date contributed by institutions and individuals to a comprehensive, searchable open-access database that currently includes over 70,000 geolocated profiles for which soil C and other soil properties. 3) Derivative products resulting from the database, including depth attenuation attributes for C concentration and storage; C storage maps; and model-based assessments of emission/sequestration for future climate scenarios. Several examples illustrate the power of such a database and its engagement with the science community. First, a simplified, data-constrained global ecosystem model estimated a global sensitivity of permafrost soil carbon to climate change (g sensitivity) of -14 to -19 Pg C °C-1 of warming on a 100 years time scale. Second, using mathematical characterizations of depth profiles for organic carbon storage, C at the soil surface reflects Net Primary Production (NPP) and its allotment as moss or litter, while e-folding depths are correlated to rooting depth. Third, storage of deep C is highly

  8. RDFacl: A Secure Access Control Model Based on RDF Triple

    NASA Astrophysics Data System (ADS)

    Kim, Jaehoon; Park, Seog

    An expectation for more intelligent Web is recently being reflected through the new research field called Semantic Web. In this paper, related with Semantic Web security, we introduce an RDF triple based access control model having explicit authorization propagation by inheritance and implicit authorization propagation by inference. Especially, we explain an authorization conflict problem between the explicit and the implicit authorization propagation, which is an important concept in access control for Semantic Web. We also propose a novel conflict detection algorithm using graph labeling techniques in order to efficiently find authorization conflicts. Some experimental results show that the proposed detection algorithm has much better performance than the existing detection algorithm when data size and number of specified authorizations become larger.

  9. The theory research of multi-user quantum access network with Measurement Device Independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Ji, Yi-Ming; Li, Yun-Xia; Shi, Lei; Meng, Wen; Cui, Shu-Min; Xu, Zhen-Yu

    2015-10-01

    Quantum access network can't guarantee the absolute security of multi-user detector and eavesdropper can get access to key information through time-shift attack and other ways. Measurement-device-independent quantum key distribution is immune from all the detection attacks, and accomplishes the safe sharing of quantum key. In this paper, that Measurement-device-independent quantum key distribution is used in the application of multi-user quantum access to the network is on the research. By adopting time-division multiplexing technology to achieve the sharing of multiuser detector, the system structure is simplified and the security of quantum key sharing is acquired.

  10. Identifying Network Public Opinion Leaders Based on Markov Logic Networks

    PubMed Central

    Zhang, Weizhe; Li, Xiaoqiang; He, Hui; Wang, Xing

    2014-01-01

    Public opinion emergencies have important effect on social activities. Recognition of special communities like opinion leaders can contribute to a comprehensive understanding of the development trend of public opinion. In this paper, a network opinion leader recognition method based on relational data was put forward, and an opinion leader recognition system integrating public opinion data acquisition module, data characteristic selection, and fusion module as well as opinion leader discovery module based on Markov Logic Networks was designed. The designed opinion leader recognition system not only can overcome the incomplete data acquisition and isolated task of traditional methods, but also can recognize opinion leaders comprehensively with considerations to multiple problems by using the relational model. Experimental results demonstrated that, compared with the traditional methods, the proposed method can provide a more accurate opinion leader recognition and has good noise immunity. PMID:24977188

  11. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  12. ATM interface design issues for IP traffic over ATM/ADSL access networks

    NASA Astrophysics Data System (ADS)

    Buschmann, Jonathan E.; Pampolini, Matteo

    1999-01-01

    The combination of ATM and ADSL is fast becoming an attractive alternative for Internet access for home and small business. ADSL modems allow the use of the existing copper plant at speeds much higher than those afforded by traditional modem technologies. The use of ATM both enables the long-sought goal of an ATM end-to-end network, and allows, through the use of QOS guarantees, efficient use of the limited upstream bandwidth of ADSL. Although the client- server model, which typified classical Internet traffic and newer multimedia IP services, fits well an asymmetric network model, performance can be greatly impacted unless the interactions between ADSL, ATM, and Internet protocols are well understood an taken into account in the design of ATM interfaces. In this paper we investigate the potential limitations on performance in IP/ATM/ADSL networks and explain how, in our ATM interface designs, we have ameliorated these problems and optimized the use of IP services over such networks. We discuss the importance of 'traffic shaping', heretofore afforded little importance for IP traffic, and the impact of latency and asymmetric bandwidth of ADSL, on both traditional and multimedia IP services, in our implementations.

  13. Web100-based Network Diagnostic Tool

    2003-03-20

    NDT is a client/server based network diagnostic tool developed to aid in finding network performance and configuration problems. The tool measures data transfer rates between two internet hosts (client and server). It also gathers detailed TCP statistical variable counters supplied by the Web100 modified server and uses these TCP variables to compute the theoretical performance rate between the two internet hosts. It then compares these analytical results with the measured results to determine if performancemore » or configuration problems exist and translates these results into plain text messages to aid users and network operators in resolving reported problems.« less

  14. Pulse based sensor networking using mechanical waves through metal substrates

    NASA Astrophysics Data System (ADS)

    Lorenz, S.; Dong, B.; Huo, Q.; Tomlinson, W. J.; Biswas, S.

    2013-05-01

    This paper presents a novel wireless sensor networking technique using ultrasonic signal as the carrier wave for binary data exchange. Using the properties of lamb wave propagation through metal substrates, the proposed network structure can be used for runtime transport of structural fault information to ultrasound access points. Primary applications of the proposed sensor networking technique will include conveying fault information on an aircraft wing or on a bridge to an ultrasonic access point using ultrasonic wave through the structure itself (i.e. wing or bridge). Once a fault event has been detected, a mechanical pulse is forwarded to the access node using shortest path multi-hop ultrasonic pulse routing. The advantages of mechanical waves over traditional radio transmission using pulses are the following: First, unlike radio frequency, surface acoustic waves are not detectable outside the medium, which increases the inherent security for sensitive environments in respect to tapping. Second, event detection can be represented by the injection of a single mechanical pulse at a specific temporal position, whereas radio messages usually take several bits. The contributions of this paper are: 1) Development of a transceiver for transmitting/receiving ultrasound pulses with a pulse loss rate below 2·10-5 and false positive rate with an upper bound of 2·10-4. 2) A novel one-hop distance estimation based on the properties of lamb wave propagation with an accuracy of above 80%. 3) Implementation of a wireless sensor network using mechanical wave propagation for event detection on a 2024 aluminum alloy commonly used for aircraft skin construction.

  15. Social Networks and Community-Based Natural Resource Management

    NASA Astrophysics Data System (ADS)

    Lauber, T. Bruce; Decker, Daniel J.; Knuth, Barbara A.

    2008-10-01

    We conducted case studies of three successful examples of collaborative, community-based natural resource conservation and development. Our purpose was to: (1) identify the functions served by interactions within the social networks of involved stakeholders; (2) describe key structural properties of these social networks; and (3) determine how these structural properties varied when the networks were serving different functions. The case studies relied on semi-structured, in-depth interviews of 8 to 11 key stakeholders at each site who had played a significant role in the collaborative projects. Interview questions focused on the roles played by key stakeholders and the functions of interactions between them. Interactions allowed the exchange of ideas, provided access to funding, and enabled some stakeholders to influence others. The exchange of ideas involved the largest number of stakeholders, the highest percentage of local stakeholders, and the highest density of interactions. Our findings demonstrated the value of tailoring strategies for involving stakeholders to meet different needs during a collaborative, community-based natural resource management project. Widespread involvement of local stakeholders may be most appropriate when ideas for a project are being developed. During efforts to exert influence to secure project approvals or funding, however, involving specific individuals with political connections or influence on possible sources of funds may be critical. Our findings are consistent with past work that has postulated that social networks may require specific characteristics to meet different needs in community-based environmental management.

  16. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    SciTech Connect

    Grudka, Andrzej; Horodecki, Pawel

    2010-06-15

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  17. Leo satellite-based telecommunication network concepts

    NASA Technical Reports Server (NTRS)

    Aiken, John G.; Swan, Peter A.; Leopold, Ray J.

    1991-01-01

    Design considerations are discussed for Low Earth Orbit (LEO) satellite based telecommunications networks. The satellites are assumed to be connected to each other via intersatellite links. They are connected to the end user either directly or through gateways to other networks. Frequency reuse, circuit switching, packet switching, call handoff, and routing for these systems are discussed by analogy with terrestrial cellular (mobile radio) telecommunication systems.

  18. Secret Shoppers Find Access To Providers And Network Accuracy Lacking For Those In Marketplace And Commercial Plans.

    PubMed

    Haeder, Simon F; Weimer, David L; Mukamel, Dana B

    2016-07-01

    The adequacy of provider networks for plans sold through insurance Marketplaces established under the Affordable Care Act has received much scrutiny recently. Various studies have established that networks are generally narrow. To learn more about network adequacy and access to care, we investigated two questions. First, no matter the nominal size of a network, can patients gain access to primary care services from providers of their choice in a timely manner? Second, how does access compare to plans sold outside insurance Marketplaces? We conducted a "secret shopper" survey of 743 primary care providers from five of California's nineteen insurance Marketplace pricing regions in the summer of 2015. Our findings indicate that obtaining access to primary care providers was generally equally challenging both inside and outside insurance Marketplaces. In less than 30 percent of cases were consumers able to schedule an appointment with an initially selected physician provider. Information about provider networks was often inaccurate. Problems accessing services for patients with acute conditions were particularly troubling. Effectively addressing issues of network adequacy requires more accurate provider information. PMID:27385229

  19. A graph-based network-vulnerability analysis system

    SciTech Connect

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  20. A graph-based network-vulnerability analysis system

    SciTech Connect

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  1. Development of a statistically based access delay timeline methodology.

    SciTech Connect

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversary's task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  2. A Comparative experimental study of media access protocols for wireless radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, M. V.

    2001-05-24

    We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2

  3. Elements of Network-Based Assessment

    ERIC Educational Resources Information Center

    Gibson, David

    2007-01-01

    Elements of network-based assessment systems are envisioned based on recent advances in knowledge and practice in learning theory, assessment design and delivery, and semantic web interoperability. The architecture takes advantage of the meditating role of technology as well as recent models of assessment systems. This overview of the elements…

  4. Facilitating Organizational Information Access in Global Network Environments: Towards a New Framework for Intranet Design.

    ERIC Educational Resources Information Center

    Detlor, Brian

    This paper proposes a user-centered framework for intranet design that is based on an understanding of people, their typical problems, information behaviors, and situated contexts. It is argued that by adopting such an approach, intranets can be designed which facilitate organizational information access and use. The first section of the paper…

  5. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  6. Connectivity and conditional models of access and abundance of species in stream networks.

    PubMed

    Chelgren, Nathan D; Dunham, Jason B

    2015-07-01

    Barriers to passage of aquatic organisms at stream road crossings are a major cause of habitat fragmentation in stream networks. Accordingly, large investments have been made to restore passage at these crossings, but often without estimation of population-level benefits. Here, we describe a broad-scale approach to quantifying the effectiveness of passage restoration in terms interpretable at population levels, namely numbers of fish and length of stream gained through restoration, by sampling abundance in a study design that accounts for variable biogeographic species pools, variable stream and barrier configurations, and variable probabilities of capture and detectability for multiple species. We modified an existing zero-inflated negative-binomial model to estimate the probability of site access, abundance conditional on access, and capture probability of individual fish. Therein, we modeled probability of access as a function of gradient, stream road-crossing type, and downstream access by fish simultaneously with a predictive model for abundance at sites accessible to fish. Results indicated that replacement of barriers with new crossing designs intended to allow for greater movement was associated with dramatically higher probability of access for all fishes, including migratory Pacific salmon, trout, sculpin, and lamprey. Conversely, existing non-replaced crossings negatively impacted fish distributions. Assuming no downstream constraints on access, we estimated the potential length of stream restored by the program ranged between 7.33 (lamprey) and 15.28 km (small coastal cutthroat and rainbow trout). These contributions represented a fraction of the total length available upstream (187 km) of replaced crossings. When limited ranges of species were considered, the estimated contributions of culvert replacement were reduced (1.65-km range, for longnose dace to 12.31 km for small coastal cutthroat and rainbow trout). Numbers of fish contributed ranged from

  7. Groundwater Information Network: enabling online access and analysis of Canadian groundwater information

    NASA Astrophysics Data System (ADS)

    Brodaric, B.; Sharpe, D.; Boisvert, E.

    2009-05-01

    A cornerstone of effective groundwater resource management is access to available groundwater information and tools for analysis, modeling, and eventually decision-making. In Canada, information access is inhibited by the heterogeneous nature of groundwater information, which is collected and maintained by many agencies using different digital structures and contents, and by varying online availability. To overcome these issues, a collaboration of federal and provincial agencies has developed the Groundwater Information Network (GIN, http://gw-info.net). In its first phase, GIN provides a single online data pipeline to the water-well databases hosted by six provincial agencies (British Columbia, Alberta, Manitoba, Ontario, Quebec and Nova Scotia) and to some key aquifer information hosted by Natural Resources Canada. GIN also provides two online portals that can be used to view, download and analyse the information. At the core of GIN is an online mediator that distributes requests for information to the host databases, and translates the replies into a common format (Groundwater MarkUp Language). This allows the portals to treat the distributed information as a single virtual online repository, one with consistent links back to the original databases. Discussed will be the GIN system, including its architecture, functionality, and portals, as well as its overall role as a point of access to some Canadian groundwater information as well as to related web-mapping and analysis tools.

  8. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  9. Multiple fiber Bragg grating sensor network with a rapid response and wide spectral dynamic range using code division multiple access

    NASA Astrophysics Data System (ADS)

    Kim, Youngbok; Jeon, Sie-Wook; Park, Chang-Soo

    2011-05-01

    Fiber Bragg grating (FBG) sensor networks have been intensively researched in optical sensor area and it developed in wavelength division multiplexing (WDM) and time division multiplexing (TDM) technologies which was adopted for its interrogating many optical sensors. In particular, WDM technology can be easily employed to interrogate FBG sensor however, the number of FBG sensors is limited. On the other hand, the TDM technique can extremely expand the number of sensor because the FBG sensors have same center wavelength. However, it suffers from a reduced sensor output power due to low reflectivity of FBG sensor. In this paper, we proposed and demonstrated the FBG sensor network based on code division multiple access (CDMA) with a rapid response and wide spectral dynamic range. The reflected semiconductor optical amplifier (RSOA) as a light source was directly modulated by the generated pseudorandom binary sequence (PRBS) code and the modulated signal is amplified and goes through FBG sensors via circulator. When the modulated optical signal experienced FBG sensor array, the optical signal which was consistent with center wavelength of FBGs is reflected and added from each sensors. The added signal goes into dispersion compensating fiber (DCF) as a dispersion medium. After through the DCF, the optical signal is converted into electrical signal by using photodetector (PD). For separate individual reflected sensor signal, the sliding correlation method was used. The proposed method improves the code interference and it also has advantages such as a large number of sensors, continuously measuring individual sensors, and decreasing the complexity of the sensor network.

  10. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    NASA Astrophysics Data System (ADS)

    Kotikalapudi, Sriram; Li, Chia-Chang; Magill, Peter D.; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A., Jr.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  11. WormBase: new content and better access

    PubMed Central

    Bieri, Tamberlyn; Blasiar, Darin; Ozersky, Philip; Antoshechkin, Igor; Bastiani, Carol; Canaran, Payan; Chan, Juancarlos; Chen, Nansheng; Chen, Wen J.; Davis, Paul; Fiedler, Tristan J.; Girard, Lisa; Han, Michael; Harris, Todd W.; Kishore, Ranjana; Lee, Raymond; McKay, Sheldon; Müller, Hans-Michael; Nakamura, Cecilia; Petcherski, Andrei; Rangarajan, Arun; Rogers, Anthony; Schindelman, Gary; Schwarz, Erich M.; Spooner, Will; Tuli, Mary Ann; Auken, Kimberly Van; Wang, Daniel; Wang, Xiaodong; Williams, Gary; Durbin, Richard; Stein, Lincoln D.; Sternberg, Paul W.; Spieth, John

    2007-01-01

    WormBase (), a model organism database for Caenorhabditis elegans and other related nematodes, continues to evolve and expand. Over the past year WormBase has added new data on C.elegans, including data on classical genetics, cell biology and functional genomics; expanded the annotation of closely related nematodes with a new genome browser for Caenorhabditis remanei; and deployed new hardware for stronger performance. Several existing datasets including phenotype descriptions and RNAi experiments have seen a large increase in new content. New datasets such as the C.remanei draft assembly and annotations, the Vancouver Fosmid library and TEC-RED 5′ end sites are now available as well. Access to and searching WormBase has become more dependable and flexible via multiple mirror sites and indexing through Google. PMID:17099234

  12. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  13. Permanent Access to the Seafloor Through Ocean Networks Canada - Key Discoveries From Nine Years of Data

    NASA Astrophysics Data System (ADS)

    Scherwath, Martin; Dewey, Richard; Heesemann, Martin; Thomsen, Laurenz; Purser, Autun; Roemer, Miriam; Xu, Guangyu

    2015-04-01

    Ocean Networks Canada operates ocean observatories and hosts data from the Canadian Pacific, Arctic and recently the Atlantic Ocean. The two prominent observatories are VENUS (Victoria Experimental Network Under the Sea), online since 2006, inshore from Vancouver Island in the Salish Sea, and NEPTUNE (North East Pacific Time-series Underwater Networked Experiments), offshore at the northern Cascadia margin across the Juan de Fuca Plate, online since 2009. Over 250 Terabytes of data have been collected and are openly and freely accessible. Geoscientific research has made use of these high-resolution permanent time series and started to quantify ocean and seafloor dynamics. For example, upward-looking echo-sounders quantify vertical migration of euphausiids (e.g. krill) in the water column, showing additional environment- and growth-related influence to the expected light intensity-related diel migration pattern; or camera observations quantify in-situ the speed of bacterial mat withering, clam movements and local anoxic region distribution changes; or rotating sonars show unprecedented long-term stability observations of a hydrothermal vent system and the sudden changes after a local earthquake, or at a gas hydrate field sonar data detect gas venting that has an amazingly specific tidal pressure correlation which hints at internal sediment processes in relation to gas hydrate dissociation; or a regional array of bottom pressure recorders has detected five major tsunami events which help fine-tune tsunami models for better hazard preparedness.

  14. Autonomous robot behavior based on neural networks

    NASA Astrophysics Data System (ADS)

    Grolinger, Katarina; Jerbic, Bojan; Vranjes, Bozo

    1997-04-01

    The purpose of autonomous robot is to solve various tasks while adapting its behavior to the variable environment, expecting it is able to navigate much like a human would, including handling uncertain and unexpected obstacles. To achieve this the robot has to be able to find solution to unknown situations, to learn experienced knowledge, that means action procedure together with corresponding knowledge on the work space structure, and to recognize working environment. The planning of the intelligent robot behavior presented in this paper implements the reinforcement learning based on strategic and random attempts for finding solution and neural network approach for memorizing and recognizing work space structure (structural assignment problem). Some of the well known neural networks based on unsupervised learning are considered with regard to the structural assignment problem. The adaptive fuzzy shadowed neural network is developed. It has the additional shadowed hidden layer, specific learning rule and initialization phase. The developed neural network combines advantages of networks based on the Adaptive Resonance Theory and using shadowed hidden layer provides ability to recognize lightly translated or rotated obstacles in any direction.

  15. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability... the devices and applications of their choice on the licensee's C Block network, except: (1) Insofar...

  16. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access requirements for Block C in the... § 27.16 Network access requirements for Block C in the 746-757 and 776-787 MHz bands. (a) Applicability... the devices and applications of their choice on the licensee's C Block network, except: (1) Insofar...

  17. Overlapping Community Detection based on Network Decomposition

    NASA Astrophysics Data System (ADS)

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-04-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.

  18. Overlapping Community Detection based on Network Decomposition

    PubMed Central

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-01-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms. PMID:27066904

  19. Overlapping Community Detection based on Network Decomposition.

    PubMed

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-01-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms. PMID:27066904

  20. Ontology-based federated data access to human studies information.

    PubMed

    Sim, Ida; Carini, Simona; Tu, Samson W; Detwiler, Landon T; Brinkley, James; Mollah, Shamim A; Burke, Karl; Lehmann, Harold P; Chakraborty, Swati; Wittkowski, Knut M; Pollock, Brad H; Johnson, Thomas M; Huser, Vojtech

    2012-01-01

    Human studies are one of the most valuable sources of knowledge in biomedical research, but data about their design and results are currently widely dispersed in siloed systems. Federation of these data is needed to facilitate large-scale data analysis to realize the goals of evidence-based medicine. The Human Studies Database project has developed an informatics infrastructure for federated query of human studies databases, using a generalizable approach to ontology-based data access. Our approach has three main components. First, the Ontology of Clinical Research (OCRe) provides the reference semantics. Second, a data model, automatically derived from OCRe into XSD, maintains semantic synchrony of the underlying representations while facilitating data acquisition using common XML technologies. Finally, the Query Integrator issues queries distributed over the data, OCRe, and other ontologies such as SNOMED in BioPortal. We report on a demonstration of this infrastructure on data acquired from institutional systems and from ClinicalTrials.gov. PMID:23304360

  1. Ontology-Based Federated Data Access to Human Studies Information

    PubMed Central

    Sim, Ida; Carini, Simona; Tu, Samson W.; Detwiler, Landon T.; Brinkley, James; Mollah, Shamim A.; Burke, Karl; Lehmann, Harold P.; Chakraborty, Swati; Wittkowski, Knut M.; Pollock, Brad H.; Johnson, Thomas M.; Huser, Vojtech

    2012-01-01

    Human studies are one of the most valuable sources of knowledge in biomedical research, but data about their design and results are currently widely dispersed in siloed systems. Federation of these data is needed to facilitate large-scale data analysis to realize the goals of evidence-based medicine. The Human Studies Database project has developed an informatics infrastructure for federated query of human studies databases, using a generalizable approach to ontology-based data access. Our approach has three main components. First, the Ontology of Clinical Research (OCRe) provides the reference semantics. Second, a data model, automatically derived from OCRe into XSD, maintains semantic synchrony of the underlying representations while facilitating data acquisition using common XML technologies. Finally, the Query Integrator issues queries distributed over the data, OCRe, and other ontologies such as SNOMED in BioPortal. We report on a demonstration of this infrastructure on data acquired from institutional systems and from ClinicalTrials.gov. PMID:23304360

  2. Development traumatic brain injury computer user interface for disaster area in Indonesia supported by emergency broadband access network.

    PubMed

    Sutiono, Agung Budi; Suwa, Hirohiko; Ohta, Toshizumi; Arifin, Muh Zafrullah; Kitamura, Yohei; Yoshida, Kazunari; Merdika, Daduk; Qiantori, Andri; Iskandar

    2012-12-01

    Disasters bring consequences of negative impacts on the environment and human life. One of the common cause of critical condition is traumatic brain injury (TBI), namely, epidural (EDH) and subdural hematoma (SDH), due to downfall hard things during earthquake. We proposed and analyzed the user response, namely neurosurgeon, general doctor/surgeon and nurse when they interacted with TBI computer interface. The communication systems was supported by TBI web based applications using emergency broadband access network with tethered balloon and simulated in the field trial to evaluate the coverage area. The interface consisted of demography data and multi tabs for anamnesis, treatment, follow up and teleconference interfaces. The interface allows neurosurgeon, surgeon/general doctors and nurses to entry the EDH and SDH patient's data during referring them on the emergency simulation and evaluated based on time needs and their understanding. The average time needed was obtained after simulated by Lenovo T500 notebook using mouse; 8-10 min for neurosurgeons, 12-15 min for surgeons/general doctors and 15-19 min for nurses. By using Think Pad X201 Tablet, the time needed for entry data was 5-7 min for neurosurgeon, 7-10 min for surgeons/general doctors and 12-16 min for nurses. We observed that the time difference was depending on the computer type and user literacy qualification as well as their understanding on traumatic brain injury, particularly for the nurses. In conclusion, there are five data classification for simply TBI GUI, namely, 1) demography, 2) specific anamnesis for EDH and SDH, 3) treatment action and medicine of TBI, 4) follow up data display and 5) teleneurosurgery for streaming video consultation. The type of computer, particularly tablet PC was more convenient and faster for entry data, compare to that computer mouse touched pad. Emergency broadband access network using tethered balloon is possible to be employed to cover the communications systems in

  3. Performance analysis of a proposed tightly-coupled medical instrument network based on CAN protocol.

    PubMed

    Mujumdar, Shantanu; Thongpithoonrat, Pongnarin; Gurkan, D; McKneely, Paul K; Chapman, Frank M; Merchant, Fatima

    2010-01-01

    Advances in medical devices and health care has been phenomenal during the recent years. Although medical device manufacturers have been improving their instruments, network connection of these instruments still rely on proprietary technologies. Even if the interface has been provided by the manufacturer (e.g., RS-232, USB, or Ethernet coupled with a proprietary API), there is no widely-accepted uniform data model to access data of various bedside instruments. There is a need for a common standard which allows for internetworking with the medical devices from different manufacturers. ISO/IEEE 11073 (X73) is a standard attempting to unify the interfaces of all medical devices. X73 defines a client access mechanism that would be implemented into the communication controllers (residing between an instrument and the network) in order to access/network patient data. On the other hand, MediCAN™ technology suite has been demonstrated with various medical instruments to achieve interfacing and networking with a similar goal in its open standardization approach. However, it provides a more generic definition for medical data to achieve flexibility for networking and client access mechanisms. The instruments are in turn becoming more sophisticated; however, the operation of an instrument is still expected to be locally done by authorized medical personnel. Unfortunately, each medical instrument has its unique proprietary API (application programming interface - if any) to provide automated and electronic access to monitoring data. Integration of these APIs requires an agreement with the manufacturers towards realization of interoperable health care networking. As long as the interoperability of instruments with a network is not possible, ubiquitous access to patient status is limited only to manual entry based systems. This paper demonstrates an attempt to realize an interoperable medical instrument interface for networking using MediCAN technology suite as an open

  4. Motion detection based on recurrent network dynamics

    PubMed Central

    Joukes, Jeroen; Hartmann, Till S.; Krekelberg, Bart

    2014-01-01

    The detection of visual motion requires temporal delays to compare current with earlier visual input. Models of motion detection assume that these delays reside in separate classes of slow and fast thalamic cells, or slow and fast synaptic transmission. We used a data-driven modeling approach to generate a model that instead uses recurrent network dynamics with a single, fixed temporal integration window to implement the velocity computation. This model successfully reproduced the temporal response dynamics of a population of motion sensitive neurons in macaque middle temporal area (MT) and its constituent parts matched many of the properties found in the motion processing pathway (e.g., Gabor-like receptive fields (RFs), simple and complex cells, spatially asymmetric excitation and inhibition). Reverse correlation analysis revealed that a simplified network based on first and second order space-time correlations of the recurrent model behaved much like a feedforward motion energy (ME) model. The feedforward model, however, failed to capture the full speed tuning and direction selectivity properties based on higher than second order space-time correlations typically found in MT. These findings support the idea that recurrent network connectivity can create temporal delays to compute velocity. Moreover, the model explains why the motion detection system often behaves like a feedforward ME network, even though the anatomical evidence strongly suggests that this network should be dominated by recurrent feedback. PMID:25565992

  5. Constructing a two bands optical code-division multiple-access network of bipolar optical access codecs using Walsh-coded liquid crystal modulators

    NASA Astrophysics Data System (ADS)

    Yen, Chih-Ta; Huang, Jen-Fa; Chih, Ping-En

    2014-08-01

    We propose and experimentally demonstrated the two bands optical code-division multiple-access (OCDMA) network over bipolar Walsh-coded liquid-crystal modulators (LCMs) and driven by green light and red light lasers. Achieving system performance depends on the construction of a decoder that implements a true bipolar correlation using only unipolar signals and intensity detection for each band. We took advantage of the phase delay characteristics of LCMs to construct a prototype optical coder/decoder (codec). Matched and unmatched Walsh signature codes were evaluated to detect correlations among multiuser data in the access network. By using LCMs, a red and green laser light source was spectrally encoded and the summed light dots were complementary decoded. Favorable contrast on auto- and cross-correlations indicates that binary information symbols can be properly recovered using a balanced photodetector.

  6. Network based high performance concurrent computing

    SciTech Connect

    Sunderam, V.S.

    1991-01-01

    The overall objectives of this project are to investigate research issues pertaining to programming tools and efficiency issues in network based concurrent computing systems. The basis for these efforts is the PVM project that evolved during my visits to Oak Ridge Laboratories under the DOE Faculty Research Participation program; I continue to collaborate with researchers at Oak Ridge on some portions of the project.

  7. Dissecting a Network-Based Education System

    ERIC Educational Resources Information Center

    Davis, Tiffany; Yoo, Seong-Moo; Pan, Wendi

    2005-01-01

    The Alabama Learning Exchange (ALEX; www.alex.state.al.us) is a network-based education system designed and implemented to help improve education in Alabama. It accomplishes this goal by providing a single location for the state's K-12 educators to find information that will help improve their classroom effectiveness. The ALEX system includes…

  8. The implementation of a standards based heterogeneous network

    SciTech Connect

    Eldridge, J.M.; Tolendino, L.F.

    1991-08-05

    Computer networks, supporting an organization's activities, are prevalent and very important to the organization's mission. Implementing a heterogenous organizational network allows the staff to select the computing environment that best supports their job requirements. This paper outlines the lessons learned implementing a heterogenous computer network based on networking standards such as TCP/IP and Ethernet. Such a network is a viable alternative to a proprietary, vendor supported network and can provide all the functionality customers expect in a computer network. 2 figs.

  9. Language Access Toolkit: An Organizing and Advocacy Resource for Community-Based Youth Programs

    ERIC Educational Resources Information Center

    Beyersdorf, Mark Ro

    2013-01-01

    Asian American Legal Defense and Education Fund (AALDEF) developed this language access toolkit to share the expertise and experiences of National Asian American Education Advocates Network (NAAEA) member organizations with other community organizations interested in developing language access campaigns. This toolkit includes an overview of…

  10. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  11. Experimental demonstration of cascaded AWG access network featuring bi-directional transmission and polarization multiplexing.

    PubMed

    Tsalamanis, Ioannis; Rochat, Etienne; Walker, Stuart; Parker, Michael; Holburn, D

    2004-03-01

    We present the first experimental demonstration of a bidirectional cascaded arrayed-waveguide grating (AWG) access network combining one NxN AWG in the central office with multiple 1xN AWG's at the distribution points, such as to individually address N(2) users with only N wavelengths. Downstream and upstream data share the same optical path. BER curves were measured using 2.5Gb/s data stream in each direction, and error free transmission achieved for downstream and upstream, with only 0.3dB power penalty for simultaneous transmission. The addition of two orthogonal polarization-multiplexed channels per wavelength doubled the number of possible end users. Error free transmission was achieved with simultaneous upstream and downstream transmission of a composite signal featuring eight 2.5Gb/s channels (2 polarizations x 4 wavelengths). PMID:19474883

  12. Isolated user security enhancement in optical code division multiple access network against eavesdropping

    NASA Astrophysics Data System (ADS)

    Jyoti, Vishav; Kaler, Rajinder Singh

    2012-09-01

    A novel virtual user system is modeled for enhancing the security of an optical code division multiple access (OCDMA) network. Although the OCDMA system implementing code shift keying (CSK) is secure against a conventional power detector, it is susceptible to differential eavesdropping. An analytical framework is developed for the CSK-OCDMA system to show eavesdropper's code interception performance for a single transmitting user in the presence of a virtual user. It is shown that the eavesdropper's probability of correct bit interception decreases from 7.1×10-1 to 1.85×10-5 with the inclusion of the virtual user. Furthermore, the results confirm that the proposed virtual user scheme increases the confidentiality of the CSK-OCDMA system and outperforms the conventional OCDMA scheme in terms of security.

  13. A nomadic access mechanism for enabling dynamic video surveillance over IEEE 802.15.4 networks

    NASA Astrophysics Data System (ADS)

    Garcia-Sanchez, Felipe; Garcia-Sanchez, Antonio-Javier; Losilla, Fernando; Garcia-Haro, Joan

    2010-12-01

    IEEE 802.15.4 networking technology is designed to be the common standard for integrating WSN applications in heterogeneous environments. However, applications considering mobile nodes along with strict temporal requirements, such as those required for video transmission, are an unexplored field for this technology. These applications involve different challenges and issues that the direct employment of the IEEE 802.15.4 standard does not resolve. Therefore, in this paper a cross-layer mechanism consisting of application and medium access arbitration is presented, enabling the efficient connection and operation of mobile nodes together with the transmission of video flows. The proposed mechanism is evaluated via simulation and its feasibility checked by means of a first prototype. The study of power consumption is also taken into account and so are the quality of service parameters and the human quality perception of the received video stream. The results obtained are presented and further discussed.

  14. Energy efficient medium access protocol for wireless medical body area sensor networks.

    PubMed

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process. PMID:23853128

  15. Packet transport network in metro

    NASA Astrophysics Data System (ADS)

    Huang, Feng; Yi, Xiaobo; Zhang, Hanzheng; Gong, Ping

    2008-11-01

    IP packet based services such as high speed internet, IP voice and IP video will be widely deployed in telecom network, which make transport network evolution to packet transport network. Characteristics of transport network and requirements of packet transport network are analyzed, T-MPLS/MPLS-TP based PTN technology is given and it will be used in metro (access, aggregation and core) network.

  16. Diffuse optical tomography based on multiple access coding

    NASA Astrophysics Data System (ADS)

    Wang, Xuefeng; Wang, Yuanqing; Su, Jinshan; Xu, Fan

    2016-04-01

    Diffuse optical tomography (DOT) has the advantages of being a non-invasive, non-radiation emitting and low-cost biological tissue imaging method, and many recent studies have employed this technology. By improving the spatial resolution and developing a new method for constantly improving the flexibility of the experimental device, the system can perform data acquisition rapidly and conveniently. We propose a method for rapid data acquisition based on multiple access coding; it can acquire data in parallel, and the system can greatly improve the temporal resolution of the data acquisition step in diffuse optical tomography thereafter. We simulate the encoding and decoding process of the source-detector pair and successfully isolate the source signal from mixed signals. The DOT image reconstruction highlight the effectiveness of the system.

  17. Formats and Network Protocols for Browser Access to 2D Raster Data

    NASA Astrophysics Data System (ADS)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  18. Novel anti-jamming technique for OCDMA network through FWM in SOA based wavelength converter

    NASA Astrophysics Data System (ADS)

    Jyoti, Vishav; Kaler, R. S.

    2013-06-01

    In this paper, we propose a novel anti-jamming technique for optical code division multiple access (OCDMA) network through four wave mixing (FWM) in semiconductor optical amplifier (SOA) based wavelength converter. OCDMA signal can be easily jammed with high power jamming signal. It is shown that wavelength conversion through four wave mixing in SOA has improved capability of jamming resistance. It is observed that jammer has no effect on OCDMA network even at high jamming powers by using the proposed technique.

  19. An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.

    PubMed

    Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  20. An Energy-efficient Rate Adaptive Media Access Protocol (RA-MAC) for Long-lived Sensor Networks

    PubMed Central

    Hu, Wen; Chen, Quanjun; Corke, Peter; O’Rourke, Damien

    2010-01-01

    We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application’s link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment. PMID:22219675

  1. Chromatin accessibility maps of chronic lymphocytic leukaemia identify subtype-specific epigenome signatures and transcription regulatory networks.

    PubMed

    Rendeiro, André F; Schmidl, Christian; Strefford, Jonathan C; Walewska, Renata; Davis, Zadie; Farlik, Matthias; Oscier, David; Bock, Christoph

    2016-01-01

    Chronic lymphocytic leukaemia (CLL) is characterized by substantial clinical heterogeneity, despite relatively few genetic alterations. To provide a basis for studying epigenome deregulation in CLL, here we present genome-wide chromatin accessibility maps for 88 CLL samples from 55 patients measured by the ATAC-seq assay. We also performed ChIPmentation and RNA-seq profiling for ten representative samples. Based on the resulting data set, we devised and applied a bioinformatic method that links chromatin profiles to clinical annotations. Our analysis identified sample-specific variation on top of a shared core of CLL regulatory regions. IGHV mutation status-which distinguishes the two major subtypes of CLL-was accurately predicted by the chromatin profiles and gene regulatory networks inferred for IGHV-mutated versus IGHV-unmutated samples identified characteristic differences between these two disease subtypes. In summary, we discovered widespread heterogeneity in the chromatin landscape of CLL, established a community resource for studying epigenome deregulation in leukaemia and demonstrated the feasibility of large-scale chromatin accessibility mapping in cancer cohorts and clinical research. PMID:27346425

  2. Entanglement distribution over quantum code-division multiple-access networks

    NASA Astrophysics Data System (ADS)

    Zhu, Chang-long; Yang, Nan; Liu, Yu-xi; Nori, Franco; Zhang, Jing

    2015-10-01

    We present a method for quantum entanglement distribution over a so-called code-division multiple-access network, in which two pairs of users share the same quantum channel to transmit information. The main idea of this method is to use different broadband chaotic phase shifts, generated by electro-optic modulators and chaotic Colpitts circuits, to encode the information-bearing quantum signals coming from different users and then recover the masked quantum signals at the receiver side by imposing opposite chaotic phase shifts. The chaotic phase shifts given to different pairs of users are almost uncorrelated due to the randomness of chaos and thus the quantum signals from different pair of users can be distinguished even when they are sent via the same quantum channel. It is shown that two maximally entangled states can be generated between two pairs of users by our method mediated by bright coherent lights, which can be more easily implemented in experiments compared with single-photon lights. Our method is robust under the channel noises if only the decay rates of the information-bearing fields induced by the channel noises are not quite high. Our study opens up new perspectives for addressing and transmitting quantum information in future quantum networks.

  3. US-Finland Planning Visit: Cooperative Research and Education Activities in Integrated Access Networks

    NASA Astrophysics Data System (ADS)

    Maclin, Arlene; University of Arizona-CIAN Collaboration; Aalto University in Finland Collaboration

    2011-03-01

    This planning grant visit sponsored by the NSF Office of International Science and Engineering occurred from October 3-10, 2010. The Dean of the School of Computer, Mathematical and Natural Sciences from Morgan State University (MSU), the PI and a faculty member from engineering at MSU along with a faculty member from the University of Arizona and two advanced level graduate students from the NSF-funded Center for Integrated Access Networks participated in this visit. The topic of novel low dimensional nano-materials was determined to be one possible area for future collaboration. As a result of this visit, a Materials World Network proposal has been submitted to the NSF involving MSU and CIAN in the US and Aalto University in Finland. A companion proposal on novel low dimensional nano- materials has also been submitted to the Academy of Finland. Another anticipated outcome of this collaboration of MSU with Aalto University and CIAN expands the outreach and diversity component to MSU, an institution serving largely an underrepresented minority student. Sponsor for this work was NSF # 1042309.

  4. Satellite range delay simulator for a matrix-switched time division multiple-access network simulator

    NASA Technical Reports Server (NTRS)

    Nagy, Lawrence A.

    1989-01-01

    The Systems Integration, Test, and Evaluation (SITE) facility at NASA Lewis Research Center is presently configured as a satellite-switched time division multiple access (SS-TDMA) network simulator. The purpose of SITE is to demonstrate and evaluate advanced communication satellite technologies, presently embodied by POC components developed under NASA contracts in addition to other hardware, such as ground terminals, designed and built in-house at NASA Lewis. Each ground terminal in a satellite communications system will experience a different aspect of the satellite's motion due mainly to daily tidal effects and station keeping, hence a different duration and rate of variation in the range delay. As a result of this and other effects such as local oscillator instability, each ground terminal must constantly adjust its transmit burst timing so that data bursts from separate ground terminals arrive at the satellite in their assigned time slots, preventing overlap and keeping the system in synchronism. On the receiving end, ground terminals must synchronize their local clocks using reference transmissions received through the satellite link. A feature of the SITE facility is its capability to simulate the varying propagation delays and associated Doppler frequency shifts that the ground terminals in the network have to cope with. Delay is achieved by means of two NASA Lewis designed and built range delay simulator (RDS) systems, each independently controlled locally with front panel switches or remotely by an experiment control and monitor (EC/M) computer.

  5. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    PubMed

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-01

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF). PMID:24921473

  6. Tools for Administration of a UNIX-Based Network

    NASA Technical Reports Server (NTRS)

    LeClaire, Stephen; Farrar, Edward

    2004-01-01

    Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.

  7. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  8. Energy latency tradeoffs for medium access and sleep scheduling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Gang, Lu

    Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient communication; however, latency remains an important concern for many applications that require fast response. The central thesis of this work is that energy efficient medium access and sleep scheduling mechanisms can be designed without necessarily sacrificing application-specific latency performance. We validate this thesis through results from four case studies that cover various aspects of medium access and sleep scheduling design in wireless sensor networks. Our first effort, DMAC, is to design an adaptive low latency and energy efficient MAC for data gathering to reduce the sleep latency. We propose staggered schedule, duty cycle adaptation, data prediction and the use of more-to-send packets to enable seamless packet forwarding under varying traffic load and channel contentions. Simulation and experimental results show significant energy savings and latency reduction while ensuring high data reliability. The second research effort, DESS, investigates the problem of designing sleep schedules in arbitrary network communication topologies to minimize the worst case end-to-end latency (referred to as delay diameter). We develop a novel graph-theoretical formulation, derive and analyze optimal solutions for the tree and ring topologies and heuristics for arbitrary topologies. The third study addresses the problem of minimum latency joint scheduling and routing (MLSR). By constructing a novel delay graph, the optimal joint scheduling and routing can be solved by M node-disjoint paths algorithm under multiple channel model. We further extended the algorithm to handle dynamic traffic changes and topology changes. A heuristic solution is proposed for MLSR under single channel interference. In the fourth study, EEJSPC, we first formulate a fundamental optimization problem that provides tunable

  9. Convolutional Neural Network Based dem Super Resolution

    NASA Astrophysics Data System (ADS)

    Chen, Zixuan; Wang, Xuewen; Xu, Zekai; Hou, Wenguang

    2016-06-01

    DEM super resolution is proposed in our previous publication to improve the resolution for a DEM on basis of some learning examples. Meanwhile, the nonlocal algorithm is introduced to deal with it and lots of experiments show that the strategy is feasible. In our publication, the learning examples are defined as the partial original DEM and their related high measurements due to this way can avoid the incompatibility between the data to be processed and the learning examples. To further extent the applications of this new strategy, the learning examples should be diverse and easy to obtain. Yet, it may cause the problem of incompatibility and unrobustness. To overcome it, we intend to investigate a convolutional neural network based method. The input of the convolutional neural network is a low resolution DEM and the output is expected to be its high resolution one. A three layers model will be adopted. The first layer is used to detect some features from the input, the second integrates the detected features to some compressed ones and the final step transforms the compressed features as a new DEM. According to this designed structure, some learning DEMs will be taken to train it. Specifically, the designed network will be optimized by minimizing the error of the output and its expected high resolution DEM. In practical applications, a testing DEM will be input to the convolutional neural network and a super resolution will be obtained. Many experiments show that the CNN based method can obtain better reconstructions than many classic interpolation methods.

  10. Based on asynchronous communication protocol of geographic space information service access mechanism research

    NASA Astrophysics Data System (ADS)

    Chen, G.; Zhao, J.; Gu, M.; Li, D.

    2014-04-01

    At present, the traditional way of accessing to classified network in geographic spatial information services is using network gatekeeper and firewall etc. to ensure public and classified network communications links. However, the physical isolation between classified network and public network is crossed, which is bound to cause classified network potential security hazard. In Yunnan province space Land dynamic monitoring integration project, it proposed the point to point text message communication protocol and asynchronous transmission mechanism. Using geo-spatial information encryption processing and data compression processing method, it reduced the risk of data sensitivity and monitored, namely to ensure data security, which realized geographic spatial information services data communication effectively between classified network and public network in the rigid field conditions.

  11. Network-based modular latent structure analysis

    PubMed Central

    2014-01-01

    Background High-throughput expression data, such as gene expression and metabolomics data, exhibit modular structures. Groups of features in each module follow a latent factor model, while between modules, the latent factors are quasi-independent. Recovering the latent factors can shed light on the hidden regulation patterns of the expression. The difficulty in detecting such modules and recovering the latent factors lies in the high dimensionality of the data, and the lack of knowledge in module membership. Methods Here we describe a method based on community detection in the co-expression network. It consists of inference-based network construction, module detection, and interacting latent factor detection from modules. Results In simulations, the method outperformed projection-based modular latent factor discovery when the input signals were not Gaussian. We also demonstrate the method's value in real data analysis. Conclusions The new method nMLSA (network-based modular latent structure analysis) is effective in detecting latent structures, and is easy to extend to non-linear cases. The method is available as R code at http://web1.sph.emory.edu/users/tyu8/nMLSA/. PMID:25435002

  12. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  13. Investigation of network-based information system model

    SciTech Connect

    Konrad, A.M.; Perez, M.; Rivera, J.; Rodriguez, Y.; Durst, M.J.; Merrill, D.W.; Holmes, H.H.

    1996-09-01

    The objective of the DOE-LBNL summer student research program in computer and information sciences focused on investigating database- based http-based information architectures, and implementation of a prototype using DOE`s Comprehensive Epidemiologic Data Resource (CEDR) metadata or Epidemiology Guide content. We were successful in identifying the components of such an information system, and appropriate configuration given the requirements, and in implementing a prototype. This work comprised investigation of various information systems architectures or variants, evaluation and selection of various tools, products, and packages, preparation of databases, database content, output formats, and graphical (World Wide Web- compatible) interfaces. We successfully prepared and demonstrated network access to content from both the CEDR structured documentation and from the DOD Epidemiology Guides (site archive records).

  14. Network-based recommendation algorithms: A review

    NASA Astrophysics Data System (ADS)

    Yu, Fei; Zeng, An; Gillard, Sébastien; Medo, Matúš

    2016-06-01

    Recommender systems are a vital tool that helps us to overcome the information overload problem. They are being used by most e-commerce web sites and attract the interest of a broad scientific community. A recommender system uses data on users' past preferences to choose new items that might be appreciated by a given individual user. While many approaches to recommendation exist, the approach based on a network representation of the input data has gained considerable attention in the past. We review here a broad range of network-based recommendation algorithms and for the first time compare their performance on three distinct real datasets. We present recommendation topics that go beyond the mere question of which algorithm to use-such as the possible influence of recommendation on the evolution of systems that use it-and finally discuss open research directions and challenges.

  15. Name-Based Address Mapping for Virtual Private Networks

    NASA Astrophysics Data System (ADS)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  16. Network-Based Protein Biomarker Discovery Platforms

    PubMed Central

    Kim, Minhyung

    2016-01-01

    The advances in mass spectrometry-based proteomics technologies have enabled the generation of global proteome data from tissue or body fluid samples collected from a broad spectrum of human diseases. Comparative proteomic analysis of global proteome data identifies and prioritizes the proteins showing altered abundances, called differentially expressed proteins (DEPs), in disease samples, compared to control samples. Protein biomarker candidates that can serve as indicators of disease states are then selected as key molecules among these proteins. Recently, it has been addressed that cellular pathways can provide better indications of disease states than individual molecules and also network analysis of the DEPs enables effective identification of cellular pathways altered in disease conditions and key molecules representing the altered cellular pathways. Accordingly, a number of network-based approaches to identify disease-related pathways and representative molecules of such pathways have been developed. In this review, we summarize analytical platforms for network-based protein biomarker discovery and key components in the platforms. PMID:27103885

  17. Novel MDM-PON scheme utilizing self-homodyne detection for high-speed/capacity access networks.

    PubMed

    Chen, Yuanxiang; Li, Juhao; Zhu, Paikun; Wu, Zhongying; Zhou, Peng; Tian, Yu; Ren, Fang; Yu, Jinyi; Ge, Dawei; Chen, Jingbiao; He, Yongqi; Chen, Zhangyuan

    2015-12-14

    In this paper, we propose a cost-effective, energy-saving mode-division-multiplexing passive optical network (MDM-PON) scheme utilizing self-homodyne detection for high-speed/capacity access network based on low modal-crosstalk few-mode fiber (FMF) and all-fiber mode multiplexer/demultiplexer (MUX/DEMUX). In the proposed scheme, one of the spatial modes is used to transmit a portion of signal carrier (namely pilot-tone) as the local oscillator (LO), while the others are used for signal-bearing channels. At the receiver, the pilot-tone and the signal can be separated without strong crosstalk and sent to the receiver for coherent detection. The spectral efficiency (SE) is significantly enhanced when multiple spatial channels are used. Meanwhile, the self-homodyne detection scheme can effectively suppress laser phase noise, which relaxes the requirement for the lasers line-width at the optical line terminal or optical network units (OLT/ONUs). The digital signal processing (DSP) at the receiver is also simplified since it removes the need for frequency offset compensation and complex phase correction, which reduces the computational complexity and energy consumption. Polarization division multiplexing (PDM) that offers doubled SE is also supported by the scheme. The proposed scheme is scalable to multi-wavelength application when wavelength MUX/DEMUX is utilized. Utilizing the proposed scheme, we demonstrate a proof of concept 4 × 40-Gb/s orthogonal frequency division multiplexing (OFDM) transmission over 55-km FMF using low modal-crosstalk two-mode FMF and MUX/DEMUX with error free operation. Compared with back to back case, less than 1-dB Q-factor penalty is observed after 55-km FMF of the four channels. Signal power and pilot-tone power are also optimized to achieve the optimal transmission performance. PMID:26698996

  18. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  19. Community detection based on network communicability

    NASA Astrophysics Data System (ADS)

    Estrada, Ernesto

    2011-03-01

    We propose a new method for detecting communities based on the concept of communicability between nodes in a complex network. This method, designated as N-ComBa K-means, uses a normalized version of the adjacency matrix to build the communicability matrix and then applies K-means clustering to find the communities in a graph. We analyze how this method performs for some pathological cases found in the analysis of the detection limit of communities and propose some possible solutions on the basis of the analysis of the ratio of local to global densities in graphs. We use four different quality criteria for detecting the best clustering and compare the new approach with the Girvan-Newman algorithm for the analysis of two "classical" networks: karate club and bottlenose dolphins. Finally, we analyze the more challenging case of homogeneous networks with community structure, for which the Girvan-Newman completely fails in detecting any clustering. The N-ComBa K-means approach performs very well in these situations and we applied it to detect the community structure in an international trade network of miscellaneous manufactures of metal having these characteristics. Some final remarks about the general philosophy of community detection are also discussed.

  20. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  1. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  2. Advanced obstacle avoidance for a laser based wheelchair using optimised Bayesian neural networks.

    PubMed

    Trieu, Hoang T; Nguyen, Hung T; Willey, Keith

    2008-01-01

    In this paper we present an advanced method of obstacle avoidance for a laser based intelligent wheelchair using optimized Bayesian neural networks. Three neural networks are designed for three separate sub-tasks: passing through a door way, corridor and wall following and general obstacle avoidance. The accurate usable accessible space is determined by including the actual wheelchair dimensions in a real-time map used as inputs to each networks. Data acquisitions are performed separately to collect the patterns required for specified sub-tasks. Bayesian frame work is used to determine the optimal neural network structure in each case. Then these networks are trained under the supervision of Bayesian rule. Experiment results showed that compare to the VFH algorithm our neural networks navigated a smoother path following a near optimum trajectory. PMID:19163454

  3. Bandwidth provisioning in infrastructure-based wireless networks employing directional antennas

    SciTech Connect

    Hasiviswanthan, Shiva; Zhao, Bo; Vasudevan, Sudarshan; Yrgaonkar, Bhuvan

    2009-01-01

    Motivated by the widespread proliferation of wireless networks employing directional antennas, we study the problem of provisioning bandwidth in such networks. Given a set of subscribers and one or more access points possessing directional antennas, we formalize the problem of orienting these antennas in two fundamental settings: (1) subscriber-centric, where the objective is to fairly allocate bandwidth among the subscribers and (2) provider-centric, where the objective is to maximize the revenue generated by satisfying the bandwidth requirements of subscribers. For both the problems, we first design algorithms for a network with only one access point working under the assumption that the number of antennas does not exceed the number of noninterfering channels. Using the well-regarded lexicographic max-min fair allocation as the objective for a subscriber-centric network, we present an optimum dynamic programming algorithm. For a provider-centric network, the allocation problem turns out to be NP-hard. We present a greedy heuristic based algorithm that guarantees almost half of the optimum revenue. We later enhance both these algorithms to operate in more general networks with multiple access points and no restrictions on the relative numbers of antennas and channels. A simulation-based evaluation using OPNET demonstrates the efficacy of our approaches and provides us further in insights into these problems.

  4. Xconf: a network-based image conferencing system.

    PubMed

    Lemkin, P F

    1993-02-01

    People often need to get together to share and discuss small amounts of image and textual data, but this is difficult when they are not located in the same place. One solution to this problem is Xconf, a multimedia computer conferencing groupware tool using existing national and international networks (the Internet). Simultaneous conferencing supports real-time interaction between multiple remote computer displays. Xconf multimedia may include conversational text, images, pointers to objects in images, and group execution of programs. Conferencing may take place with or without images. Interaction is tightly coupled with all users aware of global changes to the shared session and alternatively, individuals may monitor a specific subgroup of other users to concentrate on what they are discussing. Collaborative groups who have access to both computer networks and networked based X-Window System graphics displays can participate in a conference. Xconf is an X-Window "client" program which provides multimedia conferencing support for a group of X-Window displays. Because it is centralized, no software other than the standard X-Window System is required on any of the participants display systems. Key data structures and algorithms for image conferencing are present. PMID:8444025

  5. Query and Visualization of extremely large network datasets over the web using Quadtree based KML Regional Network Links

    SciTech Connect

    Dadi, Upendra; Liu, Cheng; Vatsavai, Raju

    2009-01-01

    Geographic data sets are often very large in size. Interactive visualization of such data at all scales is not easy because of the limited resolution of the monitors and inability of visualization applications to handle the volume of data. This is especially true for large vector datasets. The end user s experience is frequently unsatisfactory when exploring such data over the web using a naive application. Network bandwidth is another contributing factor to the low performance. In this paper, a Quadtree based technique to visualize extremely large spatial network datasets over the web is described. It involves using custom developed algorithms leveraging a PostGIS database as the data source and Google Earth as the visualization client. This methodology supports both point and range queries along with non-spatial queries. This methodology is demonstrated using a network dataset consisting of several million links. The methodology is based on using some of the powerful features of KML (Keyhole Markup Language). Keyhole Markup Language (KML) is an Open Geospatial Consortium (OGC) standard for displaying geospatial data on Earth browsers. One of the features of KML is the notion of Network Links. Using network links, a wide range of geospatial data sources such as geodatabases, static files and geospatial data services can be simultaneously accessed and visualized seamlessly. Using the network links combined with Level of Detail principle, view based rendering and intelligent server and client-side caching, scalability in visualizing extremely large spatial datasets can be achieved.

  6. Enhanced Access to Earth Science Data through Standards-based Web Services and Applications

    NASA Astrophysics Data System (ADS)

    Hiatt, S. H.; Hashimoto, H.; Melton, F. S.; Michaelis, A.; Milesi, C.; Nemani, R. R.; Votava, P.; Wang, W.

    2009-12-01

    The Terrestrial Observation and Prediction System (TOPS) at NASA Ames Research Center's Ecological Forecasting Lab generates a suite of gridded data products in near real-time that are designed to enhance management decisions related to floods, droughts, forest fires, human health, as well as crop, range, and forest production. Derived from the synthesis of satellite imagery, ground observations, and specialized ecosystem models, our data products hold great potential for supporting research and practical applications across a wide range of disciplines. In order to provide enhanced access to our data and to promote multidisciplinary collaboration we implement standards-based web services. We serve TOPS data conforming to the Open-source Project for a Network Data Access Protocol (OPeNDAP) which allows subsetting and distribution of large HDF or NetCDF datasets, complete with standards-based metadata. Additionally, we implement a standard Web Map Service (WMS) for visualization of geospatial data. To further extend the use of our data to a wider audience we build upon these web services to develop browser-based visualization and analysis tools. We use Asynchronous Javascript and XML (AJAX) techniques to build interactive web applications leveraging our web services. For example, our WMS provides the map image tiles used in our mapping client. Users can click on the map to query TOPS datasets and regional summaries via OPeNDAP, producing time-series charts allowing temporal analysis of environmental trends and associated phenomena. We present the TOPS Data Gateway and its components, highlighting how the use of open protocols and standards provides improved data access for our clients and research partners, encouraging data interoperability and multidisciplinary collaboration.

  7. WWW-based access to object-oriented clinical databases: the KHOSPAD project.

    PubMed

    Pinciroli, F; Portoni, L; Combi, C; Violante, F F

    1998-09-01

    KHOSPAD is a project aiming at improving the quality of the process of patient care concerning general practitioner-patient-hospital relationships, using current information and networking technologies. The studied application field is a cardiology division, with hemodynamic laboratory and the population of PTCA patients. Data related to PTCA patients are managed by ARCADIA, an object-oriented database management system developed for the considered clinical setting. We defined a remotely accessible view of ARCADIA medical record, suitable for general practitioners (GPs) caring patients after PTCA, during the follow-up period. Using a PC, a modem and Internet, an authorized GP can consult remotely the medical records of his PTCA patients. Main features of the application are related to the management and display of complex data, specifically characterized by multimedia and temporal features, based on an object-oriented temporal data model. PMID:9861510

  8. Model Based User's Access Requirement Analysis of E-Governance Systems

    NASA Astrophysics Data System (ADS)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  9. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    PubMed

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160

  10. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network

    PubMed Central

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160

  11. An anti-attack model based on complex network theory in P2P networks

    NASA Astrophysics Data System (ADS)

    Peng, Hao; Lu, Songnian; Zhao, Dandan; Zhang, Aixin; Li, Jianhua

    2012-04-01

    Complex network theory is a useful way to study many real systems. In this paper, an anti-attack model based on complex network theory is introduced. The mechanism of this model is based on a dynamic compensation process and a reverse percolation process in P2P networks. The main purpose of the paper is: (i) a dynamic compensation process can turn an attacked P2P network into a power-law (PL) network with exponential cutoff; (ii) a local healing process can restore the maximum degree of peers in an attacked P2P network to a normal level; (iii) a restoring process based on reverse percolation theory connects the fragmentary peers of an attacked P2P network together into a giant connected component. In this way, the model based on complex network theory can be effectively utilized for anti-attack and protection purposes in P2P networks.

  12. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    NASA Astrophysics Data System (ADS)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  13. Parallel access alignment network with barrel switch implementation for d-ordered vector elements

    NASA Technical Reports Server (NTRS)

    Barnes, George H. (Inventor)

    1980-01-01

    An alignment network between N parallel data input ports and N parallel data outputs includes a first and a second barrel switch. The first barrel switch fed by the N parallel input ports shifts the N outputs thereof and in turn feeds the N-1 input data paths of the second barrel switch according to the relationship X=k.sup.y modulo N wherein x represents the output data path ordering of the first barrel switch, y represents the input data path ordering of the second barrel switch, and k equals a primitive root of the number N. The zero (0) ordered output data path of the first barrel switch is fed directly to the zero ordered output port. The N-1 output data paths of the second barrel switch are connected to the N output ports in the reverse ordering of the connections between the output data paths of the first barrel switch and the input data paths of the second barrel switch. The second switch is controlled by a value m, which in the preferred embodiment is produced at the output of a ROM addressed by the value d wherein d represents the incremental spacing or distance between data elements to be accessed from the N input ports, and m is generated therefrom according to the relationship d=k.sup.m modulo N.

  14. Compact Interconnection Networks Based on Quantum Dots

    NASA Technical Reports Server (NTRS)

    Fijany, Amir; Toomarian, Nikzad; Modarress, Katayoon; Spotnitz, Matthew

    2003-01-01

    Architectures that would exploit the distinct characteristics of quantum-dot cellular automata (QCA) have been proposed for digital communication networks that connect advanced digital computing circuits. In comparison with networks of wires in conventional very-large-scale integrated (VLSI) circuitry, the networks according to the proposed architectures would be more compact. The proposed architectures would make it possible to implement complex interconnection schemes that are required for some advanced parallel-computing algorithms and that are difficult (and in many cases impractical) to implement in VLSI circuitry. The difficulty of implementation in VLSI and the major potential advantage afforded by QCA were described previously in Implementing Permutation Matrices by Use of Quantum Dots (NPO-20801), NASA Tech Briefs, Vol. 25, No. 10 (October 2001), page 42. To recapitulate: Wherever two wires in a conventional VLSI circuit cross each other and are required not to be in electrical contact with each other, there must be a layer of electrical insulation between them. This, in turn, makes it necessary to resort to a noncoplanar and possibly a multilayer design, which can be complex, expensive, and even impractical. As a result, much of the cost of designing VLSI circuits is associated with minimization of data routing and assignment of layers to minimize crossing of wires. Heretofore, these considerations have impeded the development of VLSI circuitry to implement complex, advanced interconnection schemes. On the other hand, with suitable design and under suitable operating conditions, QCA-based signal paths can be allowed to cross each other in the same plane without adverse effect. In principle, this characteristic could be exploited to design compact, coplanar, simple (relative to VLSI) QCA-based networks to implement complex, advanced interconnection schemes. The proposed architectures require two advances in QCA-based circuitry beyond basic QCA-based binary

  15. Generalized schemes for access and alignment of data in parallel processors with self-routing interconnection networks

    SciTech Connect

    Boppana, R.V.; Raghavendra, C.S. )

    1991-02-01

    In this paper the authors give a generalized solution to the problem of conflict-free access of various templates of data of a matrix, when they are stored in memory units in a parallel processor. The important features of the method are: compact representation of a skewing scheme, simple address computation, use of self- routing schemes to set up the interconnection network, and a general framework for the study of skewing schemes. In the method, each template access of interest will be a linear permutation on the processor address. The linear permutation involved determines the types of templates accessible. For parallel access of the most important templates, namely, row, column, main diagonal, and square blocks, the interconnection network needs to realize only the class of linear-complement permutations. It is known that with Benes or Omega as the interconnection network, one can efficiently self-route these permutations; this compares favorably with the schemes proposed by other researchers who assume that a cross bar is available for processor-memory interconnections. Hence, the approach given in the paper can be used to solve the data alignment problem for the existing parallel machines such as IBM RP3, Cedar multiprocessor, and NYU Ultracomputer. This is a generalized solution to the data skewing problem and encompasses the previous efforts by other researchers as special cases.

  16. Curation-Based Network Marketing: Strategies for Network Growth and Electronic Word-of-Mouth Diffusion

    ERIC Educational Resources Information Center

    Church, Earnie Mitchell, Jr.

    2013-01-01

    In the last couple of years, a new aspect of online social networking has emerged, in which the strength of social network connections is based not on social ties but mutually shared interests. This dissertation studies these "curation-based" online social networks (CBN) and their suitability for the diffusion of electronic word-of-mouth…

  17. Optimal halftoning for network-based imaging

    NASA Astrophysics Data System (ADS)

    Ostromoukhov, Victor

    2000-12-01

    In this contribution, we introduce a multiple depth progressive representation for network-based still and moving images. A simple quantization algorithm associated with this representation provides optimal image quality. By optimum, we mean the best possible visual quality for a given value of information under real life constraints such as physical, psychological , or legal constraints. A special variant of the algorithm, multi-depth coherent error diffusion, addresses a specific problem of temporal coherence between frames in moving images. The output produced with our algorithm is visually pleasant because its Fourier spectrum is close to the 'blue noise'.

  18. Email user ranking based on email networks

    NASA Astrophysics Data System (ADS)

    Tran, Quang Anh; Vu, Minh Tuan; Frater, Michael; Jiang, Frank

    2012-09-01

    In this paper, four spam-filtering approaches based on the mail networks: Clustering, Extended Clustering Coefficient, PageRank Algorithm and Weighted PageRank Algorithm are analyzed. We also propose a couple of fully worked-out datasets against which the experimental comparisons with the respect to the accuracy of email user ranking and spam filtering are conducted. The results indicate that PageRank algorithm and Extended Clustering Coefficient approaches are better than others. The rate of true detection is over 99.5% while the failed alarm remains below 0.5%.

  19. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  20. Adjacency Matrix-Based Transmit Power Allocation Strategies in Wireless Sensor Networks

    PubMed Central

    Consolini, Luca; Medagliani, Paolo; Ferrari, Gianluigi

    2009-01-01

    In this paper, we present an innovative transmit power control scheme, based on optimization theory, for wireless sensor networks (WSNs) which use carrier sense multiple access (CSMA) with collision avoidance (CA) as medium access control (MAC) protocol. In particular, we focus on schemes where several remote nodes send data directly to a common access point (AP). Under the assumption of finite overall network transmit power and low traffic load, we derive the optimal transmit power allocation strategy that minimizes the packet error rate (PER) at the AP. This approach is based on modeling the CSMA/CA MAC protocol through a finite state machine and takes into account the network adjacency matrix, depending on the transmit power distribution and determining the network connectivity. It will be then shown that the transmit power allocation problem reduces to a convex constrained minimization problem. Our results show that, under the assumption of low traffic load, the power allocation strategy, which guarantees minimal delay, requires the maximization of network connectivity, which can be equivalently interpreted as the maximization of the number of non-zero entries of the adjacency matrix. The obtained theoretical results are confirmed by simulations for unslotted Zigbee WSNs. PMID:22346705

  1. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    PubMed

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment. PMID:24787842

  2. KML-Based Access and Visualization of High Resolution LiDAR Topography

    NASA Astrophysics Data System (ADS)

    Crosby, C. J.; Blair, J. L.; Nandigam, V.; Memon, A.; Baru, C.; Arrowsmith, J. R.

    2008-12-01

    the user as a KML groundoverlay. The KML product enables users to quickly and easily visualize the DEMs in Google Earth. By combining internet-based LiDAR data processing with KML visualization products, users are able to execute computationally intensive data sub-setting, processing and visualization without having local access to computing resources, GIS software, or data processing expertise. Finally, GEON has partnered with the US Geological Survey to generate region-dependant network linked KML visualizations for large volumes of LiDAR derived hillshades of the Northern San Andreas fault system. These data, acquired by the NSF-funded GeoEarthScope project, offer an unprecedented look at active faults in the northern portion of the San Andreas system. Through the region-dependant network linked KML, users can seamlessly access 1 meter hillshades (both 315 and 45 degree sun angles) for the full 1400 square kilometer dataset, without downloading huge volumes of data. This type of data access has great utility for users ranging from earthquake scientists to K-12 educators who wish to introduce cutting edge real world data into their earth science lessons.

  3. Channel access schemes and fiber optic configurations for integrated-services local area networks. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Nassehi, M. Mehdi

    1987-01-01

    Local Area Networks are in common use for data communications and have enjoyed great success. Recently, there is a growing interest in using a single network to support many applications in addition to traditional data traffic. These additional applications introduce new requirements in terms of volume of traffic and real-time delivery of data which are not met by existing networks. To satisfy these requirements, a high-bandwidth tranmission medium, such as fiber optics, and a distributed channel access scheme for the efficient sharing of the bandwidth among the various applications are needed. As far as the throughput-delay requirements of the various application are concerned, a network structure along with a distributed channel access are proposed which incorporate appropriate scheduling policies for the transmission of outstanding messages on the network. A dynamic scheduling policy was devised which outperforms all existing policies in terms of minimizing the expected cost per message. A broadcast mechanism was devised for the efficient dissemination of all relevant information. Fiber optic technology is considered for the high-bandwidth transmisison medium.

  4. Spatial Access to Emergency Services in Low- and Middle-Income Countries: A GIS-Based Analysis.

    PubMed

    Tansley, Gavin; Schuurman, Nadine; Amram, Ofer; Yanchar, Natalie

    2015-01-01

    Injury is a leading cause of the global disease burden, accounting for 10 percent of all deaths worldwide. Despite 90 percent of these deaths occurring in low and middle-income countries (LMICs), the majority of trauma research and infrastructure development has taken place in high-income settings. Furthermore, although accessible services are of central importance to a mature trauma system, there remains a paucity of literature describing the spatial accessibility of emergency services in LMICs. Using data from the Service Provision Assessment component of the Demographic and Health Surveys of Namibia and Haiti we defined the capabilities of healthcare facilities in each country in terms of their preparedness to provide emergency services. A Geographic Information System-based network analysis method was used to define 5- 10- and 50-kilometer catchment areas for all facilities capable of providing 24-hour care, higher-level resuscitative services or tertiary care. The proportion of a country's population with access to each level of service was obtained by amalgamating the catchment areas with a population layer. A significant proportion of the population of both countries had poor spatial access to lower level services with 25% of the population of Haiti and 51% of the population of Namibia living further than 50 kilometers from a facility capable of providing 24-hour care. Spatial access to tertiary care was considerably lower with 51% of Haitians and 72% of Namibians having no access to these higher-level services within 50 kilometers. These results demonstrate a significant disparity in potential spatial access to emergency services in two LMICs compared to analogous estimates from high-income settings, and suggest that strengthening the capabilities of existing facilities may improve the equity of emergency services in these countries. Routine collection of georeferenced patient and facility data in LMICs will be important to understanding how spatial access

  5. Spatial Access to Emergency Services in Low- and Middle-Income Countries: A GIS-Based Analysis

    PubMed Central

    Tansley, Gavin; Schuurman, Nadine; Amram, Ofer; Yanchar, Natalie

    2015-01-01

    Injury is a leading cause of the global disease burden, accounting for 10 percent of all deaths worldwide. Despite 90 percent of these deaths occurring in low and middle-income countries (LMICs), the majority of trauma research and infrastructure development has taken place in high-income settings. Furthermore, although accessible services are of central importance to a mature trauma system, there remains a paucity of literature describing the spatial accessibility of emergency services in LMICs. Using data from the Service Provision Assessment component of the Demographic and Health Surveys of Namibia and Haiti we defined the capabilities of healthcare facilities in each country in terms of their preparedness to provide emergency services. A Geographic Information System-based network analysis method was used to define 5- 10- and 50-kilometer catchment areas for all facilities capable of providing 24-hour care, higher-level resuscitative services or tertiary care. The proportion of a country’s population with access to each level of service was obtained by amalgamating the catchment areas with a population layer. A significant proportion of the population of both countries had poor spatial access to lower level services with 25% of the population of Haiti and 51% of the population of Namibia living further than 50 kilometers from a facility capable of providing 24-hour care. Spatial access to tertiary care was considerably lower with 51% of Haitians and 72% of Namibians having no access to these higher-level services within 50 kilometers. These results demonstrate a significant disparity in potential spatial access to emergency services in two LMICs compared to analogous estimates from high-income settings, and suggest that strengthening the capabilities of existing facilities may improve the equity of emergency services in these countries. Routine collection of georeferenced patient and facility data in LMICs will be important to understanding how spatial

  6. Network model of bilateral power markets based on complex networks

    NASA Astrophysics Data System (ADS)

    Wu, Yang; Liu, Junyong; Li, Furong; Yan, Zhanxin; Zhang, Li

    2014-06-01

    The bilateral power transaction (BPT) mode becomes a typical market organization with the restructuring of electric power industry, the proper model which could capture its characteristics is in urgent need. However, the model is lacking because of this market organization's complexity. As a promising approach to modeling complex systems, complex networks could provide a sound theoretical framework for developing proper simulation model. In this paper, a complex network model of the BPT market is proposed. In this model, price advantage mechanism is a precondition. Unlike other general commodity transactions, both of the financial layer and the physical layer are considered in the model. Through simulation analysis, the feasibility and validity of the model are verified. At same time, some typical statistical features of BPT network are identified. Namely, the degree distribution follows the power law, the clustering coefficient is low and the average path length is a bit long. Moreover, the topological stability of the BPT network is tested. The results show that the network displays a topological robustness to random market member's failures while it is fragile against deliberate attacks, and the network could resist cascading failure to some extent. These features are helpful for making decisions and risk management in BPT markets.

  7. Fast surface design based on sketched networks

    NASA Astrophysics Data System (ADS)

    van Dijk, Casper G. C.

    1992-11-01

    Computer aided design of freeformed surfaces is strongly biased towards input and optimization of surfaces. Input modules are based on digitizing drawings or placing and manipulating spline control vertices. Design, especially during the idea generation (or conceptual) design phase, is poorly supported. We present a system based on direct manipulation of shaded images of the surfaces. The designer sketches profiles on a tablet. The profiles are positioned in object space with a spaceball (6D joystick). A network of crossing curves is built interactively. The system constructs patches over this network in realtime. The designer can correct a profile by sketching. The affected surfaces are updated immediately. Patches are defined by the curves and estimated cross-boundary derivatives. They connect with G1 continuity. Our prototype surface modeler avoids the need for exact dimensions and precise coordinates, as seen in traditional systems. Instead, it supports fast, intuitive generation and evaluation of surfaces. We discuss a comparison with other systems regarding the time needed to model shapes, and some opinions of professional industrial designers.

  8. Paper-based synthetic gene networks.

    PubMed

    Pardee, Keith; Green, Alexander A; Ferrante, Tom; Cameron, D Ewen; DaleyKeyser, Ajay; Yin, Peng; Collins, James J

    2014-11-01

    Synthetic gene networks have wide-ranging uses in reprogramming and rewiring organisms. To date, there has not been a way to harness the vast potential of these networks beyond the constraints of a laboratory or in vivo environment. Here, we present an in vitro paper-based platform that provides an alternate, versatile venue for synthetic biologists to operate and a much-needed medium for the safe deployment of engineered gene circuits beyond the lab. Commercially available cell-free systems are freeze dried onto paper, enabling the inexpensive, sterile, and abiotic distribution of synthetic-biology-based technologies for the clinic, global health, industry, research, and education. For field use, we create circuits with colorimetric outputs for detection by eye and fabricate a low-cost, electronic optical interface. We demonstrate this technology with small-molecule and RNA actuation of genetic switches, rapid prototyping of complex gene circuits, and programmable in vitro diagnostics, including glucose sensors and strain-specific Ebola virus sensors. PMID:25417167

  9. Paper-based Synthetic Gene Networks

    PubMed Central

    Pardee, Keith; Green, Alexander A.; Ferrante, Tom; Cameron, D. Ewen; DaleyKeyser, Ajay; Yin, Peng; Collins, James J.

    2014-01-01

    Synthetic gene networks have wide-ranging uses in reprogramming and rewiring organisms. To date, there has not been a way to harness the vast potential of these networks beyond the constraints of a laboratory or in vivo environment. Here, we present an in vitro paper-based platform that provides a new venue for synthetic biologists to operate, and a much-needed medium for the safe deployment of engineered gene circuits beyond the lab. Commercially available cell-free systems are freeze-dried onto paper, enabling the inexpensive, sterile and abiotic distribution of synthetic biology-based technologies for the clinic, global health, industry, research and education. For field use, we create circuits with colorimetric outputs for detection by eye, and fabricate a low-cost, electronic optical interface. We demonstrate this technology with small molecule and RNA actuation of genetic switches, rapid prototyping of complex gene circuits, and programmable in vitro diagnostics, including glucose sensors and strain-specific Ebola virus sensors. PMID:25417167

  10. Performance evaluation of multilevel modulation formats using partial response for capacity upgrade in access network with limited electronic bandwidth

    NASA Astrophysics Data System (ADS)

    Madsen, Peter; Frejstrup Suhr, Lau; Sebastian Rodriguez, Juan; Tafur Monroy, Idelfonso; Vegas Olmos, Juan José

    2016-09-01

    We present a successful experimental evaluation of 4 level Pulse Amplitude Modulation (4-PAM) and Duobinary modulation. An experimental performance evaluation is presented for Duobinary 4 PAM and other modulation formats. All modulation formants used, may be considered to be implemented in future Passive Optical Network (PON) class access networks with limited electrical bandwidth. We compared NRZ, Duobinary, 4-PAM and Duobinary 4-PAM operating at 9 Gbaud over 20 km single mode fiber. The results provides an insight and guidelines on the utilization of these advanced modulation formats.

  11. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks. PMID:16340094

  12. Utilizing self-seeding RSOA with Faraday rotator mirror for colorless access network

    NASA Astrophysics Data System (ADS)

    Wu, Yu-Fu; Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung

    2014-09-01

    In this paper, we propose and demonstrate a self-seeding 1.2 GHz RSOA-based laser by employing 3.5 Gbit/s orthogonal-frequency-division-multiplexing quadrature-amplitude-modulation (OFDM-QAM) with bit-loading algorithm for upstream traffic in a colorless WDM-PON access. To achieve 3.5 Gbit/s traffic data rate and accomplish the forward error correction (FEC) threshold [bit error rate (BER) = 3.8 x 10-3], a Faraday rotator mirror (FRM) is used to perform self-seeding operation in this experiment. Here, the power penalty is about 2.59 dB at the wavelength of 1550.0 nm wavelength in a 20 km single mode fiber (SMF) transmission. Moreover, the measured BER performances of proposed laser are also discussed and analyzed, while the fiber mirror (FM) is used to replace the FRM in this experiment.

  13. Mesh deformation based on artificial neural networks

    NASA Astrophysics Data System (ADS)

    Stadler, Domen; Kosel, Franc; Čelič, Damjan; Lipej, Andrej

    2011-09-01

    In the article a new mesh deformation algorithm based on artificial neural networks is introduced. This method is a point-to-point method, meaning that it does not use connectivity information for calculation of the mesh deformation. Two already known point-to-point methods, based on interpolation techniques, are also presented. In contrast to the two known interpolation methods, the new method does not require a summation over all boundary nodes for one displacement calculation. The consequence of this fact is a shorter computational time of mesh deformation, which is proven by different deformation tests. The quality of the deformed meshes with all three deformation methods was also compared. Finally, the generated and the deformed three-dimensional meshes were used in the computational fluid dynamics numerical analysis of a Francis water turbine. A comparison of the analysis results was made to prove the applicability of the new method in every day computation.

  14. The GEOSS Clearinghouse based on the GeoNetwork opensource

    NASA Astrophysics Data System (ADS)

    Liu, K.; Yang, C.; Wu, H.; Huang, Q.

    2010-12-01

    The Global Earth Observation System of Systems (GEOSS) is established to support the study of the Earth system in a global community. It provides services for social management, quick response, academic research, and education. The purpose of GEOSS is to achieve comprehensive, coordinated and sustained observations of the Earth system, improve monitoring of the state of the Earth, increase understanding of Earth processes, and enhance prediction of the behavior of the Earth system. In 2009, GEO called for a competition for an official GEOSS clearinghouse to be selected as a source to consolidating catalogs for Earth observations. The Joint Center for Intelligent Spatial Computing at George Mason University worked with USGS to submit a solution based on the open-source platform - GeoNetwork. In the spring of 2010, the solution is selected as the product for GEOSS clearinghouse. The GEOSS Clearinghouse is a common search facility for the Intergovernmental Group on Ea rth Observation (GEO). By providing a list of harvesting functions in Business Logic, GEOSS clearinghouse can collect metadata from distributed catalogs including other GeoNetwork native nodes, webDAV/sitemap/WAF, catalog services for the web (CSW)2.0, GEOSS Component and Service Registry (http://geossregistries.info/), OGC Web Services (WCS, WFS, WMS and WPS), OAI Protocol for Metadata Harvesting 2.0, ArcSDE Server and Local File System. Metadata in GEOSS clearinghouse are managed in a database (MySQL, Postgresql, Oracle, or MckoiDB) and an index of the metadata is maintained through Lucene engine. Thus, EO data, services, and related resources can be discovered and accessed. It supports a variety of geospatial standards including CSW and SRU for search, FGDC and ISO metadata, and WMS related OGC standards for data access and visualization, as linked from the metadata.

  15. Architecture and System Engineering Development Study of Space-Based Satellite Networks for NASA Missions

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2003-01-01

    Traditional NASA missions, both near Earth and deep space, have been stovepipe in nature and point-to-point in architecture. Recently, NASA and others have conceptualized missions that required space-based networking. The notion of networks in space is a drastic shift in thinking and requires entirely new architectures, radio systems (antennas, modems, and media access), and possibly even new protocols. A full system engineering approach for some key mission architectures will occur that considers issues such as the science being performed, stationkeeping, antenna size, contact time, data rates, radio-link power requirements, media access techniques, and appropriate networking and transport protocols. This report highlights preliminary architecture concepts and key technologies that will be investigated.

  16. Rumor diffusion in an interests-based dynamic social network.

    PubMed

    Tang, Mingsheng; Mao, Xinjun; Guessoum, Zahia; Zhou, Huiping

    2013-01-01

    To research rumor diffusion in social friend network, based on interests, a dynamic friend network is proposed, which has the characteristics of clustering and community, and a diffusion model is also proposed. With this friend network and rumor diffusion model, based on the zombie-city model, some simulation experiments to analyze the characteristics of rumor diffusion in social friend networks have been conducted. The results show some interesting observations: (1) positive information may evolve to become a rumor through the diffusion process that people may modify the information by word of mouth; (2) with the same average degree, a random social network has a smaller clustering coefficient and is more beneficial for rumor diffusion than the dynamic friend network; (3) a rumor is spread more widely in a social network with a smaller global clustering coefficient than in a social network with a larger global clustering coefficient; and (4) a network with a smaller clustering coefficient has a larger efficiency. PMID:24453911

  17. Rumor Diffusion in an Interests-Based Dynamic Social Network

    PubMed Central

    Mao, Xinjun; Guessoum, Zahia; Zhou, Huiping

    2013-01-01

    To research rumor diffusion in social friend network, based on interests, a dynamic friend network is proposed, which has the characteristics of clustering and community, and a diffusion model is also proposed. With this friend network and rumor diffusion model, based on the zombie-city model, some simulation experiments to analyze the characteristics of rumor diffusion in social friend networks have been conducted. The results show some interesting observations: (1) positive information may evolve to become a rumor through the diffusion process that people may modify the information by word of mouth; (2) with the same average degree, a random social network has a smaller clustering coefficient and is more beneficial for rumor diffusion than the dynamic friend network; (3) a rumor is spread more widely in a social network with a smaller global clustering coefficient than in a social network with a larger global clustering coefficient; and (4) a network with a smaller clustering coefficient has a larger efficiency. PMID:24453911

  18. Measuring Accessibility for Inclusive Development: A Census Based Index

    ERIC Educational Resources Information Center

    Bisht, Shailendra Singh; Mishra, Vishal; Fuloria, Sanjay

    2010-01-01

    State is often involved in the challenging process of judicious allocation and apportioning of resources for an inclusive growth through creating infrastructure and ensuring accessibility- the "ability of the people to reach and engage in opportunities and activities". The issue at the heart of the debate concerns with the "opportunities"…

  19. Android-based access to holistic emergency care record.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2013-01-01

    This paper is concerned with the development of an Emergency Medical Services (EMS) system which interfaces with a Holistic Emergency Care Record (HECR) that aims at managing emergency care holistically by supporting EMS processes and is accessible by Android-enabled mobile devices. PMID:23823406

  20. Browser-Based Accessibility Evaluation Tools for Beginners

    ERIC Educational Resources Information Center

    McHale, Nina

    2011-01-01

    There are hundreds of Web accessibility software options out in the world that serve many different functions. Not surprisingly, many of them are designed for users with a wide range of abilities, with the intent of making the use of computers and the Internet easier for both work and entertainment. There are, however, numerous products available…

  1. Reconfiguring waveguide-gratings-based M-signature codecs to enhance OCDMA network confidentiality

    NASA Astrophysics Data System (ADS)

    Huang, Jen-Fa; Chen, Kai-Sheng; Lin, Ying-Chen; Li, Chung-Yu

    2014-02-01

    A reconfiguration scheme based on composite signature codes over waveguide-gratings-based optical code-division multiple-access (OCDMA) network coder/decoders (codecs) is proposed in the paper. By using central control node to monitor network traffic condition and reconfigure the composite signature codes made up of maximal-length sequence (M-sequence) component codes and random changing the signature codes assigned for each user to improve the confidentiality performance in an OCDMA system. The proposed scheme is analyzed with some practical eavesdroppers' attacks.

  2. Best Practices for Making Scientific Data Discoverable and Accessible through Integrated, Standards-Based Data Portals

    NASA Astrophysics Data System (ADS)

    Lucido, J. M.

    2013-12-01

    Scientists in the fields of hydrology, geophysics, and climatology are increasingly using the vast quantity of publicly-available data to address broadly-scoped scientific questions. For example, researchers studying contamination of nearshore waters could use a combination of radar indicated precipitation, modeled water currents, and various sources of in-situ monitoring data to predict water quality near a beach. In discovering, gathering, visualizing and analyzing potentially useful data sets, data portals have become invaluable tools. The most effective data portals often aggregate distributed data sets seamlessly and allow multiple avenues for accessing the underlying data, facilitated by the use of open standards. Additionally, adequate metadata are necessary for attribution, documentation of provenance and relating data sets to one another. Metadata also enable thematic, geospatial and temporal indexing of data sets and entities. Furthermore, effective portals make use of common vocabularies for scientific methods, units of measure, geologic features, chemical, and biological constituents as they allow investigators to correctly interpret and utilize data from external sources. One application that employs these principles is the National Ground Water Monitoring Network (NGWMN) Data Portal (http://cida.usgs.gov/ngwmn), which makes groundwater data from distributed data providers available through a single, publicly accessible web application by mediating and aggregating native data exposed via web services on-the-fly into Open Geospatial Consortium (OGC) compliant service output. That output may be accessed either through the map-based user interface or through the aforementioned OGC web services. Furthermore, the Geo Data Portal (http://cida.usgs.gov/climate/gdp/), which is a system that provides users with data access, subsetting and geospatial processing of large and complex climate and land use data, exemplifies the application of International Standards

  3. Accessing integrated genomic data using GenoBase: A tutorial, Part 1

    SciTech Connect

    Overbeek, R.; Price, M.

    1993-01-01

    GenoBase integrates genomic information from many existing databases, offering convenient access to the curated data. This document is the first part of a two-part tutorial on how to use GenoBase for accessing integrated genomic data.

  4. Accessibility and Usability of Web-Based Library Databases for Non-Visual Users.

    ERIC Educational Resources Information Center

    Byerley, Suzanne L.; Chambers, Mary Beth

    2002-01-01

    Examined the accessibility of two Web-based abstracting and indexing services by blind users using screen-reading programs based on guidelines from the Rehabilitation Act of 1973 and Web Content Accessibility Guidelines by the WWW Consortium. Suggests Web developers need to conduct usability testing and librarians need to be aware of accessibility…

  5. Access channels and methanol binding site to the CaMn4 cluster in Photosystem II based on solvent accessibility simulations, with implications for substrate water access.

    PubMed

    Ho, Felix M; Styring, Stenbjörn

    2008-02-01

    Given the tightly packed environment of Photosystem II (PSII), channels are expected to exist within the protein to allow the movement of small molecules to and from the oxygen evolving centre. In this report, we calculate solvent contact surfaces from the PSII crystal structures to identify such access channels for methanol and water molecules. In a previous study of the effects of methanol on the EPR split S1-, S3-, and S0-signals [Su et al. (2006) Biochemistry 45, 7617-7627], we proposed that methanol binds to one and the same Mn ion in all S-states. We find here that while channels of methanol dimensions were able to make contact with the CaMn4 cluster, only 3Mn and 4Mn were accessible to methanol. Combining this observation with spectroscopic data in the literature, we propose that 3Mn is the ion to which methanol binds. Furthermore, by calculating solvent contact surfaces for water, we found analogous and more extensive water accessible channels within PSII. On the basis of their structure, orientation, and electrostatic properties, we propose functional assignments of these channels as passages for substrate water access to the CaMn4 cluster, and for the exit of O2 and H+ that are released during water oxidation. Finally, we discuss the possible existence of a gating mechanism for the control of substrate water access to the CaMn4 cluster, based on the observation of a gap within the channel system that is formed by Ca2+ and several mechanistically very significant residues in the vicinity of the cluster. PMID:17964532

  6. Set processing in a network environment. [data bases and magnetic disks and tapes

    NASA Technical Reports Server (NTRS)

    Hardgrave, W. T.

    1975-01-01

    A combination of a local network, a mass storage system, and an autonomous set processor serving as a data/storage management machine is described. Its characteristics include: content-accessible data bases usable from all connected devices; efficient storage/access of large data bases; simple and direct programming with data manipulation and storage management handled by the set processor; simple data base design and entry from source representation to set processor representation with no predefinition necessary; capability available for user sort/order specification; significant reduction in tape/disk pack storage and mounts; flexible environment that allows upgrading hardware/software configuration without causing major interruptions in service; minimal traffic on data communications network; and improved central memory usage on large processors.

  7. NetCoDer: A Retransmission Mechanism for WSNs Based on Cooperative Relays and Network Coding.

    PubMed

    Valle, Odilson T; Montez, Carlos; Medeiros de Araujo, Gustavo; Vasques, Francisco; Moraes, Ricardo

    2016-01-01

    Some of the most difficult problems to deal with when using Wireless Sensor Networks (WSNs) are related to the unreliable nature of communication channels. In this context, the use of cooperative diversity techniques and the application of network coding concepts may be promising solutions to improve the communication reliability. In this paper, we propose the NetCoDer scheme to address this problem. Its design is based on merging cooperative diversity techniques and network coding concepts. We evaluate the effectiveness of the NetCoDer scheme through both an experimental setup with real WSN nodes and a simulation assessment, comparing NetCoDer performance against state-of-the-art TDMA-based (Time Division Multiple Access) retransmission techniques: BlockACK, Master/Slave and Redundant TDMA. The obtained results highlight that the proposed NetCoDer scheme clearly improves the network performance when compared with other retransmission techniques. PMID:27258280

  8. NetCoDer: A Retransmission Mechanism for WSNs Based on Cooperative Relays and Network Coding

    PubMed Central

    Valle, Odilson T.; Montez, Carlos; Medeiros de Araujo, Gustavo; Vasques, Francisco; Moraes, Ricardo

    2016-01-01

    Some of the most difficult problems to deal with when using Wireless Sensor Networks (WSNs) are related to the unreliable nature of communication channels. In this context, the use of cooperative diversity techniques and the application of network coding concepts may be promising solutions to improve the communication reliability. In this paper, we propose the NetCoDer scheme to address this problem. Its design is based on merging cooperative diversity techniques and network coding concepts. We evaluate the effectiveness of the NetCoDer scheme through both an experimental setup with real WSN nodes and a simulation assessment, comparing NetCoDer performance against state-of-the-art TDMA-based (Time Division Multiple Access) retransmission techniques: BlockACK, Master/Slave and Redundant TDMA. The obtained results highlight that the proposed NetCoDer scheme clearly improves the network performance when compared with other retransmission techniques. PMID:27258280

  9. Network design consideration of a satellite-based mobile communications system

    NASA Technical Reports Server (NTRS)

    Yan, T.-Y.

    1986-01-01

    Technical considerations for the Mobile Satellite Experiment (MSAT-X), the ground segment testbed for the low-cost spectral efficient satellite-based mobile communications technologies being developed for the 1990's, are discussed. The Network Management Center contains a flexible resource sharing algorithm, the Demand Assigned Multiple Access scheme, which partitions the satellite transponder bandwidth among voice, data, and request channels. Satellite use of multiple UHF beams permits frequency reuse. The backhaul communications and the Telemetry, Tracking and Control traffic are provided through a single full-coverage SHF beam. Mobile Terminals communicate with the satellite using UHF. All communications including SHF-SHF between Base Stations and/or Gateways, are routed through the satellite. Because MSAT-X is an experimental network, higher level network protocols (which are service-specific) will be developed only to test the operation of the lowest three levels, the physical, data link, and network layers.

  10. Secure mobile agent for telemedicine based on P2P networks.

    PubMed

    Hsu, Wen-Shin; Pan, Jiann-I

    2013-06-01

    Exploring intelligent mobile agent (MA) technology for assisting medical services or transmitting personal patient-health information in telemedicine applications has been widely investigated. Conversely, peer-to-peer (P2P) networking has become one of the most popular applications used in the Internet because of its benefits for easy-to-manage resources and because it balances workloads. Therefore, constructing an agent-based telemedicine platform based on P2P networking architecture is necessary. The main purpose of this paper is to construct a safe agent-based telemedicine that based on P2P networking architecture. Two themes are addressed in this paper: (a) the P2P network architecture for an agent-based telemedicine service, and (b) the security mechanisms for the proposed telemedicine networking architecture. When an MA contains patient information and migrates from one host to another through the Internet, it can be attacked by other software agents or agent platforms that can illegally access patient information. The proposed P2P network architecture is based on the JXTA protocol and provides two types of telemedicine service models: the predictable service model and unpredictable service model. This architecture employs a two-layer safety mechanism for MAs (i.e., time-limited black boxes and RSA undetachable signature technologies), to provide a secure solution for agent-based telemedicine services. PMID:23605144

  11. DEM interpolation based on artificial neural networks

    NASA Astrophysics Data System (ADS)

    Jiao, Limin; Liu, Yaolin

    2005-10-01

    This paper proposed a systemic resolution scheme of Digital Elevation model (DEM) interpolation based on Artificial Neural Networks (ANNs). In this paper, we employ BP network to fit terrain surface, and then detect and eliminate the samples with gross errors. This paper uses Self-organizing Feature Map (SOFM) to cluster elevation samples. The study area is divided into many more homogenous tiles after clustering. BP model is employed to interpolate DEM in each cluster. Because error samples are eliminated and clusters are built, interpolation result is better. The case study indicates that ANN interpolation scheme is feasible. It also shows that ANN can get a more accurate result by comparing ANN with polynomial and spline interpolation. ANN interpolation doesn't need to determine the interpolation function beforehand, so manmade influence is lessened. The ANN interpolation is more automatic and intelligent. At the end of the paper, we propose the idea of constructing ANN surface model. This model can be used in multi-scale DEM visualization, and DEM generalization, etc.

  12. Network video transmission system based on SOPC

    NASA Astrophysics Data System (ADS)

    Zhang, Zhengbing; Deng, Huiping; Xia, Zhenhua

    2008-03-01

    Video systems have been widely used in many fields such as conferences, public security, military affairs and medical treatment. With the rapid development of FPGA, SOPC has been paid great attentions in the area of image and video processing in recent years. A network video transmission system based on SOPC is proposed in this paper for the purpose of video acquisition, video encoding and network transmission. The hardware platform utilized to design the system is an SOPC board of model Altera's DE2, which includes an FPGA chip of model EP2C35F672C6, an Ethernet controller and a video I/O interface. An IP core, known as Nios II embedded processor, is used as the CPU of the system. In addition, a hardware module for format conversion of video data, and another module to realize Motion-JPEG have been designed with Verilog HDL. These two modules are attached to the Nios II processor as peripheral equipments through the Avalon bus. Simulation results show that these two modules work as expected. Uclinux including TCP/IP protocol as well as the driver of Ethernet controller is chosen as the embedded operating system and an application program scheme is proposed.

  13. The IRIS Data Management Center: An international "network of networks", providing open, automated access to geographically distributed sensors of geophysical and environmental data.

    NASA Astrophysics Data System (ADS)

    Benson, R. B.; Ahern, T. K.; Trabant, C.

    2006-12-01

    The IRIS Data Management System has long supported international collaboration for seismology by both deploying a global network of seismometers and creating and maintaining an open and accessible archive in Seattle, WA, known as the Data Management Center (DMC). With sensors distributed on a global scale spanning more than 30 years of digital data, the DMC provides a rich repository of observations across broad time and space domains. Primary seismological data types include strong motion and broadband seismometers, conventional and superconducting gravimeters, tilt and creep meters, GPS measurements, along with other similar sensors that record accurate and calibrated ground motion. What may not be as well understood is the volume of environmental data that accompanies typical seismological data these days. This poster will review the types of time-series data that are currently being collected, how they are collected, and made freely available for download at the IRIS DMC. Environmental sensor data that is often co-located with geophysical data sensors include temperature, barometric pressure, wind direction and speed, humidity, insolation, rain gauge, and sometimes hydrological data like water current, level, temperature and depth. As the primary archival institution of the International Federation of Digital Seismograph Networks (FDSN), the IRIS DMC collects approximately 13,600 channels of real-time data from 69 different networks, from close to 1600 individual stations, currently averaging 10Tb per year in total. A major contribution to the IRIS archive currently is the EarthScope project data, a ten-year science undertaking that is collecting data from a high-resolution, multi-variate sensor network. Data types include magnetotelluric, high-sample rate seismics from a borehole drilled into the San Andreas fault (SAFOD) and various types of strain data from the Plate Boundary Observatory (PBO). In addition to the DMC, data centers located in other countries

  14. Discretionary access control in a heterogeneous distributed data base management system

    SciTech Connect

    Wang, C.Y.

    1986-01-01

    An important technical problem in building a distributed database management system (DDBMS) is access control which prevents unauthorized access or malicious destruction of a database. Consider a DDBMS that uses a uniform global data model to integrate the local schemes of existing DBMSs at the sites of a network. The local DBMSs are unchanged, and the DDBMS is implemented as a module on top of the existing DBMSs at each site. The DBMS at each site is expected to retain its autonomy. That is, the local DBMS at each site maintains control of the data stored at that site. Each local DBMS decides for itself if a user (of the local DBMS or of the DDBMS) may access the data it manages. The design of the access control system for the database in such an environment presents several problems. First, the DBMSs at different sites may have different and incompatible access control mechanisms. Second, queries involving data from multiple sites must be processed by the access control mechanisms of multiple and possible different local DBMSs. Coordinating the access control mechanisms of these DBMSs to provide a consistent access control facility to the users of the heterogeneous DDBMS is a difficult task. This research discusses the problem described above. A general architecture for a DDBMS was developed. Data abstraction techniques were adapted to specify the architecture. A formal verification for the specification was completed.

  15. Medical education practice-based research networks: Facilitating collaborative research

    PubMed Central

    Schwartz, Alan; Young, Robin; Hicks, Patricia J.; APPD LEARN, For

    2016-01-01

    Abstract Background: Research networks formalize and institutionalize multi-site collaborations by establishing an infrastructure that enables network members to participate in research, propose new studies, and exploit study data to move the field forward. Although practice-based clinical research networks are now widespread, medical education research networks are rapidly emerging. Aims: In this article, we offer a definition of the medical education practice-based research network, a brief description of networks in existence in July 2014 and their features, and a more detailed case study of the emergence and early growth of one such network, the Association of Pediatric Program Directors Longitudinal Educational Assessment Research Network (APPD LEARN). Methods: We searched for extant networks through peer-reviewed literature and the world-wide web. Results: We identified 15 research networks in medical education founded since 2002 with membership ranging from 8 to 120 programs. Most focus on graduate medical education in primary care or emergency medicine specialties. Conclusions: We offer four recommendations for the further development and spread of medical education research networks: increasing faculty development, obtaining central resources, studying networks themselves, and developing networks of networks. PMID:25319404

  16. Cluster and propensity based approximation of a network

    PubMed Central

    2013-01-01

    Background The models in this article generalize current models for both correlation networks and multigraph networks. Correlation networks are widely applied in genomics research. In contrast to general networks, it is straightforward to test the statistical significance of an edge in a correlation network. It is also easy to decompose the underlying correlation matrix and generate informative network statistics such as the module eigenvector. However, correlation networks only capture the connections between numeric variables. An open question is whether one can find suitable decompositions of the similarity measures employed in constructing general networks. Multigraph networks are attractive because they support likelihood based inference. Unfortunately, it is unclear how to adjust current statistical methods to detect the clusters inherent in many data sets. Results Here we present an intuitive and parsimonious parametrization of a general similarity measure such as a network adjacency matrix. The cluster and propensity based approximation (CPBA) of a network not only generalizes correlation network methods but also multigraph methods. In particular, it gives rise to a novel and more realistic multigraph model that accounts for clustering and provides likelihood based tests for assessing the significance of an edge after controlling for clustering. We present a novel Majorization-Minimization (MM) algorithm for estimating the parameters of the CPBA. To illustrate the practical utility of the CPBA of a network, we apply it to gene expression data and to a bi-partite network model for diseases and disease genes from the Online Mendelian Inheritance in Man (OMIM). Conclusions The CPBA of a network is theoretically appealing since a) it generalizes correlation and multigraph network methods, b) it improves likelihood based significance tests for edge counts, c) it directly models higher-order relationships between clusters, and d) it suggests novel clustering

  17. Cooperative UAV-Based Communications Backbone for Sensor Networks

    SciTech Connect

    Roberts, R S

    2001-10-07

    The objective of this project is to investigate the use of unmanned air vehicles (UAVs) as mobile, adaptive communications backbones for ground-based sensor networks. In this type of network, the UAVs provide communication connectivity to sensors that cannot communicate with each other because of terrain, distance, or other geographical constraints. In these situations, UAVs provide a vertical communication path for the sensors, thereby mitigating geographic obstacles often imposed on networks. With the proper use of UAVs, connectivity to a widely disbursed sensor network in rugged terrain is readily achieved. Our investigation has focused on networks where multiple cooperating UAVs are used to form a network backbone. The advantage of using multiple UAVs to form the network backbone is parallelization of sensor connectivity. Many widely spaced or isolated sensors can be connected to the network at once using this approach. In these networks, the UAVs logically partition the sensor network into sub-networks (subnets), with one UAV assigned per subnet. Partitioning the network into subnets allows the UAVs to service sensors in parallel thereby decreasing the sensor-to-network connectivity. A UAV services sensors in its subnet by flying a route (path) through the subnet, uplinking data collected by the sensors, and forwarding the data to a ground station. An additional advantage of using multiple UAVs in the network is that they provide redundancy in the communications backbone, so that the failure of a single UAV does not necessarily imply the loss of the network.

  18. Facilitating the Development of School-Based Learning Networks

    ERIC Educational Resources Information Center

    Kubiak, Chris; Bertram, Joan

    2010-01-01

    Purpose: This paper aims to contribute to the knowledge base on leading and facilitating the growth of school improvement networks by describing the activities and challenges faced by network leaders. Design/methodology/approach: A total of 19 co-leaders from 12 networks were interviewed using a semi-structured schedule about the growth of their…

  19. Survey-Based Measurement of Public Management and Policy Networks

    ERIC Educational Resources Information Center

    Henry, Adam Douglas; Lubell, Mark; McCoy, Michael

    2012-01-01

    Networks have become a central concept in the policy and public management literature; however, theoretical development is hindered by a lack of attention to the empirical properties of network measurement methods. This paper compares three survey-based methods for measuring organizational networks: the roster, the free-recall name generator, and…

  20. VIEWCACHE: An incremental pointer-based access method for autonomous interoperable databases

    NASA Technical Reports Server (NTRS)

    Roussopoulos, N.; Sellis, Timos

    1993-01-01

    One of the biggest problems facing NASA today is to provide scientists efficient access to a large number of distributed databases. Our pointer-based incremental data base access method, VIEWCACHE, provides such an interface for accessing distributed datasets and directories. VIEWCACHE allows database browsing and search performing inter-database cross-referencing with no actual data movement between database sites. This organization and processing is especially suitable for managing Astrophysics databases which are physically distributed all over the world. Once the search is complete, the set of collected pointers pointing to the desired data are cached. VIEWCACHE includes spatial access methods for accessing image datasets, which provide much easier query formulation by referring directly to the image and very efficient search for objects contained within a two-dimensional window. We will develop and optimize a VIEWCACHE External Gateway Access to database management systems to facilitate database search.

  1. Role-based access control through on-demand classification of electronic health record.

    PubMed

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority. PMID:26559071

  2. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  3. Networks.

    ERIC Educational Resources Information Center

    Maughan, George R.; Petitto, Karen R.; McLaughlin, Don

    2001-01-01

    Describes the connectivity features and options of modern campus communication and information system networks, including signal transmission (wire-based and wireless), signal switching, convergence of networks, and network assessment variables, to enable campus leaders to make sound future-oriented decisions. (EV)

  4. Semantic segmentation based on neural network and Bayesian network

    NASA Astrophysics Data System (ADS)

    Ge, Wenying; Liu, Guoying

    2013-10-01

    It is rather difficult for low-level visual features to describe the need for specific applications of image understanding, which results in the inconsistency between vision information and application need. In this paper, a new model is proposed to reduce this gap by combining low-level visual features with semantic features. It uses the output of neural network as the semantic feature, which is accompanied with the priori label features to describe the image after making normalization. And then, the proposed method employs Potts to model the distribution of label priori, and utilizes the Bayesian network to classify images. Several experiments on both synthetic and real images have verified that this method can get more accurate segmentation.

  5. NetworkAnalyst for statistical, visual and network-based meta-analysis of gene expression data.

    PubMed

    Xia, Jianguo; Gill, Erin E; Hancock, Robert E W

    2015-06-01

    Meta-analysis of gene expression data sets is increasingly performed to help identify robust molecular signatures and to gain insights into underlying biological processes. The complicated nature of such analyses requires both advanced statistics and innovative visualization strategies to support efficient data comparison, interpretation and hypothesis generation. NetworkAnalyst (http://www.networkanalyst.ca) is a comprehensive web-based tool designed to allow bench researchers to perform various common and complex meta-analyses of gene expression data via an intuitive web interface. By coupling well-established statistical procedures with state-of-the-art data visualization techniques, NetworkAnalyst allows researchers to easily navigate large complex gene expression data sets to determine important features, patterns, functions and connections, thus leading to the generation of new biological hypotheses. This protocol provides a step-wise description of how to effectively use NetworkAnalyst to perform network analysis and visualization from gene lists; to perform meta-analysis on gene expression data while taking into account multiple metadata parameters; and, finally, to perform a meta-analysis of multiple gene expression data sets. NetworkAnalyst is designed to be accessible to biologists rather than to specialist bioinformaticians. The complete protocol can be executed in ∼1.5 h. Compared with other similar web-based tools, NetworkAnalyst offers a unique visual analytics experience that enables data analysis within the context of protein-protein interaction networks, heatmaps or chord diagrams. All of these analysis methods provide the user with supporting statistical and functional evidence. PMID:25950236

  6. ANAP: An Integrated Knowledge Base for Arabidopsis Protein Interaction Network Analysis1[C][W][OA

    PubMed Central

    Wang, Congmao; Marshall, Alex; Zhang, Dabing; Wilson, Zoe A.

    2012-01-01

    Protein interactions are fundamental to the molecular processes occurring within an organism and can be utilized in network biology to help organize, simplify, and understand biological complexity. Currently, there are more than 10 publicly available Arabidopsis (Arabidopsis thaliana) protein interaction databases. However, there are limitations with these databases, including different types of interaction evidence, a lack of defined standards for protein identifiers, differing levels of information, and, critically, a lack of integration between them. In this paper, we present an interactive bioinformatics Web tool, ANAP (Arabidopsis Network Analysis Pipeline), which serves to effectively integrate the different data sets and maximize access to available data. ANAP has been developed for Arabidopsis protein interaction integration and network-based study to facilitate functional protein network analysis. ANAP integrates 11 Arabidopsis protein interaction databases, comprising 201,699 unique protein interaction pairs, 15,208 identifiers (including 11,931 The Arabidopsis Information Resource Arabidopsis Genome Initiative codes), 89 interaction detection methods, 73 species that interact with Arabidopsis, and 6,161 references. ANAP can be used as a knowledge base for constructing protein interaction networks based on user input and supports both direct and indirect interaction analysis. It has an intuitive graphical interface allowing easy network visualization and provides extensive detailed evidence for each interaction. In addition, ANAP displays the gene and protein annotation in the generated interactive network with links to The Arabidopsis Information Resource, the AtGenExpress Visualization Tool, the Arabidopsis 1,001 Genomes GBrowse, the Protein Knowledgebase, the Kyoto Encyclopedia of Genes and Genomes, and the Ensembl Genome Browser to significantly aid functional network analysis. The tool is available open access at http

  7. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  8. Evolution of RNA-Based Networks.

    PubMed

    Stadler, Peter F

    2016-01-01

    RNA molecules have served for decades as a paradigmatic example of molecular evolution that is tractable both in in vitro experiments and in detailed computer simulation. The adaptation of RNA sequences to external selection pressures is well studied and well understood. The de novo innovation or optimization of RNA aptamers and riboswitches in SELEX experiments serves as a case in point. Likewise, fitness landscapes building upon the efficiently computable RNA secondary structures have been a key toward understanding realistic fitness landscapes. Much less is known, however, on models in which multiple RNAs interact with each other, thus actively influencing the selection pressures acting on them. From a computational perspective, RNA-RNA interactions can be dealt with by same basic methods as the folding of a single RNA molecule, although many details become more complicated. RNA-RNA interactions are frequently employed in cellular regulation networks, e.g., as miRNA bases mRNA silencing or in the modulation of bacterial mRNAs by small, often highly structured sRNAs. In this chapter, we summarize the key features of networks of replicators. We highlight the differences between quasispecies-like models describing templates copied by an external replicase and hypercycle similar to autocatalytic replicators. Two aspects are of importance: the dynamics of selection within a population, usually described by conventional dynamical systems, and the evolution of replicating species in the space of chemical types. Product inhibition plays a key role in modulating selection dynamics from survival of the fittest to extinction of unfittest. The sequence evolution of replicators is rather well understood as approximate optimization in a fitness landscape for templates that is shaped by the sequence-structure map of RNA. Some of the properties of this map, in particular shape space covering and extensive neutral networks, give rise to evolutionary patterns such as drift

  9. Hierarchical coefficient of a multifractal based network

    NASA Astrophysics Data System (ADS)

    Moreira, Darlan A.; Lucena, Liacir dos Santos; Corso, Gilberto

    2014-02-01

    The hierarchical property for a general class of networks stands for a power-law relation between clustering coefficient, CC and connectivity k: CC∝kβ. This relation is empirically verified in several biologic and social networks, as well as in random and deterministic network models, in special for hierarchical networks. In this work we show that the hierarchical property is also present in a Lucena network. To create a Lucena network we use the dual of a multifractal lattice ML, the vertices are the sites of the ML and links are established between neighbouring lattices, therefore this network is space filling and planar. Besides a Lucena network shows a scale-free distribution of connectivity. We deduce a relation for the maximal local clustering coefficient CCimax of a vertex i in a planar graph. This condition expresses that the number of links among neighbour, N△, of a vertex i is equal to its connectivity ki, that means: N△=ki. The Lucena network fulfils the condition N△≃ki independent of ki and the anisotropy of ML. In addition, CCmax implies the threshold β=1 for the hierarchical property for any scale-free planar network.

  10. US Geoscience Information Network, Web Services for Geoscience Information Discovery and Access

    NASA Astrophysics Data System (ADS)

    Richard, S.; Allison, L.; Clark, R.; Coleman, C.; Chen, G.

    2012-04-01

    The US Geoscience information network has developed metadata profiles for interoperable catalog services based on ISO19139 and the OGC CSW 2.0.2. Currently data services are being deployed for the US Dept. of Energy-funded National Geothermal Data System. These services utilize OGC Web Map Services, Web Feature Services, and THREDDS-served NetCDF for gridded datasets. Services and underlying datasets (along with a wide variety of other information and non information resources are registered in the catalog system. Metadata for registration is produced by various workflows, including harvest from OGC capabilities documents, Drupal-based web applications, transformation from tabular compilations. Catalog search is implemented using the ESRI Geoportal open-source server. We are pursuing various client applications to demonstrated discovery and utilization of the data services. Currently operational applications allow catalog search and data acquisition from map services in an ESRI ArcMap extension, a catalog browse and search application built on openlayers and Django. We are developing use cases and requirements for other applications to utilize geothermal data services for resource exploration and evaluation.

  11. Metal oxide resistive random access memory based synaptic devices for brain-inspired computing

    NASA Astrophysics Data System (ADS)

    Gao, Bin; Kang, Jinfeng; Zhou, Zheng; Chen, Zhe; Huang, Peng; Liu, Lifeng; Liu, Xiaoyan

    2016-04-01

    The traditional Boolean computing paradigm based on the von Neumann architecture is facing great challenges for future information technology applications such as big data, the Internet of Things (IoT), and wearable devices, due to the limited processing capability issues such as binary data storage and computing, non-parallel data processing, and the buses requirement between memory units and logic units. The brain-inspired neuromorphic computing paradigm is believed to be one of the promising solutions for realizing more complex functions with a lower cost. To perform such brain-inspired computing with a low cost and low power consumption, novel devices for use as electronic synapses are needed. Metal oxide resistive random access memory (ReRAM) devices have emerged as the leading candidate for electronic synapses. This paper comprehensively addresses the recent work on the design and optimization of metal oxide ReRAM-based synaptic devices. A performance enhancement methodology and optimized operation scheme to achieve analog resistive switching and low-energy training behavior are provided. A three-dimensional vertical synapse network architecture is proposed for high-density integration and low-cost fabrication. The impacts of the ReRAM synaptic device features on the performances of neuromorphic systems are also discussed on the basis of a constructed neuromorphic visual system with a pattern recognition function. Possible solutions to achieve the high recognition accuracy and efficiency of neuromorphic systems are presented.

  12. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  13. Discrete Kalman Filter based Sensor Fusion for Robust Accessibility Interfaces

    NASA Astrophysics Data System (ADS)

    Ghersi, I.; Mariño, M.; Miralles, M. T.

    2016-04-01

    Human-machine interfaces have evolved, benefiting from the growing access to devices with superior, embedded signal-processing capabilities, as well as through new sensors that allow the estimation of movements and gestures, resulting in increasingly intuitive interfaces. In this context, sensor fusion for the estimation of the spatial orientation of body segments allows to achieve more robust solutions, overcoming specific disadvantages derived from the use of isolated sensors, such as the sensitivity of magnetic-field sensors to external influences, when used in uncontrolled environments. In this work, a method for the combination of image-processing data and angular-velocity registers from a 3D MEMS gyroscope, through a Discrete-time Kalman Filter, is proposed and deployed as an alternate user interface for mobile devices, in which an on-screen pointer is controlled with head movements. Results concerning general performance of the method are presented, as well as a comparative analysis, under a dedicated test application, with results from a previous version of this system, in which the relative-orientation information was acquired directly from MEMS sensors (3D magnetometer-accelerometer). These results show an improved response for this new version of the pointer, both in terms of precision and response time, while keeping many of the benefits that were highlighted for its predecessor, giving place to a complementary method for signal acquisition that can be used as an alternative-input device, as well as for accessibility solutions.

  14. Automation of Network-Based Scientific Workflows

    SciTech Connect

    Altintas, I.; Barreto, R.; Blondin, J. M.; Cheng, Z.; Critchlow, T.; Khan, A.; Klasky, Scott A; Ligon, J.; Ludaescher, B.; Mouallem, P. A.; Parker, S.; Podhorszki, Norbert; Shoshani, A.; Silva, C.; Vouk, M. A.

    2007-01-01

    Comprehensive, end-to-end, data and workflow management solutions are needed to handle the increasing complexity of processes and data volumes associated with modern distributed scientific problem solving, such as ultra-scale simulations and high-throughput experiments. The key to the solution is an integrated network-based framework that is functional, dependable, fault-tolerant, and supports data and process provenance. Such a framework needs to make development and use of application workflows dramatically easier so that scientists' efforts can shift away from data management and utility software development to scientific research and discovery An integrated view of these activities is provided by the notion of scientific workflows - a series of structured activities and computations that arise in scientific problem-solving. An information technology framework that supports scientific workflows is the Ptolemy II based environment called Kepler. This paper discusses the issues associated with practical automation of scientific processes and workflows and illustrates this with workflows developed using the Kepler framework and tools.

  15. What Does Role-Based Access Look Like? Examples from States

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2008

    2008-01-01

    Data are only useful if people are able to access, understand and use them. Without access to the right information, stakeholders are forced to make decisions based on anecdote, experience or instinct. For information to be useful, it must be timely, readily available, and easy to understand. Different stakeholders need and are entitled to access…

  16. Providing the Public with Online Access to Large Bibliographic Data Bases.

    ERIC Educational Resources Information Center

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  17. Developing Guidelines for Evaluating the Adaptation of Accessible Web-Based Learning Materials

    ERIC Educational Resources Information Center

    Radovan, Marko; Perdih, Mojca

    2016-01-01

    E-learning is a rapidly developing form of education. One of the key characteristics of e-learning is flexibility, which enables easier access to knowledge for everyone. Information and communications technology (ICT), which is e-learning's main component, enables alternative means of accessing the web-based learning materials that comprise the…

  18. Differences in Access to Care among Students Using School-Based Health Centers

    ERIC Educational Resources Information Center

    Parasuraman, Sarika Rane; Shi, Leiyu

    2015-01-01

    Health care reform has changed the landscape for the nation's health safety net, and school-based health centers (SBHCs) remain an important part of this system. However, few large-scale studies have been conducted to assess their impact on access to care. This study investigated differences in access among a nationally representative sample of…

  19. Interdependent Multi-Layer Networks: Modeling and Survivability Analysis with Applications to Space-Based Networks

    PubMed Central

    Castet, Jean-Francois; Saleh, Joseph H.

    2013-01-01

    This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs) allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats) of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also examined, and the

  20. Pilot evaluation of a web-based intervention targeting sexual health service access.

    PubMed

    Brown, K E; Newby, K; Caley, M; Danahay, A; Kehal, I

    2016-04-01

    Sexual health service access is fundamental to good sexual health, yet interventions designed to address this have rarely been implemented or evaluated. In this article, pilot evaluation findings for a targeted public health behavior change intervention, delivered via a website and web-app, aiming to increase uptake of sexual health services among 13-19-year olds are reported. A pre-post questionnaire-based design was used. Matched baseline and follow-up data were identified from 148 respondents aged 13-18 years. Outcome measures were self-reported service access, self-reported intention to access services and beliefs about services and service access identified through needs analysis. Objective service access data provided by local sexual health services were also analyzed. Analysis suggests the intervention had a significant positive effect on psychological barriers to and antecedents of service access among females. Males, who reported greater confidence in service access compared with females, significantly increased service access by time 2 follow-up. Available objective service access data support the assertion that the intervention may have led to increases in service access. There is real promise for this novel digital intervention. Further evaluation is planned as the model is licensed to and rolled out by other local authorities in the United Kingdom. PMID:26928566