Promoting Social Network Awareness: A Social Network Monitoring System
ERIC Educational Resources Information Center
Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin
2010-01-01
To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…
Kouchri, Farrokh Mohammadzadeh
2012-11-06
A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.
Hierarchy Bayesian model based services awareness of high-speed optical access networks
NASA Astrophysics Data System (ADS)
Bai, Hui-feng
2018-03-01
As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.
Community-aware task allocation for social networked multiagent systems.
Wang, Wanyuan; Jiang, Yichuan
2014-09-01
In this paper, we propose a novel community-aware task allocation model for social networked multiagent systems (SN-MASs), where the agent' cooperation domain is constrained in community and each agent can negotiate only with its intracommunity member agents. Under such community-aware scenarios, we prove that it remains NP-hard to maximize system overall profit. To solve this problem effectively, we present a heuristic algorithm that is composed of three phases: 1) task selection: select the desirable task to be allocated preferentially; 2) allocation to community: allocate the selected task to communities based on a significant task-first heuristics; and 3) allocation to agent: negotiate resources for the selected task based on a nonoverlap agent-first and breadth-first resource negotiation mechanism. Through the theoretical analyses and experiments, the advantages of our presented heuristic algorithm and community-aware task allocation model are validated. 1) Our presented heuristic algorithm performs very closely to the benchmark exponential brute-force optimal algorithm and the network flow-based greedy algorithm in terms of system overall profit in small-scale applications. Moreover, in the large-scale applications, the presented heuristic algorithm achieves approximately the same overall system profit, but significantly reduces the computational load compared with the greedy algorithm. 2) Our presented community-aware task allocation model reduces the system communication cost compared with the previous global-aware task allocation model and improves the system overall profit greatly compared with the previous local neighbor-aware task allocation model.
A Scalable QoS-Aware VoD Resource Sharing Scheme for Next Generation Networks
NASA Astrophysics Data System (ADS)
Huang, Chenn-Jung; Luo, Yun-Cheng; Chen, Chun-Hua; Hu, Kai-Wen
In network-aware concept, applications are aware of network conditions and are adaptable to the varying environment to achieve acceptable and predictable performance. In this work, a solution for video on demand service that integrates wireless and wired networks by using the network aware concepts is proposed to reduce the blocking probability and dropping probability of mobile requests. Fuzzy logic inference system is employed to select appropriate cache relay nodes to cache published video streams and distribute them to different peers through service oriented architecture (SOA). SIP-based control protocol and IMS standard are adopted to ensure the possibility of heterogeneous communication and provide a framework for delivering real-time multimedia services over an IP-based network to ensure interoperability, roaming, and end-to-end session management. The experimental results demonstrate that effectiveness and practicability of the proposed work.
Information Assurance as a System of Systems in the Submarine Force
2013-09-01
cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network security...understand the cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network...Table 2. Assessment Scale– Vulnerability Severity (After NIST 800–30 Rev1 2012, F-2
ERIC Educational Resources Information Center
Ball, Albert L.
2012-01-01
Although reports of identity theft continue to be widely published, users continue to post an increasing amount of personal information online, especially within social networking sites (SNS) and e-learning systems (ELS). Research has suggested that many users lack awareness of the threats that risky online personal information sharing poses to…
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2013 CFR
2013-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2014 CFR
2014-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
Security-Enhanced Autonomous Network Management
NASA Technical Reports Server (NTRS)
Zeng, Hui
2015-01-01
Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.
Adolescents, Health Education, and Computers: The Body Awareness Resource Network (BARN).
ERIC Educational Resources Information Center
Bosworth, Kris; And Others
1983-01-01
The Body Awareness Resource Network (BARN) is a computer-based system designed as a confidential, nonjudgmental source of health information for adolescents. Topics include alcohol and other drugs, diet and activity, family communication, human sexuality, smoking, and stress management; programs are available for high school and middle school…
Julie, E Golden; Selvi, S Tamil
2016-01-01
Wireless sensor networks (WSNs) consist of sensor nodes with limited processing capability and limited nonrechargeable battery power. Energy consumption in WSN is a significant issue in networks for improving network lifetime. It is essential to develop an energy aware clustering protocol in WSN to reduce energy consumption for increasing network lifetime. In this paper, a neuro-fuzzy energy aware clustering scheme (NFEACS) is proposed to form optimum and energy aware clusters. NFEACS consists of two parts: fuzzy subsystem and neural network system that achieved energy efficiency in forming clusters and cluster heads in WSN. NFEACS used neural network that provides effective training set related to energy and received signal strength of all nodes to estimate the expected energy for tentative cluster heads. Sensor nodes with higher energy are trained with center location of base station to select energy aware cluster heads. Fuzzy rule is used in fuzzy logic part that inputs to form clusters. NFEACS is designed for WSN handling mobility of node. The proposed scheme NFEACS is compared with related clustering schemes, cluster-head election mechanism using fuzzy logic, and energy aware fuzzy unequal clustering. The experiment results show that NFEACS performs better than the other related schemes.
Julie, E. Golden; Selvi, S. Tamil
2016-01-01
Wireless sensor networks (WSNs) consist of sensor nodes with limited processing capability and limited nonrechargeable battery power. Energy consumption in WSN is a significant issue in networks for improving network lifetime. It is essential to develop an energy aware clustering protocol in WSN to reduce energy consumption for increasing network lifetime. In this paper, a neuro-fuzzy energy aware clustering scheme (NFEACS) is proposed to form optimum and energy aware clusters. NFEACS consists of two parts: fuzzy subsystem and neural network system that achieved energy efficiency in forming clusters and cluster heads in WSN. NFEACS used neural network that provides effective training set related to energy and received signal strength of all nodes to estimate the expected energy for tentative cluster heads. Sensor nodes with higher energy are trained with center location of base station to select energy aware cluster heads. Fuzzy rule is used in fuzzy logic part that inputs to form clusters. NFEACS is designed for WSN handling mobility of node. The proposed scheme NFEACS is compared with related clustering schemes, cluster-head election mechanism using fuzzy logic, and energy aware fuzzy unequal clustering. The experiment results show that NFEACS performs better than the other related schemes. PMID:26881269
Towards an integrated defense system for cyber security situation awareness experiment
NASA Astrophysics Data System (ADS)
Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.
Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.
Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin
2016-08-18
Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.
Brain Connectivity in Pathological and Pharmacological Coma
Noirhomme, Quentin; Soddu, Andrea; Lehembre, Rémy; Vanhaudenhuyse, Audrey; Boveroux, Pierre; Boly, Mélanie; Laureys, Steven
2010-01-01
Recent studies in patients with disorders of consciousness (DOC) tend to support the view that awareness is not related to activity in a single brain region but to thalamo-cortical connectivity in the frontoparietal network. Functional neuroimaging studies have shown preserved albeit disconnected low-level cortical activation in response to external stimulation in patients in a “vegetative state” or unresponsive wakefulness syndrome. While activation of these “primary” sensory cortices does not necessarily reflect conscious awareness, activation in higher-order associative cortices in minimally conscious state patients seems to herald some residual perceptual awareness. PET studies have identified a metabolic dysfunction in a widespread frontoparietal “global neuronal workspace” in DOC patients including the midline default mode network (“intrinsic” system) and the lateral frontoparietal cortices or “extrinsic system.” Recent studies have investigated the relation of awareness to the functional connectivity within intrinsic and extrinsic networks, and with the thalami in both pathological and pharmacological coma. In brain damaged patients, connectivity in all default network areas was found to be non-linearly correlated with the degree of clinical consciousness impairment, ranging from healthy controls and locked-in syndrome to minimally conscious, vegetative, coma, and brain dead patients. Anesthesia-induced loss of consciousness was also shown to correlate with a global decrease in cortico-cortical and thalamo-cortical connectivity in both intrinsic and extrinsic networks, but not in auditory, or visual networks. In anesthesia, unconsciousness was also associated with a loss of cross-modal interactions between networks. These results suggest that conscious awareness critically depends on the functional integrity of thalamo-cortical and cortico-cortical frontoparietal connectivity within and between “intrinsic” and “extrinsic” brain networks. PMID:21191476
Sonification of network traffic flow for monitoring and situational awareness
2018-01-01
Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators’ situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen. PMID:29672543
Sonification of network traffic flow for monitoring and situational awareness.
Debashi, Mohamed; Vickers, Paul
2018-01-01
Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators' situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen.
On detection and visualization techniques for cyber security situation awareness
NASA Astrophysics Data System (ADS)
Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao
2013-05-01
Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.
Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System
Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin
2016-01-01
Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171
Traffic-engineering-aware shortest-path routing and its application in IP-over-WDM networks [Invited
NASA Astrophysics Data System (ADS)
Lee, Youngseok; Mukherjee, Biswanath
2004-03-01
Single shortest-path routing is known to perform poorly for Internet traffic engineering (TE) where the typical optimization objective is to minimize the maximum link load. Splitting traffic uniformly over equal-cost multiple shortest paths in open shortest path first and intermediate system-intermediate system protocols does not always minimize the maximum link load when multiple paths are not carefully selected for the global traffic demand matrix. However, a TE-aware shortest path among all the equal-cost multiple shortest paths between each ingress-egress pair can be selected such that the maximum link load is significantly reduced. IP routers can use the globally optimal TE-aware shortest path without any change to existing routing protocols and without any serious configuration overhead. While calculating TE-aware shortest paths, the destination-based forwarding constraint at a node should be satisfied, because an IP router will forward a packet to the next hop toward the destination by looking up the destination prefix. We present a mathematical problem formulation for finding a set of TE-aware shortest paths for the given network as an integer linear program, and we propose a simple heuristic for solving large instances of the problem. Then we explore the usage of our proposed algorithm for the integrated TE method in IP-over-WDM networks. The proposed algorithm is evaluated through simulations in IP networks as well as in IP-over-WDM networks.
A Multi-Temporal Context-Aware System for Competences Management
ERIC Educational Resources Information Center
Rosa, João H.; Barbosa, Jorge L.; Kich, Marcos; Brito, Lucas
2015-01-01
The evolution of computing technology and wireless networks has contributed to the miniaturization of mobile devices and their increase in power, providing services anywhere and anytime. In this scenario, applications have considered the user's contexts to make decisions (Context Awareness). Context-aware applications have enabled new…
HERA: A New Platform for Embedding Agents in Heterogeneous Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Alonso, Ricardo S.; de Paz, Juan F.; García, Óscar; Gil, Óscar; González, Angélica
Ambient Intelligence (AmI) based systems require the development of innovative solutions that integrate distributed intelligent systems with context-aware technologies. In this sense, Multi-Agent Systems (MAS) and Wireless Sensor Networks (WSN) are two key technologies for developing distributed systems based on AmI scenarios. This paper presents the new HERA (Hardware-Embedded Reactive Agents) platform, that allows using dynamic and self-adaptable heterogeneous WSNs on which agents are directly embedded on the wireless nodes This approach facilitates the inclusion of context-aware capabilities in AmI systems to gather data from their surrounding environments, achieving a higher level of ubiquitous and pervasive computing.
CyberPetri at CDX 2016: Real-time Network Situation Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.
CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.
Real-Time Visualization of Network Behaviors for Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Best, Daniel M.; Bohn, Shawn J.; Love, Douglas V.
Plentiful, complex, and dynamic data make understanding the state of an enterprise network difficult. Although visualization can help analysts understand baseline behaviors in network traffic and identify off-normal events, visual analysis systems often do not scale well to operational data volumes (in the hundreds of millions to billions of transactions per day) nor to analysis of emergent trends in real-time data. We present a system that combines multiple, complementary visualization techniques coupled with in-stream analytics, behavioral modeling of network actors, and a high-throughput processing platform called MeDICi. This system provides situational understanding of real-time network activity to help analysts takemore » proactive response steps. We have developed these techniques using requirements gathered from the government users for which the tools are being developed. By linking multiple visualization tools to a streaming analytic pipeline, and designing each tool to support a particular kind of analysis (from high-level awareness to detailed investigation), analysts can understand the behavior of a network across multiple levels of abstraction.« less
Two-stage effects of awareness cascade on epidemic spreading in multiplex networks
NASA Astrophysics Data System (ADS)
Guo, Quantong; Jiang, Xin; Lei, Yanjun; Li, Meng; Ma, Yifang; Zheng, Zhiming
2015-01-01
Human awareness plays an important role in the spread of infectious diseases and the control of propagation patterns. The dynamic process with human awareness is called awareness cascade, during which individuals exhibit herd-like behavior because they are making decisions based on the actions of other individuals [Borge-Holthoefer et al., J. Complex Networks 1, 3 (2013), 10.1093/comnet/cnt006]. In this paper, to investigate the epidemic spreading with awareness cascade, we propose a local awareness controlled contagion spreading model on multiplex networks. By theoretical analysis using a microscopic Markov chain approach and numerical simulations, we find the emergence of an abrupt transition of epidemic threshold βc with the local awareness ratio α approximating 0.5 , which induces two-stage effects on epidemic threshold and the final epidemic size. These findings indicate that the increase of α can accelerate the outbreak of epidemics. Furthermore, a simple 1D lattice model is investigated to illustrate the two-stage-like sharp transition at αc≈0.5 . The results can give us a better understanding of why some epidemics cannot break out in reality and also provide a potential access to suppressing and controlling the awareness cascading systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Dumidu Wijayasekara; Milos Manic
Resiliency and improved state-awareness of modern critical infrastructures, such as energy production and industrial systems, is becoming increasingly important. As control systems become increasingly complex, the number of inputs and outputs increase. Therefore, in order to maintain sufficient levels of state-awareness, a robust system state monitoring must be implemented that correctly identifies system behavior even when one or more sensors are faulty. Furthermore, as intelligent cyber adversaries become more capable, incorrect values may be fed to the operators. To address these needs, this paper proposes a Fuzzy-Neural Data Fusion Engine (FN-DFE) for resilient state-awareness of control systems. The designed FN-DFEmore » is composed of a three-layered system consisting of: 1) traditional threshold based alarms, 2) anomalous behavior detector using self-organizing fuzzy logic system, and 3) artificial neural network based system modeling and prediction. The improved control system state-awareness is achieved via fusing input data from multiple sources and combining them into robust anomaly indicators. In addition, the neural network based signal predictions are used to augment the resiliency of the system and provide coherent state-awareness despite temporary unavailability of sensory data. The proposed system was integrated and tested with a model of the Idaho National Laboratory’s (INL) hybrid energy system facility know as HYTEST. Experimental results demonstrate that the proposed FN-DFE provides timely plant performance monitoring and anomaly detection capabilities. It was shown that the system is capable of identifying intrusive behavior significantly earlier than conventional threshold based alarm systems.« less
Environmental Awareness and Support Networks of the Hispanic Elderly.
ERIC Educational Resources Information Center
Starrett, Richard A.; And Others
Data obtained from interviews with 1,804 non-institutionalized Hispanic individuals age 55 and over were analyzed in an attempt to understand how formal and informal social support systems and awareness of available social services (environmental awareness) affect the ability of elderly Hispanics to remain independent within their communities. The…
Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Milos Manic; Miles McQueen
Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenariosmore » is demonstrated on several control system network topologies.« less
Research on the Wireless Sensor Networks Applied in the Battlefield Situation Awareness System
NASA Astrophysics Data System (ADS)
Hua, Guan; Li, Yan-Xiao; Yan, Xiao-Mei
In the modern warfare information is the crucial key of winning. Battlefield situation awareness contributes to grasping and retaining the intelligence predominance. Due to its own special characteristics Wireless Sensor Networks (WSN) have been widely used to realize reconnaissance and surveillance in the joint operations and provide simultaneous, comprehensive, accurate data to multiechelon commanders and the combatant personnel for decision making and rapid response. Military sensors have drawn great attention in the ongoing projects which have satisfied the initial design or research purpose. As the interface of the "Internet of Things" which will have an eye on every corner of the battlespace WSNs play the necessary role in the incorporated situation awareness system. WSNs, radar, infrared ray or other means work together to acquire awareness intelligence for the deployed functional units to enhance the fighting effect.
Design and Efficiency Analysis of Operational Scenarios for Space Situational Awareness Radar System
NASA Astrophysics Data System (ADS)
Choi, E. J.; Cho, S.; Jo, J. H.; Park, J.; Chung, T.; Park, J.; Jeon, H.; Yun, A.; Lee, Y.
In order to perform the surveillance and tracking of space objects, optical and radar sensors are the technical components for space situational awareness system. Especially, space situational awareness radar system in combination with optical sensors network plays an outstanding role for space situational awareness. At present, OWL-Net(Optical Wide Field patrol Network) optical system, which is the only infra structures for tracking of space objects in Korea is very limited in all-weather and observation time. Therefore, the development of radar system capable of continuous operation is becoming an essential space situational awareness element. Therefore, for an efficient space situational awareness at the current state, the strategy of the space situational awareness radar development should be considered. The purpose of this paper is to analyze the efficiency of radar system for detection and tracking of space objects. The detection capabilities are limited to an altitude of 2,000 km with debris size of 1 m2 in radar cross section (RCS) for the radar operating frequencies of L, S, C, X, and Ku-band. The power budget analysis results showed that the maximum detection range of 2,000km can be achieved with the transmitted power of 900 kW, transmit and receive antenna gains of 40 dB and 43 dB, respectively, pulse width of 2 ms, and a signal processing gain of 13.3dB, at frequency of 1.3GHz. The required signal-to-noise ratio (SNR) was assumed to be 12.6 dB for probability of detection of 80% with false alarm rate 10-6. Through the efficiency analysis and trade-off study, the key parameters of the radar system are designed. As a result, this research will provide the guideline for the conceptual design of space situational awareness system.
Explicit Context Matching in Content-Based Publish/Subscribe Systems
Vavassori, Sergio; Soriano, Javier; Lizcano, David; Jiménez, Miguel
2013-01-01
Although context could be exploited to improve performance, elasticity and adaptation in most distributed systems that adopt the publish/subscribe (P/S) communication model, only a few researchers have focused on the area of context-aware matching in P/S systems and have explored its implications in domains with highly dynamic context like wireless sensor networks (WSNs) and IoT-enabled applications. Most adopted P/S models are context agnostic or do not differentiate context from the other application data. In this article, we present a novel context-aware P/S model. SilboPS manages context explicitly, focusing on the minimization of network overhead in domains with recurrent context changes related, for example, to mobile ad hoc networks (MANETs). Our approach represents a solution that helps to efficiently share and use sensor data coming from ubiquitous WSNs across a plethora of applications intent on using these data to build context awareness. Specifically, we empirically demonstrate that decoupling a subscription from the changing context in which it is produced and leveraging contextual scoping in the filtering process notably reduces (un)subscription cost per node, while improving the global performance/throughput of the network of brokers without altering the cost of SIENA-like topology changes. PMID:23529118
Integrated situational awareness for cyber attack detection, analysis, and mitigation
NASA Astrophysics Data System (ADS)
Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng
2012-06-01
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
Ullah, Farman; Sarwar, Ghulam; Lee, Sungchang
2014-01-01
We propose a network and visual quality aware N-Screen content recommender system. N-Screen provides more ways than ever before to access multimedia content through multiple devices and heterogeneous access networks. The heterogeneity of devices and access networks present new questions of QoS (quality of service) in the realm of user experience with content. We propose, a recommender system that ensures a better visual quality on user's N-screen devices and the efficient utilization of available access network bandwidth with user preferences. The proposed system estimates the available bandwidth and visual quality on users N-Screen devices and integrates it with users preferences and contents genre information to personalize his N-Screen content. The objective is to recommend content that the user's N-Screen device and access network are capable of displaying and streaming with the user preferences that have not been supported in existing systems. Furthermore, we suggest a joint matrix factorization approach to jointly factorize the users rating matrix with the users N-Screen device similarity and program genres similarity. Finally, the experimental results show that we also enhance the prediction and recommendation accuracy, sparsity, and cold start issues. PMID:24982999
Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages
NASA Astrophysics Data System (ADS)
Larizgoitia, Iker; Muguira, Leire; Vazquez, Juan Ignacio
Wireless sensor networks (WSN) are becoming extremely popular in the development of context aware systems. Traditionally WSN have been focused on capturing data, which was later analyzed and interpreted in a server with more computational power. In this kind of scenario the problem of representing the sensor information needs to be addressed. Every node in the network might have different sensors attached; therefore their correspondent packet structures will be different. The server has to be aware of the meaning of every single structure and data in order to be able to interpret them. Multiple sensors, multiple nodes, multiple packet structures (and not following a standard format) is neither scalable nor interoperable. Context aware systems have solved this problem with the use of semantic technologies. They provide a common framework to achieve a standard definition of any domain. Nevertheless, these representations are computationally expensive, so a WSN cannot afford them. The work presented in this paper tries to bridge the gap between the sensor information and its semantic representation, by defining a simple architecture that enables the definition of this information natively in a semantic way, achieving the integration of the semantic information in the network packets. This will have several benefits, the most important being the possibility of promoting every WSN node to a real semantic information source.
Study on Dissemination Patterns in Location-Aware Gossiping Networks
NASA Astrophysics Data System (ADS)
Kami, Nobuharu; Baba, Teruyuki; Yoshikawa, Takashi; Morikawa, Hiroyuki
We study the properties of information dissemination over location-aware gossiping networks leveraging location-based real-time communication applications. Gossiping is a promising method for quickly disseminating messages in a large-scale system, but in its application to information dissemination for location-aware applications, it is important to consider the network topology and patterns of spatial dissemination over the network in order to achieve effective delivery of messages to potentially interested users. To this end, we propose a continuous-space network model extended from Kleinberg's small-world model applicable to actual location-based applications. Analytical and simulation-based study shows that the proposed network achieves high dissemination efficiency resulting from geographically neutral dissemination patterns as well as selective dissemination to proximate users. We have designed a highly scalable location management method capable of promptly updating the network topology in response to node movement and have implemented a distributed simulator to perform dynamic target pursuit experiments as one example of applications that are the most sensitive to message forwarding delay. The experimental results show that the proposed network surpasses other types of networks in pursuit efficiency and achieves the desirable dissemination patterns.
NASA Astrophysics Data System (ADS)
Kan, Jia-Qian; Zhang, Hai-Feng
2017-03-01
In this paper, we study the interplay between the epidemic spreading and the diffusion of awareness in multiplex networks. In the model, an infectious disease can spread in one network representing the paths of epidemic spreading (contact network), leading to the diffusion of awareness in the other network (information network), and then the diffusion of awareness will cause individuals to take social distances, which in turn affects the epidemic spreading. As for the diffusion of awareness, we assume that, on the one hand, individuals can be informed by other aware neighbors in information network, on the other hand, the susceptible individuals can be self-awareness induced by the infected neighbors in the contact networks (local information) or mass media (global information). Through Markov chain approach and numerical computations, we find that the density of infected individuals and the epidemic threshold can be affected by the structures of the two networks and the effective transmission rate of the awareness. However, we prove that though the introduction of the self-awareness can lower the density of infection, which cannot increase the epidemic threshold no matter of the local information or global information. Our finding is remarkably different to many previous results on single-layer network: local information based behavioral response can alter the epidemic threshold. Furthermore, our results indicate that the nodes with more neighbors (hub nodes) in information networks are easier to be informed, as a result, their risk of infection in contact networks can be effectively reduced.
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
Ruschin, Detlef
2015-01-01
Awareness systems had been invented for supporting groups collaborating simultaneously over a network. They provide each group member with real-time information about the state of affairs on the remote locations of the other members. Awareness systems have also been observed to help remote collaborators develop the same shared sense of community that often emerges within co-located work groups, and this effect of creating or maintaining group cohesion is an important goal in itself. Purely social awareness systems can be employed by any kind of group, e.g. families, without shared work tasks. As a means of preventing loneliness they can be regarded as examples of biomedical technology. In this paper a demonstrator of an awareness-enhanced instant messaging system for elderly living alone is described along with assumptions about group processes that led to its specification.
NASA Technical Reports Server (NTRS)
Thieman, J. R.
1994-01-01
Many researchers are becoming aware of the International Directory Network (IDN), an interconnected federation of international directories to Earth and space science data. Are you aware, however, of the many Earth-science-relevant information systems which can be accessed automatically from the directories? After determining potentially useful data sets in various disciplines through directories such as the Global Change Master Directory, it is becoming increasingly possible to get detailed information about the correlative possibilities of these data sets through the connected guide/catalog and inventory systems. Such capabilities as data set browse, subsetting, analysis, etc. are available now and will be improving in the future.
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
Situational Awareness of Network System Roles (SANSR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huffer, Kelly M; Reed, Joel W
In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. Wemore » will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.« less
The impact of awareness on epidemic spreading in networks.
Wu, Qingchu; Fu, Xinchu; Small, Michael; Xu, Xin-Jian
2012-03-01
We explore the impact of awareness on epidemic spreading through a population represented by a scale-free network. Using a network mean-field approach, a mathematical model for epidemic spreading with awareness reactions is proposed and analyzed. We focus on the role of three forms of awareness including local, global, and contact awareness. By theoretical analysis and simulation, we show that the global awareness cannot decrease the likelihood of an epidemic outbreak while both the local awareness and the contact awareness can. Also, the influence degree of the local awareness on disease dynamics is closely related with the contact awareness.
NASA Astrophysics Data System (ADS)
Becker, T.; König, G.
2015-10-01
Cartographic visualizations of crises are used to create a Common Operational Picture (COP) and enforce Situational Awareness by presenting relevant information to the involved actors. As nearly all crises affect geospatial entities, geo-data representations have to support location-specific analysis throughout the decision-making process. Meaningful cartographic presentation is needed for coordinating the activities of crisis manager in a highly dynamic situation, since operators' attention span and their spatial memories are limiting factors during the perception and interpretation process. Situational Awareness of operators in conjunction with a COP are key aspects in decision-making process and essential for making well thought-out and appropriate decisions. Considering utility networks as one of the most complex and particularly frequent required systems in urban environment, meaningful cartographic presentation of multiple utility networks with respect to disaster management do not exist. Therefore, an optimized visualization of utility infrastructure for emergency response procedures is proposed. The article will describe a conceptual approach on how to simplify, aggregate, and visualize multiple utility networks and their components to meet the requirements of the decision-making process and to support Situational Awareness.
INL Control System Situational Awareness Technology Annual Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Bryce Wheeler; Todd Vollmer
The overall goal of this project is to develop an interoperable set of tools to provide a comprehensive, consistent implementation of cyber security and overall situational awareness of control and sensor network implementations. The operation and interoperability of these tools will fill voids in current technological offerings and address issues that remain an impediment to the security of control systems. This report provides an FY 2012 update on the Sophia, Mesh Mapper, Intelligent Cyber Sensor, and Data Fusion projects with respect to the year-two tasks and annual reporting requirements of the INL Control System Situational Awareness Technology report (July 2010).
Self-Aware Vehicles: Mission and Performance Adaptation to System Health
NASA Technical Reports Server (NTRS)
Gregory, Irene M.; Leonard, Charles; Scotti, Stephen J.
2016-01-01
Advances in sensing (miniaturization, distributed sensor networks) combined with improvements in computational power leading to significant gains in perception, real-time decision making/reasoning and dynamic planning under uncertainty as well as big data predictive analysis have set the stage for realization of autonomous system capability. These advances open the design and operating space for self-aware vehicles that are able to assess their own capabilities and adjust their behavior to either complete the assigned mission or to modify the mission to reflect their current capabilities. This paper discusses the self-aware vehicle concept and associated technologies necessary for full exploitation of the concept. A self-aware aircraft, spacecraft or system is one that is aware of its internal state, has situational awareness of its environment, can assess its capabilities currently and project them into the future, understands its mission objectives, and can make decisions under uncertainty regarding its ability to achieve its mission objectives.
Walters, Suzan M; Reilly, Kathleen H; Neaigus, Alan; Braunstein, Sarah
2017-06-29
Women who inject drugs (WWID) are at heightened risk for HIV due to biological, behavioral, and structural factors. Pre-exposure prophylaxis (PrEP) could aid in HIV prevention for WWID. However, little is known about WWID awareness of PrEP, which is a necessary step that must occur before PrEP uptake. We report factors associated with greater awareness among WWID to identify efficient means of awareness dissemination. Data from the 2015 National HIV Behavioral Surveillance (NHBS) system cycle on injection drug use collected in New York City (NYC) were used. Bivariable analyses, using chi-squared statistics, were conducted to examine correlates of awareness of PrEP with socio-demographic, behavioral, and health care variables. Multivariable logistic regression was used to estimate adjusted associations and determine differences in awareness of PrEP. The analysis consisted of 118 WWID. Awareness of PrEP was relatively low (31%), and risk factors were high. In the last 12 months, almost two thirds (65%) reported condomless sex, approximately one third (31%) reported transactional sex, and one third (32%) reported sharing injection equipment. In multivariable logistic regression, increased PrEP awareness was associated with reported transactional sex (AOR 3.32, 95% CI 1.22-9.00) and having a conversation about HIV prevention at a syringe exchange program (SEP) (AOR 7.61, 95% CI 2.65-21.84). We did not find race, education, household income, age, binge drinking, or sexual identity to be significantly associated with PrEP awareness. Large proportions of WWID were unaware of PrEP. These findings suggest that social networks (specifically sex work and SEP networks) are an efficient means for disseminating messaging about prevention materials such as PrEP. We recommend that SEP access increase, SEP processes be adopted in other health care settings, and WWID networks be utilized to increase PrEP awareness.
Extracting the Information Backbone in Online System
Zhang, Qian-Ming; Zeng, An; Shang, Ming-Sheng
2013-01-01
Information overload is a serious problem in modern society and many solutions such as recommender system have been proposed to filter out irrelevant information. In the literature, researchers have been mainly dedicated to improving the recommendation performance (accuracy and diversity) of the algorithms while they have overlooked the influence of topology of the online user-object bipartite networks. In this paper, we find that some information provided by the bipartite networks is not only redundant but also misleading. With such “less can be more” feature, we design some algorithms to improve the recommendation performance by eliminating some links from the original networks. Moreover, we propose a hybrid method combining the time-aware and topology-aware link removal algorithms to extract the backbone which contains the essential information for the recommender systems. From the practical point of view, our method can improve the performance and reduce the computational time of the recommendation system, thus improving both of their effectiveness and efficiency. PMID:23690946
Data-centric multiobjective QoS-aware routing protocol for body sensor networks.
Razzaque, Md Abdur; Hong, Choong Seon; Lee, Sungwon
2011-01-01
In this paper, we address Quality-of-Service (QoS)-aware routing issue for Body Sensor Networks (BSNs) in delay and reliability domains. We propose a data-centric multiobjective QoS-Aware routing protocol, called DMQoS, which facilitates the system to achieve customized QoS services for each traffic category differentiated according to the generated data types. It uses modular design architecture wherein different units operate in coordination to provide multiple QoS services. Their operation exploits geographic locations and QoS performance of the neighbor nodes and implements a localized hop-by-hop routing. Moreover, the protocol ensures (almost) a homogeneous energy dissipation rate for all routing nodes in the network through a multiobjective Lexicographic Optimization-based geographic forwarding. We have performed extensive simulations of the proposed protocol, and the results show that DMQoS has significant performance improvements over several state-of-the-art approaches.
Botvin, Judith D
2005-01-01
Meridian Health, Wall, N.J., is a three-hospital system that also includes a network of partner companies. The objectives of this branding campaign were to create a better awareness of the benefits of academic medicine, to close the physician referral loop and to improve internal morale. The objectives were realized by emphasizing the teamwork of the system's doctors and showing their actual faces and voices.
A Simple Simulator for Multicomputer Routing Networks
1992-03-05
Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that...SUBTITLE Submicron Systems Architecture Project. A Smple Simulator for Multicomputer Routing Networks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c
Toward a generalized theory of epidemic awareness in social networks
NASA Astrophysics Data System (ADS)
Wu, Qingchu; Zhu, Wenfang
We discuss the dynamics of a susceptible-infected-susceptible (SIS) model with local awareness in networks. Individual awareness to the infectious disease is characterized by a general function of epidemic information in its neighborhood. We build a high-accuracy approximate equation governing the spreading dynamics and derive an approximate epidemic threshold above which the epidemic spreads over the whole network. Our results extend the previous work and show that the epidemic threshold is dependent on the awareness function in terms of one infectious neighbor. Interestingly, when a pow-law awareness function is chosen, the epidemic threshold can emerge in infinite networks.
A Workflow-based Intelligent Network Data Movement Advisor with End-to-end Performance Optimization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Michelle M.; Wu, Chase Q.
2013-11-07
Next-generation eScience applications often generate large amounts of simulation, experimental, or observational data that must be shared and managed by collaborative organizations. Advanced networking technologies and services have been rapidly developed and deployed to facilitate such massive data transfer. However, these technologies and services have not been fully utilized mainly because their use typically requires significant domain knowledge and in many cases application users are even not aware of their existence. By leveraging the functionalities of an existing Network-Aware Data Movement Advisor (NADMA) utility, we propose a new Workflow-based Intelligent Network Data Movement Advisor (WINDMA) with end-to-end performance optimization formore » this DOE funded project. This WINDMA system integrates three major components: resource discovery, data movement, and status monitoring, and supports the sharing of common data movement workflows through account and database management. This system provides a web interface and interacts with existing data/space management and discovery services such as Storage Resource Management, transport methods such as GridFTP and GlobusOnline, and network resource provisioning brokers such as ION and OSCARS. We demonstrate the efficacy of the proposed transport-support workflow system in several use cases based on its implementation and deployment in DOE wide-area networks.« less
A Cyber Situational Awareness Model for Network Administrators
2017-03-01
environments, the Internet of Things, artificial intelligence , and so on. As users’ data requirements grow more complex, they demand information...security of systems of interest. Further, artificial intelligence is a powerful concept in information technology. Therefore, new research should...look into how to use artificial intelligence to develop CSA. Human interaction with cyber systems is not making networks and their components safer
Baek, Jiwon; Hur, Nam Wook; Kim, Hyeon Chang; Youm, Yoosik
2016-07-01
Hypertension is a common chronic disease among older adults, and is associated with medical complications and mortality. This study aimed to examine the effects of social network characteristics on the prevalence, awareness, and control of hypertension among older adults. The Korean Social Life, Health, and Aging Project (KSHAP) interviewed 814 ≥ 60-year-old residents and their spouses from a rural township between December 2011 and March 2012 (response rate: 95%). We evaluated the data from 595 participants. Multivariate logistic regression models were used to assess the effects of network characteristics on hypertension. We observed strong sex-specific network effects on the prevalence, awareness, and control of hypertension. Among older women, network density was associated with hypertension awareness [odds ratio (OR): 2.63, 95% confidence interval (CI): 1.03-5.37] and control (OR: 1.72; 95% CI: 0.94-3.13). Among older men, large networks were associated with a lower prevalence of hypertension (OR: 0.75; 95% CI: 0.58-0.96). Compared to older women, older men with coarse networks exhibited better hypertension awareness (OR: 0.37; 95% CI: 0.14-0.95) and control (OR: 0.42; 95% CI: 0.19-0.91). Network size interacted with density for hypertension control (P = 0.051), with controlled hypertension being associated with large and course networks. A large network was associated with a lower risk for hypertension, and a coarse network was associated with hypertension awareness and control among older men. Older women with dense networks were most likely to exhibit hypertension awareness and control.
Susceptible-infected-recovered epidemics in random networks with population awareness
NASA Astrophysics Data System (ADS)
Wu, Qingchu; Chen, Shufang
2017-10-01
The influence of epidemic information-based awareness on the spread of infectious diseases on networks cannot be ignored. Within the effective degree modeling framework, we discuss the susceptible-infected-recovered model in complex networks with general awareness and general degree distribution. By performing the linear stability analysis, the conditions of epidemic outbreak can be deduced and the results of the previous research can be further expanded. Results show that the local awareness can suppress significantly the epidemic spreading on complex networks via raising the epidemic threshold and such effects are closely related to the formulation of awareness functions. In addition, our results suggest that the recovered information-based awareness has no effect on the critical condition of epidemic outbreak.
Ambient awareness: From random noise to digital closeness in online social networks
Levordashka, Ana; Utz, Sonja
2016-01-01
Ambient awareness refers to the awareness social media users develop of their online network in result of being constantly exposed to social information, such as microblogging updates. Although each individual bit of information can seem like random noise, their incessant reception can amass to a coherent representation of social others. Despite its growing popularity and important implications for social media research, ambient awareness on public social media has not been studied empirically. We provide evidence for the occurrence of ambient awareness and examine key questions related to its content and functions. A diverse sample of participants reported experiencing awareness, both as a general feeling towards their network as a whole, and as knowledge of individual members of the network, whom they had not met in real life. Our results indicate that ambient awareness can develop peripherally, from fragmented information and in the relative absence of extensive one-to-one communication. We report the effects of demographics, media use, and network variables and discuss the implications of ambient awareness for relational and informational processes online. PMID:27375343
Ambient awareness: From random noise to digital closeness in online social networks.
Levordashka, Ana; Utz, Sonja
2016-07-01
Ambient awareness refers to the awareness social media users develop of their online network in result of being constantly exposed to social information, such as microblogging updates. Although each individual bit of information can seem like random noise, their incessant reception can amass to a coherent representation of social others. Despite its growing popularity and important implications for social media research, ambient awareness on public social media has not been studied empirically. We provide evidence for the occurrence of ambient awareness and examine key questions related to its content and functions. A diverse sample of participants reported experiencing awareness, both as a general feeling towards their network as a whole, and as knowledge of individual members of the network, whom they had not met in real life. Our results indicate that ambient awareness can develop peripherally, from fragmented information and in the relative absence of extensive one-to-one communication. We report the effects of demographics, media use, and network variables and discuss the implications of ambient awareness for relational and informational processes online.
ERIC Educational Resources Information Center
Lin, Jian-Wei; Huang, Hsieh-Hong; Chuang, Yuh-Shy
2015-01-01
An e-learning environment that supports social network awareness (SNA) is a highly effective means of increasing peer interaction and assisting student learning by raising awareness of social and learning contexts of peers. Network centrality profoundly impacts student learning in an SNA-related e-learning environment. Additionally,…
Salmon, P M; Stanton, N A; Walker, G H; Jenkins, D; Baber, C; McMaster, R
2008-03-01
The concept of distributed situation awareness (DSA) is currently receiving increasing attention from the human factors community. This article investigates DSA in a collaborative real-world industrial setting by discussing the results derived from a recent naturalistic study undertaken within the UK energy distribution domain. The results describe the DSA-related information used by the networks of agents involved in the scenarios analysed, the sharing of this information between the agents and the salience of different information elements used. Thus, the structure, quality and content of each network's DSA is discussed, along with the implications for DSA theory. The findings reinforce the notion that when viewing situation awareness (SA) in collaborative systems, it is useful to focus on the coordinated behaviour of the system itself, rather than on the individual as the unit of analysis and suggest that the findings from such assessments can potentially be used to inform system, procedure and training design. SA is a critical commodity for teams working in industrial systems and systems, procedures and training programmes should be designed to facilitate efficient system SA acquisition and maintenance. This article presents approaches for describing and understanding SA during real-world collaborative tasks, the outputs from which can potentially be used to inform system, training programmes and procedure design.
QoS-aware health monitoring system using cloud-based WBANs.
Almashaqbeh, Ghada; Hayajneh, Thaier; Vasilakos, Athanasios V; Mohd, Bassam J
2014-10-01
Wireless Body Area Networks (WBANs) are amongst the best options for remote health monitoring. However, as standalone systems WBANs have many limitations due to the large amount of processed data, mobility of monitored users, and the network coverage area. Integrating WBANs with cloud computing provides effective solutions to these problems and promotes the performance of WBANs based systems. Accordingly, in this paper we propose a cloud-based real-time remote health monitoring system for tracking the health status of non-hospitalized patients while practicing their daily activities. Compared with existing cloud-based WBAN frameworks, we divide the cloud into local one, that includes the monitored users and local medical staff, and a global one that includes the outer world. The performance of the proposed framework is optimized by reducing congestion, interference, and data delivery delay while supporting users' mobility. Several novel techniques and algorithms are proposed to accomplish our objective. First, the concept of data classification and aggregation is utilized to avoid clogging the network with unnecessary data traffic. Second, a dynamic channel assignment policy is developed to distribute the WBANs associated with the users on the available frequency channels to manage interference. Third, a delay-aware routing metric is proposed to be used by the local cloud in its multi-hop communication to speed up the reporting process of the health-related data. Fourth, the delay-aware metric is further utilized by the association protocols used by the WBANs to connect with the local cloud. Finally, the system with all the proposed techniques and algorithms is evaluated using extensive ns-2 simulations. The simulation results show superior performance of the proposed architecture in optimizing the end-to-end delay, handling the increased interference levels, maximizing the network capacity, and tracking user's mobility.
Cyber Situational Awareness through Operational Streaming Analysis
2011-04-07
Our system makes use of two specific data sources from network traffic: raw packet data and NetFlow connection summary records (de- scribed below...implemented an operational prototype system using the following two data feeds. a) NetFlow Data: Our system processes the NetFlow records of all...Internet gateway traffic for a large enterprise network. It uses the standard Cisco NetFlow version 5 proto- col, which defines a flow as a
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
2015-06-01
unit may setup and teardown the entire tactical infrastructure multiple times per day. This tactical network administrator training is a critical...language and runs on Linux and Unix based systems. All provisioning is based around the Nagios Core application, a powerful backend solution for network...start up a large number of virtual machines quickly. CORE supports the simulation of fixed and mobile networks. CORE is open-source, written in Python
Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde
2016-01-01
A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In addition, the information sharing network was largely imbalanced and dominated by a few key individuals so that most individuals in the network have very few email connections, but a small number of individuals have very many connections. These results highlight several major growing pains for networked organizations and military organizations in particular.
Buchler, Norbou; Fitzhugh, Sean M.; Marusich, Laura R.; Ungvarsky, Diane M.; Lebiere, Christian; Gonzalez, Cleotilde
2016-01-01
A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In addition, the information sharing network was largely imbalanced and dominated by a few key individuals so that most individuals in the network have very few email connections, but a small number of individuals have very many connections. These results highlight several major growing pains for networked organizations and military organizations in particular. PMID:27445905
Simultaneous Visualization of Different Utility Networks for Disaster Management
NASA Astrophysics Data System (ADS)
Semm, S.; Becker, T.; Kolbe, T. H.
2012-07-01
Cartographic visualizations of crises are used to create a Common Operational Picture (COP) and enforce Situational Awareness by presenting and representing relevant information. As nearly all crises affect geospatial entities, geo-data representations have to support location-specific decision-making throughout the crises. Since, Operator's attention span and their working memory are limiting factors for the process of getting and interpreting information; the cartographic presentation has to support individuals in coordinating their activities and with handling highly dynamic situations. The Situational Awareness of operators in conjunction with a COP are key aspects of the decision making process and essential for coming to appropriate decisions. Utility networks are one of the most complex and most needed systems within a city. The visualization of utility infrastructure in crisis situations is addressed in this paper. The paper will provide a conceptual approach on how to simplify, aggregate, and visualize multiple utility networks and their components to meet the requirements of the decision-making process and to support Situational Awareness.
Improving Situation Awareness with the Android Team Awareness Kit (ATAK)
2015-04-01
fluid user experience and enhanced data sharing. 19 6.2.2 Esri Esri is a US-based company that sells geospatial information systems and data services...field, Situational Awareness (SA) needs to be conveyed in a de- centralized manner to the users at the edge of the network as well as at operations...that ATAK has built-in, and the ways it is being used by a variety of military, homeland security, and law enforcement users . Keywords: situational
A planetary nervous system for social mining and collective awareness
NASA Astrophysics Data System (ADS)
Giannotti, F.; Pedreschi, D.; Pentland, A.; Lukowicz, P.; Kossmann, D.; Crowley, J.; Helbing, D.
2012-11-01
We present a research roadmap of a Planetary Nervous System (PNS), capable of sensing and mining the digital breadcrumbs of human activities and unveiling the knowledge hidden in the big data for addressing the big questions about social complexity. We envision the PNS as a globally distributed, self-organizing, techno-social system for answering analytical questions about the status of world-wide society, based on three pillars: social sensing, social mining and the idea of trust networks and privacy-aware social mining. We discuss the ingredients of a science and a technology necessary to build the PNS upon the three mentioned pillars, beyond the limitations of their respective state-of-art. Social sensing is aimed at developing better methods for harvesting the big data from the techno-social ecosystem and make them available for mining, learning and analysis at a properly high abstraction level. Social mining is the problem of discovering patterns and models of human behaviour from the sensed data across the various social dimensions by data mining, machine learning and social network analysis. Trusted networks and privacy-aware social mining is aimed at creating a new deal around the questions of privacy and data ownership empowering individual persons with full awareness and control on own personal data, so that users may allow access and use of their data for their own good and the common good. The PNS will provide a goal-oriented knowledge discovery framework, made of technology and people, able to configure itself to the aim of answering questions about the pulse of global society. Given an analytical request, the PNS activates a process composed by a variety of interconnected tasks exploiting the social sensing and mining methods within the transparent ecosystem provided by the trusted network. The PNS we foresee is the key tool for individual and collective awareness for the knowledge society. We need such a tool for everyone to become fully aware of how powerful is the knowledge of our society we can achieve by leveraging our wisdom as a crowd, and how important is that everybody participates both as a consumer and as a producer of the social knowledge, for it to become a trustable, accessible, safe and useful public good.
Bluetooth-Assisted Context-Awareness in Educational Data Networks
ERIC Educational Resources Information Center
Gonzalez-Castano, F. J.; Garcia-Reinoso, J.; Gil-Castineira, F.; Costa-Montenegro, E.; Pousada-Carballo, J. M.
2005-01-01
In this paper, we propose an auxiliary "location network", to support user-independent context-awareness in educational data networks; for example, to help visitors in a museum. We assume that, in such scenarios, there exist "service servers" that need to be aware of user location in real-time. Specifically, we propose the implementation of a…
Aeronautical Situational Awareness - Airport Surface
NASA Technical Reports Server (NTRS)
Linetsky, Vladimir M.; Ivancic, William D.; Vaden, Karl R.
2017-01-01
This paper advocates for a specific design approach, based on simple principals, yet addresses challenges faced by the system engineers when designing complex data and information infrastructure. The document provides guidance for breaking out various work elements in the overall network architecture design, so that communication systems are conceived and effectively realized regardless of their location, size and local specifics. Although targeted at the Global Airspace System (GAS) and National Airspace System (NAS), this framework can be applied to any network-centric architecture.
Naito, Eiichi; Morita, Tomoyo; Amemiya, Kaoru
2016-03-01
The human brain can generate a continuously changing postural model of our body. Somatic (proprioceptive) signals from skeletal muscles and joints contribute to the formation of the body representation. Recent neuroimaging studies of proprioceptive bodily illusions have elucidated the importance of three brain systems (motor network, specialized parietal systems, right inferior fronto-parietal network) in the formation of the human body representation. The motor network, especially the primary motor cortex, processes afferent input from skeletal muscles. Such information may contribute to the formation of kinematic/dynamic postural models of limbs, thereby enabling fast online feedback control. Distinct parietal regions appear to play specialized roles in the transformation/integration of information across different coordinate systems, which may subserve the adaptability and flexibility of the body representation. Finally, the right inferior fronto-parietal network, connected by the inferior branch of the superior longitudinal fasciculus, is consistently recruited when an individual experiences various types of bodily illusions and its possible roles relate to corporeal awareness, which is likely elicited through a series of neuronal processes of monitoring and accumulating bodily information and updating the body representation. Because this network is also recruited when identifying one's own features, the network activity could be a neuronal basis for self-consciousness. Copyright © 2015 Elsevier Ireland Ltd and the Japan Neuroscience Society. All rights reserved.
Designing a holistic end-to-end intelligent network analysis and security platform
NASA Astrophysics Data System (ADS)
Alzahrani, M.
2018-03-01
Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo’s system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user’s behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.
Faculty Use of Author Identifiers and Researcher Networking Tools
ERIC Educational Resources Information Center
Tran, Clara Y.; Lyon, Jennifer A.
2017-01-01
This cross-sectional survey focused on faculty use and knowledge of author identifiers and researcher networking systems, and professional use of social media, at a large state university. Results from 296 completed faculty surveys representing all disciplines (9.3% response rate) show low levels of awareness and variable resource preferences. The…
Implementation of Networking-by-Touch to Small Unit, Network-Enabled Operations
2010-09-01
Monitoring – Telemanipulation ............... 54 5. Entertainment and Educational Applications...................... 55 6. Tactile Displays Embedded...military situational awareness systems, text and graphics applications, medical applications, entertainment and educational applications...25] ) Electromechanical transducer Electromagnetic field sensors Computer driver 21 Now, consider another simple scenario: John loves music
Architectures for Device Aware Network
2005-03-01
68 b. PDA in DAN Mode ............................................................. 69 c. Cell Phone in DAN Mode...68 Figure 15. PDA in DAN Mode - Reduced Resolution Image ..................................... 69 Figure 16. Cell Phone in DAN Mode -No Image...computer, notebook computer, cell phone and a host of networked embedded systems) may have extremely differing capabilities and resources to retrieve and
Dynamical Interplay between Awareness and Epidemic Spreading in Multiplex Networks
NASA Astrophysics Data System (ADS)
Granell, Clara; Gómez, Sergio; Arenas, Alex
2013-09-01
We present the analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the information awareness to prevent its infection, on top of multiplex networks. This scenario is representative of an epidemic process spreading on a network of persistent real contacts, and a cyclic information awareness process diffusing in the network of virtual social contacts between the same individuals. The topology corresponds to a multiplex network where two diffusive processes are interacting affecting each other. The analysis using a microscopic Markov chain approach reveals the phase diagram of the incidence of the epidemics and allows us to capture the evolution of the epidemic threshold depending on the topological structure of the multiplex and the interrelation with the awareness process. Interestingly, the critical point for the onset of the epidemics has a critical value (metacritical point) defined by the awareness dynamics and the topology of the virtual network, from which the onset increases and the epidemics incidence decreases.
Dynamical interplay between awareness and epidemic spreading in multiplex networks.
Granell, Clara; Gómez, Sergio; Arenas, Alex
2013-09-20
We present the analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the information awareness to prevent its infection, on top of multiplex networks. This scenario is representative of an epidemic process spreading on a network of persistent real contacts, and a cyclic information awareness process diffusing in the network of virtual social contacts between the same individuals. The topology corresponds to a multiplex network where two diffusive processes are interacting affecting each other. The analysis using a microscopic Markov chain approach reveals the phase diagram of the incidence of the epidemics and allows us to capture the evolution of the epidemic threshold depending on the topological structure of the multiplex and the interrelation with the awareness process. Interestingly, the critical point for the onset of the epidemics has a critical value (metacritical point) defined by the awareness dynamics and the topology of the virtual network, from which the onset increases and the epidemics incidence decreases.
Cyber situational awareness and differential hardening
NASA Astrophysics Data System (ADS)
Dwivedi, Anurag; Tebben, Dan
2012-06-01
The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.
2008-08-08
Ms. Cindy E. Moran Director for Network Services 8 August 2008 DISN Forecast to Industry Report Documentation Page Form ApprovedOMB No. 0704-0188...TITLE AND SUBTITLE DISN (Defense Information system Network ) Forecast to Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Prescribed by ANSI Std Z39-18 2 2 Integrated DISN Services by 2016: A Solid Goal Network Aware Applications Common Storage & Retrieval Shared Long
The explosion at institute: modeling and analyzing the situation awareness factor.
Naderpour, Mohsen; Lu, Jie; Zhang, Guangquan
2014-12-01
In 2008 a runaway chemical reaction caused an explosion at a methomyl unit in West Virginia, USA, killing two employees, injuring eight people, evacuating more than 40,000 residents adjacent to the facility, disrupting traffic on a nearby highway and causing significant business loss and interruption. Although the accident was formally investigated, the role of the situation awareness (SA) factor, i.e., a correct understanding of the situation, and appropriate models to maintain SA, remain unexplained. This paper extracts details of abnormal situations within the methomyl unit and models them into a situational network using dynamic Bayesian networks. A fuzzy logic system is used to resemble the operator's thinking when confronted with these abnormal situations. The combined situational network and fuzzy logic system make it possible for the operator to assess such situations dynamically to achieve accurate SA. The findings show that the proposed structure provides a useful graphical model that facilitates the inclusion of prior background knowledge and the updating of this knowledge when new information is available from monitoring systems. Copyright © 2014 Elsevier Ltd. All rights reserved.
Epidemic spreading with activity-driven awareness diffusion on multiplex network.
Guo, Quantong; Lei, Yanjun; Jiang, Xin; Ma, Yifang; Huo, Guanying; Zheng, Zhiming
2016-04-01
There has been growing interest in exploring the interplay between epidemic spreading with human response, since it is natural for people to take various measures when they become aware of epidemics. As a proper way to describe the multiple connections among people in reality, multiplex network, a set of nodes interacting through multiple sets of edges, has attracted much attention. In this paper, to explore the coupled dynamical processes, a multiplex network with two layers is built. Specifically, the information spreading layer is a time varying network generated by the activity driven model, while the contagion layer is a static network. We extend the microscopic Markov chain approach to derive the epidemic threshold of the model. Compared with extensive Monte Carlo simulations, the method shows high accuracy for the prediction of the epidemic threshold. Besides, taking different spreading models of awareness into consideration, we explored the interplay between epidemic spreading with awareness spreading. The results show that the awareness spreading can not only enhance the epidemic threshold but also reduce the prevalence of epidemics. When the spreading of awareness is defined as susceptible-infected-susceptible model, there exists a critical value where the dynamical process on the awareness layer can control the onset of epidemics; while if it is a threshold model, the epidemic threshold emerges an abrupt transition with the local awareness ratio α approximating 0.5. Moreover, we also find that temporal changes in the topology hinder the spread of awareness which directly affect the epidemic threshold, especially when the awareness layer is threshold model. Given that the threshold model is a widely used model for social contagion, this is an important and meaningful result. Our results could also lead to interesting future research about the different time-scales of structural changes in multiplex networks.
Epidemic spreading with activity-driven awareness diffusion on multiplex network
NASA Astrophysics Data System (ADS)
Guo, Quantong; Lei, Yanjun; Jiang, Xin; Ma, Yifang; Huo, Guanying; Zheng, Zhiming
2016-04-01
There has been growing interest in exploring the interplay between epidemic spreading with human response, since it is natural for people to take various measures when they become aware of epidemics. As a proper way to describe the multiple connections among people in reality, multiplex network, a set of nodes interacting through multiple sets of edges, has attracted much attention. In this paper, to explore the coupled dynamical processes, a multiplex network with two layers is built. Specifically, the information spreading layer is a time varying network generated by the activity driven model, while the contagion layer is a static network. We extend the microscopic Markov chain approach to derive the epidemic threshold of the model. Compared with extensive Monte Carlo simulations, the method shows high accuracy for the prediction of the epidemic threshold. Besides, taking different spreading models of awareness into consideration, we explored the interplay between epidemic spreading with awareness spreading. The results show that the awareness spreading can not only enhance the epidemic threshold but also reduce the prevalence of epidemics. When the spreading of awareness is defined as susceptible-infected-susceptible model, there exists a critical value where the dynamical process on the awareness layer can control the onset of epidemics; while if it is a threshold model, the epidemic threshold emerges an abrupt transition with the local awareness ratio α approximating 0.5. Moreover, we also find that temporal changes in the topology hinder the spread of awareness which directly affect the epidemic threshold, especially when the awareness layer is threshold model. Given that the threshold model is a widely used model for social contagion, this is an important and meaningful result. Our results could also lead to interesting future research about the different time-scales of structural changes in multiplex networks.
Network simulation using the simulation language for alternate modeling (SLAM 2)
NASA Technical Reports Server (NTRS)
Shen, S.; Morris, D. W.
1983-01-01
The simulation language for alternate modeling (SLAM 2) is a general purpose language that combines network, discrete event, and continuous modeling capabilities in a single language system. The efficacy of the system's network modeling is examined and discussed. Examples are given of the symbolism that is used, and an example problem and model are derived. The results are discussed in terms of the ease of programming, special features, and system limitations. The system offers many features which allow rapid model development and provides an informative standardized output. The system also has limitations which may cause undetected errors and misleading reports unless the user is aware of these programming characteristics.
Low-complex energy-aware image communication in visual sensor networks
NASA Astrophysics Data System (ADS)
Phamila, Yesudhas Asnath Victy; Amutha, Ramachandran
2013-10-01
A low-complex, low bit rate, energy-efficient image compression algorithm explicitly designed for resource-constrained visual sensor networks applied for surveillance, battle field, habitat monitoring, etc. is presented, where voluminous amount of image data has to be communicated over a bandwidth-limited wireless medium. The proposed method overcomes the energy limitation of individual nodes and is investigated in terms of image quality, entropy, processing time, overall energy consumption, and system lifetime. This algorithm is highly energy efficient and extremely fast since it applies energy-aware zonal binary discrete cosine transform (DCT) that computes only the few required significant coefficients and codes them using enhanced complementary Golomb Rice code without using any floating point operations. Experiments are performed using the Atmel Atmega128 and MSP430 processors to measure the resultant energy savings. Simulation results show that the proposed energy-aware fast zonal transform consumes only 0.3% of energy needed by conventional DCT. This algorithm consumes only 6% of energy needed by Independent JPEG Group (fast) version, and it suits for embedded systems requiring low power consumption. The proposed scheme is unique since it significantly enhances the lifetime of the camera sensor node and the network without any need for distributed processing as was traditionally required in existing algorithms.
Content-aware network storage system supporting metadata retrieval
NASA Astrophysics Data System (ADS)
Liu, Ke; Qin, Leihua; Zhou, Jingli; Nie, Xuejun
2008-12-01
Nowadays, content-based network storage has become the hot research spot of academy and corporation[1]. In order to solve the problem of hit rate decline causing by migration and achieve the content-based query, we exploit a new content-aware storage system which supports metadata retrieval to improve the query performance. Firstly, we extend the SCSI command descriptor block to enable system understand those self-defined query requests. Secondly, the extracted metadata is encoded by extensible markup language to improve the universality. Thirdly, according to the demand of information lifecycle management (ILM), we store those data in different storage level and use corresponding query strategy to retrieval them. Fourthly, as the file content identifier plays an important role in locating data and calculating block correlation, we use it to fetch files and sort query results through friendly user interface. Finally, the experiments indicate that the retrieval strategy and sort algorithm have enhanced the retrieval efficiency and precision.
NASA Astrophysics Data System (ADS)
Kikuchi, Takahiro; Kubo, Ryogo
2016-08-01
In energy-efficient passive optical network (PON) systems, the increase in the queuing delays caused by the power-saving mechanism of optical network units (ONUs) is an important issue. Some researchers have proposed quality-of-service (QoS)-aware ONU cyclic sleep controllers in PON systems. We have proposed proportional (P) and proportional-derivative (PD)-based controllers to maintain the average queuing delay at a constant level regardless of the amount of downstream traffic. However, sufficient performance has not been obtained because of the sleep period limitation. In this paper, proportional-integral (PI) and proportional-integral-derivative (PID)-based controllers considering the sleep period limitation, i.e., using an anti-windup (AW) technique, are proposed to improve both the QoS and power-saving performance. Simulations confirm that the proposed controllers provide better performance than conventional controllers in terms of the average downstream queuing delay and the time occupancy of ONU active periods.
2003-06-01
security faculty. This program offers great teaching along with the ability to master the material needed for the two most popular certifications in...then move on to an overview of some popular networks. The Open Systems Interconnect model (OSI) will be introduced to trainees to make them understand...several different network types, this part explains the two most popular types of networks: LANs and WANs. 2.1.4. Time: 30 Minutes 32 2.2. Network
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
The neural basis of impaired self-awareness after traumatic brain injury
Ham, Timothy E.; Bonnelle, Valerie; Hellyer, Peter; Jilka, Sagar; Robertson, Ian H.; Leech, Robert
2014-01-01
Self-awareness is commonly impaired after traumatic brain injury. This is an important clinical issue as awareness affects long-term outcome and limits attempts at rehabilitation. It can be investigated by studying how patients respond to their errors and monitor their performance on tasks. As awareness is thought to be an emergent property of network activity, we tested the hypothesis that impaired self-awareness is associated with abnormal brain network function. We investigated a group of subjects with traumatic brain injury (n = 63) split into low and high performance-monitoring groups based on their ability to recognize and correct their own errors. Brain network function was assessed using resting-state and event-related functional magnetic resonance imaging. This allowed us to investigate baseline network function, as well as the evoked response of networks to specific events including errors. The low performance-monitoring group underestimated their disability and showed broad attentional deficits. Neural activity within what has been termed the fronto-parietal control network was abnormal in patients with impaired self-awareness. The dorsal anterior cingulate cortex is a key part of this network that is involved in performance-monitoring. This region showed reduced functional connectivity to the rest of the fronto-parietal control network at ‘rest’. In addition, the anterior insulae, which are normally tightly linked to the dorsal anterior cingulate cortex, showed increased activity following errors in the impaired group. Interestingly, the traumatic brain injury patient group with normal performance-monitoring showed abnormally high activation of the right middle frontal gyrus, putamen and caudate in response to errors. The impairment of self-awareness was not explained either by the location of focal brain injury, or the amount of traumatic axonal injury as demonstrated by diffusion tensor imaging. The results suggest that impairments of self-awareness after traumatic brain injury result from breakdown of functional interactions between nodes within the fronto-parietal control network. PMID:24371217
The neural basis of impaired self-awareness after traumatic brain injury.
Ham, Timothy E; Bonnelle, Valerie; Hellyer, Peter; Jilka, Sagar; Robertson, Ian H; Leech, Robert; Sharp, David J
2014-02-01
Self-awareness is commonly impaired after traumatic brain injury. This is an important clinical issue as awareness affects long-term outcome and limits attempts at rehabilitation. It can be investigated by studying how patients respond to their errors and monitor their performance on tasks. As awareness is thought to be an emergent property of network activity, we tested the hypothesis that impaired self-awareness is associated with abnormal brain network function. We investigated a group of subjects with traumatic brain injury (n = 63) split into low and high performance-monitoring groups based on their ability to recognize and correct their own errors. Brain network function was assessed using resting-state and event-related functional magnetic resonance imaging. This allowed us to investigate baseline network function, as well as the evoked response of networks to specific events including errors. The low performance-monitoring group underestimated their disability and showed broad attentional deficits. Neural activity within what has been termed the fronto-parietal control network was abnormal in patients with impaired self-awareness. The dorsal anterior cingulate cortex is a key part of this network that is involved in performance-monitoring. This region showed reduced functional connectivity to the rest of the fronto-parietal control network at 'rest'. In addition, the anterior insulae, which are normally tightly linked to the dorsal anterior cingulate cortex, showed increased activity following errors in the impaired group. Interestingly, the traumatic brain injury patient group with normal performance-monitoring showed abnormally high activation of the right middle frontal gyrus, putamen and caudate in response to errors. The impairment of self-awareness was not explained either by the location of focal brain injury, or the amount of traumatic axonal injury as demonstrated by diffusion tensor imaging. The results suggest that impairments of self-awareness after traumatic brain injury result from breakdown of functional interactions between nodes within the fronto-parietal control network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less
ERIC Educational Resources Information Center
Liu, C.-C.; Tao, S.-Y.; Nee, J.-N.
2008-01-01
The internet has been widely used to promote collaborative learning among students. However, students do not always have access to the system, leading to doubt in the interaction among the students, and reducing the effectiveness of collaborative learning, since the web-based collaborative learning environment relies entirely on the availability…
Study on the context-aware middleware for ubiquitous greenhouses using wireless sensor networks.
Hwang, Jeonghwang; Yoe, Hyun
2011-01-01
Wireless Sensor Network (WSN) technology is one of the important technologies to implement the ubiquitous society, and it could increase productivity of agricultural and livestock products, and secure transparency of distribution channels if such a WSN technology were successfully applied to the agricultural sector. Middleware, which can connect WSN hardware, applications, and enterprise systems, is required to construct ubiquitous agriculture environment combining WSN technology with agricultural sector applications, but there have been insufficient studies in the field of WSN middleware in the agricultural environment, compared to other industries. This paper proposes a context-aware middleware to efficiently process data collected from ubiquitous greenhouses by applying WSN technology and used to implement combined services through organic connectivity of data. The proposed middleware abstracts heterogeneous sensor nodes to integrate different forms of data, and provides intelligent context-aware, event service, and filtering functions to maximize operability and scalability of the middleware. To evaluate the performance of the middleware, an integrated management system for ubiquitous greenhouses was implemented by applying the proposed middleware to an existing greenhouse, and it was tested by measuring the level of load through CPU usage and the response time for users' requests when the system is working.
Smart border: ad-hoc wireless sensor networks for border surveillance
NASA Astrophysics Data System (ADS)
He, Jun; Fallahi, Mahmoud; Norwood, Robert A.; Peyghambarian, Nasser
2011-06-01
Wireless sensor networks have been proposed as promising candidates to provide automated monitoring, target tracking, and intrusion detection for border surveillance. In this paper, we demonstrate an ad-hoc wireless sensor network system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This paper also presents energy-aware and sleeping algorithms designed to maximize the operating lifetime of the deployed sensor network. Lessons learned in building the network and important findings from field experiments are shared in the paper.
On Deep Learning for Trust-Aware Recommendations in Social Networks.
Deng, Shuiguang; Huang, Longtao; Xu, Guandong; Wu, Xindong; Wu, Zhaohui
2017-05-01
With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matrix factorization (MF) becomes dominant in recommender systems, the recommendation largely relies on the initialization of the user and item latent feature vectors. Aiming at addressing these challenges, we develop a novel trust-based approach for recommendation in social networks. In particular, we attempt to leverage deep learning to determinate the initialization in MF for trust-aware social recommendations and to differentiate the community effect in user's trusted friendships. A two-phase recommendation process is proposed to utilize deep learning in initialization and to synthesize the users' interests and their trusted friends' interests together with the impact of community effect for recommendations. We perform extensive experiments on real-world social network data to demonstrate the accuracy and effectiveness of our proposed approach in comparison with other state-of-the-art methods.
The Real Time Mission Monitor: A Situational Awareness Tool For Managing Experiment Assets
NASA Technical Reports Server (NTRS)
Blakeslee, Richard; Hall, John; Goodman, Michael; Parker, Philip; Freudinger, Larry; He, Matt
2007-01-01
The NASA Real Time Mission Monitor (RTMM) is a situational awareness tool that integrates satellite, airborne and surface data sets; weather information; model and forecast outputs; and vehicle state data (e.g., aircraft navigation, satellite tracks and instrument field-of-views) for field experiment management RTMM optimizes science and logistic decision-making during field experiments by presenting timely data and graphics to the users to improve real time situational awareness of the experiment's assets. The RTMM is proven in the field as it supported program managers, scientists, and aircraft personnel during the NASA African Monsoon Multidisciplinary Analyses experiment during summer 2006 in Cape Verde, Africa. The integration and delivery of this information is made possible through data acquisition systems, network communication links and network server resources built and managed by collaborators at NASA Dryden Flight Research Center (DFRC) and Marshall Space Flight Center (MSFC). RTMM is evolving towards a more flexible and dynamic combination of sensor ingest, network computing, and decision-making activities through the use of a service oriented architecture based on community standards and protocols.
Using NetMaster to manage IBM networks
NASA Technical Reports Server (NTRS)
Ginsburg, Guss
1991-01-01
After defining a network and conveying its importance to support the activities at the JSC, the need for network management based on the size and complexity of the IBM SNA network at JSC is demonstrated. Network Management consists of being aware of component status and the ability to control resources to meet the availability and service needs of users. The concerns of the user are addressed as well as those of the staff responsible for managing the network. It is explained how NetMaster (a network management system for managing SNA networks) is used to enhance reliability and maximize service to SNA network users through automated procedures. The following areas are discussed: customization, problem and configuration management, and system measurement applications of NetMaster. Also, several examples are given that demonstrate NetMaster's ability to manage and control the network, integrate various product functions, as well as provide useful management information.
Multiple Factors-Aware Diffusion in Social Networks
2015-05-22
Multiple Factors-Aware Diffusion in Social Networks Chung-Kuang Chou(B) and Ming-Syan Chen Department of Electrical Engineering, National Taiwan...propagates from nodes to nodes over a social network . The behavior that a node adopts an information piece in a social network can be affected by...Twitter dataset. Keywords: Social networks · Diffusion models 1 Introduction Information diffusion in social networks has been an active research field
NASA Astrophysics Data System (ADS)
Lee, K. David; Colony, Mike
2011-06-01
Modeling and simulation has been established as a cost-effective means of supporting the development of requirements, exploring doctrinal alternatives, assessing system performance, and performing design trade-off analysis. The Army's constructive simulation for the evaluation of equipment effectiveness in small combat unit operations is currently limited to representation of situation awareness without inclusion of the many uncertainties associated with real world combat environments. The goal of this research is to provide an ability to model situation awareness and decision process uncertainties in order to improve evaluation of the impact of battlefield equipment on ground soldier and small combat unit decision processes. Our Army Probabilistic Inference and Decision Engine (Army-PRIDE) system provides this required uncertainty modeling through the application of two critical techniques that allow Bayesian network technology to be applied to real-time applications. (Object-Oriented Bayesian Network methodology and Object-Oriented Inference technique). In this research, we implement decision process and situation awareness models for a reference scenario using Army-PRIDE and demonstrate its ability to model a variety of uncertainty elements, including: confidence of source, information completeness, and information loss. We also demonstrate that Army-PRIDE improves the realism of the current constructive simulation's decision processes through Monte Carlo simulation.
Rethinking Indoor Localization Solutions Towards the Future of Mobile Location-Based Services
NASA Astrophysics Data System (ADS)
Guney, C.
2017-11-01
Satellite navigation systems with GNSS-enabled devices, such as smartphones, car navigation systems, have changed the way users travel in outdoor environment. GNSS is generally not well suited for indoor location and navigation because of two reasons: First, GNSS does not provide a high level of accuracy although indoor applications need higher accuracies. Secondly, poor coverage of satellite signals for indoor environments decreases its accuracy. So rather than using GNSS satellites within closed environments, existing indoor navigation solutions rely heavily on installed sensor networks. There is a high demand for accurate positioning in wireless networks in GNSS-denied environments. However, current wireless indoor positioning systems cannot satisfy the challenging needs of indoor location-aware applications. Nevertheless, access to a user's location indoors is increasingly important in the development of context-aware applications that increases business efficiency. In this study, how can the current wireless location sensing systems be tailored and integrated for specific applications, like smart cities/grids/buildings/cars and IoT applications, in GNSS-deprived areas.
Energy-aware virtual network embedding in flexi-grid networks.
Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng
2017-11-27
Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.
Towards a flexible middleware for context-aware pervasive and wearable systems.
Muro, Marco; Amoretti, Michele; Zanichelli, Francesco; Conte, Gianni
2012-11-01
Ambient intelligence and wearable computing call for innovative hardware and software technologies, including a highly capable, flexible and efficient middleware, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support self-management, interoperability among different platforms, efficient communications, and context awareness. In the on-going "everything is networked" scenario scalability appears as a very important issue, for which the peer-to-peer (P2P) paradigm emerges as an appealing solution for connecting software components in an overlay network, allowing for efficient and balanced data distribution mechanisms. In this paper, we illustrate how all these concepts can be placed into a theoretical tool, called networked autonomic machine (NAM), implemented into a NAM-based middleware, and evaluated against practical problems of pervasive computing.
The Situation Awareness Weighted Network (SAWN) model and method: Theory and application.
Kalloniatis, Alexander; Ali, Irena; Neville, Timothy; La, Phuong; Macleod, Iain; Zuparic, Mathew; Kohn, Elizabeth
2017-05-01
We introduce a novel model and associated data collection method to examine how a distributed organisation of military staff who feed a Common Operating Picture (COP) generates Situation Awareness (SA), a critical component in organisational performance. The proposed empirically derived Situation Awareness Weighted Network (SAWN) model draws on two scientific models of SA, by Endsley involving perception, comprehension and projection, and by Stanton et al. positing that SA exists across a social and semantic network of people and information objects in activities connected across a set of tasks. The output of SAWN is a representation as a weighted semi-bipartite network of the interaction between people ('human nodes') and information artefacts such as documents and system displays ('product nodes'); link weights represent the Endsley levels of SA that individuals acquire from or provide to information objects and other individuals. The SAWN method is illustrated with aggregated empirical data from a case study of Australian military staff undertaking their work during two very different scenarios, during steady-state operations and in a crisis threat context. A key outcome of analysis of the weighted networks is that we are able to quantify flow of SA through an organisation as staff seek to "value-add" in the conduct of their work. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
Pujol, Jesus; Blanco-Hinojo, Laura; Batalla, Albert; López-Solà, Marina; Harrison, Ben J; Soriano-Mas, Carles; Crippa, Jose A; Fagundo, Ana B; Deus, Joan; de la Torre, Rafael; Nogué, Santiago; Farré, Magí; Torrens, Marta; Martín-Santos, Rocío
2014-04-01
Recreational drugs are generally used to intentionally alter conscious experience. Long-lasting cannabis users frequently seek this effect as a means to relieve negative affect states. As with conventional anxiolytic drugs, however, changes in subjective feelings may be associated with memory impairment. We have tested whether the use of cannabis, as a psychoactive compound, is associated with alterations in spontaneous activity in brain networks relevant to self-awareness, and whether such potential changes are related to perceived anxiety and memory performance. Functional connectivity was assessed in the Default and Insula networks during resting state using fMRI in 28 heavy cannabis users and 29 control subjects. Imaging assessments were conducted during cannabis use in the unintoxicated state and repeated after one month of controlled abstinence. Cannabis users showed increased functional connectivity in the core of the Default and Insula networks and selective enhancement of functional anticorrelation between both. Reduced functional connectivity was observed in areas overlapping with other brain networks. Observed alterations were associated with behavioral measurements in a direction suggesting anxiety score reduction and interference with memory performance. Alterations were also related to the amount of cannabis used and partially persisted after one month of abstinence. Chronic cannabis use was associated with significant effects on the tuning and coupling of brain networks relevant to self-awareness, which in turn are integrated into brain systems supporting the storage of personal experience and motivated behavior. The results suggest potential mechanisms for recreational drugs to interfere with higher-order network interactions generating conscious experience. Copyright © 2014 Elsevier Ltd. All rights reserved.
Why Adolescents Use a Computer-Based Health Information System.
ERIC Educational Resources Information Center
Hawkins, Robert P.; And Others
The Body Awareness Resource Network (BARN) is a system of interactive computer programs designed to provide adolescents with confidential, nonjudgmental health information, behavior change strategies, and sources of referral. These programs cover five adolescent health areas: alcohol and other drugs, human sexuality, smoking prevention and…
2001-09-01
43 4. GPS ......................................................................................................44 E. POWER SUPPLY HARDWARE...44 Figure 5.6 Earthmate GPS Receiver ........................................................................................45...and 5Watts at 25 Ft Effective Range Minimum range of wireless link is 5 miles. Positional awareness System requires GPS input to determine
QOS-aware error recovery in wireless body sensor networks using adaptive network coding.
Razzaque, Mohammad Abdur; Javadi, Saeideh S; Coulibaly, Yahaya; Hira, Muta Tah
2014-12-29
Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network's QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts.
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-01-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed. PMID:3315052
Beyond the online catalog: developing an academic information system in the sciences.
Crawford, S; Halbrook, B; Kelly, E; Stucki, L
1987-07-01
The online public access catalog consists essentially of a machine-readable database with network capabilities. Like other computer-based information systems, it may be continuously enhanced by the addition of new capabilities and databases. It may also become a gateway to other information networks. This paper reports the evolution of the Bibliographic Access and Control System (BACS) of Washington University in end-user searching, current awareness services, information management, and administrative functions. Ongoing research and development and the future of the online catalog are also discussed.
Online Formative Assessments with Social Network Awareness
ERIC Educational Resources Information Center
Lin, Jian-Wei; Lai, Yuan-Cheng
2013-01-01
Social network awareness (SNA) has been used extensively as one of the strategies to increase knowledge sharing and collaboration opportunities. However, most SNA studies either focus on being aware of peer's knowledge context or on social context. This work proposes online formative assessments with SNA, trying to address the problems of online…
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Şen, Sevil; Clark, John A.; Tapiador, Juan E.
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.
Disease Surveillance on Complex Social Networks.
Herrera, Jose L; Srinivasan, Ravi; Brownstein, John S; Galvani, Alison P; Meyers, Lauren Ancel
2016-07-01
As infectious disease surveillance systems expand to include digital, crowd-sourced, and social network data, public health agencies are gaining unprecedented access to high-resolution data and have an opportunity to selectively monitor informative individuals. Contact networks, which are the webs of interaction through which diseases spread, determine whether and when individuals become infected, and thus who might serve as early and accurate surveillance sensors. Here, we evaluate three strategies for selecting sensors-sampling the most connected, random, and friends of random individuals-in three complex social networks-a simple scale-free network, an empirical Venezuelan college student network, and an empirical Montreal wireless hotspot usage network. Across five different surveillance goals-early and accurate detection of epidemic emergence and peak, and general situational awareness-we find that the optimal choice of sensors depends on the public health goal, the underlying network and the reproduction number of the disease (R0). For diseases with a low R0, the most connected individuals provide the earliest and most accurate information about both the onset and peak of an outbreak. However, identifying network hubs is often impractical, and they can be misleading if monitored for general situational awareness, if the underlying network has significant community structure, or if R0 is high or unknown. Taking a theoretical approach, we also derive the optimal surveillance system for early outbreak detection but find that real-world identification of such sensors would be nearly impossible. By contrast, the friends-of-random strategy offers a more practical and robust alternative. It can be readily implemented without prior knowledge of the network, and by identifying sensors with higher than average, but not the highest, epidemiological risk, it provides reasonably early and accurate information.
Content-based image exploitation for situational awareness
NASA Astrophysics Data System (ADS)
Gains, David
2008-04-01
Image exploitation is of increasing importance to the enterprise of building situational awareness from multi-source data. It involves image acquisition, identification of objects of interest in imagery, storage, search and retrieval of imagery, and the distribution of imagery over possibly bandwidth limited networks. This paper describes an image exploitation application that uses image content alone to detect objects of interest, and that automatically establishes and preserves spatial and temporal relationships between images, cameras and objects. The application features an intuitive user interface that exposes all images and information generated by the system to an operator thus facilitating the formation of situational awareness.
Naro, Antonino; Leo, Antonino; Manuli, Alfredo; Cannavò, Antonino; Bramanti, Alessia; Bramanti, Placido; Calabrò, Rocco Salvatore
2017-05-04
Awareness generation and modulation may depend on a balanced information integration and differentiation across default mode network (DMN) and external awareness networks (EAN). Neuromodulation approaches, capable of shaping information processing, may highlight residual network activities supporting awareness, which are not detectable through active paradigms, thus allowing to differentiate chronic disorders of consciousness (DoC). We studied aftereffects of repetitive transcranial magnetic stimulation (rTMS) by applying graph theory within canonical frequency bands to compare the markers of these networks in the electroencephalographic data from 20 patients with DoC. We found that patients' high-frequency networks suffered from a large-scale connectivity breakdown, paralleled by a local hyperconnectivity, whereas low-frequency networks showed a preserved but dysfunctional large-scale connectivity. There was a correlation between metrics and the behavioral awareness. Interestingly, two persons with UWS showed a residual rTMS-induced modulation of the functional correlations between the DMN and the EAN, as observed in patients with MCS. Hence, we may hypothesize that the patients with UWS who demonstrate evidence of residual DMN-EAN functional correlation may be misdiagnosed, given that such residual network correlations could support covert consciousness. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.
If it walks like a duck: nanosensor threat assessment
NASA Astrophysics Data System (ADS)
Chachis, George C.
2003-09-01
A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.
Improving Situational Awareness for First Responders via Mobile Computing
NASA Technical Reports Server (NTRS)
Betts, Bradley J.; Mah, Robert W.; Papasin, Richard; Del Mundo, Rommel; McIntosh, Dawn M.; Jorgensen, Charles
2005-01-01
This project looks to improve first responder situational awareness using tools and techniques of mobile computing. The prototype system combines wireless communication, real-time location determination, digital imaging, and three-dimensional graphics. Responder locations are tracked in an outdoor environment via GPS and uploaded to a central server via GPRS or an 802.11 network. Responders can also wirelessly share digital images and text reports, both with other responders and with the incident commander. A pre-built three dimensional graphics model of a particular emergency scene is used to visualize responder and report locations. Responders have a choice of information end points, ranging from programmable cellular phones to tablet computers. The system also employs location-aware computing to make responders aware of particular hazards as they approach them. The prototype was developed in conjunction with the NASA Ames Disaster Assistance and Rescue Team and has undergone field testing during responder exercise at NASA Ames.
Improving Situational Awareness for First Responders via Mobile Computing
NASA Technical Reports Server (NTRS)
Betts, Bradley J.; Mah, Robert W.; Papasin, Richard; Del Mundo, Rommel; McIntosh, Dawn M.; Jorgensen, Charles
2006-01-01
This project looks to improve first responder incident command, and an appropriately managed flow of situational awareness using mobile computing techniques. The prototype system combines wireless communication, real-time location determination, digital imaging, and three-dimensional graphics. Responder locations are tracked in an outdoor environment via GPS and uploaded to a central server via GPRS or an 802. II network. Responders can also wireless share digital images and text reports, both with other responders and with the incident commander. A pre-built three dimensional graphics model of the emergency scene is used to visualize responder and report locations. Responders have a choice of information end points, ranging from programmable cellular phones to tablet computers. The system also employs location-aware computing to make responders aware of particular hazards as they approach them. The prototype was developed in conjunction with the NASA Ames Disaster Assistance and Rescue Team and has undergone field testing during responder exercises at NASA Ames.
NASA Astrophysics Data System (ADS)
Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie
2018-01-01
The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.
Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil
2015-08-10
In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds.
Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil
2015-01-01
In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds. PMID:26266411
Properties of centralized cooperative sensing in cognitive radio networks
NASA Astrophysics Data System (ADS)
Skokowski, Paweł; Malon, Krzysztof; Łopatka, Jerzy
2017-04-01
Spectrum sensing is a functionality that enables network creation in the cognitive radio technology. Spectrum sensing is use for building the situation awareness knowledge for better use of radio resources and to adjust network parameters in case of jamming, interferences from legacy systems, decreasing link quality caused e.g. by nodes positions changes. This paper presents results from performed tests to compare cooperative centralized sensing versus local sensing. All tests were performed in created simulator developed in Matlab/Simulink environment.
NASA Langley WINN System Operational Assessment
NASA Technical Reports Server (NTRS)
Jonsson, Jon
2003-01-01
An operational assessment of the NASA Langley Weather Information Network (WINN) System is presented. The objectives of this program include: 1) Determine if near real-time weather information presented on the flight deck improves pilot situational awareness of weather; and 2) Identify pilot interface issues related to the use of WINN system during test flights. This paper is in viewgraph form.
75 FR 2836 - Schools and Libraries Universal Service Support Mechanism
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... networking websites and in chat rooms and cyberbullying awareness and response, as required by the Protecting... interacting with other individuals on social networking Web sites and in chat rooms and cyberbullying... networking websites and in chat rooms and cyberbullying awareness and response. We seek comment on this...
Cross-Layer Damage Assessment for Cyber Situational Awareness
NASA Astrophysics Data System (ADS)
Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason
Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.
Evans, B M
2003-02-01
The physiological mechanisms that underlie consciousness and unconsciousness are the sleep/wake mechanisms. Deep sleep is a state of physiological reversible unconsciousness. The change from that state to wakefulness is mediated by the reticular activating mechanism. The reverse change from wakefulness to sleep is also an active process effected by an arousal inhibitory mechanism based on a partial blockade of the thalamus and upper brain stem, associated with thalamic sleep spindles and also with cortical sub-delta activity (<1 Hz). The deactivation of the thalamus has been demonstrated both electrically and by positron emission tomography during deep sleep. Normally, wakefulness is associated with instant awareness (defined as the ability to integrate all sensory information from the external environment and the internal environment of the body). Awareness may be a function of the thalamo-cortical network in the cerebral hemispheres, which forms the final path of the sleep/wake mechanism. Anatomical and physiological studies suggest that there may be a double thalamo-cortical network; one relating to cortical and thalamic areas with specific functions and the other global, involving all cortical areas and so-called 'non-specific' thalamic nuclei. The global system might function as a cortical integrating mechanism permitting the spread of information between the specific cortical areas and thus underlying awareness. The global system may also be responsible for much of the spontaneous and evoked electrical activity of the brain. The cognitive change between sleep and wakefulness is accompanied by changes in the autonomic system, the cerebral blood flow and cerebral metabolism. Awareness is an essential component of total consciousness (defined as continuous awareness of the external and internal environment, both past and present, together with the emotions arising from it). In addition to awareness, full consciousness requires short-term and explicit memory and intact emotional responses.
Yin, Jie; Guo, Jiannan; Kong, Bingxin; Yin, Heqing; Zhu, Zuqing
2017-06-26
Software-defined elastic optical networks (SD-EONs) provide operators more flexibility to customize their optical infrastructures dynamically. By leveraging infrastructure-as-a-service (IaaS), virtual SD-EONs (vSD-EONs) can be realized to further enhance the adaptivity of SD-EONs and shorten the time-to-market of new services. In this paper, we design and demonstrate the building and operating of quality-of-service (QoS) aware survivable vSD-EONs that are equipped with transparent data plane (DP) resiliency. Specifically, when slicing a vSD-EON, our network hypervisor (NHV) chooses to use "1:1" virtual link (VL) protection or on-demand VL remapping as the DP restoration scheme, according to the service-level agreement (SLA) between the vSD-EON's operator and the infrastructure provider (InP). Then, during an actual substrate link (SL) failure, the NHV realizes automatic DP restoration that is transparent to the controllers of vSD-EONs. We build a network testbed to demonstrate the creation of QoS-aware survivable vSD-EONs, the activation of lightpaths in the vSD-EONs to support upper-layer applications, and the automatic and simultaneous QoS-aware DP restorations during an SL failure. The experimental results indicate that our vSD-EON slicing system can build QoS-aware survivable vSD-EONs on-demand, operate them to set up lightpaths for carrying real application traffic, and facilitate differentiated DP restorations during SL failures to recover the vSD-EONs' services according to their SLAs.
2014-06-01
information superiority in Network- centric warfare .34 A brief discussion of the implementation of battlespace awareness is given. The method 3 Figure 2...developing the model used for this study. Lanchester Equations,39 System Dynamics models,40–42 Discrete Event Simulation, and Agent-based models (ABMs) were...popularity in the military modeling community in recent years due to their ability to effectively capture complex interactions in warfare scenarios with many
Validation and augmentation of Inrix arterial travel time data using independent sources.
DOT National Transportation Integrated Search
2015-02-01
Travel time data is a key input to Intelligent Transportation Systems (ITS) applications. Advancement in vehicle : tracking and identification technologies and proliferation of location-aware and connected devices has made network-wide travel time da...
Cortical networks involved in visual awareness independent of visual attention.
Webb, Taylor W; Igelström, Kajsa M; Schurger, Aaron; Graziano, Michael S A
2016-11-29
It is now well established that visual attention, as measured with standard spatial attention tasks, and visual awareness, as measured by report, can be dissociated. It is possible to attend to a stimulus with no reported awareness of the stimulus. We used a behavioral paradigm in which people were aware of a stimulus in one condition and unaware of it in another condition, but the stimulus drew a similar amount of spatial attention in both conditions. The paradigm allowed us to test for brain regions active in association with awareness independent of level of attention. Participants performed the task in an MRI scanner. We looked for brain regions that were more active in the aware than the unaware trials. The largest cluster of activity was obtained in the temporoparietal junction (TPJ) bilaterally. Local independent component analysis (ICA) revealed that this activity contained three distinct, but overlapping, components: a bilateral, anterior component; a left dorsal component; and a right dorsal component. These components had brain-wide functional connectivity that partially overlapped the ventral attention network and the frontoparietal control network. In contrast, no significant activity in association with awareness was found in the banks of the intraparietal sulcus, a region connected to the dorsal attention network and traditionally associated with attention control. These results show the importance of separating awareness and attention when testing for cortical substrates. They are also consistent with a recent proposal that awareness is associated with ventral attention areas, especially in the TPJ.
A radio-aware routing algorithm for reliable directed diffusion in lossy wireless sensor networks.
Kim, Yong-Pyo; Jung, Euihyun; Park, Yong-Jin
2009-01-01
In Wireless Sensor Networks (WSNs), transmission errors occur frequently due to node failure, battery discharge, contention or interference by objects. Although Directed Diffusion has been considered as a prominent data-centric routing algorithm, it has some weaknesses due to unexpected network errors. In order to address these problems, we proposed a radio-aware routing algorithm to improve the reliability of Directed Diffusion in lossy WSNs. The proposed algorithm is aware of the network status based on the radio information from MAC and PHY layers using a cross-layer design. The cross-layer design can be used to get detailed information about current status of wireless network such as a link quality or transmission errors of communication links. The radio information indicating variant network conditions and link quality was used to determine an alternative route that provides reliable data transmission under lossy WSNs. According to the simulation result, the radio-aware reliable routing algorithm showed better performance in both grid and random topologies with various error rates. The proposed solution suggested the possibility of providing a reliable transmission method for QoS requests in lossy WSNs based on the radio-awareness. The energy and mobility issues will be addressed in the future work.
The impact of vaccine success and awareness on epidemic dynamics
NASA Astrophysics Data System (ADS)
Juang, Jonq; Liang, Yu-Hao
2016-11-01
The role of vaccine success is introduced into an epidemic spreading model consisting of three states: susceptible, infectious, and vaccinated. Moreover, the effect of three types, namely, contact, local, and global, of infection awareness and immunization awareness is also taken into consideration. The model generalizes those considered in Pastor-Satorras and Vespignani [Phys. Rev. E 63, 066117 (2001)], Pastor-Satorras and Vespignani [Phys. Rev. E 65, 036104 (2002)], Moreno et al. [Eur. Phys. J. B 26, 521-529 (2002)], Wu et al. [Chaos 22, 013101 (2012)], and Wu et al. [Chaos 24, 023108 (2014)]. Our main results contain the following. First, the epidemic threshold is explicitly obtained. In particular, we show that, for any initial conditions, the epidemic eventually dies out regardless of what other factors are whenever some type of immunization awareness is considered, and vaccination has a perfect success. Moreover, the threshold is independent of the global type of awareness. Second, we compare the effect of contact and local types of awareness on the epidemic thresholds between heterogeneous networks and homogeneous networks. Specifically, we find that the epidemic threshold for the homogeneous network can be lower than that of the heterogeneous network in an intermediate regime for intensity of contact infection awareness while it is higher otherwise. In summary, our results highlight the important and crucial roles of both vaccine success and contact infection awareness on epidemic dynamics.
NASA Astrophysics Data System (ADS)
Dum, Ralph
Various types of diverse networks — communication networks, transport networks, global business networks, networks of friends, or the Internet — shape our daily life and the way we think and act. We depend on various social, economic, and technological networks that weave a tissue of businesses, governments, technologies and that contain us as citizens, users, or customers. We only become aware of our dependence if failures occur in these networks: when cities are plunged into darkness because of a breakdown of the power grid like happened recently in New York, when national economies collapse because of a failure of global financial systems like happened in the South-Asian banking crisis, or when computer viruses spread with mind-boggling speed over information networks destroying or, even worse, exposing sensitive data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
NASA Technical Reports Server (NTRS)
Panangadan, Anand; Monacos, Steve; Burleigh, Scott; Joswig, Joseph; James, Mark; Chow, Edward
2012-01-01
In this paper, we describe the architecture of both the PATS and SAP systems and how these two systems interoperate with each other forming a unified capability for deploying intelligence in hostile environments with the objective of providing actionable situational awareness of individuals. The SAP system works in concert with the UICDS information sharing middleware to provide data fusion from multiple sources. UICDS can then publish the sensor data using the OGC's Web Mapping Service, Web Feature Service, and Sensor Observation Service standards. The system described in the paper is able to integrate a spatially distributed sensor system, operating without the benefit of the Web infrastructure, with a remote monitoring and control system that is equipped to take advantage of SWE.
Stability-Aware Geographic Routing in Energy Harvesting Wireless Sensor Networks
Hieu, Tran Dinh; Dung, Le The; Kim, Byung-Seo
2016-01-01
A new generation of wireless sensor networks that harvest energy from environmental sources such as solar, vibration, and thermoelectric to power sensor nodes is emerging to solve the problem of energy limitation. Based on the photo-voltaic model, this research proposes a stability-aware geographic routing for reliable data transmissions in energy-harvesting wireless sensor networks (EH-WSNs) to provide a reliable routes selection method and potentially achieve an unlimited network lifetime. Specifically, the influences of link quality, represented by the estimated packet reception rate, on network performance is investigated. Simulation results show that the proposed method outperforms an energy-harvesting-aware method in terms of energy consumption, the average number of hops, and the packet delivery ratio. PMID:27187414
A framework for visualization of battlefield network behavior
NASA Astrophysics Data System (ADS)
Perzov, Yury; Yurcik, William
2006-05-01
An extensible network simulation application was developed to study wireless battlefield communications. The application monitors node mobility and depicts broadcast and unicast traffic as expanding rings and directed links. The network simulation was specially designed to support fault injection to show the impact of air strikes on disabling nodes. The application takes standard ns-2 trace files as an input and provides for performance data output in different graphical forms (histograms and x/y plots). Network visualization via animation of simulation output can be saved in AVI format that may serve as a basis for a real-time battlefield awareness system.
EU Space Awareness: Initial implemenation
NASA Astrophysics Data System (ADS)
Russo, Pedro
2015-08-01
EU Space Awareness uses the excitement of space to attract young people into science and technology and stimulate European and global citizenship. The project will show children and teenagers the opportunities offered by space science and engineering and inspire primary-school children when their curiosity is high and their value systems are being formed. EU Space Awareness, a 3-year project, has started in March 2015 with 10 partner organisations and 15 network nodes in 17 European countries and the IAU Office of Astronomy for Development. During this talk we will give a update about the intial implementation of the project and its relevant for astronomy for development.
Human-Computer Interaction and Information Management Research Needs
2003-10-01
Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be...hand-held personal digital assistants, networked sensors and actuators, and low-power computers on satellites. 5 most complex tools that humans have...calculations using data on external media such as tapes evolved into our multi-functional 21st century systems. More ideas came as networks of computing
Quantifying the propagation of distress and mental disorders in social networks.
Scatà, Marialisa; Di Stefano, Alessandro; La Corte, Aurelio; Liò, Pietro
2018-03-22
Heterogeneity of human beings leads to think and react differently to social phenomena. Awareness and homophily drive people to weigh interactions in social multiplex networks, influencing a potential contagion effect. To quantify the impact of heterogeneity on spreading dynamics, we propose a model of coevolution of social contagion and awareness, through the introduction of statistical estimators, in a weighted multiplex network. Multiplexity of networked individuals may trigger propagation enough to produce effects among vulnerable subjects experiencing distress, mental disorder, which represent some of the strongest predictors of suicidal behaviours. The exposure to suicide is emotionally harmful, since talking about it may give support or inadvertently promote it. To disclose the complex effect of the overlapping awareness on suicidal ideation spreading among disordered people, we also introduce a data-driven approach by integrating different types of data. Our modelling approach unveils the relationship between distress and mental disorders propagation and suicidal ideation spreading, shedding light on the role of awareness in a social network for suicide prevention. The proposed model is able to quantify the impact of overlapping awareness on suicidal ideation spreading and our findings demonstrate that it plays a dual role on contagion, either reinforcing or delaying the contagion outbreak.
Dalal, Anuj K; Roy, Christopher L; Poon, Eric G; Williams, Deborah H; Nolido, Nyryan; Yoon, Cathy; Budris, Jonas; Gandhi, Tejal; Bates, David W; Schnipper, Jeffrey L
2014-01-01
Physician awareness of the results of tests pending at discharge (TPADs) is poor. We developed an automated system that notifies responsible physicians of TPAD results via secure, network email. We sought to evaluate the impact of this system on self-reported awareness of TPAD results by responsible physicians, a necessary intermediary step to improve management of TPAD results. We conducted a cluster-randomized controlled trial at a major hospital affiliated with an integrated healthcare delivery network in Boston, Massachusetts. Adult patients with TPADs who were discharged from inpatient general medicine and cardiology services were assigned to the intervention or usual care arm if their inpatient attending physician and primary care physician (PCP) were both randomized to the same study arm. Patients of physicians randomized to discordant study arms were excluded. We surveyed these physicians 72 h after all TPAD results were finalized. The primary outcome was awareness of TPAD results by attending physicians. Secondary outcomes included awareness of TPAD results by PCPs, awareness of actionable TPAD results, and provider satisfaction. We analyzed data on 441 patients. We sent 441 surveys to attending physicians and 353 surveys to PCPs and received 275 and 152 responses from 83 different attending physicians and 112 different PCPs, respectively (attending physician survey response rate of 63%). Intervention attending physicians and PCPs were significantly more aware of TPAD results (76% vs 38%, adjusted/clustered OR 6.30 (95% CI 3.02 to 13.16), p<0.001; 57% vs 33%, adjusted/clustered OR 3.08 (95% CI 1.43 to 6.66), p=0.004, respectively). Intervention attending physicians tended to be more aware of actionable TPAD results (59% vs 29%, adjusted/clustered OR 4.25 (0.65, 27.85), p=0.13). One hundred and eighteen (85%) and 43 (63%) intervention attending physician and PCP survey respondents, respectively, were satisfied with this intervention. Automated email notification represents a promising strategy for managing TPAD results, potentially mitigating an unresolved patient safety concern. ClinicalTrials.gov (NCT01153451).
Dalal, Anuj K; Roy, Christopher L; Poon, Eric G; Williams, Deborah H; Nolido, Nyryan; Yoon, Cathy; Budris, Jonas; Gandhi, Tejal; Bates, David W; Schnipper, Jeffrey L
2014-01-01
Background and objective Physician awareness of the results of tests pending at discharge (TPADs) is poor. We developed an automated system that notifies responsible physicians of TPAD results via secure, network email. We sought to evaluate the impact of this system on self-reported awareness of TPAD results by responsible physicians, a necessary intermediary step to improve management of TPAD results. Methods We conducted a cluster-randomized controlled trial at a major hospital affiliated with an integrated healthcare delivery network in Boston, Massachusetts. Adult patients with TPADs who were discharged from inpatient general medicine and cardiology services were assigned to the intervention or usual care arm if their inpatient attending physician and primary care physician (PCP) were both randomized to the same study arm. Patients of physicians randomized to discordant study arms were excluded. We surveyed these physicians 72 h after all TPAD results were finalized. The primary outcome was awareness of TPAD results by attending physicians. Secondary outcomes included awareness of TPAD results by PCPs, awareness of actionable TPAD results, and provider satisfaction. Results We analyzed data on 441 patients. We sent 441 surveys to attending physicians and 353 surveys to PCPs and received 275 and 152 responses from 83 different attending physicians and 112 different PCPs, respectively (attending physician survey response rate of 63%). Intervention attending physicians and PCPs were significantly more aware of TPAD results (76% vs 38%, adjusted/clustered OR 6.30 (95% CI 3.02 to 13.16), p<0.001; 57% vs 33%, adjusted/clustered OR 3.08 (95% CI 1.43 to 6.66), p=0.004, respectively). Intervention attending physicians tended to be more aware of actionable TPAD results (59% vs 29%, adjusted/clustered OR 4.25 (0.65, 27.85), p=0.13). One hundred and eighteen (85%) and 43 (63%) intervention attending physician and PCP survey respondents, respectively, were satisfied with this intervention. Conclusions Automated email notification represents a promising strategy for managing TPAD results, potentially mitigating an unresolved patient safety concern. Clinical Trial Registration: ClinicalTrials.gov (NCT01153451) PMID:24154834
Enriching Adaptation in E-Learning Systems through a Situation-Aware Ontology Network
ERIC Educational Resources Information Center
Pernas, Ana Marilza; Diaz, Alicia; Motz, Regina; de Oliveira, Jose Palazzo Moreira
2012-01-01
Purpose: The broader adoption of the internet along with web-based systems has defined a new way of exchanging information. That advance added by the multiplication of mobile devices has required systems to be even more flexible and personalized. Maybe because of that, the traditional teaching-controlled learning style has given up space to a new…
NASA Astrophysics Data System (ADS)
Choi, E.; Cho, S.; Shin, S.; Park, J.; Kim, J.; Kim, D.
The threat posed by asteroids and comets has become one of the important issues. Jinju meteorite discovered in March 2014 has expanded the interest of the people of the fall of the natural space objects. Furthermore, the growing quantity of space debris is a serious threat to satellites and other spacecraft, which risk being damaged or even destroyed. In May of 2014, Korea established the preparedness plan for space hazards according to the space development promotion act which is amended to take action with respect to hazards from space. This plan is largely composed of 3 items such as system, technology and infrastructure. System is included the establishment and management of national space hazards headquarters at risk situation. Korea Astronomy and Space Science Institute (KASI) was designated as a space environment monitoring agency under the ministry of science, ICT and future planning (MSIP). Technology is supposed to develop the space situational awareness system that can monitor and detect space objects. For infrastructure, research and development of core technology will be promoted for capabilities improvement of space hazards preparedness such as software tools, application and data systems. This paper presents the architectural design for building space situational awareness system. The trade-off study of space situational awareness system for the Korea situation was performed. The results have shown the proposed architectural design. The baseline architecture is composed of Integrated Analysis System and Space Objects Monitoring System. Integrated Analysis System collects the status data from Space Objects Monitoring System and analyzes the space risk information through a data processing. For Space Objects Monitoring System, the all-sky surveillance camera, array radar and meteoroid surveillance sensor networks were considered. This system focuses on not only the threat of a large artificial satellite and natural space objects such as asteroids that crashed to Earth but also the prediction of potential collisions between space objects. Especially, array radar aims to accurately track space objects. By analyzing performance for radar system and sensor networks, several feasible approaches for such a space objects monitoring system will be presented in this paper.
Smile and laughter elicited by electrical stimulation of the frontal operculum.
Caruana, F; Gozzo, F; Pelliccia, V; Cossu, M; Avanzini, P
2016-08-01
Laughter and smile are typical expressions of mirth and fundamental means of social communication. Despite their general interest, the current knowledge about the brain regions involved in the production of these expressions is still very limited, and the principal insights come from electrical stimulation (ES) studies in patients, in which, nevertheless, laughter or smile have been elicited very rarely. Previous studies showed that laughter is evoked by the stimulation of nodes of an emotional network encompassing the anterior cingulate, the superior frontal and basal temporal cortex. A common feature of these stimulation studies is that the facial expression was always accompanied by motor awareness and often by mirth, in line with the affective functions attributed to these regions. Little is known, in contrast, on the neural basis of the voluntary motor control of this expression. The objective of this study was to investigate the effect of ES of the frontal operculum (FO), which is considered a crucial node for the linkage of the voluntary motor system for emotional expression and limbic emotional network. We report the case of ES applied to the frontal operculum (FO) in four patients with drug-resistant focal epilepsy undergoing stereo-electroencephalographic (SEEG) implantation of intracerebral electrodes. In all patients, ES applied to the FO produced laughter or smile. Interestingly, in one patient, the production of a smiling expression was also clearly accompanied by the lack of motor awareness. Since the lack of motor awareness has been previously observed only after the stimulation of the voluntary motor network, we speculate that FO is involved in the voluntary control of facial expressions, and is placed at the interface with the emotional network, gating limbic information to the motor system. Copyright © 2016 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dorier, Matthieu; Mubarak, Misbah; Ross, Rob
Two-tiered direct network topologies such as Dragonflies have been proposed for future post-petascale and exascale machines, since they provide a high-radix, low-diameter, fast interconnection network. Such topologies call for redesigning MPI collective communication algorithms in order to attain the best performance. Yet as increasingly more applications share a machine, it is not clear how these topology-aware algorithms will react to interference with concurrent jobs accessing the same network. In this paper, we study three topology-aware broadcast algorithms, including one designed by ourselves. We evaluate their performance through event-driven simulation for small- and large-sized broadcasts (in terms of both data sizemore » and number of processes). We study the effect of different routing mechanisms on the topology-aware collective algorithms, as well as their sensitivity to network contention with other jobs. Our results show that while topology-aware algorithms dramatically reduce link utilization, their advantage in terms of latency is more limited.« less
Design and Evaluation of a Widget-Based Dashboard for Awareness Support in Research Networks
ERIC Educational Resources Information Center
Reinhardt, Wolfgang; Mletzko, Christian; Drachsler, Hendrik; Sloep, Peter B.
2014-01-01
In this article, we describe the rationale, design and evaluation of a widget-based dashboard to support scholars' awareness of their Research Networks. We introduce the concept of a Research Network and discuss Personal Research Environments that are built of as a development parallel to Personal Learning Environments. Based on the results…
Visualization techniques for computer network defense
NASA Astrophysics Data System (ADS)
Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew
2011-06-01
Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.
IoT Contextual Factors on Healthcare.
Michalakis, Konstantinos; Caridakis, George
2017-01-01
With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.
Parallel-aware, dedicated job co-scheduling within/across symmetric multiprocessing nodes
Jones, Terry R.; Watson, Pythagoras C.; Tuel, William; Brenner, Larry; ,Caffrey, Patrick; Fier, Jeffrey
2010-10-05
In a parallel computing environment comprising a network of SMP nodes each having at least one processor, a parallel-aware co-scheduling method and system for improving the performance and scalability of a dedicated parallel job having synchronizing collective operations. The method and system uses a global co-scheduler and an operating system kernel dispatcher adapted to coordinate interfering system and daemon activities on a node and across nodes to promote intra-node and inter-node overlap of said interfering system and daemon activities as well as intra-node and inter-node overlap of said synchronizing collective operations. In this manner, the impact of random short-lived interruptions, such as timer-decrement processing and periodic daemon activity, on synchronizing collective operations is minimized on large processor-count SPMD bulk-synchronous programming styles.
Top 10 Threats to Computer Systems Include Professors and Students
ERIC Educational Resources Information Center
Young, Jeffrey R.
2008-01-01
User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…
Two Phase Admission Control for QoS Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Chien-Sheng; Su, Yi-Wen; Liu, Wen-Hsiung; Chi, Ching-Lung
In this paper a novel and effective two phase admission control (TPAC) for QoS mobile ad hoc networks is proposed that satisfies the real-time traffic requirements in mobile ad hoc networks. With a limited amount of extra overhead, TPAC can avoid network congestions by a simple and precise admission control which blocks most of the overloading flow-requests in the route discovery process. When compared with previous QoS routing schemes such as QoS-aware routing protocol and CACP protocols, it is shown from system simulations that the proposed scheme can increase the system throughput and reduce both the dropping rate and the end-to-end delay. Therefore, TPAC is surely an effective QoS-guarantee protocol to provide for real-time traffic.
Mapping, Awareness, And Virtualization Network Administrator Training Tool Virtualization Module
2016-03-01
AND VIRTUALIZATION NETWORK ADMINISTRATOR TRAINING TOOL VIRTUALIZATION MODULE by Erik W. Berndt March 2016 Thesis Advisor: John Gibson...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MAPPING, AWARENESS, AND VIRTUALIZATION NETWORK ADMINISTRATOR TRAINING TOOL... VIRTUALIZATION MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Erik W. Berndt 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School
Yang, Hui; Zhang, Jie; Zhao, Yongli; Ji, Yuefeng; Li, Hui; Lin, Yi; Li, Gang; Han, Jianrui; Lee, Young; Ma, Teng
2014-07-28
Data center interconnection with elastic optical networks is a promising scenario to meet the high burstiness and high-bandwidth requirements of data center services. We previously implemented enhanced software defined networking over elastic optical network for data center application [Opt. Express 21, 26990 (2013)]. On the basis of it, this study extends to consider the time-aware data center service scheduling with elastic service time and service bandwidth according to the various time sensitivity requirements. A novel time-aware enhanced software defined networking (TeSDN) architecture for elastic data center optical interconnection has been proposed in this paper, by introducing a time-aware resources scheduling (TaRS) scheme. The TeSDN can accommodate the data center services with required QoS considering the time dimensionality, and enhance cross stratum optimization of application and elastic optical network stratums resources based on spectrum elasticity, application elasticity and time elasticity. The overall feasibility and efficiency of the proposed architecture is experimentally verified on our OpenFlow-based testbed. The performance of TaRS scheme under heavy traffic load scenario is also quantitatively evaluated based on TeSDN architecture in terms of blocking probability and resource occupation rate.
A Two-Stage Composition Method for Danger-Aware Services Based on Context Similarity
NASA Astrophysics Data System (ADS)
Wang, Junbo; Cheng, Zixue; Jing, Lei; Ota, Kaoru; Kansen, Mizuo
Context-aware systems detect user's physical and social contexts based on sensor networks, and provide services that adapt to the user accordingly. Representing, detecting, and managing the contexts are important issues in context-aware systems. Composition of contexts is a useful method for these works, since it can detect a context by automatically composing small pieces of information to discover service. Danger-aware services are a kind of context-aware services which need description of relations between a user and his/her surrounding objects and between users. However when applying the existing composition methods to danger-aware services, they show the following shortcomings that (1) they have not provided an explicit method for representing composition of multi-user' contexts, (2) there is no flexible reasoning mechanism based on similarity of contexts, so that they can just provide services exactly following the predefined context reasoning rules. Therefore, in this paper, we propose a two-stage composition method based on context similarity to solve the above problems. The first stage is composition of the useful information to represent the context for a single user. The second stage is composition of multi-users' contexts to provide services by considering the relation of users. Finally the danger degree of the detected context is computed by using context similarity between the detected context and the predefined context. Context is dynamically represented based on two-stage composition rules and a Situation theory based Ontology, which combines the advantages of Ontology and Situation theory. We implement the system in an indoor ubiquitous environment, and evaluate the system through two experiments with the support of subjects. The experiment results show the method is effective, and the accuracy of danger detection is acceptable to a danger-aware system.
Energy-aware virtual network embedding in flexi-grid optical networks
NASA Astrophysics Data System (ADS)
Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin
2018-01-01
Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.
Effect of risk perception on epidemic spreading in temporal networks
NASA Astrophysics Data System (ADS)
Moinet, Antoine; Pastor-Satorras, Romualdo; Barrat, Alain
2018-01-01
Many progresses in the understanding of epidemic spreading models have been obtained thanks to numerous modeling efforts and analytical and numerical studies, considering host populations with very different structures and properties, including complex and temporal interaction networks. Moreover, a number of recent studies have started to go beyond the assumption of an absence of coupling between the spread of a disease and the structure of the contacts on which it unfolds. Models including awareness of the spread have been proposed, to mimic possible precautionary measures taken by individuals that decrease their risk of infection, but have mostly considered static networks. Here, we adapt such a framework to the more realistic case of temporal networks of interactions between individuals. We study the resulting model by analytical and numerical means on both simple models of temporal networks and empirical time-resolved contact data. Analytical results show that the epidemic threshold is not affected by the awareness but that the prevalence can be significantly decreased. Numerical studies on synthetic temporal networks highlight, however, the presence of very strong finite-size effects, resulting in a significant shift of the effective epidemic threshold in the presence of risk awareness. For empirical contact networks, the awareness mechanism leads as well to a shift in the effective threshold and to a strong reduction of the epidemic prevalence.
Modeling Synergies in Large Human-Machine Networked Systems
2013-09-25
Help Through Adaptive Autonomy”, CMU http://www.cs.cmu.edu/~softagents/theses/Kane_MS_thesis_2010.pdf Lingzhi Luo, MS in Robotics May 2012 Thesis...Affecting Situation Awareness in Unmanned Aerial Vehicles”, In Proceedings of AIAA, 2009. 165. Lingzhi Luo, Nilanjan Chakraborty, and Katia Sycara
2015-06-01
raspberry pi , robotic operation system (ros), arduino 15. NUMBER OF PAGES 123 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...51 2. Raspberry Pi ...52 Figure 21. The Raspberry Pi B+ model, from [24
MARSnet: Mission-aware Autonomous Radar Sensor Network for Future Combat Systems
2007-05-03
34Parameter estimation for 3-parameter log-logistic distribution (LLD3) by Porne ", Parameter estimation for 3-parameter log-logistic distribu- tion...section V we physical security, air traffic control, traffic monitoring, andvidefaconu s cribedy. video surveillance, industrial automation etc. Each
Event detection in an assisted living environment.
Stroiescu, Florin; Daly, Kieran; Kuris, Benjamin
2011-01-01
This paper presents the design of a wireless event detection and in building location awareness system. The systems architecture is based on using a body worn sensor to detect events such as falls where they occur in an assisted living environment. This process involves developing event detection algorithms and transmitting such events wirelessly to an in house network based on the 802.15.4 protocol. The network would then generate alerts both in the assisted living facility and remotely to an offsite monitoring facility. The focus of this paper is on the design of the system architecture and the compliance challenges in applying this technology.
Energy Aware Clustering Algorithms for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Rakhshan, Noushin; Rafsanjani, Marjan Kuchaki; Liu, Chenglian
2011-09-01
The sensor nodes deployed in wireless sensor networks (WSNs) are extremely power constrained, so maximizing the lifetime of the entire networks is mainly considered in the design. In wireless sensor networks, hierarchical network structures have the advantage of providing scalable and energy efficient solutions. In this paper, we investigate different clustering algorithms for WSNs and also compare these clustering algorithms based on metrics such as clustering distribution, cluster's load balancing, Cluster Head's (CH) selection strategy, CH's role rotation, node mobility, clusters overlapping, intra-cluster communications, reliability, security and location awareness.
An intelligent anti-jamming network system of data link
NASA Astrophysics Data System (ADS)
Fan, Xiangrui; Lin, Jingyong; Liu, Jiarun; Zhou, Chunmei
2017-10-01
Data link is the key information system for the cooperation of weapons, single physical layer anti-jamming technology has been unable to meet its requirements. High dynamic precision-guided weapon nodes like missiles, anti-jamming design of data link system need to have stronger pertinence and effectiveness: the best anti-jamming communication mode can be selected intelligently in combat environment, in real time, guarantee the continuity of communication. We discuss an anti-jamming intelligent networking technology of data link based on interference awareness, put forward a model of intelligent anti-jamming system, and introduces the cognitive node protocol stack model and intelligent anti-jamming method, in order to improve the data chain of intelligent anti-jamming ability.
NASA Astrophysics Data System (ADS)
Huang, Haibin; Guo, Bingli; Li, Xin; Yin, Shan; Zhou, Yu; Huang, Shanguo
2017-12-01
Virtualization of datacenter (DC) infrastructures enables infrastructure providers (InPs) to provide novel services like virtual networks (VNs). Furthermore, optical networks have been employed to connect the metro-scale geographically distributed DCs. The synergistic virtualization of the DC infrastructures and optical networks enables the efficient VN service over inter-DC optical networks (inter-DCONs). While the capacity of the used standard single-mode fiber (SSMF) is limited by their nonlinear characteristics. Thus, mode-division multiplexing (MDM) technology based on few-mode fibers (FMFs) could be employed to increase the capacity of optical networks. Whereas, modal crosstalk (XT) introduced by optical fibers and components deployed in the MDM optical networks impacts the performance of VN embedding (VNE) over inter-DCONs with FMFs. In this paper, we propose a XT-aware VNE mechanism over inter-DCONs with FMFs. The impact of XT is considered throughout the VNE procedures. The simulation results show that the proposed XT-aware VNE can achieves better performances of blocking probability and spectrum utilization compared to conventional VNE mechanisms.
MARSnet: Mission-aware Autonomous Radar Sensor Network for Future Combat Systems 12/8/06 to 12/31/09
2010-01-01
8/06 to 12/31/09. Qilian Liang Department of Electrical Engineering 416 Yates Street, Room 518 University of Texas at Arlington Arlington, TX 76019...Modeling in Foliage Environment Jing Liang and Qilian Liang, Senior Member, IEEE Department of Electrical Engineering University of Texas at Arlington E...32 46 of 816 NEW: Network-enabled Electronic Warfare for Target Recognition Qilian Liang Xiuzhen Cheng Sherwood W. Samn Dept of Electrical
Synchronous wearable wireless body sensor network composed of autonomous textile nodes.
Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik
2014-10-09
A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system.
Synchronous Wearable Wireless Body Sensor Network Composed of Autonomous Textile Nodes
Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik
2014-01-01
A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system. PMID:25302808
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-16
... sensor network and provide extended sensor network and components to fill critical situational awareness... different agencies), and share resources. The IOCs will improve tactical decision-making, situational awareness, operations monitoring/ interoperability, rules-based processing, and joint planning in a...
Smart unattended sensor networks with scene understanding capabilities
NASA Astrophysics Data System (ADS)
Kuvich, Gary
2006-05-01
Unattended sensor systems are new technologies that are supposed to provide enhanced situation awareness to military and law enforcement agencies. A network of such sensors cannot be very effective in field conditions only if it can transmit visual information to human operators or alert them on motion. In the real field conditions, events may happen in many nodes of a network simultaneously. But the real number of control personnel is always limited, and attention of human operators can be simply attracted to particular network nodes, while more dangerous threat may be unnoticed at the same time in the other nodes. Sensor networks would be more effective if equipped with a system that is similar to human vision in its abilities to understand visual information. Human vision uses for that a rough but wide peripheral system that tracks motions and regions of interests, narrow but precise foveal vision that analyzes and recognizes objects in the center of selected region of interest, and visual intelligence that provides scene and object contexts and resolves ambiguity and uncertainty in the visual information. Biologically-inspired Network-Symbolic models convert image information into an 'understandable' Network-Symbolic format, which is similar to relational knowledge models. The equivalent of interaction between peripheral and foveal systems in the network-symbolic system is achieved via interaction between Visual and Object Buffers and the top-level knowledge system.
The impact of multiple information on coupled awareness-epidemic dynamics in multiplex networks
NASA Astrophysics Data System (ADS)
Pan, Yaohui; Yan, Zhijun
2018-02-01
Growing interest has emerged in the study of the interplay between awareness and epidemics in multiplex networks. However, previous studies on this issue usually assume that all aware individuals take the same level of precautions, ignoring individual heterogeneity. In this paper, we investigate the coupled awareness-epidemic dynamics in multiplex networks considering individual heterogeneity. Here, the precaution levels are heterogeneous and depend on three types of information: contact information and local and global prevalence information. The results show that contact-based precautions can decrease the epidemic prevalence and augment the epidemic threshold, but prevalence-based precautions, regardless of local or global information, can only decrease the epidemic prevalence. Moreover, unlike previous studies in single-layer networks, we do not find a greater impact of local prevalence information on the epidemic prevalence compared to global prevalence information. In addition, we find that the altruistic behaviors of infected individuals can effectively suppress epidemic spreading, especially when the level of contact-based precaution is high.
Networks Analysis of a Regional Ecosystem of Afterschool Programs
ERIC Educational Resources Information Center
Russell, Martha G.; Smith, Marc A.
2011-01-01
Case studies have documented the impact of family-school-community collaboration in afterschool programs on increasing awareness about the problems of at-risk youth, initiating dialogue among leaders and community representatives, developing rich school-based information systems, and demonstrating how to build strong relationships between public…
Uncovering the essential links in online commercial networks
NASA Astrophysics Data System (ADS)
Zeng, Wei; Fang, Meiling; Shao, Junming; Shang, Mingsheng
2016-09-01
Recommender systems are designed to effectively support individuals' decision-making process on various web sites. It can be naturally represented by a user-object bipartite network, where a link indicates that a user has collected an object. Recently, research on the information backbone has attracted researchers' interests, which is a sub-network with fewer nodes and links but carrying most of the relevant information. With the backbone, a system can generate satisfactory recommenda- tions while saving much computing resource. In this paper, we propose an enhanced topology-aware method to extract the information backbone in the bipartite network mainly based on the information of neighboring users and objects. Our backbone extraction method enables the recommender systems achieve more than 90% of the accuracy of the top-L recommendation, however, consuming only 20% links. The experimental results show that our method outperforms the alternative backbone extraction methods. Moreover, the structure of the information backbone is studied in detail. Finally, we highlight that the information backbone is one of the most important properties of the bipartite network, with which one can significantly improve the efficiency of the recommender system.
Leveraging AMI data for distribution system model calibration and situational awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peppanen, Jouni; Reno, Matthew J.; Thakkar, Mohini
The many new distributed energy resources being installed at the distribution system level require increased visibility into system operations that will be enabled by distribution system state estimation (DSSE) and situational awareness applications. Reliable and accurate DSSE requires both robust methods for managing the big data provided by smart meters and quality distribution system models. This paper presents intelligent methods for detecting and dealing with missing or inaccurate smart meter data, as well as the ways to process the data for different applications. It also presents an efficient and flexible parameter estimation method based on the voltage drop equation andmore » regression analysis to enhance distribution system model accuracy. Finally, it presents a 3-D graphical user interface for advanced visualization of the system state and events. Moreover, we demonstrate this paper for a university distribution network with the state-of-the-art real-time and historical smart meter data infrastructure.« less
Leveraging AMI data for distribution system model calibration and situational awareness
Peppanen, Jouni; Reno, Matthew J.; Thakkar, Mohini; ...
2015-01-15
The many new distributed energy resources being installed at the distribution system level require increased visibility into system operations that will be enabled by distribution system state estimation (DSSE) and situational awareness applications. Reliable and accurate DSSE requires both robust methods for managing the big data provided by smart meters and quality distribution system models. This paper presents intelligent methods for detecting and dealing with missing or inaccurate smart meter data, as well as the ways to process the data for different applications. It also presents an efficient and flexible parameter estimation method based on the voltage drop equation andmore » regression analysis to enhance distribution system model accuracy. Finally, it presents a 3-D graphical user interface for advanced visualization of the system state and events. Moreover, we demonstrate this paper for a university distribution network with the state-of-the-art real-time and historical smart meter data infrastructure.« less
Ntofon, Okung-Dike; Channegowda, Mayur P; Efstathiou, Nikolaos; Rashidi Fard, Mehdi; Nejabati, Reza; Hunter, David K; Simeonidou, Dimitra
2013-02-25
In this paper, a novel Software-Defined Networking (SDN) architecture is proposed for high-end Ultra High Definition (UHD) media applications. UHD media applications require huge amounts of bandwidth that can only be met with high-capacity optical networks. In addition, there are requirements for control frameworks capable of delivering effective application performance with efficient network utilization. A novel SDN-based Controller that tightly integrates application-awareness with network control and management is proposed for such applications. An OpenFlow-enabled test-bed demonstrator is reported with performance evaluations of advanced online and offline media- and network-aware schedulers.
NASA Astrophysics Data System (ADS)
Timonen, Jussi; Vankka, Jouko
2013-05-01
This paper presents a solution for information integration and sharing architecture, which is able to receive data simultaneously from multiple different sensor networks. Creating a Common Operational Picture (COP) object along with the base map of the building plays a key role in the research. The object is combined with desired map sources and then shared to the mobile devices worn by soldiers in the field. The sensor networks we used focus on location techniques indoors, and a simple set of symbols is created to present the information, as an addition to NATO APP6B symbols. A core element in this research is the MUSAS (Mobile Urban Situational Awareness System), a demonstration environment that implements central functionalities. Information integration of the system is handled by the Internet Connection Engine (Ice) middleware, as well as the server, which hosts COP information and maps. The entire system is closed, such that it does not need any external service, and the information transfer with the mobile devices is organized by a tactical 5 GHz WLAN solution. The demonstration environment is implemented using only commercial off-theshelf (COTS) products. We have presented a field experiment event in which the system was able to integrate and share real time information of a blue force tracking system, received signal strength indicator (RSSI) based intrusion detection system, and a robot using simultaneous location and mapping technology (SLAM), where all the inputs were based on real activities. The event was held in a training area on urban area warfare.
Triage Visualization for Digital Media Exploitation
2013-09-01
and responding to threats. Previous work includes NVisionIP [17], a network visualization 8 tool that processes Argus NetFlow [18] data. NVisionIP...2012.02.021 [17] K. Lakkaraju et al., “Nvisionip: netflow visualizations of system state for security situational awareness,” in Proceedings of the 2004 ACM
Military clouds: utilization of cloud computing systems at the battlefield
NASA Astrophysics Data System (ADS)
Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai
2012-05-01
Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.
Visualization Techniques for Computer Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Steed, Chad A; Patton, Robert M
2011-01-01
Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operatormore » to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.« less
On effectiveness of network sensor-based defense framework
NASA Astrophysics Data System (ADS)
Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh
2012-06-01
Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.
2010-09-01
articulating perception, interpretation and actionable prediction in an operational environment . BCKS’ success with digital storytelling has far...podcasts; wikis and other collaborative spaces; social networks such as Facebook and LinkedIn; other user generated content; virtual social environments ...study of Xerox’s knowledge management systems noting that 80% of its IT was focused on adapting to the social dynamics of its workplace environment
NASA Technical Reports Server (NTRS)
Strybel, Thomas Z.; Vu, Kim-Phuong L.; Battiste, Vernol; Dao, Arik-Quang; Dwyer, John P.; Landry, Steven; Johnson, Walter; Ho, Nhut
2011-01-01
A research consortium of scientists and engineers from California State University Long Beach (CSULB), San Jose State University Foundation (SJSUF), California State University Northridge (CSUN), Purdue University, and The Boeing Company was assembled to evaluate the impact of changes in roles and responsibilities and new automated technologies, being introduced in the Next Generation Air Transportation System (NextGen), on operator situation awareness (SA) and workload. To meet these goals, consortium members performed systems analyses of NextGen concepts and airspace scenarios, and concurrently evaluated SA, workload, and performance measures to assess their appropriateness for evaluations of NextGen concepts and tools. The following activities and accomplishments were supported by the NRA: a distributed simulation, metric development, systems analysis, part-task simulations, and large-scale simulations. As a result of this NRA, we have gained a greater understanding of situation awareness and its measurement, and have shared our knowledge with the scientific community. This network provides a mechanism for consortium members, colleagues, and students to pursue research on other topics in air traffic management and aviation, thus enabling them to make greater contributions to the field
Khanna, Aditya S; Schumm, Phil; Schneider, John A
2017-03-01
Young Black men who have sex with men (YBMSM) are the only population in the United States who have experienced rising human immunodeficiency virus incidence over the past decade. Consistent pre-exposure prophylaxis (PrEP) use can substantially reduce the risk of human immunodeficiency virus acquisition. What differentiates those who become aware of PrEP, and those who do not, remains largely unknown. The social networks of YBMSM can impact their awareness of PrEP; to examine this impact, we used two waves of Facebook data from "uConnect"-a longitudinal cohort study of YBMSM in Chicago (n = 266). While PrEP awareness increased from 45% at baseline to 75% at follow-up, its use remained low (4% and 6%). There were 88 PrEP-unaware individuals at baseline who became aware (BA) by follow-up, and 56 who remained persistently unaware. While the persistently unawares had a higher median number of total Facebook friends, the BAs had a higher median numbers of friends who participated in uConnect, who were PrEP-aware, and who practiced behaviors previously found to be associated with individual-level awareness of PrEP at baseline. The BAs also had substantially more "influential" friends. These findings demonstrate the potential of social networks in raising PrEP awareness and use among YBMSM. Copyright © 2016 Elsevier Inc. All rights reserved.
Khanna, Aditya S.; Schumm, Phil; Schneider, John A.
2016-01-01
Young Black men who have sex with men (YBMSM) are the only population in the U.S. who have experienced rising HIV incidence over the past decade. Consistent preexposure prophylaxis (PrEP) use can substantially reduce the risk of HIV acquisition. What differentiates those who become aware of PrEP, and those who do not, remains largely unknown. The social networks of YBMSM can impact their awareness of PrEP; to examine this impact, we used two waves of Facebook data from the “uConnect” study – a longitudinal cohort study of YBMSM in Chicago (n=266). While PrEP awareness increased from 45% at baseline to 75% at follow-up, its use remained low (4% and 6%). There were 88 PrEP-unaware individuals at baseline who became aware (BA) by follow-up, and 56 who remained persistently unaware (PU). While the PUs had a higher median number of total Facebook friends, the BAs had a higher median numbers of friends who participated in uConnect, who were PrEP-aware, and who practiced behaviors previously found to be associated with individual-level awareness of PrEP at baseline. The BAs also had substantially more “influential” friends. These findings demonstrate the potential of social networks in raising PrEP awareness and use among YBMSM. PMID:28003117
Epidemic spread in bipartite network by considering risk awareness
NASA Astrophysics Data System (ADS)
Han, She; Sun, Mei; Ampimah, Benjamin Chris; Han, Dun
2018-02-01
Human awareness plays an important role in the spread of infectious diseases and the control of propagation patterns. Exploring the interplay between human awareness and epidemic spreading is a topic that has been receiving increasing attention. Considering the fact, some well-known diseases only spread between different species we propose a theoretical analysis of the Susceptible-Infected-Susceptible (SIS) epidemic spread from the perspective of bipartite network and risk aversion. Using mean field theory, the epidemic threshold is calculated theoretically. Simulation results are consistent with the proposed analytic model. The results show that, the final infection density is negative linear with the value of individuals' risk awareness. Therefore, the epidemic spread could be effectively suppressed by improving individuals' risk awareness.
Modeling epidemic spread with awareness and heterogeneous transmission rates in networks.
Shang, Yilun
2013-06-01
During an epidemic outbreak in a human population, susceptibility to infection can be reduced by raising awareness of the disease. In this paper, we investigate the effects of three forms of awareness (i.e., contact, local, and global) on the spread of a disease in a random network. Connectivity-correlated transmission rates are assumed. By using the mean-field theory and numerical simulation, we show that both local and contact awareness can raise the epidemic thresholds while the global awareness cannot, which mirrors the recent results of Wu et al. The obtained results point out that individual behaviors in the presence of an infectious disease has a great influence on the epidemic dynamics. Our method enriches mean-field analysis in epidemic models.
Breakdown of the brain’s functional network modularity with awareness
Godwin, Douglass; Barry, Robert L.; Marois, René
2015-01-01
Neurobiological theories of awareness propose divergent accounts of the spatial extent of brain changes that support conscious perception. Whereas focal theories posit mostly local regional changes, global theories propose that awareness emerges from the propagation of neural signals across a broad extent of sensory and association cortex. Here we tested the scalar extent of brain changes associated with awareness using graph theoretical analysis applied to functional connectivity data acquired at ultra-high field while subjects performed a simple masked target detection task. We found that awareness of a visual target is associated with a degradation of the modularity of the brain’s functional networks brought about by an increase in intermodular functional connectivity. These results provide compelling evidence that awareness is associated with truly global changes in the brain’s functional connectivity. PMID:25759440
Competing spreading processes on multiplex networks: awareness and epidemics.
Granell, Clara; Gómez, Sergio; Arenas, Alex
2014-07-01
Epidemiclike spreading processes on top of multilayered interconnected complex networks reveal a rich phase diagram of intertwined competition effects. A recent study by the authors [C. Granell et al., Phys. Rev. Lett. 111, 128701 (2013).] presented an analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the spreading of information awareness to prevent infection, on top of multiplex networks. The results in the case in which awareness implies total immunization to the disease revealed the existence of a metacritical point at which the critical onset of the epidemics starts, depending on completion of the awareness process. Here we present a full analysis of these critical properties in the more general scenario where the awareness spreading does not imply total immunization, and where infection does not imply immediate awareness of it. We find the critical relation between the two competing processes for a wide spectrum of parameters representing the interaction between them. We also analyze the consequences of a massive broadcast of awareness (mass media) on the final outcome of the epidemic incidence. Importantly enough, the mass media make the metacritical point disappear. The results reveal that the main finding, i.e., existence of a metacritical point, is rooted in the competition principle and holds for a large set of scenarios.
2016-06-22
this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi...exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation... email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between
Awareness Through Agility: Teenagers as a Model for Terrorist Development of Situational Awareness
2006-05-01
relationship. Two of the most popular social networking sites are Myspace.com and Facebook.com. MySpace is currently the world’s...blogs allows teenagers to express themselves and, in some cases, gain limited notoriety. Blogs differ from web-based social networking sites as the...posted to web-based social networking sites , blogs, or instant messaging profiles; pictures that are taken out of context can be sent via cell
2011-09-01
service -oriented systems • Software -as-a- Service ( SaaS ) • social network infrastructures • Internet marketing • mobile computing • context awareness...Maintenance and Evolution of Service -Oriented Systems (MESOA 2010), organized by members of the Carnegie Mellon Software Engineering Institute’s...CMU/SEI-2011-SR-008 | 1 1 Workshop Introduction The Software Engineering Institute (SEI) started developing a service -oriented architecture
Paganelli, Federica; Spinicci, Emilio; Giuli, Dino
2008-01-01
Continuous care models for chronic diseases pose several technology-oriented challenges for home-based continuous care, where assistance services rely on a close collaboration among different stakeholders such as health operators, patient relatives, and social community members. Here we describe Emilia Romagna Mobile Health Assistance Network (ERMHAN) a multichannel context-aware service platform designed to support care networks in cooperating and sharing information with the goal of improving patient quality of life. In order to meet extensibility and flexibility requirements, this platform has been developed through ontology-based context-aware computing and a service oriented approach. We also provide some preliminary results of performance analysis and user survey activity. PMID:18695739
Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.
Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568
An energy-aware routing protocol for query-based applications in wireless sensor networks.
Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.
An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks
Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640
ERIC Educational Resources Information Center
Magolis, David; Briggs, Audra
2016-01-01
This research study focused on the social networking site (SNS) awareness of undergraduate students, examining their experiences through the type and extent of the information shared on their SNSs in order to discover the students' experiences with SNS privacy. A phenomenological research approach was used to interview eight undergraduates to…
An adaptive neural swarm approach for intrusion defense in ad hoc networks
NASA Astrophysics Data System (ADS)
Cannady, James
2011-06-01
Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.
Investigating accident causation through information network modelling.
Griffin, T G C; Young, M S; Stanton, N A
2010-02-01
Management of risk in complex domains such as aviation relies heavily on post-event investigations, requiring complex approaches to fully understand the integration of multi-causal, multi-agent and multi-linear accident sequences. The Event Analysis of Systemic Teamwork methodology (EAST; Stanton et al. 2008) offers such an approach based on network models. In this paper, we apply EAST to a well-known aviation accident case study, highlighting communication between agents as a central theme and investigating the potential for finding agents who were key to the accident. Ultimately, this work aims to develop a new model based on distributed situation awareness (DSA) to demonstrate that the risk inherent in a complex system is dependent on the information flowing within it. By identifying key agents and information elements, we can propose proactive design strategies to optimize the flow of information and help work towards avoiding aviation accidents. Statement of Relevance: This paper introduces a novel application of an holistic methodology for understanding aviation accidents. Furthermore, it introduces an ongoing project developing a nonlinear and prospective method that centralises distributed situation awareness and communication as themes. The relevance of findings are discussed in the context of current ergonomic and aviation issues of design, training and human-system interaction.
A self-organizing neural network for job scheduling in distributed systems
NASA Astrophysics Data System (ADS)
Newman, Harvey B.; Legrand, Iosif C.
2001-08-01
The aim of this work is to describe a possible approach for the optimization of the job scheduling in large distributed systems, based on a self-organizing Neural Network. This dynamic scheduling system should be seen as adaptive middle layer software, aware of current available resources and making the scheduling decisions using the "past experience." It aims to optimize job specific parameters as well as the resource utilization. The scheduling system is able to dynamically learn and cluster information in a large dimensional parameter space and at the same time to explore new regions in the parameters space. This self-organizing scheduling system may offer a possible solution to provide an effective use of resources for the off-line data processing jobs for future HEP experiments.
Architectural Design for European SST System
NASA Astrophysics Data System (ADS)
Utzmann, Jens; Wagner, Axel; Blanchet, Guillaume; Assemat, Francois; Vial, Sophie; Dehecq, Bernard; Fernandez Sanchez, Jaime; Garcia Espinosa, Jose Ramon; Agueda Mate, Alberto; Bartsch, Guido; Schildknecht, Thomas; Lindman, Niklas; Fletcher, Emmet; Martin, Luis; Moulin, Serge
2013-08-01
The paper presents the results of a detailed design, evaluation and trade-off of a potential European Space Surveillance and Tracking (SST) system architecture. The results have been produced in study phase 1 of the on-going "CO-II SSA Architectural Design" project performed by the Astrium consortium as part of ESA's Space Situational Awareness Programme and are the baseline for further detailing and consolidation in study phase 2. The sensor network is comprised of both ground- and space-based assets and aims at being fully compliant with the ESA SST System Requirements. The proposed ground sensors include a surveillance radar, an optical surveillance system and a tracking network (radar and optical). A space-based telescope system provides significant performance and robustness for the surveillance and tracking of beyond-LEO target objects.
La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.
Sun, Guodong; Shang, Xinna; Zuo, Yan
2018-02-02
In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.
Smart Grid Communications System Blueprint
NASA Astrophysics Data System (ADS)
Clark, Adrian; Pavlovski, Chris
2010-10-01
Telecommunications operators are well versed in deploying 2G and 3G wireless networks. These networks presently support the mobile business user and/or retail consumer wishing to place conventional voice calls and data connections. The electrical power industry has recently commenced transformation of its distribution networks by deploying smart monitoring and control devices throughout their networks. This evolution of the network into a `smart grid' has also motivated the need to deploy wireless technologies that bridge the communication gap between the smart devices and information technology systems. The requirements of these networks differ from traditional wireless networks that communications operators have deployed, which have thus far forced energy companies to consider deploying their own wireless networks. We present our experience in deploying wireless networks to support the smart grid and highlight the key properties of these networks. These characteristics include application awareness, support for large numbers of simultaneous cell connections, high service coverage and prioritized routing of data. We also outline our target blueprint architecture that may be useful to the industry in building wireless and fixed networks to support the smart grid. By observing our experiences, telecommunications operators and equipment manufacturers will be able to augment their current networks and products in a way that accommodates the needs of the emerging industry of smart grids and intelligent electrical networks.
A Korean Space Situational Awareness Program : OWL Network
NASA Astrophysics Data System (ADS)
Park, J.; Choi, Y.; Jo, J.; Moon, H.; Im, H.; Park, J.
2012-09-01
We are going to present a brief introduction to the OWL (Optical Wide-field patroL) network, one of Korean space situational awareness facilities. Primary objectives of the OWL network are 1) to obtain orbital information of Korean domestic LEOs using optical method, 2) to monitor GEO-belt over territory of Korea, and 3) to alleviate collisional risks posed to Korean satellites from space debris. For these purposes, we are planning to build a global network of telescopes which consists of five small wide-field telescopes and one 2m class telescope. The network of small telescopes will be dedicated mainly to the observation of domestic LEOs, but many slots will be open to other scientific programs such as GRB follow-up observations. Main targets of 2m telescope not only include artificial objects such as GEO debris and LEO debris with low inclination and high eccentricity, but also natural objects such as near Earth asteroids. We expect to monitor space objects down to 10cm in size in GEO using the 2m telescope system. Main research topics include size distribution and evolution of space debris. We also expect to utilize this facility for physical characterization and population study of near Earth asteroids. The aperture size of the small telescope system is 0.5m with Rechey-Cretian configuration and its field of view is 1.75 deg x 1.75 deg. It is equipped with 4K CCD with 9um pixel size, and its plate scale is 1.3 arcsec/pixel. A chopper wheel is employed to maximize astrometric solutions in a single CCD frame, and a de-rotator is used to compensate field rotation of the alt-az type mount. We have designed a compact end unit in which three rotating parts (chopper wheel, filter wheel, de-rotator) and a CCD camera are integrated, and dedicated telescope/site control boards for the OWL network. The design of 2m class telescope is still under discussion yet is expected to be fixed in the first half of 2013 at the latest. The OWL network will be operated in a fully autonomous mode based on scheduled observation. We have designed a compact and robust system for fully robotic operation. The network operating system located in the headquarter issues command files for observation which are transferred to each local site. After that, the site operating system interprets command files and controls each telescope system. In this way, we obtain and update orbital information of domestic satellites based on purely optical method. A prototype of the network telescope system will be installed at a test bed in Korea in commissioning phase. After the test operation, the design of the network telescope system will be finalized in the end of 2012. The installation of the telescope systems in 3 local sites will be completed in 2013, and the so-called "OWL basic network"" will start normal operations. In the first two years of the second stage of the OWL Project (2014-2015), we plan to place two small wide-field telescopes, and we build the 2m telescope system to complete the OWL network in the 2016.
NASA Astrophysics Data System (ADS)
Bedrina, T.; Parodi, A.; Quarati, A.; Clematis, A.
2012-06-01
It is widely recognised that an effective exploitation of Information and Communication Technologies (ICT) is an enabling factor to achieve major advancements in Hydro-Meteorological Research (HMR). Recently, a lot of attention has been devoted to the use of ICT in HMR activities, e.g. in order to facilitate data exchange and integration, to improve computational capabilities and consequently model resolution and quality. Nowadays, ICT technologies have demonstrated that it is possible to extend monitoring networks by integrating sensors and other sources of data managed by volunteer's communities. These networks are constituted by peers that span a wide portion of the territory in many countries. The peers are "location aware" in the sense that they provide information strictly related with their geospatial location. The coverage of these networks, in general, is not uniform and the location of peers may follow random distribution. The ICT features used to set up the network are lightweight and user friendly, thus, permitting the peers to join the network without the necessity of specialised ICT knowledge. In this perspective it is of increasing interest for HMR activities to elaborate of Personal Weather Station (PWS) networks, capable to provide almost real-time, location aware, weather data. Moreover, different big players of the web arena are now providing world-wide backbones, suitable to present on detailed map location aware information, obtained by mashing up data from different sources. This is the case, for example, with Google Earth and Google Maps. This paper presents the design of a mashup application aimed at aggregating, refining and visualizing near real-time hydro-meteorological datasets. In particular, we focused on the integration of instant precipitation depths, registered either by widespread semi-professional weather stations and official ones. This sort of information has high importance and usefulness in decision support systems and Civil Protection applications. As a significant case study, we analysed the rainfall data observed during the severe flash-flood event of 4 November 2011 over Liguria region, Italy. The joint use of official observation network with PWS networks and meteorological radar allowed for the making of evident finger-like convection structure.
Latino Civic Group Participation, Social Networks, and Physical Activity.
Marquez, Becky; Gonzalez, Patricia; Gallo, Linda; Ji, Ming
2016-07-01
We examined whether social networks and resource awareness for physical activity may mediate the relationship between civic group participation and physical activity. This is a cross-sectional study of a randomly selected sample of 335 Latinos (mean age 42.1 ± 16.4 years) participating in the San Diego Prevention Research Center's 2009 Household Community Survey. Serial multiple mediation analysis tested the hypothesis that civic group participation is associated with meeting physical activity recommendations through an indirect mechanism of larger social networks followed by greater knowledge of physical activity community resources. The indirect effects of level of civic group participation as well as religious, health, neighborhood, or arts group participation on meeting national physical activity recommendations were significant in models testing pathways through social network size and physical activity resource awareness. The direct effect was only significant for health group indicating that participating in a health group predicted physical activity independent of social network size and awareness of physical activity resources. Belonging to civic groups may promote physical activity engagement through social network diffusion of information on community physical activity resources which has implications for health.
Tops, Mattie; Boksem, Maarten A. S.; Quirin, Markus; IJzerman, Hans; Koole, Sander L.
2013-01-01
In the present paper, we will apply the predictive and reactive control systems (PARCS) theory as a framework that integrates competing theories of neural substrates of awareness by describing the “default mode network” (DMN) and anterior insula (AI) as parts of two different behavioral and homeostatic control systems. The DMN, a network that becomes active at rest when there is no external stimulation or task to perform, has been implicated in self-reflective awareness and prospection. By contrast, the AI is associated with awareness and task-related attention. This has led to competing theories stressing the role of the DMN in self-awareness vs. the role of interoceptive and emotional information integration in the AI in awareness of the emotional moment. In PARCS, the respective functions of the DMN and AI in a specific control system explains their association with different qualities of awareness, and how mental states can shift from one state (e.g., prospective self-reflection) to the other (e.g., awareness of the emotional moment) depending on the relative dominance of control systems. These shifts between reactive and predictive control are part of processes that enable the intake of novel information, integration of this novel information within existing knowledge structures, and the creation of a continuous personal context in which novel information can be integrated and understood. As such, PARCS can explain key characteristics of mental states, such as their temporal and spatial focus (e.g., a focus on the here and now vs. the future; a first person vs. a third person perspective). PARCS further relates mental states to brain states and functions, such as activation of the DMN or hemispheric asymmetry in frontal cortical functions. Together, PARCS deepens the understanding of a broad range of mental states, including mindfulness, mind wandering, rumination, autobiographical memory, imagery, and the experience of self. PMID:24904455
Exploring mobile health in a private online social network.
Memon, Qurban A; Mustafa, Asma Fayes
2015-01-01
Health information is very vulnerable. Certain individuals or corporate organisations will continue to steal it similar to bank account data once data is on wireless channels. Once health information is part of a social network, corresponding privacy issues also surface. Insufficiently trained employees at hospitals that pay less attention to creating a privacy-aware culture will suffer loss when mobile devices containing health information are lost, stolen or sniffed. In this work, a social network system is explored as a m-health system from a privacy perspective. A model is developed within a framework of data-driven privacy and implemented on Android operating system. In order to check feasibility of the proposed model, a prototype application is developed on Facebook for different services, including: i) sharing user location; ii) showing nearby friends; iii) calculating and sharing distance moved, and calories burned; iv) calculating, tracking and sharing user heart rate; etc.
Configuring a Context-Aware Middleware for Wireless Sensor Networks
Gámez, Nadia; Cubo, Javier; Fuentes, Lidia; Pimentel, Ernesto
2012-01-01
In the Future Internet, applications based on Wireless Sensor Networks will have to support reconfiguration with minimum human intervention, depending on dynamic context changes in their environment. These situations create a need for building these applications as adaptive software and including techniques that allow the context acquisition and decisions about adaptation. However, contexts use to be made up of complex information acquired from heterogeneous devices and user characteristics, making them difficult to manage. So, instead of building context-aware applications from scratch, we propose to use FamiWare, a family of middleware for Ambient Intelligence specifically designed to be aware of contexts in sensor and smartphone devices. It provides both, several monitoring services to acquire contexts from devices and users, and a context-awareness service to analyze and detect context changes. However, the current version of FamiWare does not allow the automatic incorporation related to the management of new contexts into the FamiWare family. To overcome this shortcoming, in this work, we first present how to model the context using a metamodel to define the contexts that must to be taken into account in an instantiation of FamiWare for a certain Ambient Intelligence system. Then, to configure a new context-aware version of FamiWare and to generate code ready-to-install within heterogeneous devices, we define a mapping that automatically transforms metamodel elements defining contexts into elements of the FamiWare family, and we also use the FamiWare configuration process to customize the new context-aware variant. Finally, we evaluate the benefits of our process, and we analyze both that the new version of the middleware works as expected and that it manages the contexts in an efficient way. PMID:23012505
NASA Astrophysics Data System (ADS)
Karahan, Engin; Roehrig, Gillian
2015-02-01
Current science education reforms and policy documents highlight the importance of environmental awareness and perceived need for activism. As "environmental problems are socially constructed in terms of their conceptualized effects on individuals, groups, other living things and systems research based on constructivist principles provides not only a coherent framework in which to theorize about learning, but also a context for understanding socially constructed issues" (Palmer and Suggate in Res Pap Educ 19(2), 2004, p. 208). This research study investigated the impacts of the learning processes structured based on the theories of constructionism and social constructivism on students' environmental awareness and perceived need for activism. Students constructed multimedia artifacts expressing their knowledge, attitudes, awareness, and activism about environmental issues through a constructionist design process. In addition, a social networking site was designed and used to promote social interaction among students. Twenty-two high school environmental science students participated in this study. A convergent mixed methods design was implemented to allow for the triangulation of methods by directly comparing and contrasting quantitative results with qualitative findings for corroboration and validation purposes. Using a mixed method approach, quantitative findings are supported with qualitative data (student video projects, writing prompts, blog entries, video projects of the students, observational field notes, and reflective journals) including spontaneous responses in both synchronous and asynchronous conversations on the social network to provide a better understanding of the change in students' environmental awareness and perceived need for activism. The findings of the study indicated that students' environmental awareness and perceived need for activism were improved at different scales (personal, community, global) throughout the constructionist and social constructivist learning processes.
Network Policy Languages: A Survey and a New Approach
2000-08-01
go, throwing a community into economic chaos. These events could result from discontinued funding from Silicon Valley investors who became aware of...prevented. C. POLICY HIERARCHIES FOR DISTRIBUTED SYSTEMS MANAGEMENT In [23], Moffett and Sloman form a policy hierarchy is by refining general high...management behavior of a system, without coding the behavior into the manager agents. Lupu and Sloman focus on techniques and tool support for off-line
Potential System Vulnerabilities of a Network Enabled Force
2004-09-01
of trust in information, loss of context and awareness of others’ needs and reduction of social cohesion . Science - (more specifically systems...and Technology Damaging Social Cohesion NCW champions the concept of dispersed forces as a means to generate effects through approaches other than...Mission Grouping Damaging Social Cohesion This is a slight variation on the vulnerability expressed in 3.9.6 above. If we have agility in mission
Analysis of three-dimensionally proliferated sensor architectures for flexible SSA
NASA Astrophysics Data System (ADS)
Cunio, Phillip M.; Flewelling, Brien
2018-05-01
The evolution of space into a congested, contested, and competitive regime drives a commensurate need for awareness of events there. As the number of systems on orbit grows, so will the need for sensing and tracking these systems. One avenue for advanced sensing capability is a widespread network of small but capable Space Situational Awareness (SSA) sensors, proliferated widely in the three-dimensional volume extending from the Earth's surface to the Geosynchronous Earth Orbit (GEO) belt, incorporating multiple different varieties and types of sensors. Due to the freedom of movement afforded by solid surfaces and atmosphere, some of these sensors may have substantial mobility. Accordingly, designing a network for maximum SSA coverage at reasonable cost may entail heterogeneous architectures with common logistics (including modular sensor packages or mobility platforms, which may be flexibly re-assigned). Smaller mobile sensors leveraging Commercial-Off-The-Shelf (COTS) components and software are appealing for their ability to simplify logistics versus large, monolithic, uniquely-exquisite sensor systems. This paper examines concepts for such sensor systems, and analyzes the costs associated with their use, while assessing the benefits (including reduced gap time, weather resilience, and multiple-sensor coverage) that such an architecture enables. Recommendations for preferred modes and mixes of fielding sensors in a heterogeneous architecture are made, and directions for future related research are suggested.
An ethernet/IP security review with intrusion detection applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laughter, S. A.; Williams, R. D.
2006-07-01
Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less
Student Career Awareness Network at L. B. Johnson Middle School: 1997-98 School Year Evaluation.
ERIC Educational Resources Information Center
Mearns, Curt
The Student Career Awareness Network (SCAN) at L. B. Johnson Middle School, New Mexico, seeks to target a wide range of students with differing abilities while incorporating School-To-Career's philosophy of instruction. SCAN uses work-related experiences such as project-based assignments, applications-based instruction, hands-on experience, and…
Nanotechnology enabled sensors and wireless sensing networks
NASA Astrophysics Data System (ADS)
Tsui, Ray; Zhang, Ruth; Mastroianni, Sal; Díaz Aguilar, Alvaro; Forzani, Erica; Tao, Nongjian
2009-05-01
The capabilities of future mobile communication devices will extend beyond merely transmitting and receiving voice, data, and video information. For example, first responders such as firefighters and emergency workers will wear environmentally- aware devices that will warn them of combustible and toxic gases as well as communicate that information wirelessly to the Command and Control Center. Similar sensor systems could alert warfighters of the presence of explosives or biological weapons. These systems can function either in the form of an individual stand-alone detector or part of a wireless sensor network. Novel sensors whose functionality is enhanced via nanotechnology will play a key role in realizing such systems. Such sensors are important because of their high sensitivity, low power consumption, and small size. This talk will provide an overview of some of the advances made in sensors through the use of nanotechnology, including those that make use of carbon nanotubes and nanoparticles. Their applicability in mobile sensing and wireless sensor networks for use in national security and public safety will be described. Other technical challenges associated with the development of such systems and networks will also be discussed.
Navigation Architecture For A Space Mobile Network
NASA Technical Reports Server (NTRS)
Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell
2016-01-01
The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space-based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts.
Competing spreading processes on multiplex networks: Awareness and epidemics
NASA Astrophysics Data System (ADS)
Granell, Clara; Gómez, Sergio; Arenas, Alex
2014-07-01
Epidemiclike spreading processes on top of multilayered interconnected complex networks reveal a rich phase diagram of intertwined competition effects. A recent study by the authors [C. Granell et al., Phys. Rev. Lett. 111, 128701 (2013)., 10.1103/PhysRevLett.111.128701] presented an analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the spreading of information awareness to prevent infection, on top of multiplex networks. The results in the case in which awareness implies total immunization to the disease revealed the existence of a metacritical point at which the critical onset of the epidemics starts, depending on completion of the awareness process. Here we present a full analysis of these critical properties in the more general scenario where the awareness spreading does not imply total immunization, and where infection does not imply immediate awareness of it. We find the critical relation between the two competing processes for a wide spectrum of parameters representing the interaction between them. We also analyze the consequences of a massive broadcast of awareness (mass media) on the final outcome of the epidemic incidence. Importantly enough, the mass media make the metacritical point disappear. The results reveal that the main finding, i.e., existence of a metacritical point, is rooted in the competition principle and holds for a large set of scenarios.
On the relevance of using open wireless sensor networks in environment monitoring.
Bagula, Antoine B; Inggs, Gordon; Scott, Simon; Zennaro, Marco
2009-01-01
This paper revisits the problem of the readiness for field deployments of wireless sensor networks by assessing the relevance of using Open Hardware and Software motes for environment monitoring. We propose a new prototype wireless sensor network that fine-tunes SquidBee motes to improve the life-time and sensing performance of an environment monitoring system that measures temperature, humidity and luminosity. Building upon two outdoor sensing scenarios, we evaluate the performance of the newly proposed energy-aware prototype solution in terms of link quality when expressed by the Received Signal Strength, Packet Loss and the battery lifetime. The experimental results reveal the relevance of using the Open Hardware and Software motes when setting up outdoor wireless sensor networks.
Soft real-time alarm messages for ATLAS TDAQ
NASA Astrophysics Data System (ADS)
Darlea, G.; Al Shabibi, A.; Martin, B.; Lehmann Miotto, G.
2010-05-01
The ATLAS TDAQ network consists of three separate Ethernet-based networks (Data, Control and Management) with over 2000 end-nodes. The TDAQ system has to be aware of the meaningful network failures and events in order for it to take effective recovery actions. The first stage of the process is implemented with Spectrum, a commercial network management tool. Spectrum detects and registers all network events, then it publishes the information via a CORBA programming interface. A gateway program (called NSG—Network Service Gateway) connects to Spectrum through CORBA and exposes to its clients a Java RMI interface. This interface implements a callback mechanism that allows the clients to subscribe for monitoring "interesting" parts of the network. The last stage of the TDAQ network monitoring tool is implemented in a module named DNC (DAQ to Network Connection), which filters the events that are to be reported to the TDAQ system: it subscribes to the gateway only for the machines that are currently active in the system and it forwards only the alarms that are considered important for the current TDAQ data taking session. The network information is then synthesized and presented in a human-readable format. These messages can be further processed either by the shifter who is in charge, the network expert or the Online Expert System. This article aims to describe the different mechanisms of the chain that transports the network events to the front-end user, as well as the constraints and rules that govern the filtering and the final format of the alarm messages.
He, Jiang-Hong; Yang, Yi; Zhang, Yi; Qiu, Si-You; Zhou, Zhen-Yu; Dang, Yuan-Yuan; Dai, Yi-Wu; Liu, Yi-Jun; Xu, Ru-Xiang
2014-08-01
Resting-state functional MRI (fMRI) has emerged as a valuable tool to characterize the complex states encompassing disorders of consciousness (DOC). Awareness appears to comprise two coexistent, anticorrelated components named the external and internal awareness networks. The present study hypothesizes that DOC interrupts the balance between the internal and external awareness networks. To gain more understanding of this phenomenon, the present study analyzed resting-state fMRI data from 12 patients with DOC versus 12 healthy age-matched controls. The data were explored using independent component analysis and amplitude of low-frequency fluctuation (ALFF) analysis. The results indicated that DOC deactivated midline areas associated with internal awareness. In addition, external awareness was strengthened in DOC because of increased activation in the insula, lingual gyrus, paracentral and supplementary motor area. The activity patterns suggested strengthened external awareness against weakened internal awareness in DOC. In particular, increased activity found in the insula, lingual gyrus, paracentral and supplementary motor area of patients with DOC implied possible involvement of augmented visuo-motor modulation in these patients. DOC is probably related to hyperactive external awareness opposing hypoactive internal awareness. This unique pattern of brain activity may potentially be a prognostic marker for DOC. Copyright © 2014 John Wiley & Sons, Ltd.
NASA Technical Reports Server (NTRS)
Lee, Mark
1991-01-01
Many companies, including Xerox and Texas Instruments, are using cross functional systems to deal with the increasingly complex and competitive business environment. However, few firms within the aerospace industry appear to be aware of the significant benefits that cross functional systems can provide. Those benefits are examined and a flexible methodology is discussed that companies can use to identify and develop cross functional systems that will help improve organizational performance. In addition, some of the managerial issues are addressed that cross functional systems may raise and specific examples are used to explore networking's contributions to cross functional systems.
Physical impairment aware transparent optical networks
NASA Astrophysics Data System (ADS)
Antona, Jean-Christophe; Morea, Annalisa; Zami, Thierry; Leplingard, Florence
2009-11-01
As illustrated by optical fiber and optical amplification, optical telecommunications have appeared for the last ten years as one of the most promising candidates to increase the transmission capacities. More recently, the concept of optical transparency has been investigated and introduced: it consists of the optical routing of Wavelength Division Multiplexed (WDM) channels without systematic optoelectronic processing at nodes, as long as propagation impairments remain acceptable [1]. This allows achieving less power-consuming, more scalable and flexible networks, and today partial optical transparency has become a reality in deployed systems. However, because of the evolution of traffic features, optical networks are facing new challenges such as demand for higher transmitted capacity, further upgradeability, and more automation. Making all these evolutions compliant on the same current network infrastructure with a minimum of upgrades is one of the main issues for equipment vendors and operators. Hence, an automatic and efficient management of the network needs a control plan aware of the expected Quality of Transmission (QoT) of the connections to set-up with respect to numerous parameters such as: the services demanded by the customers in terms of protection/restoration; the modulation rate and format of the connection under test and also of its adjacent WDM channels; the engineering rules of the network elements traversed with an accurate knowledge of the associated physical impairments. Whatever the method and/or the technology used to collect this information, the issue about its accuracy is one of the main concerns of the network system vendors, because an inaccurate knowledge could yield a sub-optimal dimensioning and so additional costs when installing the network in the field. Previous studies [1], [2] illustrated the impact of this knowledge accuracy on the ability to predict the connection feasibility. After describing usual methods to build performance estimators, this paper reports on this impact but at the global network level, quantifying the importance to account for these uncertainties from the early network planning step; it also proposes an improvement of the accuracy of the Quality of Transmission (QoT) estimator to reduce the raise of planned resources due to these uncertainties.
Smart sensing surveillance system
NASA Astrophysics Data System (ADS)
Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen
2010-04-01
An effective public safety sensor system for heavily-populated applications requires sophisticated and geographically-distributed infrastructures, centralized supervision, and deployment of large-scale security and surveillance networks. Artificial intelligence in sensor systems is a critical design to raise awareness levels, improve the performance of the system and adapt to a changing scenario and environment. In this paper, a highly-distributed, fault-tolerant, and energy-efficient Smart Sensing Surveillance System (S4) is presented to efficiently provide a 24/7 and all weather security operation in crowded environments or restricted areas. Technically, the S4 consists of a number of distributed sensor nodes integrated with specific passive sensors to rapidly collect, process, and disseminate heterogeneous sensor data from near omni-directions. These distributed sensor nodes can cooperatively work to send immediate security information when new objects appear. When the new objects are detected, the S4 will smartly select the available node with a Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR camera to track the objects and capture associated imagery. The S4 provides applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. Other imaging processes can be updated to meet specific requirements and operations. In the S4, all the sensor nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology. This UWB RF technology can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The Service Oriented Architecture of S4 enables remote applications to interact with the S4 network and use the specific presentation methods. In addition, the S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE) standards to efficiently discover, access, use, and control heterogeneous sensors and their metadata. These S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. The S4 system is directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.
Simulation of Attacks for Security in Wireless Sensor Network.
Diaz, Alvaro; Sanchez, Pablo
2016-11-18
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.
Advanced algorithms for distributed fusion
NASA Astrophysics Data System (ADS)
Gelfand, A.; Smith, C.; Colony, M.; Bowman, C.; Pei, R.; Huynh, T.; Brown, C.
2008-03-01
The US Military has been undergoing a radical transition from a traditional "platform-centric" force to one capable of performing in a "Network-Centric" environment. This transformation will place all of the data needed to efficiently meet tactical and strategic goals at the warfighter's fingertips. With access to this information, the challenge of fusing data from across the batttlespace into an operational picture for real-time Situational Awareness emerges. In such an environment, centralized fusion approaches will have limited application due to the constraints of real-time communications networks and computational resources. To overcome these limitations, we are developing a formalized architecture for fusion and track adjudication that allows the distribution of fusion processes over a dynamically created and managed information network. This network will support the incorporation and utilization of low level tracking information within the Army Distributed Common Ground System (DCGS-A) or Future Combat System (FCS). The framework is based on Bowman's Dual Node Network (DNN) architecture that utilizes a distributed network of interlaced fusion and track adjudication nodes to build and maintain a globally consistent picture across all assets.
Vago, David R; Silbersweig, David A
2012-01-01
Mindfulness-as a state, trait, process, type of meditation, and intervention has proven to be beneficial across a diverse group of psychological disorders as well as for general stress reduction. Yet, there remains a lack of clarity in the operationalization of this construct, and underlying mechanisms. Here, we provide an integrative theoretical framework and systems-based neurobiological model that explains the mechanisms by which mindfulness reduces biases related to self-processing and creates a sustainable healthy mind. Mindfulness is described through systematic mental training that develops meta-awareness (self-awareness), an ability to effectively modulate one's behavior (self-regulation), and a positive relationship between self and other that transcends self-focused needs and increases prosocial characteristics (self-transcendence). This framework of self-awareness, -regulation, and -transcendence (S-ART) illustrates a method for becoming aware of the conditions that cause (and remove) distortions or biases. The development of S-ART through meditation is proposed to modulate self-specifying and narrative self-networks through an integrative fronto-parietal control network. Relevant perceptual, cognitive, emotional, and behavioral neuropsychological processes are highlighted as supporting mechanisms for S-ART, including intention and motivation, attention regulation, emotion regulation, extinction and reconsolidation, prosociality, non-attachment, and decentering. The S-ART framework and neurobiological model is based on our growing understanding of the mechanisms for neurocognition, empirical literature, and through dismantling the specific meditation practices thought to cultivate mindfulness. The proposed framework will inform future research in the contemplative sciences and target specific areas for development in the treatment of psychological disorders.
Vago, David R.; Silbersweig, David A.
2012-01-01
Mindfulness—as a state, trait, process, type of meditation, and intervention has proven to be beneficial across a diverse group of psychological disorders as well as for general stress reduction. Yet, there remains a lack of clarity in the operationalization of this construct, and underlying mechanisms. Here, we provide an integrative theoretical framework and systems-based neurobiological model that explains the mechanisms by which mindfulness reduces biases related to self-processing and creates a sustainable healthy mind. Mindfulness is described through systematic mental training that develops meta-awareness (self-awareness), an ability to effectively modulate one's behavior (self-regulation), and a positive relationship between self and other that transcends self-focused needs and increases prosocial characteristics (self-transcendence). This framework of self-awareness, -regulation, and -transcendence (S-ART) illustrates a method for becoming aware of the conditions that cause (and remove) distortions or biases. The development of S-ART through meditation is proposed to modulate self-specifying and narrative self-networks through an integrative fronto-parietal control network. Relevant perceptual, cognitive, emotional, and behavioral neuropsychological processes are highlighted as supporting mechanisms for S-ART, including intention and motivation, attention regulation, emotion regulation, extinction and reconsolidation, prosociality, non-attachment, and decentering. The S-ART framework and neurobiological model is based on our growing understanding of the mechanisms for neurocognition, empirical literature, and through dismantling the specific meditation practices thought to cultivate mindfulness. The proposed framework will inform future research in the contemplative sciences and target specific areas for development in the treatment of psychological disorders. PMID:23112770
Federated queries of clinical data repositories: Scaling to a national network.
Weber, Griffin M
2015-06-01
Federated networks of clinical research data repositories are rapidly growing in size from a handful of sites to true national networks with more than 100 hospitals. This study creates a conceptual framework for predicting how various properties of these systems will scale as they continue to expand. Starting with actual data from Harvard's four-site Shared Health Research Information Network (SHRINE), the framework is used to imagine a future 4000 site network, representing the majority of hospitals in the United States. From this it becomes clear that several common assumptions of small networks fail to scale to a national level, such as all sites being online at all times or containing data from the same date range. On the other hand, a large network enables researchers to select subsets of sites that are most appropriate for particular research questions. Developers of federated clinical data networks should be aware of how the properties of these networks change at different scales and design their software accordingly. Copyright © 2015 Elsevier Inc. All rights reserved.
Leveraging Emerging Technology to Maintain Corporate Situational Awareness
2008-06-01
Abstract and Outline for 13th ICCRTS For the paper entitled: Leveraging Emerging Technology to Maintain Corporate ...Situational Awareness Topics: Topic 5. Organizational Issues Topic 4. Cognitive and Social Issues Topic: 2 Networks and Networking Mr. José...for the collection of information is estimated to average 1 hour per response , including the time for reviewing instructions, searching existing data
Network-Aware Mechanisms for Tolerating Byzantine Failures in Distributed Systems
2012-01-01
In Digest, we use SHA-256 as the collision-resistant hash function. We use the realization of SHA-256 from the OpenSSL toolkit [48]. The results...vol. 46, pp. 372–378, 1997. [48] “ Openssl project.” [Online]. Available: http://www.openssl.org/ 154 [49] M. J. Fischer, N. A. Lynch, and M. Merritt
Turel, Ofir; Bechara, Antoine
2016-01-01
This study examines a behavioral tripartite model developed in the field of addiction, and applies it here to understanding general and impulsive information technology use. It suggests that technology use is driven by two information-processing brain systems: reflective and impulsive, and that their effects on use are modulated by interoceptive awareness processes. The resultant reflective-impulsive-interoceptive awareness model is tested in two behavioral studies. Both studies employ SEM techniques to time-lagged self-report data from n1 = 300 and n2 = 369 social networking site users. Study 1 demonstrated that temptations augment the effect of habit on technology use, and reduce the effect of satisfaction on use. Study 2 showed that temptations strengthen the effect of habit on impulsive technology use, and weaken the effect of behavioral expectations on impulsive technology use. Hence, the results consistently support the notion that information technology users' behaviors are influenced by reflective and impulsive information processing systems; and that the equilibrium of these systems is determined, at least in part, by one's temptations. These results can serve as a basis for understanding the etiology of modern day addictions. PMID:27199834
Turel, Ofir; Bechara, Antoine
2016-01-01
This study examines a behavioral tripartite model developed in the field of addiction, and applies it here to understanding general and impulsive information technology use. It suggests that technology use is driven by two information-processing brain systems: reflective and impulsive, and that their effects on use are modulated by interoceptive awareness processes. The resultant reflective-impulsive-interoceptive awareness model is tested in two behavioral studies. Both studies employ SEM techniques to time-lagged self-report data from n 1 = 300 and n 2 = 369 social networking site users. Study 1 demonstrated that temptations augment the effect of habit on technology use, and reduce the effect of satisfaction on use. Study 2 showed that temptations strengthen the effect of habit on impulsive technology use, and weaken the effect of behavioral expectations on impulsive technology use. Hence, the results consistently support the notion that information technology users' behaviors are influenced by reflective and impulsive information processing systems; and that the equilibrium of these systems is determined, at least in part, by one's temptations. These results can serve as a basis for understanding the etiology of modern day addictions.
N-Screen Aware Multicriteria Hybrid Recommender System Using Weight Based Subspace Clustering
Ullah, Farman; Lee, Sungchang
2014-01-01
This paper presents a recommender system for N-screen services in which users have multiple devices with different capabilities. In N-screen services, a user can use various devices in different locations and time and can change a device while the service is running. N-screen aware recommendation seeks to improve the user experience with recommended content by considering the user N-screen device attributes such as screen resolution, media codec, remaining battery time, and access network and the user temporal usage pattern information that are not considered in existing recommender systems. For N-screen aware recommendation support, this work introduces a user device profile collaboration agent, manager, and N-screen control server to acquire and manage the user N-screen devices profile. Furthermore, a multicriteria hybrid framework is suggested that incorporates the N-screen devices information with user preferences and demographics. In addition, we propose an individual feature and subspace weight based clustering (IFSWC) to assign different weights to each subspace and each feature within a subspace in the hybrid framework. The proposed system improves the accuracy, precision, scalability, sparsity, and cold start issues. The simulation results demonstrate the effectiveness and prove the aforementioned statements. PMID:25152921
2006-10-01
C L A S I F I C A T I O N An Assessment of ELINT Exploitation for Situational Awareness Visualisations on Operator Situational...environment. The An Assessment of ELINT Exploitation for Situational Awareness Visualisations on Operator Situational Awareness EXECUTIVE SUMMARY...1. ELEXSA’s Process of Sequential Enrichment. 2 Figure 2. Sample ELEXSA Visualisation . 3 Figure 3. Example Llama/Cheetah Network Layout. 5
MARSnet: Mission-aware Autonomous Radar Sensor Network for Future Combat Systems
2009-03-23
15 , , L x(s)x*(s) ds WdB = lOlog Jo Y ; ; (19) In addition, the sidelobe structure is changed because of the Dop])ler shift...Synchro- nous CDMA Systems.’’ IEICE Trans.Fundamentals. E832A(11): 1 16, 2000. 24 [10] P. Z. Fan. "New Direction in Spreading Sequence Design and the...Suehiro , N Kuroyanagi and P Z Fan. "Two types of polyphase sequence set. for approximately synchronized CDMA systems." IEICE Trans. Fundamentals. E862A
2005-11-01
more random. Autonomous systems can exchange entropy statistics for packet streams with no confidentiality concerns, potentially enabling timely and... analysis began with simulation results, which were validated by analysis of actual data from an Autonomous System (AS). A scale-free network is one...traffic—for example, time series of flux at given nodes and mean path length Outputs the time series from any node queried Calculates
Amemiya, Kaoru; Naito, Eiichi
2016-05-01
It is generally believed that the human right cerebral hemisphere plays a dominant role in corporeal awareness, which is highly associated with conscious experience of the physical self. Prompted by our previous findings, we examined whether the right frontoparietal activations often observed when people experience kinesthetic illusory limb movement are supported by a large-scale brain network connected by a specific branch of the superior longitudinal fasciculus fiber tracts (SLF I, II, and III). We scanned brain activity with functional magnetic resonance imaging (MRI) while nineteen blindfolded healthy volunteers experienced illusory movement of the right stationary hand elicited by tendon vibration, which was replicated after the scanning. We also scanned brain activity when they executed and imagined right hand movement, and identified the active brain regions during illusion, execution, and imagery in relation to the SLF fiber tracts. We found that illusion predominantly activated the right inferior frontoparietal regions connected by SLF III, which were not substantially recruited during execution and imagery. Among these regions, activities in the right inferior parietal cortices and inferior frontal cortices showed right-side dominance and correlated well with the amount of illusion (kinesthetic illusory awareness) experienced by the participants. The results illustrated the predominant involvement of the right inferior frontoparietal network connected by SLF III when people recognize postural changes of their limb. We assume that the network bears a series of functions, specifically, monitoring the current status of the musculoskeletal system, and building-up and updating our postural model (body schema), which could be a basis for the conscious experience of the physical self. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
NASA Technical Reports Server (NTRS)
Goodman, Michael; Blakeslee, Richard; Hall, John; Parker, Philip; He, Yubin
2008-01-01
The NASA Real Time Mission Monitor (RTMM) is a situational awareness tool that integrates satellite, aircraft state information, airborne and surface instruments, and weather state data in to a single visualization package for real time field experiment management. RTMM optimizes science and logistic decision-making during field experiments by presenting timely data and graphics to the users to improve real time situational awareness of the experiment's assets. The RTMM is proven in the field as it supported program managers, scientists, and aircraft personnel during the NASA African Monsoon Multidisciplinary Analyses (investigated African easterly waves and Tropical Storm Debby and Helene) during August-September 2006 in Cape Verde, the Tropical Composition, Cloud and Climate Coupling experiment during July-August 2007 in Costa Rica, and the Hurricane Aerosonde mission into Hurricane Noel in 2-3 November 2007. The integration and delivery of this information is made possible through data acquisition systems, network communication links, and network server resources built and managed by collaborators at NASA Marshall Space Flight Center (MSFC) and Dryden Flight Research Center (DFRC). RTMM is evolving towards a more flexible and dynamic combination of sensor ingest, network computing, and decision-making activities through the use of a service oriented architecture based on community standards and protocols. Each field experiment presents unique challenges and opportunities for advancing the functionality of RTMM. A description of RTMM, the missions it has supported, and its new features that are under development will be presented.
Epidemic mitigation via awareness propagation in communication networks: the role of time scales
NASA Astrophysics Data System (ADS)
Wang, Huijuan; Chen, Chuyi; Qu, Bo; Li, Daqing; Havlin, Shlomo
2017-07-01
The participation of individuals in multi-layer networks allows for feedback between network layers, opening new possibilities to mitigate epidemic spreading. For instance, the spread of a biological disease such as Ebola in a physical contact network may trigger the propagation of the information related to this disease in a communication network, e.g. an online social network. The information propagated in the communication network may increase the awareness of some individuals, resulting in them avoiding contact with their infected neighbors in the physical contact network, which might protect the population from the infection. In this work, we aim to understand how the time scale γ of the information propagation (speed that information is spread and forgotten) in the communication network relative to that of the epidemic spread (speed that an epidemic is spread and cured) in the physical contact network influences such mitigation using awareness information. We begin by proposing a model of the interaction between information propagation and epidemic spread, taking into account the relative time scale γ. We analytically derive the average fraction of infected nodes in the meta-stable state for this model (i) by developing an individual-based mean-field approximation (IBMFA) method and (ii) by extending the microscopic Markov chain approach (MMCA). We show that when the time scale γ of the information spread relative to the epidemic spread is large, our IBMFA approximation is better compared to MMCA near the epidemic threshold, whereas MMCA performs better when the prevalence of the epidemic is high. Furthermore, we find that an optimal mitigation exists that leads to a minimal fraction of infected nodes. The optimal mitigation is achieved at a non-trivial relative time scale γ, which depends on the rate at which an infected individual becomes aware. Contrary to our intuition, information spread too fast in the communication network could reduce the mitigation effect. Finally, our finding has been validated in the real-world two-layer network obtained from the location-based social network Brightkite.
MicroSensors Systems: detection of a dismounted threat
NASA Astrophysics Data System (ADS)
Davis, Bill; Berglund, Victor; Falkofske, Dwight; Krantz, Brian
2005-05-01
The Micro Sensor System (MSS) is a layered sensor network with the goal of detecting dismounted threats approaching high value assets. A low power unattended ground sensor network is dependant on a network protocol for efficiency in order to minimize data transmissions after network establishment. The reduction of network 'chattiness' is a primary driver for minimizing power consumption and is a factor in establishing a low probability of detection and interception. The MSS has developed a unique protocol to meet these challenges. Unattended ground sensor systems are most likely dependant on batteries for power which due to size determines the ability of the sensor to be concealed after placement. To minimize power requirements, overcome size limitations, and maintain a low system cost the MSS utilizes advanced manufacturing processes know as Fluidic Self-Assembly and Chip Scale Packaging. The type of sensing element and the ability to sense various phenomenologies (particularly magnetic) at ranges greater than a few meters limits the effectiveness of a system. The MicroSensor System will overcome these limitations by deploying large numbers of low cost sensors, which is made possible by the advanced manufacturing process used in production of the sensors. The MSS program will provide unprecedented levels of real-time battlefield information which greatly enhances combat situational awareness when integrated with the existing Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) infrastructure. This system will provide an important boost to realizing the information dominant, network-centric objective of Joint Vision 2020.
Network Access Control List Situation Awareness
ERIC Educational Resources Information Center
Reifers, Andrew
2010-01-01
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
DARPA DTN Phase 3 Core Engineering Support
NASA Technical Reports Server (NTRS)
Torgerson, J. Leigh; Richard Borgen, Richard; McKelvey, James; Segui, John; Tsao, Phil
2010-01-01
This report covers the initial DARPA DTN Phase 3 activities as JPL provided Core Engineering Support to the DARPA DTN Program, and then further details the culmination of the Phase 3 Program with a systematic development, integration and test of a disruption-tolerant C2 Situation Awareness (SA) system that may be transitioned to the USMC and deployed in the near future. The system developed and tested was a SPAWAR/JPL-Developed Common Operating Picture Fusion Tool called the Software Interoperability Environment (SIE), running over Disruption Tolerant Networking (DTN) protocols provided by BBN and MITRE, which effectively extends the operational range of SIE from normal fully-connected internet environments to the mobile tactical edges of the battlefield network.
NASA Astrophysics Data System (ADS)
Margitus, Michael R.; Tagliaferri, William A., Jr.; Sudit, Moises; LaMonica, Peter M.
2012-06-01
Understanding the structure and dynamics of networks are of vital importance to winning the global war on terror. To fully comprehend the network environment, analysts must be able to investigate interconnected relationships of many diverse network types simultaneously as they evolve both spatially and temporally. To remove the burden from the analyst of making mental correlations of observations and conclusions from multiple domains, we introduce the Dynamic Graph Analytic Framework (DYGRAF). DYGRAF provides the infrastructure which facilitates a layered multi-modal network analysis (LMMNA) approach that enables analysts to assemble previously disconnected, yet related, networks in a common battle space picture. In doing so, DYGRAF provides the analyst with timely situation awareness, understanding and anticipation of threats, and support for effective decision-making in diverse environments.
An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks
Abba, Sani; Lee, Jeong-A
2015-01-01
We propose an autonomous self-aware and adaptive fault-tolerant routing technique (ASAART) for wireless sensor networks. We address the limitations of self-healing routing (SHR) and self-selective routing (SSR) techniques for routing sensor data. We also examine the integration of autonomic self-aware and adaptive fault detection and resiliency techniques for route formation and route repair to provide resilience to errors and failures. We achieved this by using a combined continuous and slotted prioritized transmission back-off delay to obtain local and global network state information, as well as multiple random functions for attaining faster routing convergence and reliable route repair despite transient and permanent node failure rates and efficient adaptation to instantaneous network topology changes. The results of simulations based on a comparison of the ASAART with the SHR and SSR protocols for five different simulated scenarios in the presence of transient and permanent node failure rates exhibit a greater resiliency to errors and failure and better routing performance in terms of the number of successfully delivered network packets, end-to-end delay, delivered MAC layer packets, packet error rate, as well as efficient energy conservation in a highly congested, faulty, and scalable sensor network. PMID:26295236
An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks.
Abba, Sani; Lee, Jeong-A
2015-08-18
We propose an autonomous self-aware and adaptive fault-tolerant routing technique (ASAART) for wireless sensor networks. We address the limitations of self-healing routing (SHR) and self-selective routing (SSR) techniques for routing sensor data. We also examine the integration of autonomic self-aware and adaptive fault detection and resiliency techniques for route formation and route repair to provide resilience to errors and failures. We achieved this by using a combined continuous and slotted prioritized transmission back-off delay to obtain local and global network state information, as well as multiple random functions for attaining faster routing convergence and reliable route repair despite transient and permanent node failure rates and efficient adaptation to instantaneous network topology changes. The results of simulations based on a comparison of the ASAART with the SHR and SSR protocols for five different simulated scenarios in the presence of transient and permanent node failure rates exhibit a greater resiliency to errors and failure and better routing performance in terms of the number of successfully delivered network packets, end-to-end delay, delivered MAC layer packets, packet error rate, as well as efficient energy conservation in a highly congested, faulty, and scalable sensor network.
Making sense: Dopamine activates conscious self‐monitoring through medial prefrontal cortex
Joensson, Morten; Thomsen, Kristine Rømer; Andersen, Lau M.; Gross, Joachim; Mouridsen, Kim; Sandberg, Kristian; Østergaard, Leif
2015-01-01
Abstract When experiences become meaningful to the self, they are linked to synchronous activity in a paralimbic network of self‐awareness and dopaminergic activity. This network includes medial prefrontal and medial parietal/posterior cingulate cortices, where transcranial magnetic stimulation may transiently impair self‐awareness. Conversely, we hypothesize that dopaminergic stimulation may improve self‐awareness and metacognition (i.e., the ability of the brain to consciously monitor its own cognitive processes). Here, we demonstrate improved noetic (conscious) metacognition by oral administration of 100 mg dopamine in minimal self‐awareness. In a separate experiment with extended self‐awareness dopamine improved the retrieval accuracy of memories of self‐judgment (autonoetic, i.e., explicitly self‐conscious) metacognition. Concomitantly, magnetoencephalography (MEG) showed increased amplitudes of oscillations (power) preferentially in the medial prefrontal cortex. Given that electromagnetic activity in this region is instrumental in self‐awareness, this explains the specific effect of dopamine on explicit self‐awareness and autonoetic metacognition. Hum Brain Mapp 36:1866–1877, 2015. © 2015 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc.. PMID:25627861
Providing Situational Awareness for Pipeline Control Operations
NASA Astrophysics Data System (ADS)
Butts, Jonathan; Kleinhans, Hugo; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet
A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awareness about SCADA devices and control operations. The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity. Experimental results obtained using real pipeline control traffic demonstrate the utility of the scanner in industrial settings.
Perceptual tools for quality-aware video networks
NASA Astrophysics Data System (ADS)
Bovik, A. C.
2014-01-01
Monitoring and controlling the quality of the viewing experience of videos transmitted over increasingly congested networks (especially wireless networks) is a pressing problem owing to rapid advances in video-centric mobile communication and display devices that are straining the capacity of the network infrastructure. New developments in automatic perceptual video quality models offer tools that have the potential to be used to perceptually optimize wireless video, leading to more efficient video data delivery and better received quality. In this talk I will review key perceptual principles that are, or could be used to create effective video quality prediction models, and leading quality prediction models that utilize these principles. The goal is to be able to monitor and perceptually optimize video networks by making them "quality-aware."
A Visual Language for Situational Awareness
2016-12-01
listening. The arrival of the information age has delivered the ability to transfer larger volumes of data at far greater rates. Wireless digital... wireless infrastructure for use in large-scale events where domestic power and private wireless networks are overloaded or unavailable. States should...lacking by responders using ANSI INCITS 415 symbols sets.226 When combined with the power of a wireless network, a situational awareness metalanguage is
Network Adaptability from WMD Disruption and Cascading Failures
2016-04-01
Figure 1(b) shows a typical timeline before and after an attack with an example of average offered and requested bandwidth utilization. Telecom ...and security of our nation. Telecom networks and the Internet were originally designed to provide end-to-end communications which can survive failures...technology transfer The techniques developed for WMD-aware reprovisioning are also applicable for any disaster-aware provisioning on telecom
Identification and impact of discoverers in online social systems
Medo, Matúš; Mariani, Manuel S.; Zeng, An; Zhang, Yi-Cheng
2016-01-01
Understanding the behavior of users in online systems is of essential importance for sociology, system design, e-commerce, and beyond. Most existing models assume that individuals in diverse systems, ranging from social networks to e-commerce platforms, tend to what is already popular. We propose a statistical time-aware framework to identify the users who differ from the usual behavior by being repeatedly and persistently among the first to collect the items that later become hugely popular. Since these users effectively discover future hits, we refer them as discoverers. We use the proposed framework to demonstrate that discoverers are present in a wide range of real systems. Once identified, discoverers can be used to predict the future success of new items. We finally introduce a simple network model which reproduces the discovery patterns observed in the real data. Our results open the door to quantitative study of detailed temporal patterns in social systems. PMID:27687588
Identification and impact of discoverers in online social systems
NASA Astrophysics Data System (ADS)
Medo, Matúš; Mariani, Manuel S.; Zeng, An; Zhang, Yi-Cheng
2016-09-01
Understanding the behavior of users in online systems is of essential importance for sociology, system design, e-commerce, and beyond. Most existing models assume that individuals in diverse systems, ranging from social networks to e-commerce platforms, tend to what is already popular. We propose a statistical time-aware framework to identify the users who differ from the usual behavior by being repeatedly and persistently among the first to collect the items that later become hugely popular. Since these users effectively discover future hits, we refer them as discoverers. We use the proposed framework to demonstrate that discoverers are present in a wide range of real systems. Once identified, discoverers can be used to predict the future success of new items. We finally introduce a simple network model which reproduces the discovery patterns observed in the real data. Our results open the door to quantitative study of detailed temporal patterns in social systems.
Identification and impact of discoverers in online social systems.
Medo, Matúš; Mariani, Manuel S; Zeng, An; Zhang, Yi-Cheng
2016-09-30
Understanding the behavior of users in online systems is of essential importance for sociology, system design, e-commerce, and beyond. Most existing models assume that individuals in diverse systems, ranging from social networks to e-commerce platforms, tend to what is already popular. We propose a statistical time-aware framework to identify the users who differ from the usual behavior by being repeatedly and persistently among the first to collect the items that later become hugely popular. Since these users effectively discover future hits, we refer them as discoverers. We use the proposed framework to demonstrate that discoverers are present in a wide range of real systems. Once identified, discoverers can be used to predict the future success of new items. We finally introduce a simple network model which reproduces the discovery patterns observed in the real data. Our results open the door to quantitative study of detailed temporal patterns in social systems.
NASA Astrophysics Data System (ADS)
de Laat, Cees; Develder, Chris; Jukan, Admela; Mambretti, Joe
This topic is devoted to communication issues in scalable compute and storage systems, such as parallel computers, networks of workstations, and clusters. All aspects of communication in modern systems were solicited, including advances in the design, implementation, and evaluation of interconnection networks, network interfaces, system and storage area networks, on-chip interconnects, communication protocols, routing and communication algorithms, and communication aspects of parallel and distributed algorithms. In total 15 papers were submitted to this topic of which we selected the 7 strongest papers. We grouped the papers in two sessions of 3 papers each and one paper was selected for the best paper session. We noted a number of papers dealing with changing topologies, stability and forwarding convergence in source routing based cluster interconnect network architectures. We grouped these for the first session. The authors of the paper titled: “Implementing a Change Assimilation Mechanism for Source Routing Interconnects” propose a mechanism that can obtain the new topology, and compute and distribute a new set of fabric paths to the source routed network end points to minimize the impact on the forwarding service. The article entitled “Dependability Analysis of a Fault-tolerant Network Reconfiguration Strateg” reports on a case study analyzing the effects of network size, mean time to node failure, mean time to node repair, mean time to network repair and coverage of the failure when using a 2D mesh network with a fault-tolerant mechanism (similar to the one used in the BlueGene/L system), that is able to remove rows and/or columns in the presence of failures. The last paper in this session: “RecTOR: A New and Efficient Method for Dynamic Network Reconfiguration” presents a new dynamic reconfiguration method, that ensures deadlock-freedom during the reconfiguration without causing performance degradation such as increased latency or decreased throughput. The second session groups 3 papers presenting methods, protocols and architectures that enhance capacities in the Networks. The paper titled: “NIC-assisted Cache-Efficient Receive Stack for Message Passing over Ethernet” presents the addition of multiqueue support in the Open-MX receive stack so that all incoming packets for the same process are treated on the same core. It then introduces the idea of binding the target end process near its dedicated receive queue. In general this multiqueue receive stack performs better than the original single queue stack, especially on large communication patterns where multiple processes are involved and manual binding is difficult. The authors of: “A Multipath Fault-Tolerant Routing Method for High-Speed Interconnection Networks” focus on the problem of fault tolerance for high-speed interconnection networks by designing a fault tolerant routing method. The goal was to solve a certain number of link and node failures, considering its impact, and occurrence probability. Their experiments show that their method allows applications to successfully finalize their execution in the presence of several faults, with an average performance value of 97% with respect to the fault-free scenarios. The paper: “Hardware implementation study of the Self-Clocked Fair Queuing Credit Aware (SCFQ-CA) and Deficit Round Robin Credit Aware (DRR-CA) scheduling algorithms” proposes specific implementations of the two schedulers taking into account the characteristics of current high-performance networks. A comparison is presented on the complexity of these two algorithms in terms of silicon area and computation delay. Finally we selected one paper for the special paper session: “A Case Study of Communication Optimizations on 3D Mesh Interconnects”. In this paper the authors present topology aware mapping as a technique to optimize communication on 3-dimensional mesh interconnects and hence improve performance. Results are presented for OpenAtom on up to 16,384 processors of Blue Gene/L, 8,192 processors of Blue Gene/P and 2,048 processors of Cray XT3.
A Mobility-Aware QoS Signaling Protocol for Ambient Networks
NASA Astrophysics Data System (ADS)
Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho
Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.
Topology-Aware Performance Optimization and Modeling of Adaptive Mesh Refinement Codes for Exascale
Chan, Cy P.; Bachan, John D.; Kenny, Joseph P.; ...
2017-01-26
Here, we introduce a topology-aware performance optimization and modeling workflow for AMR simulation that includes two new modeling tools, ProgrAMR and Mota Mapper, which interface with the BoxLib AMR framework and the SSTmacro network simulator. ProgrAMR allows us to generate and model the execution of task dependency graphs from high-level specifications of AMR-based applications, which we demonstrate by analyzing two example AMR-based multigrid solvers with varying degrees of asynchrony. Mota Mapper generates multiobjective, network topology-aware box mappings, which we apply to optimize the data layout for the example multigrid solvers. While the sensitivity of these solvers to layout and executionmore » strategy appears to be modest for balanced scenarios, the impact of better mapping algorithms can be significant when performance is highly constrained by network hop latency. Furthermore, we show that network latency in the multigrid bottom solve is the main contributing factor preventing good scaling on exascale-class machines.« less
Topology-Aware Performance Optimization and Modeling of Adaptive Mesh Refinement Codes for Exascale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chan, Cy P.; Bachan, John D.; Kenny, Joseph P.
Here, we introduce a topology-aware performance optimization and modeling workflow for AMR simulation that includes two new modeling tools, ProgrAMR and Mota Mapper, which interface with the BoxLib AMR framework and the SSTmacro network simulator. ProgrAMR allows us to generate and model the execution of task dependency graphs from high-level specifications of AMR-based applications, which we demonstrate by analyzing two example AMR-based multigrid solvers with varying degrees of asynchrony. Mota Mapper generates multiobjective, network topology-aware box mappings, which we apply to optimize the data layout for the example multigrid solvers. While the sensitivity of these solvers to layout and executionmore » strategy appears to be modest for balanced scenarios, the impact of better mapping algorithms can be significant when performance is highly constrained by network hop latency. Furthermore, we show that network latency in the multigrid bottom solve is the main contributing factor preventing good scaling on exascale-class machines.« less
Cloud Computing Services for Seismic Networks
NASA Astrophysics Data System (ADS)
Olson, Michael
This thesis describes a compositional framework for developing situation awareness applications: applications that provide ongoing information about a user's changing environment. The thesis describes how the framework is used to develop a situation awareness application for earthquakes. The applications are implemented as Cloud computing services connected to sensors and actuators. The architecture and design of the Cloud services are described and measurements of performance metrics are provided. The thesis includes results of experiments on earthquake monitoring conducted over a year. The applications developed by the framework are (1) the CSN---the Community Seismic Network---which uses relatively low-cost sensors deployed by members of the community, and (2) SAF---the Situation Awareness Framework---which integrates data from multiple sources, including the CSN, CISN---the California Integrated Seismic Network, a network consisting of high-quality seismometers deployed carefully by professionals in the CISN organization and spread across Southern California---and prototypes of multi-sensor platforms that include carbon monoxide, methane, dust and radiation sensors.
Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan
2017-12-13
Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability period when compared to existing routing protocols.
Hu, Xiaopeng; Wang, Fan
2017-01-01
Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability period when compared to existing routing protocols. PMID:29236031
NASA Astrophysics Data System (ADS)
Marcus, Kelvin
2014-06-01
The U.S Army Research Laboratory (ARL) has built a "Network Science Research Lab" to support research that aims to improve their ability to analyze, predict, design, and govern complex systems that interweave the social/cognitive, information, and communication network genres. Researchers at ARL and the Network Science Collaborative Technology Alliance (NS-CTA), a collaborative research alliance funded by ARL, conducted experimentation to determine if automated network monitoring tools and task-aware agents deployed within an emulated tactical wireless network could potentially increase the retrieval of relevant data from heterogeneous distributed information nodes. ARL and NS-CTA required the capability to perform this experimentation over clusters of heterogeneous nodes with emulated wireless tactical networks where each node could contain different operating systems, application sets, and physical hardware attributes. Researchers utilized the Dynamically Allocated Virtual Clustering Management System (DAVC) to address each of the infrastructure support requirements necessary in conducting their experimentation. The DAVC is an experimentation infrastructure that provides the means to dynamically create, deploy, and manage virtual clusters of heterogeneous nodes within a cloud computing environment based upon resource utilization such as CPU load, available RAM and hard disk space. The DAVC uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex private networks. Clusters created by the DAVC system can be utilized for software development, experimentation, and integration with existing hardware and software. The goal of this paper is to explore how ARL and the NS-CTA leveraged the DAVC to create, deploy and manage multiple experimentation clusters to support their experimentation goals.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jim Alves-Foss
2011-08-01
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less
Monowar, Muhammad Mostafa; Bajaber, Fuad
2015-06-15
In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches.
La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks
Sun, Guodong; Shang, Xinna; Zuo, Yan
2018-01-01
In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user’s burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency. PMID:29393876
Monowar, Muhammad Mostafa; Bajaber, Fuad
2015-01-01
In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level. TLQoS exploits modular architecture wherein different modules perform integrated operations in providing multiple QoS service with lower temperature rise. To address the challenges of highly dynamic wireless environment inside the human body. TLQoS implements potential-based localized routing that requires only local neighborhood information. TLQoS avoids routing loop formation as well as reduces the number of hop traversal exploiting hybrid potential, and tuning a configurable parameter. We perform extensive simulations of TLQoS, and the results show that TLQoS has significant performance improvements over state-of-the-art approaches. PMID:26083228
A Simulation and Modeling Framework for Space Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olivier, S S
This paper describes the development and initial demonstration of a new, integrated modeling and simulation framework, encompassing the space situational awareness enterprise, for quantitatively assessing the benefit of specific sensor systems, technologies and data analysis techniques. The framework is based on a flexible, scalable architecture to enable efficient, physics-based simulation of the current SSA enterprise, and to accommodate future advancements in SSA systems. In particular, the code is designed to take advantage of massively parallel computer systems available, for example, at Lawrence Livermore National Laboratory. The details of the modeling and simulation framework are described, including hydrodynamic models of satellitemore » intercept and debris generation, orbital propagation algorithms, radar cross section calculations, optical brightness calculations, generic radar system models, generic optical system models, specific Space Surveillance Network models, object detection algorithms, orbit determination algorithms, and visualization tools. The use of this integrated simulation and modeling framework on a specific scenario involving space debris is demonstrated.« less
Cognitive task analysis of network analysts and managers for network situational awareness
NASA Astrophysics Data System (ADS)
Erbacher, Robert F.; Frincke, Deborah A.; Wong, Pak Chung; Moody, Sarah; Fink, Glenn
2010-01-01
The goal of our project is to create a set of next-generation cyber situational-awareness capabilities with applications to other domains in the long term. The situational-awareness capabilities being developed focus on novel visualization techniques as well as data analysis techniques designed to improve the comprehensibility of the visualizations. The objective is to improve the decision-making process to enable decision makers to choose better actions. To this end, we put extensive effort into ensuring we had feedback from network analysts and managers and understanding what their needs truly are. This paper discusses the cognitive task analysis methodology we followed to acquire feedback from the analysts. This paper also provides the details we acquired from the analysts on their processes, goals, concerns, etc. A final result we describe is the generation of a task-flow diagram.
W-MAC: A Workload-Aware MAC Protocol for Heterogeneous Convergecast in Wireless Sensor Networks
Xia, Ming; Dong, Yabo; Lu, Dongming
2011-01-01
The power consumption and latency of existing MAC protocols for wireless sensor networks (WSNs) are high in heterogeneous convergecast, where each sensor node generates different amounts of data in one convergecast operation. To solve this problem, we present W-MAC, a workload-aware MAC protocol for heterogeneous convergecast in WSNs. A subtree-based iterative cascading scheduling mechanism and a workload-aware time slice allocation mechanism are proposed to minimize the power consumption of nodes, while offering a low data latency. In addition, an efficient schedule adjustment mechanism is provided for adapting to data traffic variation and network topology change. Analytical and simulation results show that the proposed protocol provides a significant energy saving and latency reduction in heterogeneous convergecast, and can effectively support data aggregation to further improve the performance. PMID:22163753
Communication Needs Assessment for Distributed Turbine Engine Control
NASA Technical Reports Server (NTRS)
Culley, Dennis E.; Behbahani, Alireza R.
2008-01-01
Control system architecture is a major contributor to future propulsion engine performance enhancement and life cycle cost reduction. The control system architecture can be a means to effect net weight reduction in future engine systems, provide a streamlined approach to system design and implementation, and enable new opportunities for performance optimization and increased awareness about system health. The transition from a centralized, point-to-point analog control topology to a modular, networked, distributed system is paramount to extracting these system improvements. However, distributed engine control systems are only possible through the successful design and implementation of a suitable communication system. In a networked system, understanding the data flow between control elements is a fundamental requirement for specifying the communication architecture which, itself, is dependent on the functional capability of electronics in the engine environment. This paper presents an assessment of the communication needs for distributed control using strawman designs and relates how system design decisions relate to overall goals as we progress from the baseline centralized architecture, through partially distributed and fully distributed control systems.
Know Thyself: Metacognitive Networks and Measures of Consciousness
ERIC Educational Resources Information Center
Pasquali, Antoine; Timmermans, Bert; Cleeremans, Axel
2010-01-01
Subjective measures of awareness rest on the assumption that conscious knowledge is knowledge that participants know they possess. Post-Decision Wagering (PDW), recently proposed as a new measure of awareness, requires participants to place a high or a low wager on their decisions. Whereas advantageous wagering indicates awareness of the knowledge…
ERIC Educational Resources Information Center
Economic Commission for Latin America and the Caribbean, Santiago (Chile).
In areas such as Latin America and the Caribbean, many institutions are setting up databases using existing computerized information and documentation networks, and relying on new microcomputer equipment for their implementation. Increasing awareness of the implications of this practice prompted this conference, which provided the first step of a…
Global Grid Telemedicine System: Expert Consult Manager
2000-10-01
Department of the Army position, policy or decision unless so designated by other documentation. DTIC QUALITY iw^^rxi 20010122 014 REPORT DOCUMENTATION...processes and personnel for collecting, processing, storing, disseminating and managing information on demand to warfighters, policy makers, and...to be responsive to and incorporate current and future policy decisions. (7) Be continuously aware, along with Network and Bandwidth managers, of
High-Performance Computer Modeling of the Cosmos-Iridium Collision
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olivier, S; Cook, K; Fasenfest, B
2009-08-28
This paper describes the application of a new, integrated modeling and simulation framework, encompassing the space situational awareness (SSA) enterprise, to the recent Cosmos-Iridium collision. This framework is based on a flexible, scalable architecture to enable efficient simulation of the current SSA enterprise, and to accommodate future advancements in SSA systems. In particular, the code is designed to take advantage of massively parallel, high-performance computer systems available, for example, at Lawrence Livermore National Laboratory. We will describe the application of this framework to the recent collision of the Cosmos and Iridium satellites, including (1) detailed hydrodynamic modeling of the satellitemore » collision and resulting debris generation, (2) orbital propagation of the simulated debris and analysis of the increased risk to other satellites (3) calculation of the radar and optical signatures of the simulated debris and modeling of debris detection with space surveillance radar and optical systems (4) determination of simulated debris orbits from modeled space surveillance observations and analysis of the resulting orbital accuracy, (5) comparison of these modeling and simulation results with Space Surveillance Network observations. We will also discuss the use of this integrated modeling and simulation framework to analyze the risks and consequences of future satellite collisions and to assess strategies for mitigating or avoiding future incidents, including the addition of new sensor systems, used in conjunction with the Space Surveillance Network, for improving space situational awareness.« less
A Vision-Based Approach for Building Telecare and Telerehabilitation Services.
Barriga, Angela; Conejero, José M; Hernández, Juan; Jurado, Elena; Moguel, Enrique; Sánchez-Figueroa, Fernando
2016-10-18
In the last few years, telerehabilitation and telecare have become important topics in healthcare since they enable people to remain independent in their own homes by providing person-centered technologies to support the individual. These technologies allows elderly people to be assisted in their home, instead of traveling to a clinic, providing them wellbeing and personalized health care. The literature shows a great number of interesting proposals to address telerehabilitation and telecare scenarios, which may be mainly categorized into two broad groups, namely wearable devices and context-aware systems. However, we believe that these apparently different scenarios may be addressed by a single context-aware approach, concretely a vision-based system that can operate automatically in a non-intrusive way for the elderly, and this is the goal of this paper. We present a general approach based on 3D cameras and neural network algorithms that offers an efficient solution for two different scenarios of telerehabilitation and telecare for elderly people. Our empirical analysis reveals the effectiveness and accuracy of the algorithms presented in our approach and provides more than promising results when the neural network parameters are properly adjusted.
A Vision-Based Approach for Building Telecare and Telerehabilitation Services
Barriga, Angela; Conejero, José M.; Hernández, Juan; Jurado, Elena; Moguel, Enrique; Sánchez-Figueroa, Fernando
2016-01-01
In the last few years, telerehabilitation and telecare have become important topics in healthcare since they enable people to remain independent in their own homes by providing person-centered technologies to support the individual. These technologies allows elderly people to be assisted in their home, instead of traveling to a clinic, providing them wellbeing and personalized health care. The literature shows a great number of interesting proposals to address telerehabilitation and telecare scenarios, which may be mainly categorized into two broad groups, namely wearable devices and context-aware systems. However, we believe that these apparently different scenarios may be addressed by a single context-aware approach, concretely a vision-based system that can operate automatically in a non-intrusive way for the elderly, and this is the goal of this paper. We present a general approach based on 3D cameras and neural network algorithms that offers an efficient solution for two different scenarios of telerehabilitation and telecare for elderly people. Our empirical analysis reveals the effectiveness and accuracy of the algorithms presented in our approach and provides more than promising results when the neural network parameters are properly adjusted. PMID:27763540
A Delay-Aware and Reliable Data Aggregation for Cyber-Physical Sensing
Zhang, Jinhuan; Long, Jun; Zhang, Chengyuan; Zhao, Guihu
2017-01-01
Physical information sensed by various sensors in a cyber-physical system should be collected for further operation. In many applications, data aggregation should take reliability and delay into consideration. To address these problems, a novel Tiered Structure Routing-based Delay-Aware and Reliable Data Aggregation scheme named TSR-DARDA for spherical physical objects is proposed. By dividing the spherical network constructed by dispersed sensor nodes into circular tiers with specifically designed widths and cells, TSTR-DARDA tries to enable as many nodes as possible to transmit data simultaneously. In order to ensure transmission reliability, lost packets are retransmitted. Moreover, to minimize the latency while maintaining reliability for data collection, in-network aggregation and broadcast techniques are adopted to deal with the transmission between data collecting nodes in the outer layer and their parent data collecting nodes in the inner layer. Thus, the optimization problem is transformed to minimize the delay under reliability constraints by controlling the system parameters. To demonstrate the effectiveness of the proposed scheme, we have conducted extensive theoretical analysis and comparisons to evaluate the performance of TSR-DARDA. The analysis and simulations show that TSR-DARDA leads to lower delay with reliability satisfaction. PMID:28218668
Twitter web-service for soft agent reporting in persistent surveillance systems
NASA Astrophysics Data System (ADS)
Rababaah, Haroun; Shirkhodaie, Amir
2010-04-01
Persistent surveillance is an intricate process requiring monitoring, gathering, processing, tracking, and characterization of many spatiotemporal events occurring concurrently. Data associated with events can be readily attained by networking of hard (physical) sensors. Sensors may have homogeneous or heterogeneous (hybrid) sensing modalities with different communication bandwidth requirements. Complimentary to hard sensors are human observers or "soft sensors" that can report occurrences of evolving events via different communication devices (e.g., texting, cell phones, emails, instant messaging, etc.) to the command control center. However, networking of human observers in ad-hoc way is rather a difficult task. In this paper, we present a Twitter web-service for soft agent reporting in persistent surveillance systems (called Web-STARS). The objective of this web-service is to aggregate multi-source human observations in hybrid sensor networks rapidly. With availability of Twitter social network, such a human networking concept can not only be realized for large scale persistent surveillance systems (PSS), but also, it can be employed with proper interfaces to expedite rapid events reporting by human observers. The proposed technique is particularly suitable for large-scale persistent surveillance systems with distributed soft and hard sensor networks. The efficiency and effectiveness of the proposed technique is measured experimentally by conducting several simulated persistent surveillance scenarios. It is demonstrated that by fusion of information from hard and soft agents improves understanding of common operating picture and enhances situational awareness.
Flexible Macroblock Ordering for Context-Aware Ultrasound Video Transmission over Mobile WiMAX
Martini, Maria G.; Hewage, Chaminda T. E. R.
2010-01-01
The most recent network technologies are enabling a variety of new applications, thanks to the provision of increased bandwidth and better management of Quality of Service. Nevertheless, telemedical services involving multimedia data are still lagging behind, due to the concern of the end users, that is, clinicians and also patients, about the low quality provided. Indeed, emerging network technologies should be appropriately exploited by designing the transmission strategy focusing on quality provision for end users. Stemming from this principle, we propose here a context-aware transmission strategy for medical video transmission over WiMAX systems. Context, in terms of regions of interest (ROI) in a specific session, is taken into account for the identification of multiple regions of interest, and compression/transmission strategies are tailored to such context information. We present a methodology based on H.264 medical video compression and Flexible Macroblock Ordering (FMO) for ROI identification. Two different unequal error protection methodologies, providing higher protection to the most diagnostically relevant data, are presented. PMID:20827292
Berlingeri, Manuela; Ravasio, Alessandra; Cranna, Silvia; Basilico, Stefania; Sberna, Maurizio; Bottini, Gabriella; Paulesu, Eraldo
2015-12-01
Three cognitive components may play a crucial role in both memory awareness and in anosognosia for memory deficit (AMD): (1) a personal data base (PDB), i.e., a memory store that contains "semantic" representations about the self, (2) monitoring processes (MPs) and (3) an explicit evaluation system (EES), or comparator, that assesses and binds the representations stored in the PDB with information obtained from the environment. We compared both the behavior and the functional connectivity (as assessed by resting-state fMRI) of AMD patients with aware patients and healthy controls. We found that AMD is associated with an impoverished PDB, while MPs are necessary to successfully update the PDB. AMD was associated with reduced functional connectivity within both the default-mode network and in a network that includes the left lateral temporal cortex, the hippocampus and the insula. The reduced connectivity between the hippocampus and the insular cortex was correlated with AMD severity. Copyright © 2015 Elsevier Inc. All rights reserved.
Context Relevant Prediction Model for COPD Domain Using Bayesian Belief Network
Saleh, Lokman; Ajami, Hicham; Mili, Hafedh
2017-01-01
In the last three decades, researchers have examined extensively how context-aware systems can assist people, specifically those suffering from incurable diseases, to help them cope with their medical illness. Over the years, a huge number of studies on Chronic Obstructive Pulmonary Disease (COPD) have been published. However, how to derive relevant attributes and early detection of COPD exacerbations remains a challenge. In this research work, we will use an efficient algorithm to select relevant attributes where there is no proper approach in this domain. Such algorithm predicts exacerbations with high accuracy by adding discretization process, and organizes the pertinent attributes in priority order based on their impact to facilitate the emergency medical treatment. In this paper, we propose an extension of our existing Helper Context-Aware Engine System (HCES) for COPD. This project uses Bayesian network algorithm to depict the dependency between the COPD symptoms (attributes) in order to overcome the insufficiency and the independency hypothesis of naïve Bayesian. In addition, the dependency in Bayesian network is realized using TAN algorithm rather than consulting pneumologists. All these combined algorithms (discretization, selection, dependency, and the ordering of the relevant attributes) constitute an effective prediction model, comparing to effective ones. Moreover, an investigation and comparison of different scenarios of these algorithms are also done to verify which sequence of steps of prediction model gives more accurate results. Finally, we designed and validated a computer-aided support application to integrate different steps of this model. The findings of our system HCES has shown promising results using Area Under Receiver Operating Characteristic (AUC = 81.5%). PMID:28644419
Simulation of Attacks for Security in Wireless Sensor Network
Diaz, Alvaro; Sanchez, Pablo
2016-01-01
The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710
Achieving Optimal Privacy in Trust-Aware Social Recommender Systems
NASA Astrophysics Data System (ADS)
Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail
Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.
Pervasive Monitoring—An Intelligent Sensor Pod Approach for Standardised Measurement Infrastructures
Resch, Bernd; Mittlboeck, Manfred; Lippautz, Michael
2010-01-01
Geo-sensor networks have traditionally been built up in closed monolithic systems, thus limiting trans-domain usage of real-time measurements. This paper presents the technical infrastructure of a standardised embedded sensing device, which has been developed in the course of the Live Geography approach. The sensor pod implements data provision standards of the Sensor Web Enablement initiative, including an event-based alerting mechanism and location-aware Complex Event Processing functionality for detection of threshold transgression and quality assurance. The goal of this research is that the resultant highly flexible sensing architecture will bring sensor network applications one step further towards the realisation of the vision of a “digital skin for planet earth”. The developed infrastructure can potentially have far-reaching impacts on sensor-based monitoring systems through the deployment of ubiquitous and fine-grained sensor networks. This in turn allows for the straight-forward use of live sensor data in existing spatial decision support systems to enable better-informed decision-making. PMID:22163537
Resch, Bernd; Mittlboeck, Manfred; Lippautz, Michael
2010-01-01
Geo-sensor networks have traditionally been built up in closed monolithic systems, thus limiting trans-domain usage of real-time measurements. This paper presents the technical infrastructure of a standardised embedded sensing device, which has been developed in the course of the Live Geography approach. The sensor pod implements data provision standards of the Sensor Web Enablement initiative, including an event-based alerting mechanism and location-aware Complex Event Processing functionality for detection of threshold transgression and quality assurance. The goal of this research is that the resultant highly flexible sensing architecture will bring sensor network applications one step further towards the realisation of the vision of a "digital skin for planet earth". The developed infrastructure can potentially have far-reaching impacts on sensor-based monitoring systems through the deployment of ubiquitous and fine-grained sensor networks. This in turn allows for the straight-forward use of live sensor data in existing spatial decision support systems to enable better-informed decision-making.
Al Mamoon, Ishtiak; Muzahidul Islam, A K M; Baharun, Sabariah; Ahmed, Ashir; Komaki, Shozo
2016-08-01
Due to the rapid growth of wireless medical devices in near future, wireless healthcare services may face some inescapable issue such as medical spectrum scarcity, electromagnetic interference (EMI), bandwidth constraint, security and finally medical data communication model. To mitigate these issues, cognitive radio (CR) or opportunistic radio network enabled wireless technology is suitable for the upcoming wireless healthcare system. The up-to-date research on CR based healthcare has exposed some developments on EMI and spectrum problems. However, the investigation recommendation on system design and network model for CR enabled hospital is rare. Thus, this research designs a hierarchy based hybrid network architecture and network maintenance protocols for previously proposed CR hospital system, known as CogMed. In the previous study, the detail architecture of CogMed and its maintenance protocols were not present. The proposed architecture includes clustering concepts for cognitive base stations and non-medical devices. Two cluster head (CH selector equations are formulated based on priority of location, device, mobility rate of devices and number of accessible channels. In order to maintain the integrity of the proposed network model, node joining and node leaving protocols are also proposed. Finally, the simulation results show that the proposed network maintenance time is very low for emergency medical devices (average maintenance period 9.5 ms) and the re-clustering effects for different mobility enabled non-medical devices are also balanced.
Mustapha, Ibrahim; Ali, Borhanuddin Mohd; Rasid, Mohd Fadlee A.; Sali, Aduwati; Mohamad, Hafizal
2015-01-01
It is well-known that clustering partitions network into logical groups of nodes in order to achieve energy efficiency and to enhance dynamic channel access in cognitive radio through cooperative sensing. While the topic of energy efficiency has been well investigated in conventional wireless sensor networks, the latter has not been extensively explored. In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. Each member node selects an optimal cluster that satisfies pairwise constraints, minimizes network energy consumption and enhances channel sensing performance through an exploration technique. We first model the network energy consumption and then determine the optimal number of clusters for the network. The problem of selecting an optimal cluster is formulated as a Markov Decision Process (MDP) in the algorithm and the obtained simulation results show convergence, learning and adaptability of the algorithm to dynamic environment towards achieving an optimal solution. Performance comparisons of our algorithm with the Groupwise Spectrum Aware (GWSA)-based algorithm in terms of Sum of Square Error (SSE), complexity, network energy consumption and probability of detection indicate improved performance from the proposed approach. The results further reveal that an energy savings of 9% and a significant Primary User (PU) detection improvement can be achieved with the proposed approach. PMID:26287191
Mustapha, Ibrahim; Mohd Ali, Borhanuddin; Rasid, Mohd Fadlee A; Sali, Aduwati; Mohamad, Hafizal
2015-08-13
It is well-known that clustering partitions network into logical groups of nodes in order to achieve energy efficiency and to enhance dynamic channel access in cognitive radio through cooperative sensing. While the topic of energy efficiency has been well investigated in conventional wireless sensor networks, the latter has not been extensively explored. In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. Each member node selects an optimal cluster that satisfies pairwise constraints, minimizes network energy consumption and enhances channel sensing performance through an exploration technique. We first model the network energy consumption and then determine the optimal number of clusters for the network. The problem of selecting an optimal cluster is formulated as a Markov Decision Process (MDP) in the algorithm and the obtained simulation results show convergence, learning and adaptability of the algorithm to dynamic environment towards achieving an optimal solution. Performance comparisons of our algorithm with the Groupwise Spectrum Aware (GWSA)-based algorithm in terms of Sum of Square Error (SSE), complexity, network energy consumption and probability of detection indicate improved performance from the proposed approach. The results further reveal that an energy savings of 9% and a significant Primary User (PU) detection improvement can be achieved with the proposed approach.
Latkin, Carl; Yang, Cui; Tobin, Karin; Roebuck, Geoffrey; Spikes, Pilgrim; Patterson, Jocelyn
2012-01-01
This study examined correlates of disclosure of MSM behavior and seropositive HIV status to social network members among 187 African American MSM in Baltimore, MD. 49.7% of participants were HIV-positive, 64% of their social network members (excluding male sex partners) were aware of their MSM behavior, and 71.3% were aware of their HIV-positive status. Disclosure of MSM behavior to network members was more frequent among participants who were younger, had a higher level of education, and were HIV-positive. Attributes of the social network members associated with MSM disclosure included the network member being HIV-positive, providing emotional support, socializing with the participant, and not being a female sex partner. Participants who were younger were more likely to disclose their positive HIV status. Attributes of social network members associated with disclosure of positive serostatus included the network member being older, HIV-positive, providing emotional support, loaning money, and not being a male sex partner. PMID:21811844
Tang, Jianjun; Folmer, Henk; Xue, Jianhong
2013-09-15
This paper applies a structural equation model (SEM) to analyze the formation of awareness and perception of water scarcity, based on a cross-sectional dataset of 446 farmers in the Guanzhong Plain, Shaanxi Province, China. We find that age, percentage of time spent on farming and social network are the main determinants of awareness. Water price and drought experience are the most important explanatory variables of perception. In addition, awareness and perception strongly interact. The results obtained in this paper are relevant for policymaking, since environmental behavior, which includes efficient use of natural resources, tends to improve if supported by internalization of social norms, which in its turn, is promoted by awareness and perception. From the analysis it follows that spreading information via social networks, rather than via the media, is an important vehicle to enhance awareness and perception and thus to improve irrigation water use efficiency. Special attention should be paid to part-time farmers who are limited in directly perceiving water scarcity. Finally, more use should be made of the price mechanism to strengthen perception and awareness. Copyright © 2013 Elsevier Ltd. All rights reserved.
The Quake-Catcher Network: An Innovative Community-Based Seismic Network
NASA Astrophysics Data System (ADS)
Saltzman, J.; Cochran, E. S.; Lawrence, J. F.; Christensen, C. M.
2009-12-01
The Quake-Catcher Network (QCN) is a volunteer computing seismic network that engages citizen scientists, teachers, and museums to participate in the detection of earthquakes. In less than two years, the network has grown to over 1000 participants globally and continues to expand. QCN utilizes Micro-Electro-Mechanical System (MEMS) accelerometers, in laptops and external to desktop computers, to detect moderate to large earthquakes. One goal of the network is to involve K-12 classrooms and museums by providing sensors and software to introduce participants to seismology and community-based scientific data collection. The Quake-Catcher Network provides a unique opportunity to engage participants directly in the scientific process, through hands-on activities that link activities and outcomes to their daily lives. Partnerships with teachers and museum staff are critical to growth of the Quake Catcher Network. Each participating institution receives a MEMS accelerometer to connect, via USB, to a computer that can be used for hands-on activities and to record earthquakes through a distributed computing system. We developed interactive software (QCNLive) that allows participants to view sensor readings in real time. Participants can also record earthquakes and download earthquake data that was collected by their sensor or other QCN sensors. The Quake-Catcher Network combines research and outreach to improve seismic networks and increase awareness and participation in science-based research in K-12 schools.
Cardazone, Gina; U Sy, Angela; Chik, Ivan; Corlew, Laura Kate
2014-06-01
Network analysis and GIS enable the presentation of meaningful data about organizational relationships and community characteristics, respectively. Together, these tools can provide a concrete representation of the ecological context in which coalitions operate, and may help coalitions identify opportunities for growth and enhanced effectiveness. This study uses network analysis and GIS mapping as part of an evaluation of the One Strong 'Ohana (OSO) campaign. The OSO campaign was launched in 2012 via a partnership between the Hawai'i Children's Trust Fund (HCTF) and the Joyful Heart Foundation. The OSO campaign uses a collaborative approach aimed at increasing public awareness of child maltreatment and protective factors that can prevent maltreatment, as well as enhancing the effectiveness of the HCTF Coalition. This study focuses on three elements of the OSO campaign evaluation: (1) Network analysis exploring the relationships between 24 active Coalition member organizations, (2) GIS mapping of responses to a randomized statewide phone survey (n = 1,450) assessing awareness of factors contributing to child maltreatment, and (3) Combined GIS maps and network data, illustrating opportunities for geographically-targeted coalition building and public awareness activities.
USAF Academy Center for Space Situational Awareness
NASA Astrophysics Data System (ADS)
Dearborn, M.; Chun, F.; Liu, J.; Tippets, R.
2011-09-01
Since the days of Sputnik, the Air Force has maintained the surveillance of space and a position catalog of objects that can be tracked by primarily ground-based radars and optical systems. Recent events in space such as the test of the Chinese anti-satellite weapon in 2007 and the collision between an Iridium and Russian Cosmo satellite have demonstrated the great need to have a more comprehensive awareness of the situation in space. Hence space situational awareness (SSA) has become an increasingly important mission to the Air Force and to the security of the United States. To help meet the need for future leaders knowledgeable about SSA, the Air Force Academy formally stood up the Center for Space Situational Awareness (CSSAR). The goal of the CSSAR is to provide a unique combination of educational operational experience as well as a world-class research capability for hands-on education in SSA. In order to meet this goal, the CSSAR is implementing an array of sensors, operations center, and associated software, and analysis tools. For example we have radar receivers for bi-static returns from the VHF space fence, a network of small aperture telescopes, AFSPC astro standards software, and Joint Mission System software. This paper focuses on the observational capabilities of our telescopes. In general, the preferable method for characterizing a satellite is to obtain a high-resolution image. However, high-resolution images from groundbased telescopes are only achievable if the satellite is large and close in range. Thus small satellites in low-earth orbits and large satellites in geosynchronous orbits are essentially unresolved in the focal plane of a ground-based telescope. Building ever larger telescopes capable of tracking fast enough for satellites at high resolution requires tremendous resources and funding. Cost is one of the reasons we decided to develop a network of small, commercially available telescopes spatially diverse and networked together. We call this the Falcon Telescope Network (FTN) and it provides the Air Force Academy, Air Force and Department of Defense with a unique capability that is essentially non-existent in today’s research and operational environment. With the FTN we will have the eventual capability to conduct simultaneous observations of satellites for non-resolved space object identification (NRSOI). We present preliminary photometric and spectroscopic observations from LEO to GEO satellites. The Air Force Academy has a unique mission to educate future leaders in the science, technology, and operations in missions critical to the Air Force and the CSSAR is stepping up to meet these requirements for the SSA mission.
Reliable Adaptive Video Streaming Driven by Perceptual Semantics for Situational Awareness
Pimentel-Niño, M. A.; Saxena, Paresh; Vazquez-Castro, M. A.
2015-01-01
A novel cross-layer optimized video adaptation driven by perceptual semantics is presented. The design target is streamed live video to enhance situational awareness in challenging communications conditions. Conventional solutions for recreational applications are inadequate and novel quality of experience (QoE) framework is proposed which allows fully controlled adaptation and enables perceptual semantic feedback. The framework relies on temporal/spatial abstraction for video applications serving beyond recreational purposes. An underlying cross-layer optimization technique takes into account feedback on network congestion (time) and erasures (space) to best distribute available (scarce) bandwidth. Systematic random linear network coding (SRNC) adds reliability while preserving perceptual semantics. Objective metrics of the perceptual features in QoE show homogeneous high performance when using the proposed scheme. Finally, the proposed scheme is in line with content-aware trends, by complying with information-centric-networking philosophy and architecture. PMID:26247057
Community Structure in Social Networks: Applications for Epidemiological Modelling
Kitchovitch, Stephan; Liò, Pietro
2011-01-01
During an infectious disease outbreak people will often change their behaviour to reduce their risk of infection. Furthermore, in a given population, the level of perceived risk of infection will vary greatly amongst individuals. The difference in perception could be due to a variety of factors including varying levels of information regarding the pathogen, quality of local healthcare, availability of preventative measures, etc. In this work we argue that we can split a social network, representing a population, into interacting communities with varying levels of awareness of the disease. We construct a theoretical population and study which such communities suffer most of the burden of the disease and how their awareness affects the spread of infection. We aim to gain a better understanding of the effects that community-structured networks and variations in awareness, or risk perception, have on the disease dynamics and to promote more community-resolved modelling in epidemiology. PMID:21789238
Ball, Bruce C; Hargreaves, Paul R; Watson, Christine A
2018-04-01
Globally soil quality and food security continue to decrease indicating that agriculture and the food system need to adapt. Improving connection to the soil by knowledge exchange can help achieve this. We propose a framework of three types of connections that allow the targeting of appropriate messages to different groups of people. Direct connection by, for example, handling soil develops soil awareness for management that can be fostered by farmers joining groups on soil-focused farming such as organic farming or no-till. Indirect connections between soil, food and ecosystem services can inform food choices and environmental awareness in the public and can be promoted by, for example, gardening, education and art. Temporal connection revealed from past usage of soil helps to bring awareness to policy workers of the need for the long-term preservation of soil quality for environmental conservation. The understanding of indirect and temporal connections can be helped by comparing them with the operations of the networks of soil organisms and porosity that sustain soil fertility and soil functions.
Challenges in Wireless System Integration as Enablers for Indoor Context Aware Environments
Aguirre, Erik
2017-01-01
The advent of fully interactive environments within Smart Cities and Smart Regions requires the use of multiple wireless systems. In the case of user-device interaction, which finds multiple applications such as Ambient Assisted Living, Intelligent Transportation Systems or Smart Grids, among others, large amount of transceivers are employed in order to achieve anytime, anyplace and any device connectivity. The resulting combination of heterogeneous wireless network exhibits fundamental limitations derived from Coverage/Capacity relations, as a function of required Quality of Service parameters, required bit rate, energy restrictions and adaptive modulation and coding schemes. In this context, inherent transceiver density poses challenges in overall system operation, given by multiple node operation which increases overall interference levels. In this work, a deterministic based analysis applied to variable density wireless sensor network operation within complex indoor scenarios is presented, as a function of topological node distribution. The extensive analysis derives interference characterizations, both for conventional transceivers as well as wearables, which provide relevant information in terms of individual node configuration as well as complete network layout. PMID:28704963
Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas
2006-06-01
One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.
Multifunctional Information Distribution System (MIDS)
2013-12-01
Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to...Estimate DoD - Department of Defense DSN - Defense Switched Network Econ - Economic Eng - Engineering Est - Estimating FMS - Foreign Military Sales FY...fighter aircraft, bombers, helicopters, ships, and ground sites . The MIDS Program consists of the MIDS Low Volume Terminal (MIDS-LVT) and the MIDS
Communication Needs Assessment for Distributed Turbine Engine Control (Postprint)
2008-07-01
and implementation, and enable new opportunities for performance optimization and increased awareness about system health. The transition from a...must be integrated into the communication network.10 These could include new sensors, actuators, or even complex subsystems for more advanced...No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for
The Limits of Cyberspace Deterrence
2014-01-01
networks are secure, this protection would also take the form of deterring, preventing, detect- ing, and defending against cyber attacks . As a result...tar- get into inaction. In a nuclear scenario, all nations are aware of the American ability to attribute a nuclear attack to its source, U.S...through degraded environment and improving ability to attribute and defeat attacks on systems and infrastructure. Military must provide broad range of
Don't neglect cultural diversity in oncology care.
Muñoz-Antonia, Teresita
2014-05-01
The growing Hispanic population in the United States mandates the need for oncology providers to become more familiar with disease patterns and cultural belief systems that can impact cancer care. "Culturally competent care" should be the mandate of all providers. This comprises awareness of cultural differences, communication in a manner that the patient understands, and respect. Copyright © 2014 by the National Comprehensive Cancer Network.
A network approach to assessing cognition in disorders of consciousness(e–Pub ahead of print)(CME)
Rodriguez Moreno, D.; Schiff, N.D.; Giacino, J.; Kalmar, K.; Hirsch, J.
2010-01-01
Objective: Conventional assessments of consciousness rely on motor responses to indicate awareness. However, overt behaviors may be absent or ambiguous in patients with disorders of consciousness (DOC) resulting in underrating capacity for cognition. fMRI during a silent picture-naming task was evaluated as an indicator of command following when conventional methods are not sufficient. Methods: A total of 10 patients with and without conventional evidence of awareness, who met diagnostic criteria for the minimally conscious state (MCS) (n = 5), vegetative state (VS) (n = 3), emerged from MCS (EMCS) (n = 1), and locked-in syndrome (LIS) (n = 1), participated in this observational fMRI study. Results: The LIS and EMCS patients engaged a complete network of essential language-related regions during the object-naming task. The MCS and 2 of the VS patients demonstrated both complete and partial preservation of the object-naming system. Patients who engaged a complete network scored highest on the Coma Recovery Scale-Revised. Conclusions: This study supports the view that fMRI during object naming can elicit brain activations in patients with DOC similar to those observed in healthy subjects during command following, and patients can be stratified by completeness of the engaged neural system. These results suggest that activity of the language network may serve as an indicator of high-level cognition and possibly volitional processes that cannot be discerned through conventional behavioral assessment alone. GLOSSARY BA = Brodmann area; BOLD = blood oxygenation level–dependent; CRS-R = Coma Recovery Scale-Revised; DOC = disorders of consciousness; EMCS = emerged from minimally conscious state; GFi(d) = dorsal inferior frontal gyrus; GFi(v) = ventral inferior frontal gyrus; hrf = hemodynamic response function; LIS = locked-in syndrome; MCS = minimally conscious state; preSMA = pre-supplementary motor area; STG = superior temporal gyrus; VS = vegetative state. PMID:20980667
Ley-Bosch, Carlos; Quintana-Suárez, Miguel A.
2018-01-01
Indoor localization estimation has become an attractive research topic due to growing interest in location-aware services. Many research works have proposed solving this problem by using wireless communication systems based on radiofrequency. Nevertheless, those approaches usually deliver an accuracy of up to two metres, since they are hindered by multipath propagation. On the other hand, in the last few years, the increasing use of light-emitting diodes in illumination systems has provided the emergence of Visible Light Communication technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. This brings a brand new approach to high accuracy indoor positioning because this kind of network is not affected by electromagnetic interferences and the received optical power is more stable than radio signals. Our research focus on to propose a fingerprinting indoor positioning estimation system based on neural networks to predict the device position in a 3D environment. Neural networks are an effective classification and predictive method. The localization system is built using a dataset of received signal strength coming from a grid of different points. From the these values, the position in Cartesian coordinates (x,y,z) is estimated. The use of three neural networks is proposed in this work, where each network is responsible for estimating the position by each axis. Experimental results indicate that the proposed system leads to substantial improvements to accuracy over the widely-used traditional fingerprinting methods, yielding an accuracy above 99% and an average error distance of 0.4 mm. PMID:29601525
Adaptive routing in wireless communication networks using swarm intelligence
NASA Technical Reports Server (NTRS)
Arabshahi, P.; Gray, A.; Kassabalidis, I.; Das, A.; Narayanan, S.; Sharkawi, M. El; Marks, R. J.
2001-01-01
In this paper we focus on the network routing problem, and survey swarm intelligent approaches for its efficient solution, after a brief overview of power-aware routing schemes, which are important in the network examples outlined above.
Effective Usage of Social Media for Dark Skies Awareness
NASA Astrophysics Data System (ADS)
Hennig, A. J.; Heenatigala, T.; Walker, C. E.
2012-12-01
Social media has become a daily tool in our culture. Networks such as Facebook with 900 million active users and Twitter with 140 million active users make an ideal platform to create awareness. It helps to generate and share new content and enables multi-communication channels. This presentation will address how effectively social media can be used as an education tool to create awareness of light pollution. As a "green" focus becomes more important in our world the topic of light pollution is also rising as an important issue. Light Pollution affects many aspects of our world ranging from flora and fauna to the economic well-being of many industrialized countries. Mixed among the many important pollutants in our world light pollution can fall by the way-side, forgotten, but it is imperative to bring out awareness of this problem, especially since studies are beginning to show how by fighting light pollution we will also be fighting other pollution such as air pollutants. GLOBE at Night has combined social media tools such as Facebook and Twitter with its educational awareness campaign on light pollution to reach out to social media community. Currently our Facebook reaches citizens of twenty separate countries ranging from the Czech Republic and Peru to the United States and the United Kingdom. On Facebook our reach is estimated at over 800,000 friends of our fans. These networks help us to directly answer users' immediate questions and encourage participation in the GLOBE at Night campaigns. Important news on light pollution appearing in cyberspace is monitored regularly using Google Alerts and Twitter hash tags filters which gets posted regularly on our networks. Social media networking has become a tool for users not only for information about GLOBE at Night but also for information about the overall topic of light pollution itself. Many individuals and organizations struggle with the mass content shared in social networks. It is important to know where to look for the right content and what to share with whom. This presentation will highlight on; the importance of engaging in social media to gain and share new content, how to filter the right content, and best uses of social media to create an awareness of light pollution. We will discuss the proper ways to get the most use out of social media networking.
Improved efficient routing strategy on two-layer complex networks
NASA Astrophysics Data System (ADS)
Ma, Jinlong; Han, Weizhan; Guo, Qing; Zhang, Shuai; Wang, Junfang; Wang, Zhihao
2016-10-01
The traffic dynamics of multi-layer networks has become a hot research topic since many networks are comprised of two or more layers of subnetworks. Due to its low traffic capacity, the traditional shortest path routing (SPR) protocol is susceptible to congestion on two-layer complex networks. In this paper, we propose an efficient routing strategy named improved global awareness routing (IGAR) strategy which is based on the betweenness centrality of nodes in the two layers. With the proposed strategy, the routing paths can bypass hub nodes of both layers to enhance the transport efficiency. Simulation results show that the IGAR strategy can bring much better traffic capacity than the SPR and the global awareness routing (GAR) strategies. Because of the significantly improved traffic performance, this study is helpful to alleviate congestion of the two-layer complex networks.
Using Social Networks to Create Powerful Learning Communities
ERIC Educational Resources Information Center
Lenox, Marianne; Coleman, Maurice
2010-01-01
Regular readers of "Computers in Libraries" are aware that social networks are forming increasingly important linkages to professional and personal development in all libraries. Live and virtual social networks have become the new learning playground for librarians and library staff. Social networks have the ability to connect those who are…
Smart sensing surveillance system
NASA Astrophysics Data System (ADS)
Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen
2010-04-01
Unattended ground sensor (UGS) networks have been widely used in remote battlefield and other tactical applications over the last few decades due to the advances of the digital signal processing. The UGS network can be applied in a variety of areas including border surveillance, special force operations, perimeter and building protection, target acquisition, situational awareness, and force protection. In this paper, a highly-distributed, fault-tolerant, and energyefficient Smart Sensing Surveillance System (S4) is presented to efficiently provide 24/7 and all weather security operation in a situation management environment. The S4 is composed of a number of distributed nodes to collect, process, and disseminate heterogeneous sensor data. Nearly all S4 nodes have passive sensors to provide rapid omnidirectional detection. In addition, Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR cameras are integrated to selected nodes to track the objects and capture associated imagery. These S4 camera-connected nodes will provide applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. In the S4, all the nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology, which can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The S4 utilizes a Service Oriented Architecture such that remote applications can interact with the S4 network and use the specific presentation methods. The S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments and near perimeters and borders. The S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE®) standards. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.
ERIC Educational Resources Information Center
Lin, Jian-Wei; Mai, Li-Jung; Lai, Yung-Cheng
2015-01-01
Although several studies related to social-context awareness (SA) and knowledge-context awareness (KA) argued that each (SA or KA) can individually enhance peer interaction in an online learning community, other studies reached opposite conclusions. These conflicting findings likely stem from different experimental settings. Most importantly, few…
Packet-aware transport for video distribution [Invited
NASA Astrophysics Data System (ADS)
Aguirre-Torres, Luis; Rosenfeld, Gady; Bruckman, Leon; O'Connor, Mannix
2006-05-01
We describe a solution based on resilient packet rings (RPR) for the distribution of broadcast video and video-on-demand (VoD) content over a packet-aware transport network. The proposed solution is based on our experience in the design and deployment of nationwide Triple Play networks and relies on technologies such as RPR, multiprotocol label switching (MPLS), and virtual private LAN service (VPLS) to provide the most efficient solution in terms of utilization, scalability, and availability.
The impact of vaccine failure rate on epidemic dynamics in responsive networks.
Liang, Yu-Hao; Juang, Jonq
2015-04-01
An SIS model based on the microscopic Markov-chain approximation is considered in this paper. It is assumed that the individual vaccination behavior depends on the contact awareness, local and global information of an epidemic. To better simulate the real situation, the vaccine failure rate is also taken into consideration. Our main conclusions are given in the following. First, we show that if the vaccine failure rate α is zero, then the epidemic eventually dies out regardless of what the network structure is or how large the effective spreading rate and the immunization response rates of an epidemic are. Second, we show that for any positive α, there exists a positive epidemic threshold depending on an adjusted network structure, which is only determined by the structure of the original network, the positive vaccine failure rate and the immunization response rate for contact awareness. Moreover, the epidemic threshold increases with respect to the strength of the immunization response rate for contact awareness. Finally, if the vaccine failure rate and the immunization response rate for contact awareness are positive, then there exists a critical vaccine failure rate αc > 0 so that the disease free equilibrium (DFE) is stable (resp., unstable) if α < αc (resp., α > αc). Numerical simulations to see the effectiveness of our theoretical results are also provided.
Stengel, Camille May; Mane, Famara; Guise, Andrew; Pouye, Magath; Sigrist, Monika; Rhodes, Tim
2018-02-27
Peer outreach harm reduction initiatives are being developed with and for people who use drugs in Dakar, Senegal. This is in response to growing injecting drug use across the West Africa region and linked emerging epidemics of HIV and hepatitis C. We undertook formative qualitative research to explore the feasibility and potential of peer outreach in this context and in particular how outreach could be linked to fostering community-level processes of change. We undertook a total of 44 semi-structured qualitative interviews. Thirty-four interviews were with people who used drugs (comprised of 25 participants who had injected at least once in their life) and included 11 peer educators who delivered "awareness-raising" harm reduction activities. We also interviewed 10 service providers involved in the planning and monitoring of peer outreach initiatives. We used thematic analysis to identify key characteristics of how peer-led outreach is being delivered, beneficiary need, and the nature of the social networks in which the awareness-raising activities operate. Through interviews with peer educators, people who use drugs, and service providers, four main overlapping themes are identified as follows: peer educators as a bridge to responsibilization through awareness-raising activities, awareness-raising activities as an enactment of recovery, awareness raising through social network diffusion, and the contexts and constraints of peer outreach engagement through awareness-raising activities. The study results suggest that peer education is on a trajectory to develop into a central role for harm reduction interventions in Dakar, Senegal. This research shows how peer education is bound in processes of responsibilization and self-change, which link to varying possibilities for risk reduction or recovery. For peer education to achieve a range of significant goals, broader structural and system changes should be implemented in the region. We caution that without such changes, awareness-raising activities and the role of peer educators may instead become part of state- and agency-sponsored processes of seeking to responsibilize individuals for health and harm reduction.
Improving the energy efficiency of telecommunication networks
NASA Astrophysics Data System (ADS)
Lange, Christoph; Gladisch, Andreas
2011-05-01
The energy consumption of telecommunication networks has gained increasing interest throughout the recent past: Besides its environmental implications it has been identified to be a major contributor to operational expenditures of network operators. Targeting at sustainable telecommunication networks, thus, it is important to find appropriate strategies for improving their energy efficiency before the background of rapidly increasing traffic volumes. Besides the obvious benefits of increasing energy efficiency of network elements by leveraging technology progress, load-adaptive network operation is a very promising option, i.e. using network resources only to an extent and for the time they are actually needed. In contrast, current network operation takes almost no advantage of the strongly time-variant behaviour of the network traffic load. Mechanisms for energy-aware load-adaptive network operation can be subdivided in techniques based on local autonomous or per-link decisions and in techniques relying on coordinated decisions incorporating information from several links. For the transformation from current network structures and operation paradigms towards energy-efficient and sustainable networks it will be essential to use energy-optimized network elements as well as including the overall energy consumption in network design and planning phases together with the energy-aware load-adaptive operation. In load-adaptive operation it will be important to establish the optimum balance between local and overarching power management concepts in telecommunication networks.
NASA Astrophysics Data System (ADS)
Wu, Bo; Yang, Minglei; Li, Kehuang; Huang, Zhen; Siniscalchi, Sabato Marco; Wang, Tong; Lee, Chin-Hui
2017-12-01
A reverberation-time-aware deep-neural-network (DNN)-based multi-channel speech dereverberation framework is proposed to handle a wide range of reverberation times (RT60s). There are three key steps in designing a robust system. First, to accomplish simultaneous speech dereverberation and beamforming, we propose a framework, namely DNNSpatial, by selectively concatenating log-power spectral (LPS) input features of reverberant speech from multiple microphones in an array and map them into the expected output LPS features of anechoic reference speech based on a single deep neural network (DNN). Next, the temporal auto-correlation function of received signals at different RT60s is investigated to show that RT60-dependent temporal-spatial contexts in feature selection are needed in the DNNSpatial training stage in order to optimize the system performance in diverse reverberant environments. Finally, the RT60 is estimated to select the proper temporal and spatial contexts before feeding the log-power spectrum features to the trained DNNs for speech dereverberation. The experimental evidence gathered in this study indicates that the proposed framework outperforms the state-of-the-art signal processing dereverberation algorithm weighted prediction error (WPE) and conventional DNNSpatial systems without taking the reverberation time into account, even for extremely weak and severe reverberant conditions. The proposed technique generalizes well to unseen room size, array geometry and loudspeaker position, and is robust to reverberation time estimation error.
Helmet-mounted acoustic array for hostile fire detection and localization in an urban environment
NASA Astrophysics Data System (ADS)
Scanlon, Michael V.
2008-04-01
The detection and localization of hostile weapons firing has been demonstrated successfully with acoustic sensor arrays on unattended ground sensors (UGS), ground-vehicles, and unmanned aerial vehicles (UAVs). Some of the more mature systems have demonstrated significant capabilities and provide direct support to ongoing counter-sniper operations. The Army Research Laboratory (ARL) is conducting research and development for a helmet-mounted system to acoustically detect and localize small arms firing, or other events such as RPG, mortars, and explosions, as well as other non-transient signatures. Since today's soldier is quickly being asked to take on more and more reconnaissance, surveillance, & target acquisition (RSTA) functions, sensor augmentation enables him to become a mobile and networked sensor node on the complex and dynamic battlefield. Having a body-worn threat detection and localization capability for events that pose an immediate danger to the soldiers around him can significantly enhance their survivability and lethality, as well as enable him to provide and use situational awareness clues on the networked battlefield. This paper addresses some of the difficulties encountered by an acoustic system in an urban environment. Complex reverberation, multipath, diffraction, and signature masking by building structures makes this a very harsh environment for robust detection and classification of shockwaves and muzzle blasts. Multifunctional acoustic detection arrays can provide persistent surveillance and enhanced situational awareness for every soldier.
Consciousness as a global property of brain dynamic activity
NASA Astrophysics Data System (ADS)
Mateos, D. M.; Wennberg, R.; Guevara, R.; Perez Velazquez, J. L.
2017-12-01
We seek general principles of the structure of the cellular collective activity associated with conscious awareness. Can we obtain evidence for features of the optimal brain organization that allows for adequate processing of stimuli and that may guide the emergence of cognition and consciousness? Analyzing brain recordings in conscious and unconscious states, we followed initially the classic approach in physics when it comes to understanding collective behaviours of systems composed of a myriad of units: the assessment of the number of possible configurations (microstates) that the system can adopt, for which we use a global entropic measure associated with the number of connected brain regions. Having found maximal entropy in conscious states, we then inspected the microscopic nature of the configurations of connections using an adequate complexity measure and found higher complexity in states characterized not only by conscious awareness but also by subconscious cognitive processing, such as sleep stages. Our observations indicate that conscious awareness is associated with maximal global (macroscopic) entropy and with the short time scale (microscopic) complexity of the configurations of connected brain networks in pathological unconscious states (seizures and coma), but the microscopic view captures the high complexity in physiological unconscious states (sleep) where there is information processing. As such, our results support the global nature of conscious awareness, as advocated by several theories of cognition. We thus hope that our studies represent preliminary steps to reveal aspects of the structure of cognition that leads to conscious awareness.
Enabling information management systems in tactical network environments
NASA Astrophysics Data System (ADS)
Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher
2009-05-01
Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.
The Impact of Public Health Awareness Campaigns on the Awareness and Quality of Palliative Care.
Seymour, Jane
2018-01-01
The right to health includes a right of access to good quality palliative care, but inequalities persist. Raising awareness is a key plank of the public health approach to palliative care, but involves consideration of subjects most of us prefer not to address. This review addresses the question: "do public health awareness campaigns effectively improve the awareness and quality of palliative care"? The evidence shows that public awareness campaigns can improve awareness of palliative care and probably improve quality of care, but there is a lack of evidence about the latter. Rapid review and synthesis. A comprehensive public awareness campaign about palliative care (including advance care planning and end-of-life decision making) should be based on clear and shared terminology, use well piloted materials, and the full range of mass media to suit different ages, cultures, and religious/spiritual perspectives. Arts and humanities have a role to play in allowing individuals and communities to express experiences of illness, death, and grief and encourage conversation and thoughtful reflection. There is evidence about key factors for success: targeting, networking, and use of specific, measurable, achievable, realistic time-bound objectives; continuous evaluation; and complementarity to national and international policy. Campaigns should be located within the framework of public health promotion and the synergy between short national mass media campaigns and longer term local community action initiatives carefully considered. National and local projects to raise awareness should identify and address any barriers at the level of individuals, communities, and systems of care, for example, literacy skills and unequal access to resources.
Caniato, M; Tudor, T; Vaccari, M
2015-01-01
The sustainable management of waste requires a holistic approach involving a range of stakeholders. What can often be difficult is to understand the manner in which different types of stakeholder networks are composed and work, and how best to enhance their effectiveness. Using social network analysis and stakeholder analysis of healthcare waste management stakeholders in the case study region of the Gaza Strip, this study aimed to understand and examine the manner in which the networks functioned. The Ministry of Health was found to be the most important stakeholder, followed by municipalities and solid waste management councils. Some international agencies were also mentioned, with specific roles, while other local institutions had a limited influence. Finally while health-care facilities had a strong interest in waste management, they were generally poorly informed and had limited links to each other. The manner in which the networks operated was complicated and influenced by differences in perception, sharing of information, access to finance and levels of awareness. The lack of a clear legal framework generated various mistakes about roles and responsibilities in the system, and evidently regulation was not an effective driver for improvement. Finally stakeholders had different priorities according to the waste management issues they were involved with, however segregation at the source was identified as a key requirement by most. Areas for improving the effectiveness of the networks are suggested. The analysis utilized an innovative methodology, which involved a large number of stakeholders. Such an approach served to raise interest and awareness at different levels (public authorities, health providers, supporting actors, others), stimulate the discussion about the adoption of specific policies, and identify the effective way forward. Copyright © 2014 Elsevier Ltd. All rights reserved.
Connecting to the Internet Securely; Protecting Home Networks CIAC-2324
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W J; Krystosek, P; Smith, J
2002-11-27
With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less
The impact of heterogeneous response on coupled spreading dynamics in multiplex networks
NASA Astrophysics Data System (ADS)
Nie, Xiaoyu; Tang, Ming; Zou, Yong; Guan, Shuguang; Zhou, Jie
2017-10-01
Many recent studies have demonstrated that individual awareness of disease may significantly affect the spreading process of infectious disease. In the majority of these studies, the response of the awareness is generally treated homogeneously. Considering of diversity and heterogeneity in the human behavior which widely exist under different circumstances, in this paper we study heterogeneous response when people are aware of the prevalence of infectious diseases. Specifically, we consider that an individual with more neighbors may take more preventive measures as a reaction when he is aware of the disease. A suppression strength is introduced to describe such heterogeneity, and we find that a more evident heterogeneity may cause a more effective suppressing effect to the spreading of epidemics. A mean-field theory is developed to support the results which are verified on the multiplex networks with different interlayer degree correlation.
Lou, Hans C
2012-02-01
Self-awareness is a pivotal component of any conscious experience and conscious self-regulation of behaviour. A paralimbic network is active, specific and causal in self-awareness. Its regions interact by gamma synchrony. Gamma synchrony develops throughout infancy, childhood and adolescence into adulthood and is regulated by dopamine and other neurotransmitters via GABA interneurons. Major derailments of this network and self-awareness occur in developmental disorders of conscious self-regulation like autism, attention deficit hyperactivity disorder (ADHD) and schizophrenia. Recent research on conscious experience is no longer limited to the study of neural 'correlations' but is increasingly lending itself to the study of causality. This paradigm shift opens new perspectives for understanding the neural mechanisms of the developing self and the causal effects of their disturbance in developmental disorders. © 2011 The Author(s)/Acta Paediatrica © 2011 Foundation Acta Paediatrica.
Surveillance of Space in Australia
NASA Astrophysics Data System (ADS)
Newsam, G.
Australia's geography and technology base got it off to a flying start in the early days of surveillance of space, starting with CSIRO's first radio telescope in the 1940's and climaxing in NASA's establishment of station 43 in the Deep Space Network at Tidbinbilla in 1965. But Britain's exit from space and the subsequent closure of the Woomera launch range and associated space tracking facilities in the early 1970's saw the start of a long draw-down of capability. Programs such as CSIRO's radio astronomy telescopes, Electro-Optic Systems' adoption of laser technology for satellite laser ranging and tracking system, and the exploration of the use of technology developed in Australia's over-the-horizon-radar program for surveillance of space, kept some interest in the problem alive, but there has been no serious national investment in the area for the last thirty years. Recently, however, increased awareness of the vulnerability of space systems and the need to include potential opponents' space capabilities in operations planning has led to a revival of interest in space situational awareness within the Australian Defence Organisation. While firm commitments to new systems must wait on the next Defence White Paper due out at the end of 2007 and the policy directions it formally endorses, discussions have already started with the US on participating in the Space Surveillance Network (SSN) and developing a comprehensive space situational awareness capability. In support of these initiatives the Defence Science and Technology Organisation (DSTO) is drawing up an inventory of relevant Australian capabilities, technologies and activities: the paper will describe the findings of this inventory, and in particular local technologies and systems that might be deployed in Australia to contribute to the SSN. In the optical regime the available options are rather limited; they centre primarily on the satellite laser ranging technology developed by Electro-Optic Systems and operating in stations at Yarragadee, Western Australia and Mt Stromlo, Australian Capital Territory. Recently, however, Australia has also agreed to host a node of AFRL's Extended HANDS telescope network in Learmonth, Western Australia, and discussions are underway with researchers in Australian academia about also participating in this research program. In the RF regime, however, DSTO has substantial HF and microwave radar programs, elements of which could be readily adapted to surveillance of space. Proposals have already been developed internally within both programs for various forms of space surveillance systems including both broad area surveillance and imaging along with some very initial technology concept demonstrator systems. Recently proposals have also been floated to substantially increase Australia's civilian space surveillance programs including the Ionospheric Prediction Service's longstanding program to monitor the ionosphere and space weather, meteor radars and other systems. Finally Australia's bid to host the international Square Kilometre Array radio telescope has already generated concrete commitments to establish several very substantial RF arrays in Western Australia that may also provide instruments of unprecedented sensitivity and resolution for surveillance of space. The paper will survey these technology development programs and associated progress on integrating them into some sort of national program for space situational awareness.
Building an Energy-efficient Uplink and Downlink Delay Aware TDM-PON System
NASA Astrophysics Data System (ADS)
Newaz, S. H. Shah; Jang, Min Seok; Alaelddin, Fuad Yousif Mohammed; Lee, Gyu Myoung; Choi, Jun Kyun
2016-05-01
With the increasing concern over the energy expenditure due to rapid ICT expansion and growth of Internet traffic volume, there is a growing trend towards developing energy-efficient ICT solutions. Passive Optical Network (PON), which is regarded as a key enabler to facilitate high speed broadband connection to individual subscribers, is considered as one of the energy-efficient access network technologies. However, an immense amount of research effort can be noticed in academia and industries to make PON more energy-efficient. In this paper, we aim at improving energy saving performance of Time Division Multiplexing (TDM)-PON, which is the most widely deployed PON technology throughout the world. A commonly used approach to make TDM-PON energy-efficient is to use sleep mode in Optical Network Units (ONUs), which are the customer premises equipment of a TDM-PON system. However, there is a strong trade-off relationship between traffic delay performance of an ONU and its energy saving (the longer the sleep interval length of an ONU, the lower its energy consumption, but the higher the traffic delay, and vice versa). In this paper, we propose an Energy-efficient Uplink and Downlink Delay Aware (EUDDA) scheme for TDM-PON system. The prime object of EUDDA is to meet both downlink and uplink traffic delay requirement while maximizing energy saving performance of ONUs as much as possible. In EUDDA, traffic delay requirement is given more priority over energy saving. Even so, it still can improve energy saving of ONUs noticeably. We evaluate performance of EUDDA in front of two existing solutions in terms of traffic delay, jitter, and ONU energy consumption. The performance results show that EUDDA significantly outperforms the other existing solutions.
Contention Modeling for Multithreaded Distributed Shared Memory Machines: The Cray XMT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Secchi, Simone; Tumeo, Antonino; Villa, Oreste
Distributed Shared Memory (DSM) machines are a wide class of multi-processor computing systems where a large virtually-shared address space is mapped on a network of physically distributed memories. High memory latency and network contention are two of the main factors that limit performance scaling of such architectures. Modern high-performance computing DSM systems have evolved toward exploitation of massive hardware multi-threading and fine-grained memory hashing to tolerate irregular latencies, avoid network hot-spots and enable high scaling. In order to model the performance of such large-scale machines, parallel simulation has been proved to be a promising approach to achieve good accuracy inmore » reasonable times. One of the most critical factors in solving the simulation speed-accuracy trade-off is network modeling. The Cray XMT is a massively multi-threaded supercomputing architecture that belongs to the DSM class, since it implements a globally-shared address space abstraction on top of a physically distributed memory substrate. In this paper, we discuss the development of a contention-aware network model intended to be integrated in a full-system XMT simulator. We start by measuring the effects of network contention in a 128-processor XMT machine and then investigate the trade-off that exists between simulation accuracy and speed, by comparing three network models which operate at different levels of accuracy. The comparison and model validation is performed by executing a string-matching algorithm on the full-system simulator and on the XMT, using three datasets that generate noticeably different contention patterns.« less
Foo, Yong-Lin; Chow, Julie Chi; Lai, Ming-Chi; Tsai, Wen-Hui; Tung, Li-Chen; Kuo, Mei-Chin; Lin, Shio-Jean
2015-08-01
This review article aims to introduce the screening and referral network of genetic evaluation for children with developmental delay in Taiwan. For these children, integrated systems provide services from the medical, educational, and social welfare sectors. All cities and counties in Taiwan have established a network for screening, detection, referral, evaluation, and intervention services. Increased awareness improves early detection and intervention. There remains a gap between supply and demand, especially with regard to financial resources and professional manpower. Genetic etiology has a major role in prenatal causes of developmental delay. A summary of reports on some related genetic disorders in the Taiwanese population is included in this review. Genetic diagnosis allows counseling with regard to recurrence risk and prevention. Networking with neonatal screening, laboratory diagnosis, genetic counseling, and orphan drugs logistics systems can provide effective treatment for patients. In Taiwan, several laboratories provide genetic tests for clinical diagnosis. Accessibility to advanced expensive tests such as gene chips or whole exome sequencing is limited because of funding problems; however, the service system in Taiwan can still operate in a relatively cost-effective manner. This experience in Taiwan may serve as a reference for other countries. Copyright © 2014. Published by Elsevier B.V.
Challenging data and workload management in CMS Computing with network-aware systems
NASA Astrophysics Data System (ADS)
D, Bonacorsi; T, Wildish
2014-06-01
After a successful first run at the LHC, and during the Long Shutdown (LS1) of the accelerator, the workload and data management sectors of the CMS Computing Model are entering into an operational review phase in order to concretely assess area of possible improvements and paths to exploit new promising technology trends. In particular, since the preparation activities for the LHC start, the Networks have constantly been of paramount importance for the execution of CMS workflows, exceeding the original expectations - as from the MONARC model - in terms of performance, stability and reliability. The low-latency transfers of PetaBytes of CMS data among dozens of WLCG Tiers worldwide using the PhEDEx dataset replication system is an example of the importance of reliable Networks. Another example is the exploitation of WAN data access over data federations in CMS. A new emerging area of work is the exploitation of Intelligent Network Services, including also bandwidth on demand concepts. In this paper, we will review the work done in CMS on this, and the next steps.
Disinfection of the hospital water supply: a hidden risk to dialysis patients
2009-01-01
Water suitable for drinking is unsuited for use in the preparation of haemodialysis fluid and undergoes additional treatment. The primary component of the additional treatment is reverse osmosis, which does not remove low-molecular-weight contaminants, and the water treatment system must contain carbon beds or filters to ensure effective removal of such contaminants. The recent article by Bek and colleagues highlights an unrecognised issue with respect to chemicals that may be added to the water within hospitals to ensure that the distribution network is free of pathogens (for example, Legionella, pseudomonas, and mycobacteria) and underlines the need for personnel responsible for dialysis in a renal or intensive care setting to be aware of any potential effects that disinfection of the hospital water treatment system may have on the product water used in the preparation of dialysis fluid. Such awareness requires communication and the sharing of information between clinical and facilities staff. PMID:20053299
Ooe, Yosuke; Anamizu, Hiromitsu; Tatsumi, Haruyuki; Tanaka, Hiroshi
2008-07-01
The financial condition of the Japanese health insurance system is said to be compounded with the aging of the population. The government argues that the application of IT and networking is required in order to streamline health care services while avoiding its collapse. The Internet environment has been furnished with broadband connection and multimedia in the span of one year or shorter, and is becoming more and more convenient. It is true that the Internet is now a part of Tokyo's infrastructure along with electricity and water supply, as it is the center of politics. However, in local cities, development of the Internet environment is still insufficient. In order to use the network as a common infrastructure at health care facilities, we need to be aware of this digital divide. This study investigated the development status of network infrastructure in regional cities.
Use and Views on Social Networking Sites of Pharmacy Students in the United Kingdom
Hanna, Lezley-Anne; Huey, Gwyneth
2013-01-01
Objective. To investigate students' use and views on social networking sites and assess differences in attitudes between genders and years in the program. Methods. All pharmacy undergraduate students were invited via e-mail to complete an electronic questionnaire consisting of 21 questions relating to social networking. Results. Most (91.8%) of the 377 respondents reported using social networking Web sites, with 98.6% using Facebook and 33.7% using Twitter. Female students were more likely than male students to agree that they had been made sufficiently aware of the professional behavior expected of them when using social networking sites (76.6% vs 58.1% p=0.002) and to agree that students should have the same professional standards whether on placement or using social networking sites (76.3% vs 61.6%; p<0.001). Conclusions. A high level of social networking use and potentially inappropriate attitudes towards professionalism were found among pharmacy students. Further training may be useful to ensure pharmacy students are aware of how to apply codes of conduct when using social networking sites. PMID:23459621
Use and views on social networking sites of pharmacy students in the United kingdom.
Hall, Maurice; Hanna, Lezley-Anne; Huey, Gwyneth
2013-02-12
Objective. To investigate students' use and views on social networking sites and assess differences in attitudes between genders and years in the program.Methods. All pharmacy undergraduate students were invited via e-mail to complete an electronic questionnaire consisting of 21 questions relating to social networking.Results. Most (91.8%) of the 377 respondents reported using social networking Web sites, with 98.6% using Facebook and 33.7% using Twitter. Female students were more likely than male students to agree that they had been made sufficiently aware of the professional behavior expected of them when using social networking sites (76.6% vs 58.1% p=0.002) and to agree that students should have the same professional standards whether on placement or using social networking sites (76.3% vs 61.6%; p<0.001).Conclusions. A high level of social networking use and potentially inappropriate attitudes towards professionalism were found among pharmacy students. Further training may be useful to ensure pharmacy students are aware of how to apply codes of conduct when using social networking sites.
Manipulation of the extrastriate frontal loop can resolve visual disability in blindsight patients.
Badgaiyan, Rajendra D
2012-12-01
Patients with blindsight are not consciously aware of visual stimuli in the affected field of vision but retain nonconscious perception. This disability can be resolved if nonconsciously perceived information can be brought to their conscious awareness. It can be accomplished by manipulating neural network of visual awareness. To understand this network, we studied the pattern of cortical activity elicited during processing of visual stimuli with or without conscious awareness. The analysis indicated that a re-entrant signaling loop between the area V3A (located in the extrastriate cortex) and the frontal cortex is critical for processing conscious awareness. The loop is activated by visual signals relayed in the primary visual cortex, which is damaged in blindsight patients. Because of the damage, V3A-frontal loop is not activated and the signals are not processed for conscious awareness. These patients however continue to receive visual signals through the lateral geniculate nucleus. Since these signals do not activate the V3A-frontal loop, the stimuli are not consciously perceived. If visual input from the lateral geniculate nucleus is appropriately manipulated and made to activate the V3A-frontal loop, blindsight patients can regain conscious vision. Published by Elsevier Ltd.
Implementation of an Adaptive Controller System from Concept to Flight Test
NASA Technical Reports Server (NTRS)
Larson, Richard R.; Burken, John J.; Butler, Bradley S.; Yokum, Steve
2009-01-01
The National Aeronautics and Space Administration Dryden Flight Research Center (Edwards, California) is conducting ongoing flight research using adaptive controller algorithms. A highly modified McDonnell-Douglas NF-15B airplane called the F-15 Intelligent Flight Control System (IFCS) is used to test and develop these algorithms. Modifications to this airplane include adding canards and changing the flight control systems to interface a single-string research controller processor for neural network algorithms. Research goals include demonstration of revolutionary control approaches that can efficiently optimize aircraft performance in both normal and failure conditions and advancement of neural-network-based flight control technology for new aerospace system designs. This report presents an overview of the processes utilized to develop adaptive controller algorithms during a flight-test program, including a description of initial adaptive controller concepts and a discussion of modeling formulation and performance testing. Design finalization led to integration with the system interfaces, verification of the software, validation of the hardware to the requirements, design of failure detection, development of safety limiters to minimize the effect of erroneous neural network commands, and creation of flight test control room displays to maximize human situational awareness; these are also discussed.
León-Domínguez, Umberto; Vela-Bueno, Antonio; Froufé-Torres, Manuel; León-Carrión, Jose
2013-06-01
The thalamo-cortical system has been defined as a neural network associated with consciousness. While there seems to be wide agreement that the thalamo-cortical system directly intervenes in vigilance and arousal, a divergence of opinion persists regarding its intervention in the control of other cognitive processes necessary for consciousness. In the present manuscript, we provide a review of recent scientific findings on the thalamo-cortical system and its role in the control and regulation of the flow of neural information necessary for conscious cognitive processes. We suggest that the axis formed by the medial prefrontal cortex and different thalamic nuclei (reticular nucleus, intralaminar nucleus, and midline nucleus), represents a core component for consciousness. This axis regulates different cerebral structures which allow basic cognitive processes like attention, arousal and memory to emerge. In order to produce a synchronized coherent response, neural communication between cerebral structures must have exact timing (chronometry). Thus, a chronometric functional sub-network within the thalamo-cortical system keeps us in an optimal and continuous functional state, allowing high-order cognitive processes, essential to awareness and qualia, to take place. Copyright © 2013 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Soeharwinto; Sinulingga, Emerson; Siregar, Baihaqi
2017-01-01
An accurate information can be useful for authorities to make good policies for preventive and mitigation after volcano eruption disaster. Monitoring of environmental parameters of post-eruption volcano provides an important information for authorities. Such monitoring system can be develop using the Wireless Network Sensor technology. Many application has been developed using the Wireless Sensor Network technology, such as floods early warning system, sun radiation mapping, and watershed monitoring. This paper describes the implementation of a remote environment monitoring system of mount Sinabung post-eruption. The system monitor three environmental parameters: soil condition, water quality and air quality (outdoor). Motes equipped with proper sensors, as components of the monitoring system placed in sample locations. The measured value from the sensors periodically sends to data server using 3G/GPRS communication module. The data can be downloaded by the user for further analysis.The measurement and data analysis results generally indicate that the environmental parameters in the range of normal/standard condition. The sample locations are safe for living and suitable for cultivation, but awareness is strictly required due to the uncertainty of Sinabung status.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamentalmore » need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.« less
Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress
2016-05-27
ordnance disposal (counter- IED), combat construction engineering , cargo handling, combat logistics, maritime security, detainee operations, customs...Rutherford, “Navy’s Maritime Domain Awareness System ‘Up And Running’,” Defense Daily, September 4, 2008; and Dan Taylor , “New Network Allows Navy To...with twin diesel engines and water jets. It has a range of 600 nautical miles. 34 Other Organizational Initiatives Other Navy initiatives in recent
Revolutionize Situational Awareness in Emergencies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hehlen, Markus Peter
This report describes an integrated system that provides real-time actionable information to first responders. LANL will integrate three technologies to form an advanced predictive real-time sensor network including compact chemical and wind sensor sin low cost rugged package for outdoor installation; flexible robust communication architecture linking sensors in near-real time to globally accessible servers; and the QUIC code which predicts contamination transport and dispersal in urban environments in near real time.
2010-06-01
Scenario – 12 gallons of readily available toxic substance – pump ($150 rental) – wrench to open a fire hydrant ($10) One (1) terrorist, or...6 Gallons Water General Comments Aflatoxin 7.6 Potent Carcinogen Aldicarb 1.1 Cycloheximide 2.1 LSD 0.2 Highly Toxic , Psychoactive Mercuric Chloride...Chlorfenvinphos, Formetanate Hydrochloride, Acrolein, Chloropicrin, Sodium chloroacetate, Thyoglycolate medium, Crotoxyphos, Glyphosate , Jimsonweed, Methanol
2015-02-01
not normally blocked by enterprise firewalls . • Some malware exploited zero-day vulnerabilities as well as attempted to exploit vulnerabilities for...servers, receiving updates, and exfiltrating data. Firewalls are routinely configured to block incoming connections while malware within a target...implemented with layers of technical security controls (e.g., ICS-aware firewalls ) to control network traffic and prevent the spread of malware . Intrusion
Cooperative Management of a Lithium-Ion Battery Energy Storage Network: A Distributed MPC Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fang, Huazhen; Wu, Di; Yang, Tao
2016-12-12
This paper presents a study of cooperative power supply and storage for a network of Lithium-ion energy storage systems (LiBESSs). We propose to develop a distributed model predictive control (MPC) approach for two reasons. First, able to account for the practical constraints of a LiBESS, the MPC can enable a constraint-aware operation. Second, a distributed management can cope with a complex network that integrates a large number of LiBESSs over a complex communication topology. With this motivation, we then build a fully distributed MPC algorithm from an optimization perspective, which is based on an extension of the alternating direction methodmore » of multipliers (ADMM) method. A simulation example is provided to demonstrate the effectiveness of the proposed algorithm.« less
Mobile Context Provider for Social Networking
NASA Astrophysics Data System (ADS)
Santos, André C.; Cardoso, João M. P.; Ferreira, Diogo R.; Diniz, Pedro C.
The ability to infer user context based on a mobile device together with a set of external sensors opens up the way to new context-aware services and applications. In this paper, we describe a mobile context provider that makes use of sensors available in a smartphone as well as sensors externally connected via bluetooth. We describe the system architecture from sensor data acquisition to feature extraction, context inference and the publication of context information to well-known social networking services such as Twitter and Hi5. In the current prototype, context inference is based on decision trees, but the middleware allows the integration of other inference engines. Experimental results suggest that the proposed solution is a promising approach to provide user context to both local and network-level services.
Energy aware swarm optimization with intercluster search for wireless sensor network.
Thilagavathi, Shanmugasundaram; Geetha, Bhavani Gnanasambandan
2015-01-01
Wireless sensor networks (WSNs) are emerging as a low cost popular solution for many real-world challenges. The low cost ensures deployment of large sensor arrays to perform military and civilian tasks. Generally, WSNs are power constrained due to their unique deployment method which makes replacement of battery source difficult. Challenges in WSN include a well-organized communication platform for the network with negligible power utilization. In this work, an improved binary particle swarm optimization (PSO) algorithm with modified connected dominating set (CDS) based on residual energy is proposed for discovery of optimal number of clusters and cluster head (CH). Simulations show that the proposed BPSO-T and BPSO-EADS perform better than LEACH- and PSO-based system in terms of energy savings and QOS.
Soma, Yuki; Tsunoda, Kenji; Kitano, Naruki; Jindo, Takashi; Okura, Tomohiro
2015-01-01
The present study examines factors affecting individuals' awareness of certain types of preventive care exercises, particularly the distance from their home to an exercise facility and their social networks. Participants were 3206 men (age, 73.0±6.2 years) and 3395 women (age, 73.2±6.4 years) aged ≥65 years who had not been certified as persons with care needs and who had responded to an inventory survey conducted in Kasama City, Japan, in 2013. We performed multiple logistic regression analysis to assess the characteristics associated with participants' awareness of two types of exercises for preventive care: "silver rehabili taisou" (SRT) and "square-stepping exercise" (SSE). Independent variables were distance from home to the exercise facility, social networks, transportation availability, physical function, cognitive function, and neighborhood population density. Older adults who were aware of the exercises lived significantly closer to an exercise facility (SRT, aware: 1,148.5±961.3 m vs. unaware: 1,284.2±1,027.4 m; SSE, aware: 1,415.9±1104.1 m vs. unaware: 1,615.7±1,172.2 m). Multiple logistic regression analysis showed that participation in community activities (men, SRT-odds ratio [OR]=2.54 and SSE-OR=2.19; women, SRT-OR=4.14 and SSE-OR=3.34] and visiting friends (men, SRT-OR=1.45 and SSE-OR=1.49; women SRT-OR=1.44 and SSE-OR=1.73) were promoting factors for awareness of both types of exercises. In men and women, low physical function (SRT-OR=0.73 and SSE-OR=0.56) and dependence on another person to drive them to the destination (SRT-OR=0.79 and SSE-OR=0.78) were inhibiting factors, respectively. A distance of >500 m between their home and the facility tended to be an inhibiting factor. A shorter distance from home to an exercise facility and better social networks increased awareness of preventive care exercises in both sexes and for both types of exercise. Establishing exercise centers and devising effective methods of imparting information to individuals (e.g., via community magazines and home visits) may promote participation in preventive care exercises.
Extending the littoral battlespace (ELB)
NASA Astrophysics Data System (ADS)
McKinney, Edward J.
1999-07-01
The ELB program is a joint Advanced Concept Technology Demonstration funded by the Navy, Marine Corps and the Office of the Secretary of Defence, and managed by the Naval Research. ELB is based on the new warfare paradigm defined by 'joint vision 2010, and on concepts developed by the Navy and Marine Corps in 'From the Sea', 'Forward...from the Sea', 'Ship to Objective Maneuver (STOM)', and 'Operational Maneuver from the Sea'. The objective of ELB is to demonstrate effective operation of dispersed forces in a variety of littoral environments, and to provide those forces timely remote fire support. Successful operation will depend on achieving a common situational awareness among a mobile, distributed command and control, a shortened sensor- to-shooter timeline, and effective utilization of all information source. The glue to hold this system of systems together is a reliable wide band communications system and network infrastructure. This paper will describe the overall architecture of ELB and focus on the core command and control functions associated with achieving a common situational awareness.
Factors for success in mental health advocacy
Hann, Katrina; Pearson, Heather; Campbell, Doris; Sesay, Daniel; Eaton, Julian
2015-01-01
Background Mental health advocacy groups are an effective way of pushing the mental health agenda and putting pressure on national governments to observe the right to health; however, there is limited research that highlights best practices for such groups in low-resource settings. In an effort to improve the scaling up of mental health in Sierra Leone, stakeholders came together to form the country's first mental health advocacy group: the Mental Health Coalition – Sierra Leone. Since its inception, the group has worked towards raising the profile of mental health in Sierra Leone and developing as an advocacy organisation. Design The study's aim was to investigate views on enabling factors and barriers associated with mental health advocacy in a low-income country using a community-based participatory approach and qualitative methodology. Focus groups (N=9) were held with mental health stakeholders, and key informant interviews (N=15) were conducted with advocacy targets. Investigators analysed the data collaboratively using coding techniques informed by grounded theory. Results Investigators reveal viewpoints on key factors in networking, interacting with government actors, and awareness raising that enabled mental health advocacy aims of supporting policy, service delivery, service user rights, training for service delivery, and awareness raising. The investigators outline viewpoints on barriers for advocacy aims in framing the issue of mental health, networking, interacting with government actors, resource mobilization, and awareness raising. Conclusions The findings outline enabling factors, such as networking with key stakeholders, and barriers, such as lack of political will, for achieving mental health advocacy aims within a low-resource setting, Sierra Leone. Stakeholder coalitions can further key policy development aims that are essential to strengthen mental health systems in low-resource settings. PMID:26689456
Factors for success in mental health advocacy.
Hann, Katrina; Pearson, Heather; Campbell, Doris; Sesay, Daniel; Eaton, Julian
2015-01-01
Mental health advocacy groups are an effective way of pushing the mental health agenda and putting pressure on national governments to observe the right to health; however, there is limited research that highlights best practices for such groups in low-resource settings. In an effort to improve the scaling up of mental health in Sierra Leone, stakeholders came together to form the country's first mental health advocacy group: the Mental Health Coalition - Sierra Leone. Since its inception, the group has worked towards raising the profile of mental health in Sierra Leone and developing as an advocacy organisation. The study's aim was to investigate views on enabling factors and barriers associated with mental health advocacy in a low-income country using a community-based participatory approach and qualitative methodology. Focus groups (N=9) were held with mental health stakeholders, and key informant interviews (N=15) were conducted with advocacy targets. Investigators analysed the data collaboratively using coding techniques informed by grounded theory. Investigators reveal viewpoints on key factors in networking, interacting with government actors, and awareness raising that enabled mental health advocacy aims of supporting policy, service delivery, service user rights, training for service delivery, and awareness raising. The investigators outline viewpoints on barriers for advocacy aims in framing the issue of mental health, networking, interacting with government actors, resource mobilization, and awareness raising. The findings outline enabling factors, such as networking with key stakeholders, and barriers, such as lack of political will, for achieving mental health advocacy aims within a low-resource setting, Sierra Leone. Stakeholder coalitions can further key policy development aims that are essential to strengthen mental health systems in low-resource settings.
Towards energy aware optical networks and interconnects
NASA Astrophysics Data System (ADS)
Glesk, Ivan; Osadola, Tolulope; Idris, Siti
2013-10-01
In a today's world, information technology has been identified as one of the major factors driving economic prosperity. Datacenters businesses have been growing significantly in the past few years. The equipments in these datacenters need to be efficiently connected to each other and also to the outside world in order to enable effective exchange of information. This is why there is need for highly scalable, energy savvy and reliable network connectivity infrastructure that is capable of accommodating the large volume of data being exchanged at any time within the datacenter network and the outside network in general. These devices that can ensure such effective connectivity currently require large amount of energy in order to meet up with these increasing demands. In this paper, an overview of works being done towards realizing energy aware optical networks and interconnects for datacenters is presented. Also an OCDMA approach is discussed as potential multiple access technique for future optical network interconnections. We also presented some challenges that might inhibit effective implementation of the OCDMA multiplexing scheme.
Local empathy provides global minimization of congestion in communication networks
NASA Astrophysics Data System (ADS)
Meloni, Sandro; Gómez-Gardeñes, Jesús
2010-11-01
We present a mechanism to avoid congestion in complex networks based on a local knowledge of traffic conditions and the ability of routers to self-coordinate their dynamical behavior. In particular, routers make use of local information about traffic conditions to either reject or accept information packets from their neighbors. We show that when nodes are only aware of their own congestion state they self-organize into a hierarchical configuration that delays remarkably the onset of congestion although leading to a sharp first-order-like congestion transition. We also consider the case when nodes are aware of the congestion state of their neighbors. In this case, we show that empathy between nodes is strongly beneficial to the overall performance of the system and it is possible to achieve larger values for the critical load together with a smooth, second-order-like, transition. Finally, we show how local empathy minimize the impact of congestion as much as global minimization. Therefore, here we present an outstanding example of how local dynamical rules can optimize the system’s functioning up to the levels reached using global knowledge.
Intraformation positioning system
NASA Astrophysics Data System (ADS)
Sheldon, Stuart; Zadzora, Timothy
1996-05-01
The IntraFormation Positioning System is a networked relative navigation system currently being developed for rendezvous, join-up, and formation flight of Air Force helicopters and fixed wing aircraft in instrument meteorological conditions. The system is designed to be integrated into existing aircraft and will display relative positions of all aircraft within a formation, as well as the relative positions of other formations participating in coordinated missions. The system uses a Global Positioning System receiver integrated with the aircraft Inertial Navigation System to generate accurate aircraft position and velocity data. These data are transmitted over a data link to all participating aircraft and displayed as graphic symbols at the relative range and bearing to own aircraft on a situational awareness display format similar to a radar plan position indicator. Flight guidance computation is based on the difference between a desired formation slot position and current aircraft position relative to the formation lead aircraft. This information is presented on the flight director display allowing the pilot to null out position errors. The system is being developed for the Air Force Special Operations Command; however, it is applicable to all aircraft desiring improved formation situational awareness and formation flight coordination.
Awareware: Narrowcasting Attributes for Selective Attention, Privacy, and Multipresence
NASA Astrophysics Data System (ADS)
Cohen, Michael; Newton Fernando, Owen Noel
The domain of cscw, computer-supported collaborative work, and DSC, distributed synchronous collaboration, spans real-time interactive multiuser systems, shared information spaces, and applications for teleexistence and artificial reality, including collaborative virtual environments ( cves) (Benford et al., 2001). As presence awareness systems emerge, it is important to develop appropriate interfaces and architectures for managing multimodal multiuser systems. Especially in consideration of the persistent connectivity enabled by affordable networked communication, shared distributed environments require generalized control of media streams, techniques to control source → sink transmissions in synchronous groupware, including teleconferences and chatspaces, online role-playing games, and virtual concerts.
An Overview of Data Routing Approaches for Wireless Sensor Networks
Anisi, Mohammad Hossein; Abdullah, Abdul Hanan; Razak, Shukor Abd; Ngadi, Md. Asri
2012-01-01
Recent years have witnessed a growing interest in deploying large populations of microsensors that collaborate in a distributed manner to gather and process sensory data and deliver them to a sink node through wireless communications systems. Currently, there is a lot of interest in data routing for Wireless Sensor Networks (WSNs) due to their unique challenges compared to conventional routing in wired networks. In WSNs, each data routing approach follows a specific goal (goals) according to the application. Although the general goal of every data routing approach in WSNs is to extend the network lifetime and every approach should be aware of the energy level of the nodes, data routing approaches may focus on one (or some) specific goal(s) depending on the application. Thus, existing approaches can be categorized according to their routing goals. In this paper, the main goals of data routing approaches in sensor networks are described. Then, the best known and most recent data routing approaches in WSNs are classified and studied according to their specific goals. PMID:23443040
Context-based user grouping for multi-casting in heterogeneous radio networks
NASA Astrophysics Data System (ADS)
Mannweiler, C.; Klein, A.; Schneider, J.; Schotten, H. D.
2011-08-01
Along with the rise of sophisticated smartphones and smart spaces, the availability of both static and dynamic context information has steadily been increasing in recent years. Due to the popularity of social networks, these data are complemented by profile information about individual users. Making use of this information by classifying users in wireless networks enables targeted content and advertisement delivery as well as optimizing network resources, in particular bandwidth utilization, by facilitating group-based multi-casting. In this paper, we present the design and implementation of a web service for advanced user classification based on user, network, and environmental context information. The service employs simple and advanced clustering algorithms for forming classes of users. Available service functionalities include group formation, context-aware adaptation, and deletion as well as the exposure of group characteristics. Moreover, the results of a performance evaluation, where the service has been integrated in a simulator modeling user behavior in heterogeneous wireless systems, are presented.
Son, Seungsik; Jeong, Jongpil
2014-01-01
In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.
Multiplex Networks of Cortical and Hippocampal Neurons Revealed at Different Timescales
Timme, Nicholas; Ito, Shinya; Myroshnychenko, Maxym; Yeh, Fang-Chin; Hiolski, Emma; Hottowy, Pawel; Beggs, John M.
2014-01-01
Recent studies have emphasized the importance of multiplex networks – interdependent networks with shared nodes and different types of connections – in systems primarily outside of neuroscience. Though the multiplex properties of networks are frequently not considered, most networks are actually multiplex networks and the multiplex specific features of networks can greatly affect network behavior (e.g. fault tolerance). Thus, the study of networks of neurons could potentially be greatly enhanced using a multiplex perspective. Given the wide range of temporally dependent rhythms and phenomena present in neural systems, we chose to examine multiplex networks of individual neurons with time scale dependent connections. To study these networks, we used transfer entropy – an information theoretic quantity that can be used to measure linear and nonlinear interactions – to systematically measure the connectivity between individual neurons at different time scales in cortical and hippocampal slice cultures. We recorded the spiking activity of almost 12,000 neurons across 60 tissue samples using a 512-electrode array with 60 micrometer inter-electrode spacing and 50 microsecond temporal resolution. To the best of our knowledge, this preparation and recording method represents a superior combination of number of recorded neurons and temporal and spatial recording resolutions to any currently available in vivo system. We found that highly connected neurons (“hubs”) were localized to certain time scales, which, we hypothesize, increases the fault tolerance of the network. Conversely, a large proportion of non-hub neurons were not localized to certain time scales. In addition, we found that long and short time scale connectivity was uncorrelated. Finally, we found that long time scale networks were significantly less modular and more disassortative than short time scale networks in both tissue types. As far as we are aware, this analysis represents the first systematic study of temporally dependent multiplex networks among individual neurons. PMID:25536059
Integrated coding-aware intra-ONU scheduling for passive optical networks with inter-ONU traffic
NASA Astrophysics Data System (ADS)
Li, Yan; Dai, Shifang; Wu, Weiwei
2016-12-01
Recently, with the soaring of traffic among optical network units (ONUs), network coding (NC) is becoming an appealing technique for improving the performance of passive optical networks (PONs) with such inter-ONU traffic. However, in the existed NC-based PONs, NC can only be implemented by buffering inter-ONU traffic at the optical line terminal (OLT) to wait for the establishment of coding condition, such passive uncertain waiting severely limits the effect of NC technique. In this paper, we will study integrated coding-aware intra-ONU scheduling in which the scheduling of inter-ONU traffic within each ONU will be undertaken by the OLT to actively facilitate the forming of coding inter-ONU traffic based on the global inter-ONU traffic distribution, and then the performance of PONs with inter-ONU traffic can be significantly improved. We firstly design two report message patterns and an inter-ONU traffic transmission framework as the basis for the integrated coding-aware intra-ONU scheduling. Three specific scheduling strategies are then proposed for adapting diverse global inter-ONU traffic distributions. The effectiveness of the work is finally evaluated by both theoretical analysis and simulations.
Disability Awareness and Action Working Group (DAAWG) Event with
2017-10-12
Dr. Temple Grandin addresses employees as the keynote speaker at Kennedy Space Center's annual National Disability Employment Awareness Month (NDEAM) event. A prominent author and speaker on animal behavior and autism, she is a professor of animal science at Colorado State University in Fort Collins, Colorado. Kennedy's Disability Awareness and Action Working Group partnered with the Kennedy Networking Opportunities for Women group to sponsor the presentation.
The Use of Social Networking Websites as a Recruiting Tool for Employers
ERIC Educational Resources Information Center
Vicknair, Jamie; Elkersh, Dalia; Yancey, Katie; Budden, Michael C.
2010-01-01
The use of online social networking is a commonplace occurrence. A recent trend is for employers and recruiters to utilize social networking sites to screen candidates as part of the hiring process. This study examines student attitudes and awareness of these practices.
A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.
Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud
2016-09-01
Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree-Based', 'Cross-Layer', 'Opportunistic', and 'Medium Access Control'. We, then, provide a full description of the statistical analysis of each category in relation to all papers, current hybrid protocols, and the type of simulators used in each paper. Next, we analyze the distribution of papers in each category during various years. Moreover, for each category, the advantages and disadvantages as well as the number of issued papers in different years are given. We also analyze the type of layer and deployment of mathematical models or algorithmic techniques in each category. Finally, after introducing certain important protocols for each category, the goals, advantages, and disadvantages of the protocols are discussed and compared with each other.
Conflict-Aware Scheduling Algorithm
NASA Technical Reports Server (NTRS)
Wang, Yeou-Fang; Borden, Chester
2006-01-01
conflict-aware scheduling algorithm is being developed to help automate the allocation of NASA s Deep Space Network (DSN) antennas and equipment that are used to communicate with interplanetary scientific spacecraft. The current approach for scheduling DSN ground resources seeks to provide an equitable distribution of tracking services among the multiple scientific missions and is very labor intensive. Due to the large (and increasing) number of mission requests for DSN services, combined with technical and geometric constraints, the DSN is highly oversubscribed. To help automate the process, and reduce the DSN and spaceflight project labor effort required for initiating, maintaining, and negotiating schedules, a new scheduling algorithm is being developed. The scheduling algorithm generates a "conflict-aware" schedule, where all requests are scheduled based on a dynamic priority scheme. The conflict-aware scheduling algorithm allocates all requests for DSN tracking services while identifying and maintaining the conflicts to facilitate collaboration and negotiation between spaceflight missions. These contrast with traditional "conflict-free" scheduling algorithms that assign tracks that are not in conflict and mark the remainder as unscheduled. In the case where full schedule automation is desired (based on mission/event priorities, fairness, allocation rules, geometric constraints, and ground system capabilities/ constraints), a conflict-free schedule can easily be created from the conflict-aware schedule by removing lower priority items that are in conflict.
NASA Astrophysics Data System (ADS)
Banerjee, Sourav; Liu, Lie; Liu, S. T.; Yuan, Fuh-Gwo; Beard, Shawn
2011-04-01
Materials State Awareness (MSA) goes beyond traditional NDE and SHM in its challenge to characterize the current state of material damage before the onset of macro-damage such as cracks. A highly reliable, minimally invasive system for MSA of Aerospace Structures, Naval structures as well as next generation space systems is critically needed. Development of such a system will require a reliable SHM system that can detect the onset of damage well before the flaw grows to a critical size. Therefore, it is important to develop an integrated SHM system that not only detects macroscale damages in the structures but also provides an early indication of flaw precursors and microdamages. The early warning for flaw precursors and their evolution provided by an SHM system can then be used to define remedial strategies before the structural damage leads to failure, and significantly improve the safety and reliability of the structures. Thus, in this article a preliminary concept of developing the Hybrid Distributed Sensor Network Integrated with Self-learning Symbiotic Diagnostic Algorithms and Models to accurately and reliably detect the precursors to damages that occur to the structure are discussed. Experiments conducted in a laboratory environment shows potential of the proposed technique.
Intelligent On-Board Processing in the Sensor Web
NASA Astrophysics Data System (ADS)
Tanner, S.
2005-12-01
Most existing sensing systems are designed as passive, independent observers. They are rarely aware of the phenomena they observe, and are even less likely to be aware of what other sensors are observing within the same environment. Increasingly, intelligent processing of sensor data is taking place in real-time, using computing resources on-board the sensor or the platform itself. One can imagine a sensor network consisting of intelligent and autonomous space-borne, airborne, and ground-based sensors. These sensors will act independently of one another, yet each will be capable of both publishing and receiving sensor information, observations, and alerts among other sensors in the network. Furthermore, these sensors will be capable of acting upon this information, perhaps altering acquisition properties of their instruments, changing the location of their platform, or updating processing strategies for their own observations to provide responsive information or additional alerts. Such autonomous and intelligent sensor networking capabilities provide significant benefits for collections of heterogeneous sensors within any environment. They are crucial for multi-sensor observations and surveillance, where real-time communication with external components and users may be inhibited, and the environment may be hostile. In all environments, mission automation and communication capabilities among disparate sensors will enable quicker response to interesting, rare, or unexpected events. Additionally, an intelligent network of heterogeneous sensors provides the advantage that all of the sensors can benefit from the unique capabilities of each sensor in the network. The University of Alabama in Huntsville (UAH) is developing a unique approach to data processing, integration and mining through the use of the Adaptive On-Board Data Processing (AODP) framework. AODP is a key foundation technology for autonomous internetworking capabilities to support situational awareness by sensors and their on-board processes. The two primary research areas for this project are (1) the on-board processing and communications framework itself, and (2) data mining algorithms targeted to the needs and constraints of the on-board environment. The team is leveraging its experience in on-board processing, data mining, custom data processing, and sensor network design. Several unique UAH-developed technologies are employed in the AODP project, including EVE, an EnVironmEnt for on-board processing, and the data mining tools included in the Algorithm Development and Mining (ADaM) toolkit.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
The Impact of Public Health Awareness Campaigns on the Awareness and Quality of Palliative Care
2017-01-01
Abstract Objective: The right to health includes a right of access to good quality palliative care, but inequalities persist. Raising awareness is a key plank of the public health approach to palliative care, but involves consideration of subjects most of us prefer not to address. This review addresses the question: “do public health awareness campaigns effectively improve the awareness and quality of palliative care”? Background: The evidence shows that public awareness campaigns can improve awareness of palliative care and probably improve quality of care, but there is a lack of evidence about the latter. Methods: Rapid review and synthesis. Results: A comprehensive public awareness campaign about palliative care (including advance care planning and end-of-life decision making) should be based on clear and shared terminology, use well piloted materials, and the full range of mass media to suit different ages, cultures, and religious/spiritual perspectives. Arts and humanities have a role to play in allowing individuals and communities to express experiences of illness, death, and grief and encourage conversation and thoughtful reflection. There is evidence about key factors for success: targeting, networking, and use of specific, measurable, achievable, realistic time-bound objectives; continuous evaluation; and complementarity to national and international policy. Discussion: Campaigns should be located within the framework of public health promotion and the synergy between short national mass media campaigns and longer term local community action initiatives carefully considered. National and local projects to raise awareness should identify and address any barriers at the level of individuals, communities, and systems of care, for example, literacy skills and unequal access to resources. PMID:29283867
Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness
Vollmer, Todd; Manic, Milos; Linda, Ondrej
2013-06-01
The proliferation of digital devices in a networked industrial ecosystem, along with an exponential growth in complexity and scope, has resulted in elevated security concerns and management complexity issues. This paper describes a novel architecture utilizing concepts of Autonomic computing and a SOAP based IF-MAP external communication layer to create a network security sensor. This approach simplifies integration of legacy software and supports a secure, scalable, self-managed framework. The contribution of this paper is two-fold: 1) A flexible two level communication layer based on Autonomic computing and Service Oriented Architecture is detailed and 2) Three complementary modules that dynamically reconfiguremore » in response to a changing environment are presented. One module utilizes clustering and fuzzy logic to monitor traffic for abnormal behavior. Another module passively monitors network traffic and deploys deceptive virtual network hosts. These components of the sensor system were implemented in C++ and PERL and utilize a common internal D-Bus communication mechanism. A proof of concept prototype was deployed on a mixed-use test network showing the possible real world applicability. In testing, 45 of the 46 network attached devices were recognized and 10 of the 12 emulated devices were created with specific Operating System and port configurations. Additionally the anomaly detection algorithm achieved a 99.9% recognition rate. All output from the modules were correctly distributed using the common communication structure.« less
QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.
Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem
2013-01-01
Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.
Failure prediction using machine learning and time series in optical network.
Wang, Zhilong; Zhang, Min; Wang, Danshi; Song, Chuang; Liu, Min; Li, Jin; Lou, Liqi; Liu, Zhuo
2017-08-07
In this paper, we propose a performance monitoring and failure prediction method in optical networks based on machine learning. The primary algorithms of this method are the support vector machine (SVM) and double exponential smoothing (DES). With a focus on risk-aware models in optical networks, the proposed protection plan primarily investigates how to predict the risk of an equipment failure. To the best of our knowledge, this important problem has not yet been fully considered. Experimental results showed that the average prediction accuracy of our method was 95% when predicting the optical equipment failure state. This finding means that our method can forecast an equipment failure risk with high accuracy. Therefore, our proposed DES-SVM method can effectively improve traditional risk-aware models to protect services from possible failures and enhance the optical network stability.
2015-03-27
i.e., temporarily focusing on one object instead of wide area survey) or SOI collection on high interest objects (e.g., unidentified objects ...The Air Force Institute of Technology has spent the last seven years conducting research on orbit identification and object characterization of space... objects through the use of commercial-off-the-shelf hardware systems controlled via custom software routines, referred to simply as TeleTrak. Year
2008-03-01
operator, can be operated autonomously or remotely, can be expendable or recoverable, and can carry a lethal or nonlethal payload. Ballistic or semi ...states that vehicles should be recoverable, and that ballistic or semi - ballistic vehicles, cruise missiles, and artillery projectiles are not considered...2007-2032. 32 Nicola Tesla and his telautomatons (robots); Tesla further demonstrated remote control of objects by wireless in an exhibition in 1898
A Next Generation Repository for Sharing Sensitive Network and Security Data
2018-01-01
submission, and 5 yearly IRB reviews d. Provided legal support for MOA data provider and host agreements and amendments e. Feedback and bug reporting...intrusion detection methods and systems , b) event- reconstruction and evidence-based insights into global trends (e.g., DDoS attacks and malware...propagation), and c) situational awareness (e.g., outage detection). We have leveraged IMPACT’s policy and legal framework to minimize any risks associated
Cyber-Physical Multi-Core Optimization for Resource and Cache Effects (C2ORES)
2014-03-01
DoD-sponsored ATAACK mobile cloud testbed funded through the DURIP program, which is deployed at Virginia Tech and Vanderbilt University to conduct...0.9.2. Jug was configured to use a filesystem (network file system (nfs)) backend for locking and task synchronization. 4.1.7.2 Experiment 1...and performance-aware virtual machine placement technique that is realized as cloud infrastructure middleware. The key contributions of iPlace include
Sustainability for the Americas: Building the American Network of Sustainability Consortia
ERIC Educational Resources Information Center
Motloch, John; Pacheco, Pedro; Vann, John
2007-01-01
Purpose: To build awareness of an emergent global network of sustainability consortia, the network's Sustainability for the Americas (SFTA) regional cluster, its pilot US-Brazil Sustainability Consortium (USBSC), its subsequent North American Sustainability, Housing and Community Consortium (NASHCC), the process through which these consortia are…
ERIC Educational Resources Information Center
EnviroTeach, 1992
1992-01-01
Introduces networking projects for studying rivers and water quality. Describes two projects in South Africa (Project W.A.T.E.R and SWAP) associated with the international network, Global Rivers Environmental Education Network. Discusses water test kits and educational material developed through Project W.A.T.E.R. (Water Awareness through…
Chatwin, John; Povey, Andrew; Kennedy, Anne; Frank, Tim; Firth, Adam; Booton, Richard; Barber, Phil; Sanders, Caroline
2014-10-07
Whilst there has been no clear consensus on the potential for earlier diagnosis of lung cancer, recent research has suggested that the time between symptom onset and consultation can be long enough to plausibly affect prognosis. In this article, we present findings from a qualitative study involving in-depth interviews with patients who had been diagnosed with lung cancer (n = 11), and people who were at heightened risk of developing the disease (n = 14). A grounded theory methodology was drawn upon to conduct thematic and narrative based approaches to analysis. The paper focuses on three main themes which emerged from the study: i) fatalism and resignation in pathways to help-seeking and the process of diagnosis; ii) Awareness of smoking risk and response to cessation information and advice. iii) The role of social and other networks on help-seeking. Key findings included: poor awareness among participants of the symptoms of lung cancer; ambivalence about the dangers of smoking; the perception of lung cancer as part of a homogenisation of multiple illnesses; close social networks as a key trigger in help-seeking. We suggest that future smoking cessation and lung cancer awareness campaigns could usefully capitalise on the influence of close social networks, and would benefit from taking a 'softer' approach.
Riesch, Susan K; Ngui, Emmanuel M; Ehlert, Carey; Miller, M Katie; Cronk, Christine A; Leuthner, Steven; Strehlow, Mary; Hewitt, Jeanne B; Durkin, Maureen S
2013-05-01
The purpose of this methods article was to describe and evaluate outreach and engagement strategies designed to initially build county-wide awareness and support for the National Children's Study (NCS or the study) and subsequently to target the segment communities where recruitment for the study occurred. Selected principles from community outreach, social marketing, and health care system and personal referral formed the foundation for the strategies. The strategies included a celebration event, community advisory board, community needs assessment, building relationships with health care providers and systems, eliciting a network of study supporters, newsletters, appearances at local young family-oriented events (health fairs, parades), presentations to local community leaders, community forums, "branding" with assistance from a women-owned local marketing firm, and mailings including an oversized, second-touch postcard. Six months after study launch, approximately 4,600 study-eligible women were asked in a door-to-door survey if and how they became aware of the study. On average, 40% of eligible women reported being aware of the study. The most frequently cited strategy to cultivate their awareness was study-specific mailings. Awareness of the NCS increased by 7.5% among those receiving a second-touch postcard relative to controls (95% CIs [4.9, 10.7] z = 5.347, p < 0.0000, d = 0.16). Community outreach and engagement strategies, in particular the oversized postcard as a second-touch effort, may be used effectively by researchers for participant recruitment and by public health nurses for delivery of important population-focused messages. © 2013 Wiley Periodicals, Inc.
Riesch, Susan K.; Ngui, Emmanuel; Ehlert, Carey; Miller, M. Katie; Cronk, Christine A.; Leuthner, Steven; Strehlow, Mary; Hewitt, Jeanne; Durkin, Maureen S.
2014-01-01
The purpose of this methods paper is to describe and evaluate outreach and engagement strategies designed to initially build county-wide awareness and support for the National Children’s Study (NCS or the study) and subsequently to target the segment communities where recruitment for the study occurred. Selected principles from community outreach, social marketing, and healthcare system and personal referral formed the foundation for the strategies. The strategies included a celebration event, community advisory board, community needs assessment, building relationships with healthcare providers and systems, eliciting a network of study supporters, newsletters, appearances at local young family-oriented events (health fairs, parades), presentations to local community leaders, community forums, “branding” with assistance from a women-owned local marketing firm, and mailings including an oversized, second-touch postcard. Six months after study launch, approximately 4600 study-eligible women were asked in a door-to-door survey if and how they became aware of the study. On average, 40% of eligible women reported being aware of the study. The most frequently cited strategy to cultivate their awareness was study-specific mailings. Awareness of the NCS increased by 7.5% among those receiving a second-touch postcard relative to controls 95% CIs [4.9, 10.7] z = 5.347, p < 0.0000, d = 0.16. Community outreach and engagement strategies, in particular the oversized postcard as a second-touch effort, may be used effectively by researchers for participant recruitment and by public health nurses for delivery of important population-focused messages. PMID:23586770
Use of CD-ROM MEDLINE by medical students of the College of Medicine, University of Lagos, Nigeria.
Ogunyade, Taiwo O; Oyibo, Wellington A
2003-01-01
Use of information technology in information acquisition, especially MEDLINE on CD-ROM and online, has been evaluated in several localities and regions, especially in the advanced countries. Use of MEDLINE on CD-ROM is still very poor among the medical students of the University of Lagos, Lagos, Nigeria, due to lack of awareness, insufficient personal computers, nonperiodic training, and the high cost of using the facility. Due to financial constraints, MEDLINE online and sufficiently-networked computer systems are not available. To report on the situation in Nigeria, a developing country, so as to compare the current awareness of searching MEDLINE on CD-ROM among the medical students at the University of Lagos with the awareness of their overseas' counterparts. This is the first step toward setting up an online PubMed search as well as expanding the computer systems and network. Essentially based on cross-sectional proportional sampling using structured questionnaires, in-depth interviews, and focus-group discussions among the medical students and library staff. The study involved the medical students in their second year to sixth (final) year of study. Of the 250 students interviewed, 130 (52%) were aware of MEDLINE on CD-ROM searches as a means of information retrieval. Only 60 (24%) had used MEDLINE on CD-ROM-2% had used MEDLINE on CD-ROM more than 9 times; 4%, 7 to 9 times; 8%, 4 to 6 times; and 10%, 1 to 3 times. Of the students who used MEDLINE on CD-ROM search, 22% used it in preparing for examinations, 24% in research, 6% in patient care, and 26% in preparation of assignments and clinical cases. Lack of awareness (52%) and cost of undertaking MEDLINE on CD-ROM search (46%) were identified as important factors that discouraged the use of MEDLINE on CD-ROM. Though the above factors were recognized as important, it was concluded that the reasons for the poor use of MEDLINE on CD-ROM are multifactorial. Poor use of MEDLINE on CD-ROM could be attributed to these critical underlying factors: nonavailability of networked personal computers, which should be connected to a central server; lack of mandatory assignments to the medical students that would specifically require use of MEDLINE on CD-ROM; financial constraints on the university management; and infrequent periodic orientation on use of MEDLINE on CD-ROM. It was therefore suggested that the number of personal computers should be increased and that the library staff should periodically train the preclinical and clinical medical students in searching MEDLINE on CD-ROM. These steps would enable the medical students to benefit from online PubMed searching when it becomes fully operational in the future.
Hidden Connectivity in Networks with Vulnerable Classes of Nodes
NASA Astrophysics Data System (ADS)
Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko
2016-10-01
In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.
NASA Astrophysics Data System (ADS)
Mohr, Ulrich
2001-11-01
For efficient business continuance and backup of mission- critical data an inter-site storage network is required. Where traditional telecommunications costs are prohibitive for all but the largest organizations, there is an opportunity for regional carries to deliver an innovative storage service. This session reveals how a combination of optical networking and protocol-aware SAN gateways can provide an extended storage networking platform with the lowest cost of ownership and the highest possible degree of reliability, security and availability. Companies of every size, with mainframe and open-systems environments, can afford to use this integrated service. Three mayor applications are explained; channel extension, Network Attached Storage (NAS), Storage Area Networks (SAN) and how optical networks address the specific requirements. One advantage of DWDM is the ability for protocols such as ESCON, Fibre Channel, ATM and Gigabit Ethernet, to be transported natively and simultaneously across a single fiber pair, and the ability to multiplex many individual fiber pairs over a single pair, thereby reducing fiber cost and recovering fiber pairs already in use. An optical storage network enables a new class of service providers, Storage Service Providers (SSP) aiming to deliver value to the enterprise by managing storage, backup, replication and restoration as an outsourced service.
Learning Agents for Autonomous Space Asset Management (LAASAM)
NASA Astrophysics Data System (ADS)
Scally, L.; Bonato, M.; Crowder, J.
2011-09-01
Current and future space systems will continue to grow in complexity and capabilities, creating a formidable challenge to monitor, maintain, and utilize these systems and manage their growing network of space and related ground-based assets. Integrated System Health Management (ISHM), and in particular, Condition-Based System Health Management (CBHM), is the ability to manage and maintain a system using dynamic real-time data to prioritize, optimize, maintain, and allocate resources. CBHM entails the maintenance of systems and equipment based on an assessment of current and projected conditions (situational and health related conditions). A complete, modern CBHM system comprises a number of functional capabilities: sensing and data acquisition; signal processing; conditioning and health assessment; diagnostics and prognostics; and decision reasoning. In addition, an intelligent Human System Interface (HSI) is required to provide the user/analyst with relevant context-sensitive information, the system condition, and its effect on overall situational awareness of space (and related) assets. Colorado Engineering, Inc. (CEI) and Raytheon are investigating and designing an Intelligent Information Agent Architecture that will provide a complete range of CBHM and HSI functionality from data collection through recommendations for specific actions. The research leverages CEI’s expertise with provisioning management network architectures and Raytheon’s extensive experience with learning agents to define a system to autonomously manage a complex network of current and future space-based assets to optimize their utilization.
Navigation Architecture for a Space Mobile Network
NASA Technical Reports Server (NTRS)
Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell
2016-01-01
The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.
Energy-aware scheduling of surveillance in wireless multimedia sensor networks.
Wang, Xue; Wang, Sheng; Ma, Junjie; Sun, Xinyao
2010-01-01
Wireless sensor networks involve a large number of sensor nodes with limited energy supply, which impacts the behavior of their application. In wireless multimedia sensor networks, sensor nodes are equipped with audio and visual information collection modules. Multimedia contents are ubiquitously retrieved in surveillance applications. To solve the energy problems during target surveillance with wireless multimedia sensor networks, an energy-aware sensor scheduling method is proposed in this paper. Sensor nodes which acquire acoustic signals are deployed randomly in the sensing fields. Target localization is based on the signal energy feature provided by multiple sensor nodes, employing particle swarm optimization (PSO). During the target surveillance procedure, sensor nodes are adaptively grouped in a totally distributed manner. Specially, the target motion information is extracted by a forecasting algorithm, which is based on the hidden Markov model (HMM). The forecasting results are utilized to awaken sensor node in the vicinity of future target position. According to the two properties, signal energy feature and residual energy, the sensor nodes decide whether to participate in target detection separately with a fuzzy control approach. Meanwhile, the local routing scheme of data transmission towards the observer is discussed. Experimental results demonstrate the efficiency of energy-aware scheduling of surveillance in wireless multimedia sensor network, where significant energy saving is achieved by the sensor awakening approach and data transmission paths are calculated with low computational complexity.
Disability Awareness and Action Working Group (DAAWG) Event with
2017-10-12
Dr. Temple Grandin speaks with employees following Kennedy Space Center's annual National Disability Employment Awareness Month (NDEAM) event. Grandin served as keynote speaker. A prominent author and speaker on animal behavior and autism, she is a professor of animal science at Colorado State University in Fort Collins, Colorado. Kennedy's Disability Awareness and Action Working Group partnered with the Kennedy Networking Opportunities for Women group to sponsor the presentation.
Objectively Optimized Observation Direction System Providing Situational Awareness for a Sensor Web
NASA Astrophysics Data System (ADS)
Aulov, O.; Lary, D. J.
2010-12-01
There is great utility in having a flexible and automated objective observation direction system for the decadal survey missions and beyond. Such a system allows us to optimize the observations made by suite of sensors to address specific goals from long term monitoring to rapid response. We have developed such a prototype using a network of communicating software elements to control a heterogeneous network of sensor systems, which can have multiple modes and flexible viewing geometries. Our system makes sensor systems intelligent and situationally aware. Together they form a sensor web of multiple sensors working together and capable of automated target selection, i.e. the sensors “know” where they are, what they are able to observe, what targets and with what priorities they should observe. This system is implemented in three components. The first component is a Sensor Web simulator. The Sensor Web simulator describes the capabilities and locations of each sensor as a function of time, whether they are orbital, sub-orbital, or ground based. The simulator has been implemented using AGIs Satellite Tool Kit (STK). STK makes it easy to analyze and visualize optimal solutions for complex space scenarios, and perform complex analysis of land, sea, air, space assets, and shares results in one integrated solution. The second component is target scheduler that was implemented with STK Scheduler. STK Scheduler is powered by a scheduling engine that finds better solutions in a shorter amount of time than traditional heuristic algorithms. The global search algorithm within this engine is based on neural network technology that is capable of finding solutions to larger and more complex problems and maximizing the value of limited resources. The third component is a modeling and data assimilation system. It provides situational awareness by supplying the time evolution of uncertainty and information content metrics that are used to tell us what we need to observe and the priority we should give to the observations. A prototype of this component was implemented with AutoChem. AutoChem is NASA release software constituting an automatic code generation, symbolic differentiator, analysis, documentation, and web site creation tool for atmospheric chemical modeling and data assimilation. Its model is explicit and uses an adaptive time-step, error monitoring time integration scheme for stiff systems of equations. AutoChem was the first model to ever have the facility to perform 4D-Var data assimilation and Kalman filter. The project developed a control system with three main accomplishments. First, fully multivariate observational and theoretical information with associated uncertainties was combined using a full Kalman filter data assimilation system. Second, an optimal distribution of the computations and of data queries was achieved by utilizing high performance computers/load balancing and a set of automatically mirrored databases. Third, inter-instrument bias correction was performed using machine learning. The PI for this project was Dr. David Lary of the UMBC Joint Center for Earth Systems Technology at NASA/Goddard Space Flight Center.
Hall, Taryn O; Renz, Anne D; Snapinn, Katherine W; Bowen, Deborah J; Edwards, Karen L
2012-07-01
To determine if awareness of, interest in, and use of direct-to-consumer (DTC) genetic testing is greater in a sample of high-risk individuals (cancer cases and their relatives), compared to controls. Participants were recruited from the Northwest Cancer Genetics Network. A follow-up survey was mailed to participants to assess DTC genetic testing awareness, interest, and use. One thousand two hundred sixty-seven participants responded to the survey. Forty-nine percent of respondents were aware of DTC genetic testing. Of those aware, 19% indicated interest in obtaining and <1% reported having used DTC genetic testing. Additional information supplied by respondents who reported use of DTC genetic tests indicated that 55% of these respondents likely engaged in clinical genetic testing, rather than DTC genetic testing. Awareness of DTC genetic testing was greater in our sample of high-risk individuals than in controls and population-based studies. Although interest in and use of these tests among cases in our sample were equivalent to other population-based studies, interest in testing was higher among relatives and people who self-referred for a registry focused on cancer than among cases and controls. Additionally, our results suggest that there may be some confusion about what constitutes DTC genetic testing.
Unseen fearful faces promote amygdala guidance of attention.
Troiani, Vanessa; Price, Elinora T; Schultz, Robert T
2014-02-01
Little is known about the network of brain regions activated prior to explicit awareness of emotionally salient social stimuli. We investigated this in a functional magnetic resonance imaging study using a technique that combined elements of binocular rivalry and motion flash suppression in order to prevent awareness of fearful faces and houses. We found increased left amygdala and fusiform gyrus activation for fearful faces compared to houses, despite suppression from awareness. Psychophysiological interaction analyses showed that amygdala activation was associated with task-specific (fearful faces greater than houses) modulation of an attention network, including bilateral pulvinar, bilateral insula, left frontal eye fields, left intraparietal sulcus and early visual cortex. Furthermore, we report an unexpected main effect of increased left parietal cortex activation associated with suppressed fearful faces compared to suppressed houses. This parietal finding is the first report of increased dorsal stream activation for a social object despite suppression, which suggests that information can reach parietal cortex for a class of emotionally salient social objects, even in the absence of awareness.
Skeleton-Based Human Action Recognition With Global Context-Aware Attention LSTM Networks
NASA Astrophysics Data System (ADS)
Liu, Jun; Wang, Gang; Duan, Ling-Yu; Abdiyeva, Kamila; Kot, Alex C.
2018-04-01
Human action recognition in 3D skeleton sequences has attracted a lot of research attention. Recently, Long Short-Term Memory (LSTM) networks have shown promising performance in this task due to their strengths in modeling the dependencies and dynamics in sequential data. As not all skeletal joints are informative for action recognition, and the irrelevant joints often bring noise which can degrade the performance, we need to pay more attention to the informative ones. However, the original LSTM network does not have explicit attention ability. In this paper, we propose a new class of LSTM network, Global Context-Aware Attention LSTM (GCA-LSTM), for skeleton based action recognition. This network is capable of selectively focusing on the informative joints in each frame of each skeleton sequence by using a global context memory cell. To further improve the attention capability of our network, we also introduce a recurrent attention mechanism, with which the attention performance of the network can be enhanced progressively. Moreover, we propose a stepwise training scheme in order to train our network effectively. Our approach achieves state-of-the-art performance on five challenging benchmark datasets for skeleton based action recognition.
Boarding Team Networking on the Move: Applying Unattended Relay Nodes
2014-09-01
below the main deck via a wireless ad-hoc network will enhance the situational awareness. Regarding the boarding of a non-compliant vessel, tracking...reaction time. 14. SUBJECT TERMS Maritime Interdiction Operations, Boarding Team Networking , Unattended Relay Nodes, Wireless Mesh Networks Onboard...the steel structures of naval vessels obstruct signals to propagate below the main deck. Extending the network below the main deck via a wireless ad
Rhetoric vs. reality: employer views on consumer-driven health care.
Trude, Sally; Conwell, Leslie
2004-07-01
Because of rising premiums, employers are investigating new health insurance approaches that maintain workers' broad choice of providers while raising awareness of health care costs through increased patient financial responsibility. Employers' knowledge of new health plan products, including consumer-driven health plans and tiered-provider networks, has grown considerably in recent years, according to findings from the Center for Studying Health System Change's (HSC) 2002-03 site visit to 12 nationally representative communities. But employers are concerned that consumer-driven health plans would take considerable effort to implement without much cost savings. They also are skeptical that tiered-provider networks can adequately capture both cost and quality information in a way that is understandable to patients.
Dellal, George; Peterson, Laura E; Provost, Lloyd; Gloor, Peter A; Fore, David Livingstone; Margolis, Peter A
2018-01-01
Background Our health care system fails to deliver necessary results, and incremental system improvements will not deliver needed change. Learning health systems (LHSs) are seen as a means to accelerate outcomes, improve care delivery, and further clinical research; yet, few such systems exist. We describe the process of codesigning, with all relevant stakeholders, an approach for creating a collaborative chronic care network (C3N), a peer-produced networked LHS. Objective The objective of this study was to report the methods used, with a diverse group of stakeholders, to translate the idea of a C3N to a set of actionable next steps. Methods The setting was ImproveCareNow, an improvement network for pediatric inflammatory bowel disease. In collaboration with patients and families, clinicians, researchers, social scientists, technologists, and designers, C3N leaders used a modified idealized design process to develop a design for a C3N. Results Over 100 people participated in the design process that resulted in (1) an overall concept design for the ImproveCareNow C3N, (2) a logic model for bringing about this system, and (3) 13 potential innovations likely to increase awareness and agency, make it easier to collect and share information, and to enhance collaboration that could be tested collectively to bring about the C3N. Conclusions We demonstrate methods that resulted in a design that has the potential to transform the chronic care system into an LHS. PMID:29472173
NASA Astrophysics Data System (ADS)
Rababaah, Haroun; Shirkhodaie, Amir
2009-04-01
The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.
Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A
2015-09-01
This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.
Community Size Effects on Epidemic Spreading in Multiplex Social Networks.
Liu, Ting; Li, Ping; Chen, Yan; Zhang, Jie
2016-01-01
The dynamical process of epidemic spreading has drawn much attention of the complex network community. In the network paradigm, diseases spread from one person to another through the social ties amongst the population. There are a variety of factors that govern the processes of disease spreading on the networks. A common but not negligible factor is people's reaction to the outbreak of epidemics. Such reaction can be related information dissemination or self-protection. In this work, we explore the interactions between disease spreading and population response in terms of information diffusion and individuals' alertness. We model the system by mapping multiplex networks into two-layer networks and incorporating individuals' risk awareness, on the assumption that their response to the disease spreading depends on the size of the community they belong to. By comparing the final incidence of diseases in multiplex networks, we find that there is considerable mitigation of diseases spreading for full phase of spreading speed when individuals' protection responses are introduced. Interestingly, the degree of community overlap between the two layers is found to be critical factor that affects the final incidence. We also analyze the consequences of the epidemic incidence in communities with different sizes and the impacts of community overlap between two layers. Specifically, as the diseases information makes individuals alert and take measures to prevent the diseases, the effective protection is more striking in small community. These phenomena can be explained by the multiplexity of the networked system and the competition between two spreading processes.
Community Size Effects on Epidemic Spreading in Multiplex Social Networks
Liu, Ting; Li, Ping; Chen, Yan; Zhang, Jie
2016-01-01
The dynamical process of epidemic spreading has drawn much attention of the complex network community. In the network paradigm, diseases spread from one person to another through the social ties amongst the population. There are a variety of factors that govern the processes of disease spreading on the networks. A common but not negligible factor is people’s reaction to the outbreak of epidemics. Such reaction can be related information dissemination or self-protection. In this work, we explore the interactions between disease spreading and population response in terms of information diffusion and individuals’ alertness. We model the system by mapping multiplex networks into two-layer networks and incorporating individuals’ risk awareness, on the assumption that their response to the disease spreading depends on the size of the community they belong to. By comparing the final incidence of diseases in multiplex networks, we find that there is considerable mitigation of diseases spreading for full phase of spreading speed when individuals’ protection responses are introduced. Interestingly, the degree of community overlap between the two layers is found to be critical factor that affects the final incidence. We also analyze the consequences of the epidemic incidence in communities with different sizes and the impacts of community overlap between two layers. Specifically, as the diseases information makes individuals alert and take measures to prevent the diseases, the effective protection is more striking in small community. These phenomena can be explained by the multiplexity of the networked system and the competition between two spreading processes. PMID:27007112
Cha, Seong-Soo; Seo, Bo-Kyung
2018-01-01
This study aimed to examine smartphone use patterns, smartphone addiction characteristics, and the predictive factors of the smartphone addiction in middle school students in South Korea. According to the Smartphone Addiction Proneness Scale scores, 563 (30.9%) were classified as a risk group for smartphone addiction and 1261 (69.1%) were identified as a normal user group. The adolescents used mobile messengers for the longest, followed by Internet surfing, gaming, and social networking service use. The two groups showed significant differences in smartphone use duration, awareness of game overuse, and purposes of playing games. The predictive factors of smartphone addiction were daily smartphone and social networking service use duration, and the awareness of game overuse.
Cha, Seong-Soo; Seo, Bo-Kyung
2018-01-01
This study aimed to examine smartphone use patterns, smartphone addiction characteristics, and the predictive factors of the smartphone addiction in middle school students in South Korea. According to the Smartphone Addiction Proneness Scale scores, 563 (30.9%) were classified as a risk group for smartphone addiction and 1261 (69.1%) were identified as a normal user group. The adolescents used mobile messengers for the longest, followed by Internet surfing, gaming, and social networking service use. The two groups showed significant differences in smartphone use duration, awareness of game overuse, and purposes of playing games. The predictive factors of smartphone addiction were daily smartphone and social networking service use duration, and the awareness of game overuse. PMID:29435355
Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco
2015-02-05
One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.
A Vocabulary-Added Reading Intervention for English Learners At-Risk of Reading Difficulties
ERIC Educational Resources Information Center
Filippini, Alexis L.; Gerber, Michael M.; Leafstedt, Jill M.
2012-01-01
This study examined the added value of a vocabulary plus phonological awareness (vocab+) intervention against a phonological awareness (PA only) intervention only. The vocabulary intervention built networks among words through attention to morphological and semantic relationships. This supplementary classroom instruction augmented existing…
An Optimized Handover Scheme with Movement Trend Awareness for Body Sensor Networks
Sun, Wen; Zhang, Zhiqiang; Ji, Lianying; Wong, Wai-Choong
2013-01-01
When a body sensor network (BSN) that is linked to the backbone via a wireless network interface moves from one coverage zone to another, a handover is required to maintain network connectivity. This paper presents an optimized handover scheme with movement trend awareness for BSNs. The proposed scheme predicts the future position of a BSN user using the movement trend extracted from the historical position, and adjusts the handover decision accordingly. Handover initiation time is optimized when the unnecessary handover rate is estimated to meet the requirement and the outage probability is minimized. The proposed handover scheme is simulated in a BSN deployment area in a hospital environment in UK. Simulation results show that the proposed scheme reduces the outage probability by 22% as compared with the existing hysteresis-based handover scheme under the constraint of acceptable handover rate. PMID:23736852
"SWING": A European project for a new application of an ionospheric network
NASA Astrophysics Data System (ADS)
Zolesi, B.; Bianchi, C.; Meloni, A.; Baskaradas, J. A.; Belehaki, A.; Altadill, D.; Dalle Mese, E.
2016-05-01
The SWING (Short Wave critical Infrastructure Network based on a new Generation high survival radio communication system) is a European project aimed at studying a high survival high-frequency (HF) radio network to link European Critical Infrastructures (ECIs). This system is thought to replace broadband internet communication, maintaining the minimum flux of essential information for the ECIs management and control, in case of wide-scale threats, including terrorist attacks, able to put out of order internet links over the Mediterranean region. SWING is designed to evaluate the threat and increase the security awareness, as well as the level of protection, of analogous and/or interdependent ECIs. In order to meet these goals, SWING was finalized to recognize how and when the internet communication fails and to develop the standard software and hardware tools necessary for implementing communication protocols suited for a reliable and interoperable short-wave (SW) or high-frequency (HF) radio network backup. The internet broadband description and internet failure recognition were taken into consideration in the project but are not treated in this paper. It has been assessed that in case of complete failure of the internet broadband communication fundamental information for the management and control of ECIs over the Mediterranean region can be maintained with a HF network, even in case of moderate ionospheric perturbations.
Implementation of an Adaptive Controller System from Concept to Flight Test
NASA Technical Reports Server (NTRS)
Larson, Richard R.; Burken, John J.; Butler, Bradley S.
2009-01-01
The National Aeronautics and Space Administration Dryden Flight Research Center (Edwards, California) is conducting ongoing flight research using adaptive controller algorithms. A highly modified McDonnell-Douglas NF-15B airplane called the F-15 Intelligent Flight Control System (IFCS) was used for these algorithms. This airplane has been modified by the addition of canards and by changing the flight control systems to interface a single-string research controller processor for neural network algorithms. Research goals included demonstration of revolutionary control approaches that can efficiently optimize aircraft performance for both normal and failure conditions, and to advance neural-network-based flight control technology for new aerospace systems designs. Before the NF-15B IFCS airplane was certified for flight test, however, certain processes needed to be completed. This paper presents an overview of these processes, including a description of the initial adaptive controller concepts followed by a discussion of modeling formulation and performance testing. Upon design finalization, the next steps are: integration with the system interfaces, verification of the software, validation of the hardware to the requirements, design of failure detection, development of safety limiters to minimize the effect of erroneous neural network commands, and creation of flight test control room displays to maximize human situational awareness.
Performance Analysis of Sensor Systems for Space Situational Awareness
NASA Astrophysics Data System (ADS)
Choi, Eun-Jung; Cho, Sungki; Jo, Jung Hyun; Park, Jang-Hyun; Chung, Taejin; Park, Jaewoo; Jeon, Hocheol; Yun, Ami; Lee, Yonghui
2017-12-01
With increased human activity in space, the risk of re-entry and collision between space objects is constantly increasing. Hence, the need for space situational awareness (SSA) programs has been acknowledged by many experienced space agencies. Optical and radar sensors, which enable the surveillance and tracking of space objects, are the most important technical components of SSA systems. In particular, combinations of radar systems and optical sensor networks play an outstanding role in SSA programs. At present, Korea operates the optical wide field patrol network (OWL-Net), the only optical system for tracking space objects. However, due to their dependence on weather conditions and observation time, it is not reasonable to use optical systems alone for SSA initiatives, as they have limited operational availability. Therefore, the strategies for developing radar systems should be considered for an efficient SSA system using currently available technology. The purpose of this paper is to analyze the performance of a radar system in detecting and tracking space objects. With the radar system investigated, the minimum sensitivity is defined as detection of a 1-m2 radar cross section (RCS) at an altitude of 2,000 km, with operating frequencies in the L, S, C, X or Ku-band. The results of power budget analysis showed that the maximum detection range of 2,000 km, which includes the low earth orbit (LEO) environment, can be achieved with a transmission power of 900 kW, transmit and receive antenna gains of 40 dB and 43 dB, respectively, a pulse width of 2 ms, and a signal processing gain of 13.3 dB, at a frequency of 1.3 GHz. We defined the key parameters of the radar following a performance analysis of the system. This research can thus provide guidelines for the conceptual design of radar systems for national SSA initiatives.
Disability Awareness and Action Working Group (DAAWG) Event with
2017-10-12
Kennedy Space Center Director Bob Cabana addresses employees at the start of the annual National Disability Employment Awareness Month (NDEAM) event, which featured Dr. Temple Grandin as keynote speaker. A prominent author and speaker on animal behavior and autism, she is a professor of animal science at Colorado State University in Fort Collins, Colorado. Kennedy's Disability Awareness and Action Working Group partnered with the Kennedy Networking Opportunities for Women group to sponsor the presentation.
Dynamics analysis of epidemic and information spreading in overlay networks.
Liu, Guirong; Liu, Zhimei; Jin, Zhen
2018-05-07
We establish an SIS-UAU model to present the dynamics of epidemic and information spreading in overlay networks. The overlay network is represented by two layers: one where the dynamics of the epidemic evolves and another where the information spreads. We theoretically derive the explicit formulas for the basic reproduction number of awareness R 0 a by analyzing the self-consistent equation and the basic reproduction number of disease R 0 d by using the next generation matrix. The formula of R 0 d shows that the effect of awareness can reduce the basic reproduction number of disease. In particular, when awareness does not affect epidemic spreading, R 0 d is shown to match the existing theoretical results. Furthermore, we demonstrate that the disease-free equilibrium is globally asymptotically stable if R 0 d <1; and the endemic equilibrium is globally asymptotically stable if R 0 d >1. Finally, numerical simulations show that information plays a vital role in preventing and controlling disease and effectively reduces the final disease scale. Copyright © 2018 Elsevier Ltd. All rights reserved.
Cyber-physical networking for wireless mesh infrastructures
NASA Astrophysics Data System (ADS)
Mannweiler, C.; Lottermann, C.; Klein, A.; Schneider, J.; Schotten, H. D.
2012-09-01
This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.
The ‘prediction imperative’ as the basis for self-awareness
Llinás, Rodolfo R.; Roy, Sisir
2009-01-01
Here, we propose that global brain function is geared towards the implementation of intelligent motricity. Motricity is the only possible external manifestation of nervous system function (other than endocrine and exocrine secretion and the control of vascular tone). The intelligence component of motricity requires, for its successful wheeling, a prediction imperative to approximate the consequences of the impending motion. We address how such predictive function may originate from the dynamic properties of neuronal networks. PMID:19528011
SmartHome: a domotic framework based on smart sensing and actuator network to reduce energy wastes
NASA Astrophysics Data System (ADS)
Santamaria, Amilcare Francesco; De Rango, Floriano; Falbo, Domenico; Barletta, Domenico
2014-05-01
Domestic environment and human interaction with services supplied by domotic devices is going to be a very interesting application field. With a domotic system is possible to achieve great interaction between human beings, environments and smart devices. The enhancing of these interactions is the main goal of this work whose intent is to improve the classic concept of domotics. The framework we developed can be used for several application fields such as lighting, heating, conditioning or water management and energy consumption. In particular, the proposed system can optimize energy consumptions by rising awareness to users that have full control of their house and the possibility to save money and reduce the impact of the energetic consumes to the earth, matching the new "green" motto requirements. In this way, the overall system wants to match the central concept of Internet Of Things (IoT) as well. From this point of view a complex automation system with smart devices make possible a more efficient way to produce, follow and manage domotic policies. Following the spread of IoT, for this work we designed and implemented new plug-and-play and ready-to-use smart devices that are part of a complex automation system that offers a user-friendly web application and allows users to control and interact with different plans of their house in order to make life more comfortable and be aware of their energy consumptions. Control and awareness arc the two key points that led us to develop the proposed system.
Does conflict control occur without awareness? Evidence from an ERP study.
Wang, Baoxi; Xiang, Ling; Li, Juan
2013-01-15
The relationship between conflict control and awareness has attracted extensive interest. Although researchers have investigated the relationship between response conflict and awareness, it still remains unclear whether stimulus conflict can occur outside of awareness. In addition, previous studies on the role of awareness in conflict control have ignored the fact that conflict control includes both conflict detection and resolution. A modified version of the flanker task was used to manipulate stimulus and response conflicts under both masked and unmasked conditions. The masked condition elicited a sequence of distinct event-related potential components that were also observed in the unmasked condition. N2 amplitudes presented the following pattern: incongruent-eligible>incongruent-ineligible>congruent, they did not show any difference under the masked and unmasked conditions, suggesting that detection of stimulus-related conflict revealed by the comparison between incongruent-ineligible and congruent trials, and response-related conflict revealed by the comparison between incongruent-eligible and incongruent-ineligible trials can occur in the absence of awareness, and unconscious conflict detection might involve the same neural network employed for conscious conflict detection. Late positive component (LPC) amplitudes also presented as incongruent-eligible>incongruent-ineligible>congruent at CPz and Pz, irrespective of conscious awareness. However, LPC amplitudes under the masked condition were markedly reduced compared to unmasked trials. These LPC findings suggest that stimulus- and response-related conflict resolution can occur in the absence of awareness; furthermore, unconscious conflict resolution might involve a weaker cognitive control network compared to conscious conflict resolution. These findings have important implications for the theories concerning the relationship between cognitive control and awareness. Copyright © 2012 Elsevier B.V. All rights reserved.
Fostering E-Mail Security Awareness: The West Point Carronade
ERIC Educational Resources Information Center
Ferguson, Aaron J.
2005-01-01
The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…
Weiss, Jacob B; Lorenzi, Nancy M; Lorenzi, Nancy
2008-11-06
Despite the availability of community-based support services, cancer patients and survivors are not aware of many of these resources. Without access to community programs, cancer survivors are at risk for lower quality of care and lower quality of life. At the same time, non-profit community organizations lack access to advanced consumer informatics applications to effectively promote awareness of their services. In addition to the current models of print and online resource guides, new community-driven informatics approaches are needed to achieve the goal of comprehensive care for cancer survivors. We present the formulation of a novel model for synthesizing a local communitys collective wisdom of cancer-related resources through a combination of online social networking technologies and real-world collaborative partnerships. This approach can improve awareness of essential, but underutilized community resources.
Topic-Aware Physical Activity Propagation in a Health Social Network
Phan, Nhathai; Ebrahimi, Javid; Kil, Dave; Piniewski, Brigitte; Dou, Dejing
2016-01-01
Modeling physical activity propagation, such as physical exercise level and intensity, is the key to preventing the conduct that can lead to obesity; it can also help spread wellness behavior in a social network. PMID:27087794
Safe Active Scanning for Energy Delivery Systems Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Helms, J.; Salazar, B.; Scheibel, P.
The Department of Energy’s Cybersecurity for Energy Delivery Systems Program has funded Safe(r) Active Scanning for Energy Delivery Systems, led by Lawrence Livermore National Laboratory, to investigate and analyze the impacts of active scanning in the operational environment of energy delivery systems. In collaboration with Pacific Northwest National Laboratory and Idaho National Laboratory, active scans across three testbeds including 38 devices were performed. This report gives a summary of the initial literature survey performed on the SASEDS project as well as industry partner interview summaries and main findings from Phase 1 of the project. Additionally, the report goes into themore » details of scanning techniques, methodologies for testing, testbed descriptions, and scanning results, with appendices to elaborate on the specific scans that were performed. As a result of testing, a single device out of 38 exhibited problems when actively scanned, and a reboot was required to fix it. This single failure indicates that active scanning is not likely to have a detrimental effect on the safety and resilience of energy delivery systems. We provide a path forward for future research that could enable wide adoption of active scanning and lead utilities to incorporate active scanning as part of their default network security plans to discover and rectify rogue devices, adversaries, and services that may be on the network. This increased network visibility will allow operational technology cybersecurity practitioners to improve their situational awareness of networks and their vulnerabilities.« less
A survey of body sensor networks.
Lai, Xiaochen; Liu, Quanli; Wei, Xin; Wang, Wei; Zhou, Guoqiao; Han, Guangyi
2013-04-24
The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing surveys have placed emphasis on the concept and architecture of BSNs, signal acquisition, context-aware sensing, and system technology, while this paper will focus on sensor, data fusion, and network communication. And we will introduce the research status of BSNs, the analysis of hotspots, and future development trends, the discussion of major challenges and technical problems facing currently. The typical research projects and practical application of BSNs are introduced as well. BSNs are progressing along the direction of multi-technology integration and intelligence. Although there are still many problems, the future of BSNs is fundamentally promising, profoundly changing the human-machine relationships and improving the quality of people's lives.
A Survey of Body Sensor Networks
Lai, Xiaochen; Liu, Quanli; Wei, Xin; Wang, Wei; Zhou, Guoqiao; Han, Guangyi
2013-01-01
The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing surveys have placed emphasis on the concept and architecture of BSNs, signal acquisition, context-aware sensing, and system technology, while this paper will focus on sensor, data fusion, and network communication. And we will introduce the research status of BSNs, the analysis of hotspots, and future development trends, the discussion of major challenges and technical problems facing currently. The typical research projects and practical application of BSNs are introduced as well. BSNs are progressing along the direction of multi-technology integration and intelligence. Although there are still many problems, the future of BSNs is fundamentally promising, profoundly changing the human-machine relationships and improving the quality of people's lives. PMID:23615581
NASA Astrophysics Data System (ADS)
Salman Arafath, Mohammed; Rahman Khan, Khaleel Ur; Sunitha, K. V. N.
2018-01-01
Nowadays due to most of the telecommunication standard development organizations focusing on using device-to-device communication so that they can provide proximity-based services and add-on services on top of the available cellular infrastructure. An Oppnets and wireless sensor network play a prominent role here. Routing in these networks plays a significant role in fields such as traffic management, packet delivery etc. Routing is a prodigious research area with diverse unresolved issues. This paper firstly focuses on the importance of Opportunistic routing and its concept then focus is shifted to prime aspect i.e. on packet reception ratio which is one of the highest QoS Awareness parameters. This paper discusses the two important functions of routing in wireless sensor networks (WSN) namely route selection using least routing time algorithm (LRTA) and data forwarding using clustering technique. Finally, the simulation result reveals that LRTA performs relatively better than the existing system in terms of average packet reception ratio and connectivity.
Open architecture of smart sensor suites
NASA Astrophysics Data System (ADS)
Müller, Wilmuth; Kuwertz, Achim; Grönwall, Christina; Petersson, Henrik; Dekker, Rob; Reinert, Frank; Ditzel, Maarten
2017-10-01
Experiences from recent conflicts show the strong need for smart sensor suites comprising different multi-spectral imaging sensors as core elements as well as additional non-imaging sensors. Smart sensor suites should be part of a smart sensor network - a network of sensors, databases, evaluation stations and user terminals. Its goal is to optimize the use of various information sources for military operations such as situation assessment, intelligence, surveillance, reconnaissance, target recognition and tracking. Such a smart sensor network will enable commanders to achieve higher levels of situational awareness. Within the study at hand, an open system architecture was developed in order to increase the efficiency of sensor suites. The open system architecture for smart sensor suites, based on a system-of-systems approach, enables combining different sensors in multiple physical configurations, such as distributed sensors, co-located sensors combined in a single package, tower-mounted sensors, sensors integrated in a mobile platform, and trigger sensors. The architecture was derived from a set of system requirements and relevant scenarios. Its mode of operation is adaptable to a series of scenarios with respect to relevant objects of interest, activities to be observed, available transmission bandwidth, etc. The presented open architecture is designed in accordance with the NATO Architecture Framework (NAF). The architecture allows smart sensor suites to be part of a surveillance network, linked e.g. to a sensor planning system and a C4ISR center, and to be used in combination with future RPAS (Remotely Piloted Aircraft Systems) for supporting a more flexible dynamic configuration of RPAS payloads.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
Unaware Processing of Tools in the Neural System for Object-Directed Action Representation.
Tettamanti, Marco; Conca, Francesca; Falini, Andrea; Perani, Daniela
2017-11-01
The hypothesis that the brain constitutively encodes observed manipulable objects for the actions they afford is still debated. Yet, crucial evidence demonstrating that, even in the absence of perceptual awareness, the mere visual appearance of a manipulable object triggers a visuomotor coding in the action representation system including the premotor cortex, has hitherto not been provided. In this fMRI study, we instantiated reliable unaware visual perception conditions by means of continuous flash suppression, and we tested in 24 healthy human participants (13 females) whether the visuomotor object-directed action representation system that includes left-hemispheric premotor, parietal, and posterior temporal cortices is activated even under subliminal perceptual conditions. We found consistent activation in the target visuomotor cortices, both with and without perceptual awareness, specifically for pictures of manipulable versus non-manipulable objects. By means of a multivariate searchlight analysis, we also found that the brain activation patterns in this visuomotor network enabled the decoding of manipulable versus non-manipulable object picture processing, both with and without awareness. These findings demonstrate the intimate neural coupling between visual perception and motor representation that underlies manipulable object processing: manipulable object stimuli specifically engage the visuomotor object-directed action representation system, in a constitutive manner that is independent from perceptual awareness. This perceptuo-motor coupling endows the brain with an efficient mechanism for monitoring and planning reactions to external stimuli in the absence of awareness. SIGNIFICANCE STATEMENT Our brain constantly encodes the visual information that hits the retina, leading to a stimulus-specific activation of sensory and semantic representations, even for objects that we do not consciously perceive. Do these unconscious representations encompass the motor programming of actions that could be accomplished congruently with the objects' functions? In this fMRI study, we instantiated unaware visual perception conditions, by dynamically suppressing the visibility of manipulable object pictures with mondrian masks. Despite escaping conscious perception, manipulable objects activated an object-directed action representation system that includes left-hemispheric premotor, parietal, and posterior temporal cortices. This demonstrates that visuomotor encoding occurs independently of conscious object perception. Copyright © 2017 the authors 0270-6474/17/3710712-13$15.00/0.
Implementation of Context Aware e-Health Environments Based on Social Sensor Networks
Aguirre, Erik; Led, Santiago; Lopez-Iturri, Peio; Azpilicueta, Leyre; Serrano, Luís; Falcone, Francisco
2016-01-01
In this work, context aware scenarios applied to e-Health and m-Health in the framework of typical households (urban and rural) by means of deploying Social Sensors will be described. Interaction with end-users and social/medical staff is achieved using a multi-signal input/output device, capable of sensing and transmitting environmental, biomedical or activity signals and information with the aid of a combined Bluetooth and Mobile system platform. The devices, which play the role of Social Sensors, are implemented and tested in order to guarantee adequate service levels in terms of multiple signal processing tasks as well as robustness in relation with the use wireless transceivers and channel variability. Initial tests within a Living Lab environment have been performed in order to validate overall system operation. The results obtained show good acceptance of the proposed system both by end users as well as by medical and social staff, increasing interaction, reducing overall response time and social inclusion levels, with a compact and moderate cost solution that can readily be largely deployed. PMID:26938539
McCurdy, Neil J.; Griswold, William G; Lenert, Leslie A.
2005-01-01
The first moments at a disater scene are chaotic. The command center initially operates with little knowledge of hazards, geography and casualties, building up knowledge of the event slowly as information trickles in by voice radio channels. RealityFlythrough is a tele-presence system that stitches together live video feeds in real-time, using the principle of visual closure, to give command center personnel the illusion of being able to explore the scene interactively by moving smoothly between the video feeds. Using RealityFlythrough, medical, fire, law enforcement, hazardous materials, and engineering experts may be able to achieve situational awareness earlier, and better manage scarce resources. The RealityFlythrough system is composed of camera units with off-the-shelf GPS and orientation systems and a server/viewing station that offers access to images collected by the camera units in real time by position/orientation. In initial field testing using an experimental mesh 802.11 wireless network, two camera unit operators were able to create an interactive image of a simulated disaster scene in about five minutes. PMID:16779092
Implementation of Context Aware e-Health Environments Based on Social Sensor Networks.
Aguirre, Erik; Led, Santiago; Lopez-Iturri, Peio; Azpilicueta, Leyre; Serrano, Luís; Falcone, Francisco
2016-03-01
In this work, context aware scenarios applied to e-Health and m-Health in the framework of typical households (urban and rural) by means of deploying Social Sensors will be described. Interaction with end-users and social/medical staff is achieved using a multi-signal input/output device, capable of sensing and transmitting environmental, biomedical or activity signals and information with the aid of a combined Bluetooth and Mobile system platform. The devices, which play the role of Social Sensors, are implemented and tested in order to guarantee adequate service levels in terms of multiple signal processing tasks as well as robustness in relation with the use wireless transceivers and channel variability. Initial tests within a Living Lab environment have been performed in order to validate overall system operation. The results obtained show good acceptance of the proposed system both by end users as well as by medical and social staff, increasing interaction, reducing overall response time and social inclusion levels, with a compact and moderate cost solution that can readily be largely deployed.
How to include public health practice and practitioners in a European Network.
Brusaferro, Silvio; Tricarico, Pierfrancesco
2017-10-01
There is a wide range of different Public Health (PH) activities and programs running in Europe. Besides the richness of national traditions, differences exist in numbers of programs, methods adopted, types of engaged professionals, available resources (including public investments), awareness to the problem and finally in health indicators among and within countries. Promoting networks of PH practices and practitioners strengthens the possibility to share knowledge across organizational, sectorial and geographic boundaries, promotes adaptation and local implementation, fosters innovation in the form of knowledge creation by developing more efficient new services and by sharing effective practices within and between organizations and sectors. Nevertheless, strengthening existing networks and promoting new ones requires coordinated efforts based on complex adaptive systems and network science rules, along with the engagement of local, national and European health authorities. Given these premises, networking promotion and development is a promising way to improve health and wealth to European citizens and communities. © The Author 2017. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.
Refining process of nursing skill movie manual by peer comments of social network system.
Majima, Yukie; Maekawa, Yasuko; Shimada, Satoshi; Izumi, Takako
2014-01-01
The nursing practical knowledge represented by nursing skill is highly tacit and is therefore difficult to verbalize. The purpose of this study is to build a new learning community for nursing education (nursing social e-learning model) that is refined and developed autonomously and continuously. We used the social network system (SNS) that can be participated in a variety of stakeholder of medical personnel in order to hear comments for the content of learning to practice nursing skill. We had the nurses make the nursing skill movie manual. Through this process to get the opinions about the movie contents from others, we inspected what kind of opinions and feelings occurred to the nurses. As a result, the nurses were able to see objectively the own nursing skills, to do self-reflection. They had the awareness to improve the nursing skills.
Modeling and analyzing malware propagation in social networks with heterogeneous infection rates
NASA Astrophysics Data System (ADS)
Jia, Peng; Liu, Jiayong; Fang, Yong; Liu, Liang; Liu, Luping
2018-10-01
With the rapid development of social networks, hackers begin to try to spread malware more widely by utilizing various kinds of social networks. Thus, studying malware epidemic dynamics in these networks is becoming a popular subject in the literature. Most of the previous works focus on the effects of factors, such as network topology and user behavior, on malware propagation. Some researchers try to analyze the heterogeneity of infection rates, but the common problem of their works is the factors they mentioned that could affect the heterogeneity are not comprehensive enough. In this paper, focusing on the effects of heterogeneous infection rates, we propose a novel model called HSID (heterogeneous-susceptible-infectious-dormant model) to characterize virus propagation in social networks, in which a connection factor is presented to evaluate the heterogeneous relationships between nodes, and a resistance factor is introduced to represent node's mutable resistant ability. We analyzed how key parameters in the two factors affect the heterogeneity and then performed simulations to explore the effects in three real-world social networks. The results indicate: heterogeneous relationship could lead to wider diffusion in directed network, and heterogeneous security awareness could lead to wider diffusion in both directed and undirected networks; heterogeneous relationship could restrain the outbreak of malware but heterogeneous initial security awareness would increase the probability; furthermore, the increasing resistibility along with infected times would lead to malware's disappearance in social networks.
Adaptive AOA-aided TOA self-positioning for mobile wireless sensor networks.
Wen, Chih-Yu; Chan, Fu-Kai
2010-01-01
Location-awareness is crucial and becoming increasingly important to many applications in wireless sensor networks. This paper presents a network-based positioning system and outlines recent work in which we have developed an efficient principled approach to localize a mobile sensor using time of arrival (TOA) and angle of arrival (AOA) information employing multiple seeds in the line-of-sight scenario. By receiving the periodic broadcasts from the seeds, the mobile target sensors can obtain adequate observations and localize themselves automatically. The proposed positioning scheme performs location estimation in three phases: (I) AOA-aided TOA measurement, (II) Geometrical positioning with particle filter, and (III) Adaptive fuzzy control. Based on the distance measurements and the initial position estimate, adaptive fuzzy control scheme is applied to solve the localization adjustment problem. The simulations show that the proposed approach provides adaptive flexibility and robust improvement in position estimation.
Is There a Mobile Social Presence?
ERIC Educational Resources Information Center
Tu, Chih-Hsiung; McIsaac, Marina; Sujo-Montes, Laura; Armfield, Shadow
2012-01-01
Mobile learning environments are human networks that afford the opportunity to participate in creative endeavors, social networking, organize/reorganize social contents, and manage social acts at anytime, anywhere through mobile technologies. Social acts that elicit identities, develop awareness, cement relationships, ensure connections, and…
An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.
Zhang, Jinhuan; Long, Jun
2017-06-12
Wireless sensor networks (WSNs) are one of the important supporting technologies of edge computing. In WSNs, reliable communications are essential for most applications due to the unreliability of wireless links. In addition, network lifetime is also an important performance metric and needs to be considered in many WSN studies. In the paper, an energy-aware hybrid Automatic Repeat-reQuest protocol (ARQ) scheme is proposed to ensure energy efficiency under the guarantee of network transmission reliability. In the scheme, the source node sends data packets continuously with the correct window size and it does not need to wait for the acknowledgement (ACK) confirmation for each data packet. When the destination receives K data packets, it will return multiple copies of one ACK for confirmation to avoid ACK packet loss. The energy consumption of each node in flat circle network applying the proposed scheme is statistical analyzed and the cases under which it is more energy efficiency than the original scheme is discussed. Moreover, how to select parameters of the scheme is addressed to extend the network lifetime under the constraint of the network reliability. In addition, the energy efficiency of the proposed schemes is evaluated. Simulation results are presented to demonstrate that a node energy consumption reduction could be gained and the network lifetime is prolonged.
Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk
2014-08-18
Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.
Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk
2014-01-01
Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption. PMID:25196015
Griffiths, Frances; Dobermann, Tim; Cave, Jonathan A K; Thorogood, Margaret; Johnson, Samantha; Salamatian, Kavé; Gomez Olive, Francis X; Goudge, Jane
2015-12-01
Interaction through online social networks potentially results in the contestation of prevailing ideas about health and health care, and to mass protest where health is put at risk or health care provision is wanting. Through a review of the academic literature and case studies of four social networking health sites (PatientsLikeMe, Mumsnet, Treatment Action Campaign, and My Pro Ana), we establish the extent to which this phenomenon is documented, seek evidence of the prevalence and character of health-related networks, and explore their structure, function, participants, and impact, seeking to understand how they came into being and how they sustain themselves. Results indicate mass protest is not arising from these established health-related networking platforms. There is evidence of changes in policy following campaigning activity prompted by experiences shared through social networking such as improved National Health Service care for miscarriage (a Mumsnet campaign). Platform owners and managers have considerable power to shape these campaigns. Social networking is also influencing health policy indirectly through increasing awareness and so demand for health care. Transient social networking about health on platforms such as Twitter were not included as case studies but may be where the most radical or destabilizing influence on health care policy might arise.
Ranking in evolving complex networks
NASA Astrophysics Data System (ADS)
Liao, Hao; Mariani, Manuel Sebastian; Medo, Matúš; Zhang, Yi-Cheng; Zhou, Ming-Yang
2017-05-01
Complex networks have emerged as a simple yet powerful framework to represent and analyze a wide range of complex systems. The problem of ranking the nodes and the edges in complex networks is critical for a broad range of real-world problems because it affects how we access online information and products, how success and talent are evaluated in human activities, and how scarce resources are allocated by companies and policymakers, among others. This calls for a deep understanding of how existing ranking algorithms perform, and which are their possible biases that may impair their effectiveness. Many popular ranking algorithms (such as Google's PageRank) are static in nature and, as a consequence, they exhibit important shortcomings when applied to real networks that rapidly evolve in time. At the same time, recent advances in the understanding and modeling of evolving networks have enabled the development of a wide and diverse range of ranking algorithms that take the temporal dimension into account. The aim of this review is to survey the existing ranking algorithms, both static and time-aware, and their applications to evolving networks. We emphasize both the impact of network evolution on well-established static algorithms and the benefits from including the temporal dimension for tasks such as prediction of network traffic, prediction of future links, and identification of significant nodes.
The Impact of Online Social Networks on Health and Health Systems: A Scoping Review and Case Studies
Griffiths, Frances; Dobermann, Tim; Cave, Jonathan A. K.; Thorogood, Margaret; Johnson, Samantha; Salamatian, Kavé; Gomez Olive, Francis X.; Goudge, Jane
2015-01-01
Interaction through online social networks potentially results in the contestation of prevailing ideas about health and health care, and to mass protest where health is put at risk or health care provision is wanting. Through a review of the academic literature and case studies of four social networking health sites (PatientsLikeMe, Mumsnet, Treatment Action Campaign, and My Pro Ana), we establish the extent to which this phenomenon is documented, seek evidence of the prevalence and character of health‐related networks, and explore their structure, function, participants, and impact, seeking to understand how they came into being and how they sustain themselves. Results indicate mass protest is not arising from these established health‐related networking platforms. There is evidence of changes in policy following campaigning activity prompted by experiences shared through social networking such as improved National Health Service care for miscarriage (a Mumsnet campaign). Platform owners and managers have considerable power to shape these campaigns. Social networking is also influencing health policy indirectly through increasing awareness and so demand for health care. Transient social networking about health on platforms such as Twitter were not included as case studies but may be where the most radical or destabilizing influence on health care policy might arise. PMID:27134699
WENESSA, Wide Eye-Narrow Eye Space Simulation fo Situational Awareness
NASA Astrophysics Data System (ADS)
Albarait, O.; Payne, D. M.; LeVan, P. D.; Luu, K. K.; Spillar, E.; Freiwald, W.; Hamada, K.; Houchard, J.
In an effort to achieve timelier indications of anomalous object behaviors in geosynchronous earth orbit, a Planning Capability Concept (PCC) for a “Wide Eye-Narrow Eye” (WE-NE) telescope network has been established. The PCC addresses the problem of providing continuous and operationally robust, layered and cost-effective, Space Situational Awareness (SSA) that is focused on monitoring deep space for anomalous behaviors. It does this by first detecting the anomalies with wide field of regard systems, and then providing reliable handovers for detailed observational follow-up by another optical asset. WENESSA will explore the added value of such a system to the existing Space Surveillance Network (SSN). The study will assess and quantify the degree to which the PCC completely fulfills, or improves or augments, these deep space knowledge deficiencies relative to current operational systems. In order to improve organic simulation capabilities, we will explore options for the federation of diverse community simulation approaches, while evaluating the efficiencies offered by a network of small and larger aperture, ground-based telescopes. Existing Space Modeling and Simulation (M&S) tools designed for evaluating WENESSA-like problems will be taken into consideration as we proceed in defining and developing the tools needed to perform this study, leading to the creation of a unified Space M&S environment for the rapid assessment of new capabilities. The primary goal of this effort is to perform a utility assessment of the WE-NE concept. The assessment will explore the mission utility of various WE-NE concepts in discovering deep space anomalies in concert with the SSN. The secondary goal is to generate an enduring modeling and simulation environment to explore the utility of future proposed concepts and supporting technologies. Ultimately, our validated simulation framework would support the inclusion of other ground- and space-based SSA assets through integrated analysis. Options will be explored using at least two competing simulation capabilities, but emphasis will be placed on reasoned analyses as supported by the simulations.
Evidence Based Education Request Desk. EBE #791
ERIC Educational Resources Information Center
Regional Educational Laboratory Southeast, 2011
2011-01-01
Would anyone in your network be aware of any states that might provide differentiated funding for virtual programs based on the model used--for example, curriculum-in-a-box vs. one with high student-teacher interaction? Are you aware of any research that examines what factors to consider when developing this type of differentiated funding? This…
Awareness of Malicious Social Engineering among Facebook Users
ERIC Educational Resources Information Center
Slonka, Kevin J.
2014-01-01
With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…
An Integrated Architecture to Support Hastily Formed Network (HFN)
2007-12-01
17 1. Creating Awareness of the Situation (intra-organization).............17 2. Sharing Awareness Among Organizations (inter...Convergence - Sharing a Common Goal to Achieve a Common Outcome...................................................................39 b. Interdependency and...Weaknesses, Opportunities and Threat UC Unclassified UCC Unified Command Center UHF Ultra High Frequency VHF Very High Frequency VoIP Voice over
The Relationship of Self-Awareness to Leadership Effectiveness for Experienced Leaders
ERIC Educational Resources Information Center
Sullivan, Patricia A.
2017-01-01
The purpose of this research was to investigate the relationship between leaders' self-awareness and their effectiveness. The population included leaders with at least five years of experience in a leadership role. Participants were recruited by snowball sampling methods; the researcher used a diverse network of professionals to recruit other…
Disease Surveillance on Complex Social Networks
Herrera, Jose L.; Srinivasan, Ravi; Brownstein, John S.; Galvani, Alison P.; Meyers, Lauren Ancel
2016-01-01
As infectious disease surveillance systems expand to include digital, crowd-sourced, and social network data, public health agencies are gaining unprecedented access to high-resolution data and have an opportunity to selectively monitor informative individuals. Contact networks, which are the webs of interaction through which diseases spread, determine whether and when individuals become infected, and thus who might serve as early and accurate surveillance sensors. Here, we evaluate three strategies for selecting sensors—sampling the most connected, random, and friends of random individuals—in three complex social networks—a simple scale-free network, an empirical Venezuelan college student network, and an empirical Montreal wireless hotspot usage network. Across five different surveillance goals—early and accurate detection of epidemic emergence and peak, and general situational awareness—we find that the optimal choice of sensors depends on the public health goal, the underlying network and the reproduction number of the disease (R0). For diseases with a low R0, the most connected individuals provide the earliest and most accurate information about both the onset and peak of an outbreak. However, identifying network hubs is often impractical, and they can be misleading if monitored for general situational awareness, if the underlying network has significant community structure, or if R0 is high or unknown. Taking a theoretical approach, we also derive the optimal surveillance system for early outbreak detection but find that real-world identification of such sensors would be nearly impossible. By contrast, the friends-of-random strategy offers a more practical and robust alternative. It can be readily implemented without prior knowledge of the network, and by identifying sensors with higher than average, but not the highest, epidemiological risk, it provides reasonably early and accurate information. PMID:27415615
Towards a Multiscale Approach to Cybersecurity Modeling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hogan, Emilie A.; Hui, Peter SY; Choudhury, Sutanay
2013-11-12
We propose a multiscale approach to modeling cyber networks, with the goal of capturing a view of the network and overall situational awareness with respect to a few key properties--- connectivity, distance, and centrality--- for a system under an active attack. We focus on theoretical and algorithmic foundations of multiscale graphs, coming from an algorithmic perspective, with the goal of modeling cyber system defense as a specific use case scenario. We first define a notion of \\emph{multiscale} graphs, in contrast with their well-studied single-scale counterparts. We develop multiscale analogs of paths and distance metrics. As a simple, motivating example ofmore » a common metric, we present a multiscale analog of the all-pairs shortest-path problem, along with a multiscale analog of a well-known algorithm which solves it. From a cyber defense perspective, this metric might be used to model the distance from an attacker's position in the network to a sensitive machine. In addition, we investigate probabilistic models of connectivity. These models exploit the hierarchy to quantify the likelihood that sensitive targets might be reachable from compromised nodes. We believe that our novel multiscale approach to modeling cyber-physical systems will advance several aspects of cyber defense, specifically allowing for a more efficient and agile approach to defending these systems.« less
Improving the Future of the Army’s Future Combat Systems Program
2009-06-01
that the Army will not be able to afford to focus on both its needs in Iraq and Afghanistan and its long-term vision of the future as if they were...and conventional fights. ‘After receiving situational awareness reports from the FCS network, the NLOS-C will be able to put precision fires on...defuse mines. 17 • Small Unmanned Ground Vehicle (SUGV), which is a lightweight robot designed to be man-portable and to be able to scout ahead of
2016-09-01
noise density and temperature sensitivity of these devices are all on the same order of magnitude. Even the worst- case noise density of the GCDC...accelerations from a handgun firing were distinct from other impulsive events on the wrist, such as using a hammer. Loeffler first identified potential shots by...spikes, taking various statistical parameters. He used a logistic regression model on these parameters and was able to classify 98.9% of shots
The Utilization of Network Enabled Capability in NATO Air C2 and Targeting Systems
2013-06-01
TBMCS Mission Exchange 3.1 ICC-JCOP JCOP aims to provide a common operational picture to the NATO users to increase the situational awareness by...transformation steps (Figure 9). Figure 9: WISI consumed by Oracle’s SOA tools 3.4 ICC-ACCS- TBMCS Mission Exchange The aim of this experiment was to... TBMCS ) using a common methodology. For this purpose, initially, a common mission definition (CMD) was defined which had the same meaning for all of
2011-08-01
Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any...may be required by the United States Customs and Immigration Services, in connection with the operation of an international bridge or tunnel. ERDC...significant effect on the operation , service quality, and safety of road networks by restricting the traffic volume and vehicle weight that can be
Resource Aware Intelligent Network Services (RAINS) Final Technical Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lehman, Tom; Yang, Xi
The Resource Aware Intelligent Network Services (RAINS) project conducted research and developed technologies in the area of cyber infrastructure resource modeling and computation. The goal of this work was to provide a foundation to enable intelligent, software defined services which spanned the network AND the resources which connect to the network. A Multi-Resource Service Plane (MRSP) was defined, which allows resource owners/managers to locate and place themselves from a topology and service availability perspective within the dynamic networked cyberinfrastructure ecosystem. The MRSP enables the presentation of integrated topology views and computation results which can include resources across the spectrum ofmore » compute, storage, and networks. The RAINS project developed MSRP includes the following key components: i) Multi-Resource Service (MRS) Ontology/Multi-Resource Markup Language (MRML), ii) Resource Computation Engine (RCE), iii) Modular Driver Framework (to allow integration of a variety of external resources). The MRS/MRML is a general and extensible modeling framework that allows for resource owners to model, or describe, a wide variety of resource types. All resources are described using three categories of elements: Resources, Services, and Relationships between the elements. This modeling framework defines a common method for the transformation of cyber infrastructure resources into data in the form of MRML models. In order to realize this infrastructure datification, the RAINS project developed a model based computation system, i.e. “RAINS Computation Engine (RCE)”. The RCE has the ability to ingest, process, integrate, and compute based on automatically generated MRML models. The RCE interacts with the resources thru system drivers which are specific to the type of external network or resource controller. The RAINS project developed a modular and pluggable driver system which facilities a variety of resource controllers to automatically generate, maintain, and distribute MRML based resource descriptions. Once all of the resource topologies are absorbed by the RCE, a connected graph of the full distributed system topology is constructed, which forms the basis for computation and workflow processing. The RCE includes a Modular Computation Element (MCE) framework which allows for tailoring of the computation process to the specific set of resources under control, and the services desired. The input and output of an MCE are both model data based on MRS/MRML ontology and schema. Some of the RAINS project accomplishments include: Development of general and extensible multi-resource modeling framework; Design of a Resource Computation Engine (RCE) system which includes the following key capabilities; Absorb a variety of multi-resource model types and build integrated models; Novel architecture which uses model based communications across the full stack for all Flexible provision of abstract or intent based user facing interfaces; Workflow processing based on model descriptions; Release of the RCE as an open source software; Deployment of RCE in the University of Maryland/Mid-Atlantic Crossroad ScienceDMZ in prototype mode with a plan under way to transition to production; Deployment at the Argonne National Laboratory DTN Facility in prototype mode; Selection of RCE by the DOE SENSE (SDN for End-to-end Networked Science at the Exascale) project as the basis for their orchestration service.« less
Cost-Aware Design of a Discrimination Strategy for Unexploded Ordnance Cleanup
2011-02-25
Acronyms ANN: Artificial Neural Network AUC: Area Under the Curve BRAC: Base Realignment And Closure DLRT: Distance Likelihood Ratio Test EER...Discriminative Aggregate Nonparametric [25] Artificial Neural Network ANN Discriminative Aggregate Parametric [33] 11 Results and Discussion Task #1
Patient safety problem identification and solution sharing among rural community pharmacists.
Galt, Kimberly A; Fuji, Kevin T; Faber, Jennifer
2013-01-01
To implement a communication network for safety problem identification and solution sharing among rural community pharmacists and to report participating pharmacists' perceived value and impact of the network on patient safety after 1 year of implementation. Action research study. Rural community pharmacies in Nebraska from January 2010 to April 2011. Rural community pharmacists who voluntarily agreed to join the Pharmacists for Patient Safety Network in Nebraska. Pharmacists reported errors, near misses, and safety concerns through Web-based event reporting. A rapid feedback process was used to provide patient safety solutions to consider implementing across the network. Qualitative interviews were conducted 1 year after program implementation with participating pharmacists to assess use of the reporting system, value of the disseminated safety solutions, and perceived impact on patient safety in pharmacies. 30 of 38 pharmacists participating in the project completed the interviews. The communication network improved pharmacist awareness, promoted open discussion and knowledge sharing, contributed to practice vigilance, and led to incorporation of proactive safety prevention practices. Despite low participation in error and near-miss reporting, a dynamic communication network designed to rapidly disseminate evidence-based patient safety strategies to reduce risk was valued and effective at improving patient safety practices in rural community pharmacies.
Real-time topic-aware influence maximization using preprocessing.
Chen, Wei; Lin, Tian; Yang, Cheng
2016-01-01
Influence maximization is the task of finding a set of seed nodes in a social network such that the influence spread of these seed nodes based on certain influence diffusion model is maximized. Topic-aware influence diffusion models have been recently proposed to address the issue that influence between a pair of users are often topic-dependent and information, ideas, innovations etc. being propagated in networks are typically mixtures of topics. In this paper, we focus on the topic-aware influence maximization task. In particular, we study preprocessing methods to avoid redoing influence maximization for each mixture from scratch. We explore two preprocessing algorithms with theoretical justifications. Our empirical results on data obtained in a couple of existing studies demonstrate that one of our algorithms stands out as a strong candidate providing microsecond online response time and competitive influence spread, with reasonable preprocessing effort.
Neural correlates of nondual awareness in meditation.
Josipovic, Zoran
2014-01-01
Dualities such as self versus other, good versus bad, and in-group versus out-group are pervasive features of human experience, structuring the majority of cognitive and affective processes. Yet, an entirely different way of experiencing, one in which such dualities are relaxed rather than fortified, is also available. It depends on recognizing, within the stream of our consciousness, the nondual awareness (NDA)--a background awareness that precedes conceptualization and intention and that can contextualize various perceptual, affective, or cognitive contents without fragmenting the field of experience into habitual dualities. This paper introduces NDA as experienced in Tibetan Buddhist meditation and reviews the results of our study on the influence of NDA on anticorrelated intrinsic and extrinsic networks in the brain. Also discussed are preliminary data from a current study of NDA with minimized phenomenal content that points to involvement of a precuneus network in NDA. © 2013 New York Academy of Sciences.
Pratt, Rebekah; Gyllstrom, Beth; Gearin, Kim; Lange, Carol; Hahn, David; Baldwin, Laura-Mae; VanRaemdonck, Lisa; Nease, Don; Zahner, Susan
Interest is increasing in collaborations between public health and primary care to address the health of a community. Although the understanding of how these collaborations work is growing, little is known about the barriers facing these partners at the local level. The objective of this study was to identify barriers to collaboration between primary care and public health at the local level in 4 states. The study team, which comprised 12 representatives of Practice-Based Research Networks (networks of practitioners interested in conducting research in practice-based settings), identified 40 key informants from the public health and primary care fields in Colorado, Minnesota, Washington State, and Wisconsin. The key informants participated in standardized, semistructured telephone interviews with 8 study team members in 2014 and 2015. Interviews were audio recorded and transcribed verbatim. We analyzed key themes and subthemes by drawing on grounded theory. Primary care and public health participants identified similar barriers to collaboration. Barriers at the institutional level included the challenges of the primary care environment, in which providers feel overwhelmed and resources are tight; the need for systems change; a lack of partnership; and geographic challenges. Barriers to collaboration included mutual awareness, communication, data sharing, capacity, lack of resources, and prioritization of resources. Some barriers to collaboration (eg, changes to health care billing, demands on provider time) require systems change to overcome, whereas others (eg, a lack of shared priorities and mutual awareness) could be addressed through educational approaches, without adding resources or making a systemic change. Overcoming these common barriers may lead to more effective collaboration.
An improved global dynamic routing strategy for scale-free network with tunable clustering
NASA Astrophysics Data System (ADS)
Sun, Lina; Huang, Ning; Zhang, Yue; Bai, Yannan
2016-08-01
An efficient routing strategy can deliver packets quickly to improve the network capacity. Node congestion and transmission path length are inevitable real-time factors for a good routing strategy. Existing dynamic global routing strategies only consider the congestion of neighbor nodes and the shortest path, which ignores other key nodes’ congestion on the path. With the development of detection methods and techniques, global traffic information is readily available and important for the routing choice. Reasonable use of this information can effectively improve the network routing. So, an improved global dynamic routing strategy is proposed, which considers the congestion of all nodes on the shortest path and incorporates the waiting time of the most congested node into the path. We investigate the effectiveness of the proposed routing for scale-free network with different clustering coefficients. The shortest path routing strategy and the traffic awareness routing strategy only considering the waiting time of neighbor node are analyzed comparatively. Simulation results show that network capacity is greatly enhanced compared with the shortest path; congestion state increase is relatively slow compared with the traffic awareness routing strategy. Clustering coefficient increase will not only reduce the network throughput, but also result in transmission average path length increase for scale-free network with tunable clustering. The proposed routing is favorable to ease network congestion and network routing strategy design.
Bridging disparate symptoms of schizophrenia: a triple network dysfunction theory
Nekovarova, Tereza; Fajnerova, Iveta; Horacek, Jiri; Spaniel, Filip
2014-01-01
Schizophrenia is a complex neuropsychiatric disorder with variable symptomatology, traditionally divided into positive and negative symptoms, and cognitive deficits. However, the etiology of this disorder has yet to be fully understood. Recent findings suggest that alteration of the basic sense of self-awareness may be an essential distortion of schizophrenia spectrum disorders. In addition, extensive research of social and mentalizing abilities has stressed the role of distortion of social skills in schizophrenia.This article aims to propose and support a concept of a triple brain network model of the dysfunctional switching between default mode and central executive network (CEN) related to the aberrant activity of the salience network. This model could represent a unitary mechanism of a wide array of symptom domains present in schizophrenia including the deficit of self (self-awareness and self-representation) and theory of mind (ToM) dysfunctions along with the traditional positive, negative and cognitive domains. We review previous studies which document the dysfunctions of self and ToM in schizophrenia together with neuroimaging data that support the triple brain network model as a common neuronal substrate of this dysfunction. PMID:24910597
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.
Novel Visual Sensor Coverage and Deployment in Time Aware PTZ Wireless Visual Sensor Networks.
Yap, Florence G H; Yen, Hong-Hsu
2016-12-30
In this paper, we consider the visual sensor deployment algorithm in Pan-Tilt-Zoom (PTZ) Wireless Visual Sensor Networks (WVSNs). With PTZ capability, a sensor's visual coverage can be extended to reduce the number of visual sensors that need to be deployed. The coverage zone of a visual sensor in PTZ WVSN is composed of two regions, a Direct Coverage Region (DCR) and a PTZ Coverage Region (PTZCR). In the PTZCR, a visual sensor needs a mechanical pan-tilt-zoom operation to cover an object. This mechanical operation can take seconds, so the sensor might not be able to adjust the camera in time to capture the visual data. In this paper, for the first time, we study this PTZ time-aware PTZ WVSN deployment problem. We formulate this PTZ time-aware PTZ WVSN deployment problem as an optimization problem where the objective is to minimize the total visual sensor deployment cost so that each area is either covered in the DCR or in the PTZCR while considering the PTZ time constraint. The proposed Time Aware Coverage Zone (TACZ) model successfully captures the PTZ visual sensor coverage in terms of camera focal range, angle span zone coverage and camera PTZ time. Then a novel heuristic, called Time Aware Deployment with PTZ camera (TADPTZ) algorithm, is proposed to solve the problem. From our computational experiments, we found out that TACZ model outperforms the existing M coverage model under all network scenarios. In addition, as compared to the optimal solutions, the TACZ model is scalable and adaptable to the different PTZ time requirements when deploying large PTZ WVSNs.
Novel Visual Sensor Coverage and Deployment in Time Aware PTZ Wireless Visual Sensor Networks
Yap, Florence G. H.; Yen, Hong-Hsu
2016-01-01
In this paper, we consider the visual sensor deployment algorithm in Pan-Tilt-Zoom (PTZ) Wireless Visual Sensor Networks (WVSNs). With PTZ capability, a sensor’s visual coverage can be extended to reduce the number of visual sensors that need to be deployed. The coverage zone of a visual sensor in PTZ WVSN is composed of two regions, a Direct Coverage Region (DCR) and a PTZ Coverage Region (PTZCR). In the PTZCR, a visual sensor needs a mechanical pan-tilt-zoom operation to cover an object. This mechanical operation can take seconds, so the sensor might not be able to adjust the camera in time to capture the visual data. In this paper, for the first time, we study this PTZ time-aware PTZ WVSN deployment problem. We formulate this PTZ time-aware PTZ WVSN deployment problem as an optimization problem where the objective is to minimize the total visual sensor deployment cost so that each area is either covered in the DCR or in the PTZCR while considering the PTZ time constraint. The proposed Time Aware Coverage Zone (TACZ) model successfully captures the PTZ visual sensor coverage in terms of camera focal range, angle span zone coverage and camera PTZ time. Then a novel heuristic, called Time Aware Deployment with PTZ camera (TADPTZ) algorithm, is proposed to solve the problem. From our computational experiments, we found out that TACZ model outperforms the existing M coverage model under all network scenarios. In addition, as compared to the optimal solutions, the TACZ model is scalable and adaptable to the different PTZ time requirements when deploying large PTZ WVSNs. PMID:28042829
Jin, Zhigang; Ma, Yingying; Su, Yishan; Li, Shuo; Fu, Xiaomei
2017-07-19
Underwater sensor networks (UWSNs) have become a hot research topic because of their various aquatic applications. As the underwater sensor nodes are powered by built-in batteries which are difficult to replace, extending the network lifetime is a most urgent need. Due to the low and variable transmission speed of sound, the design of reliable routing algorithms for UWSNs is challenging. In this paper, we propose a Q-learning based delay-aware routing (QDAR) algorithm to extend the lifetime of underwater sensor networks. In QDAR, a data collection phase is designed to adapt to the dynamic environment. With the application of the Q-learning technique, QDAR can determine a global optimal next hop rather than a greedy one. We define an action-utility function in which residual energy and propagation delay are both considered for adequate routing decisions. Thus, the QDAR algorithm can extend the network lifetime by uniformly distributing the residual energy and provide lower end-to-end delay. The simulation results show that our protocol can yield nearly the same network lifetime, and can reduce the end-to-end delay by 20-25% compared with a classic lifetime-extended routing protocol (QELAR).
Ma, Yingying; Su, Yishan; Li, Shuo; Fu, Xiaomei
2017-01-01
Underwater sensor networks (UWSNs) have become a hot research topic because of their various aquatic applications. As the underwater sensor nodes are powered by built-in batteries which are difficult to replace, extending the network lifetime is a most urgent need. Due to the low and variable transmission speed of sound, the design of reliable routing algorithms for UWSNs is challenging. In this paper, we propose a Q-learning based delay-aware routing (QDAR) algorithm to extend the lifetime of underwater sensor networks. In QDAR, a data collection phase is designed to adapt to the dynamic environment. With the application of the Q-learning technique, QDAR can determine a global optimal next hop rather than a greedy one. We define an action-utility function in which residual energy and propagation delay are both considered for adequate routing decisions. Thus, the QDAR algorithm can extend the network lifetime by uniformly distributing the residual energy and provide lower end-to-end delay. The simulation results show that our protocol can yield nearly the same network lifetime, and can reduce the end-to-end delay by 20–25% compared with a classic lifetime-extended routing protocol (QELAR). PMID:28753951
Adaptation of Collaborative Applications for Network Quality Variation
2004-06-01
collaborative application. 1.1 Quality of Service Quality of Service (QoS) is generally regarded as an end-to-end network application...using the Cloud WAN Emulator [14]. We used qtcp1 to measure end-to-end network service quality between the signal sender and the signal receiver. The...application must be aware of current resource 1 Qtcp measures end-to-end network integrity and service quality for QoS verification. Qtcp sends a
Active Job Monitoring in Pilots
NASA Astrophysics Data System (ADS)
Kuehn, Eileen; Fischer, Max; Giffels, Manuel; Jung, Christopher; Petzold, Andreas
2015-12-01
Recent developments in high energy physics (HEP) including multi-core jobs and multi-core pilots require data centres to gain a deep understanding of the system to monitor, design, and upgrade computing clusters. Networking is a critical component. Especially the increased usage of data federations, for example in diskless computing centres or as a fallback solution, relies on WAN connectivity and availability. The specific demands of different experiments and communities, but also the need for identification of misbehaving batch jobs, requires an active monitoring. Existing monitoring tools are not capable of measuring fine-grained information at batch job level. This complicates network-aware scheduling and optimisations. In addition, pilots add another layer of abstraction. They behave like batch systems themselves by managing and executing payloads of jobs internally. The number of real jobs being executed is unknown, as the original batch system has no access to internal information about the scheduling process inside the pilots. Therefore, the comparability of jobs and pilots for predicting run-time behaviour or network performance cannot be ensured. Hence, identifying the actual payload is important. At the GridKa Tier 1 centre a specific tool is in use that allows the monitoring of network traffic information at batch job level. This contribution presents the current monitoring approach and discusses recent efforts and importance to identify pilots and their substructures inside the batch system. It will also show how to determine monitoring data of specific jobs from identified pilots. Finally, the approach is evaluated.
Redes En Acción. Increasing Hispanic participation in cancer research, training, and awareness.
Ramirez, Amelie G; Talavera, Gregory A; Marti, Jose; Penedo, Frank J; Medrano, Martha A; Giachello, Aida L; Pérez-Stable, Eliseo J
2006-10-15
Hispanics are affected by many health care disparities. The National Cancer Institute (NCI), through its Special Populations Branch, is supporting networking and capacity-building activities designed to increase Hispanic participation and leadership in cancer research. Redes En Acción established a national network of cancer research centers, community-based organizations, and federal partners to facilitate opportunities for junior Hispanic scientists to participate in training and research projects on cancer control. Since 2000, Redes En Acción has established a network of more than 1800 Hispanic leaders involved in cancer research and education. The project has sustained 131 training positions and submitted 29 pilot projects to NCI for review, with 16 awards for a total of $800,000, plus an additional $8.8 million in competing grant funding based on pilot study results to date. Independent research has leveraged an additional $32 million in non-Redes funding, and together the national and regional network sites have participated in more than 1400 community and professional awareness events. In addition, the program conducted extensive national survey research that provided the basis for the Redes En Acción Latino Cancer Report, a national agenda on Hispanic cancer issues. Redes En Acción has increased participation in cancer control research, training, and awareness among Hispanic scientists and within Hispanic communities. Cancer 2006. (c) 2006 American Cancer Society.
Bolia, Robert S; Nelson, W Todd
2007-05-01
The recently promulgated doctrine of network-centric warfare suggests that increases in shared situation awareness and self-synchronization will be emergent properties of densely connected military networks. What it fails to say is how these enhancements are to be measured. The present article frames the discussion as a question of how to characterize team performance, and considers such performance in the context of its hypothetical components: situation awareness, workload, and error. This examination concludes that reliable measures of these constructs are lacking for teams, even when they exist for individual operators, and that this is due to philosophical and/or methodological flaws in their conceptual development. Additional research is recommended to overcome these deficiencies, as well as consideration of novel multidisciplinary approaches that draw on methodologies employed in the social, physical, and biological sciences.
Leveraging Large-Scale Semantic Networks for Adaptive Robot Task Learning and Execution.
Boteanu, Adrian; St Clair, Aaron; Mohseni-Kabir, Anahita; Saldanha, Carl; Chernova, Sonia
2016-12-01
This work seeks to leverage semantic networks containing millions of entries encoding assertions of commonsense knowledge to enable improvements in robot task execution and learning. The specific application we explore in this project is object substitution in the context of task adaptation. Humans easily adapt their plans to compensate for missing items in day-to-day tasks, substituting a wrap for bread when making a sandwich, or stirring pasta with a fork when out of spoons. Robot plan execution, however, is far less robust, with missing objects typically leading to failure if the robot is not aware of alternatives. In this article, we contribute a context-aware algorithm that leverages the linguistic information embedded in the task description to identify candidate substitution objects without reliance on explicit object affordance information. Specifically, we show that the task context provided by the task labels within the action structure of a task plan can be leveraged to disambiguate information within a noisy large-scale semantic network containing hundreds of potential object candidates to identify successful object substitutions with high accuracy. We present two extensive evaluations of our work on both abstract and real-world robot tasks, showing that the substitutions made by our system are valid, accepted by users, and lead to a statistically significant reduction in robot learning time. In addition, we report the outcomes of testing our approach with a large number of crowd workers interacting with a robot in real time.
Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks
NASA Astrophysics Data System (ADS)
Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei
2017-07-01
Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.
Sivakumar, B; Bhalaji, N; Sivakumar, D
2014-01-01
In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing.
Sivakumar, B.; Bhalaji, N.; Sivakumar, D.
2014-01-01
In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing. PMID:24790546
Mian, Adnan Noor; Fatima, Mehwish; Khan, Raees; Prakash, Ravi
2014-01-01
Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs.
Goedel, William C; Halkitis, Perry N; Greene, Richard E; Duncan, Dustin T
2016-07-01
Geosocial-networking smartphone applications are commonly used by gay, bisexual, and other men who have sex with men (MSM) to meet sexual partners. The purpose of the current study was to evaluate awareness of and willingness to use pre-exposure prophylaxis (PrEP) among MSM who use geosocial-networking smartphone applications residing in New York City. Recruitment utilizing broadcast advertisements on a popular smartphone application for MSM yielded a sample of 152 HIV-uninfected MSM. Multivariable models were used to assess demographic and behavioral correlates of awareness of and willingness to use PrEP. Most participants (85.5 %) had heard about PrEP but few (9.2 %) reported current use. Unwillingness to use PrEP was associated with concerns about side effects (PR = 0.303; 95 % CI 0.130, 0.708; p = 0.006). Given that more than half (57.6 %) of participants were willing to use PrEP, future research is needed to elucidate both individual and structural barriers to PrEP use among MSM.
Framework for Real-Time All-Hazards Global Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Omitaomu, Olufemi A; Fernandez, Steven J; Bhaduri, Budhendra L
Information systems play a pivotal role in emergency response by making consequence analysis models based on up-to-date data available to decision makers. While consequence analysis models have been used for years on local scales, their application on national and global scales has been constrained by lack of non-proprietary data. This chapter describes how this has changed using a framework for real-time all-hazards situational awareness called the Energy Awareness and Resiliency Standardized Services (EARSS) as an example. EARSS is a system of systems developed to collect non-proprietary data from diverse open content sources to develop a geodatabase of critical infrastructures allmore » over the world. The EARSS system shows that it is feasible to provide global disaster alerts by producing valuable information such as texting messages about detected hazards, emailing reports about affected areas, estimating an expected number of impacted people and their demographic characteristics, identifying critical infrastructures that may be affected, and analyzing potential downstream effects. This information is provided in real-time to federal agencies and subscribers all over the world for decision making in humanitarian assistance and emergency response. The system also uses live streams of power outages, weather, and satellite surveillance data as events unfold. This, in turn, is combined with other public domain or open content information, such as media reports and postings on social networking websites, for complete coverage of the situation as events unfold. Working with up-to-date information from the EARSS system, emergency responders on the ground could pre-position their staff and resources, such as emergency generators and ice, where they are most needed.« less
Development and Implementation of a Novel Prehospital Care System in the State of Kerala, India.
Brown, Heather A; Douglass, Katherine A; Ejas, Shafi; Poovathumparambil, Venugopalan
2016-12-01
Most low- and middle-income countries (LMICs) have struggled to find a system for prehospital care that can provide adequate patient care and geographical coverage while maintaining a feasible price tag. The emergency medical systems of the Western world are not necessarily relevant in developing economic systems, given the lack of strict legislation, the scarcity of resources, and the limited number of trained personnel. Meanwhile, most efforts to provide prehospital care in India have taken the form of adapting Western models to the Indian context with limited success. Described here is a novel approach to prehospital care designed for and implemented in the State of Kerala, India. The Active Network Group of Emergency Life Savers (ANGELS) was launched in 2011 in Calicut City, the third largest city in the Indian State of Kerala. The ANGELS integrated an existing fleet of private and state-owned ambulances into a single network utilizing Global Positioning System (GPS) technology and a single statewide call number. A total of 85 volunteer emergency medical certified technicians (EMCTs) were trained in basic first aid and trauma care principles. Public awareness campaigns accompanied all activities to raise awareness amongst community members. Funding was provided via public-private partnership, aimed to minimize costs to patients for service utilization. Over a two-year period from March 2011 to April 2013, 8,336 calls were recorded, of which 54.8% (4,569) were converted into actual ambulance run sheets. The majority of calls were for medical emergencies and most patients were transported to Medical College Hospital in Calicut. This unique public-private partnership has been responsive to the needs of the population while sustaining low operational costs. This system may provide a relevant template for Emergency Medical Services (EMS) development in other resource-limited settings. Brown HA , Douglass KA , Ejas S , Poovathumparambil V . Development and implementation of a novel prehospital care system in the State of Kerala, India. Prehosp Disaster Med. 2016;31(6):663-666.
Evaluation of multilayer perceptron algorithms for an analysis of network flow data
NASA Astrophysics Data System (ADS)
Bieniasz, Jedrzej; Rawski, Mariusz; Skowron, Krzysztof; Trzepiński, Mateusz
2016-09-01
The volume of exchanged information through IP networks is larger than ever and still growing. It creates a space for both benign and malicious activities. The second one raises awareness on security network devices, as well as network infrastructure and a system as a whole. One of the basic tools to prevent cyber attacks is Network Instrusion Detection System (NIDS). NIDS could be realized as a signature-based detector or an anomaly-based one. In the last few years the emphasis has been placed on the latter type, because of the possibility of applying smart and intelligent solutions. An ideal NIDS of next generation should be composed of self-learning algorithms that could react on known and unknown malicious network activities respectively. In this paper we evaluated a machine learning approach for detection of anomalies in IP network data represented as NetFlow records. We considered Multilayer Perceptron (MLP) as the classifier and we used two types of learning algorithms - Backpropagation (BP) and Particle Swarm Optimization (PSO). This paper includes a comprehensive survey on determining the most optimal MLP learning algorithm for the classification problem in application to network flow data. The performance, training time and convergence of BP and PSO methods were compared. The results show that PSO algorithm implemented by the authors outperformed other solutions if accuracy of classifications is considered. The major disadvantage of PSO is training time, which could be not acceptable for larger data sets or in real network applications. At the end we compared some key findings with the results from the other papers to show that in all cases results from this study outperformed them.
Carrillo, Snaider; Harkin, Jim; McDaid, Liam; Pande, Sandeep; Cawley, Seamus; McGinley, Brian; Morgan, Fearghal
2012-09-01
The brain is highly efficient in how it processes information and tolerates faults. Arguably, the basic processing units are neurons and synapses that are interconnected in a complex pattern. Computer scientists and engineers aim to harness this efficiency and build artificial neural systems that can emulate the key information processing principles of the brain. However, existing approaches cannot provide the dense interconnect for the billions of neurons and synapses that are required. Recently a reconfigurable and biologically inspired paradigm based on network-on-chip (NoC) and spiking neural networks (SNNs) has been proposed as a new method of realising an efficient, robust computing platform. However, the use of the NoC as an interconnection fabric for large-scale SNNs demands a good trade-off between scalability, throughput, neuron/synapse ratio and power consumption. This paper presents a novel traffic-aware, adaptive NoC router, which forms part of a proposed embedded mixed-signal SNN architecture called EMBRACE (EMulating Biologically-inspiRed ArChitectures in hardwarE). The proposed adaptive NoC router provides the inter-neuron connectivity for EMBRACE, maintaining router communication and avoiding dropped router packets by adapting to router traffic congestion. Results are presented on throughput, power and area performance analysis of the adaptive router using a 90 nm CMOS technology which outperforms existing NoCs in this domain. The adaptive behaviour of the router is also verified on a Stratix II FPGA implementation of a 4 × 2 router array with real-time traffic congestion. The presented results demonstrate the feasibility of using the proposed adaptive NoC router within the EMBRACE architecture to realise large-scale SNNs on embedded hardware. Copyright © 2012 Elsevier Ltd. All rights reserved.
Abreu, Liliana; Nunes, João Arriscado; Taylor, Peter; Silva, Susana
2018-01-01
This study embraces a patient-centred and narrative-oriented notion of health literacy, exploring how social networks and personal experiences constitute distributed health literacy (DHL) by mapping out health literacy mediators of each individual and how they enable self-management skills and knowledge of health conditions. Semi-structured interviews with 26 patients with type 2 diabetes were conducted in a Primary Care Center of Porto (Portugal) from October 2014 to December 2015. Data were collected based on McGill Illness Narrative Interview (MINI). Following the grounded theory, interviews were analysed as case-based and process-tracing-oriented. Three awareness narratives emerged: (i) a narrative of minimisation revealing minimal impact of diabetes in patients' lives and daily routines, resignation towards "inevitable" consequences of the diagnosis and dependence of a large network of health literacy mediators; (ii) a narrative of empathy, where patients tended to mention readjustments in their lives by following medical recommendations regarding medication without criticism and with few health literacy mediators; (iii) a narrative of disruption, with patients highlighting the huge impact of diabetes on their lives and their individual responsibility and autonomy with respect to the management of diabetes and the search for alternatives to medication, relying on a very restrictive network of mediators. Exploring meanings given to diagnosis, identifying health mediators and analysing the structure of social networks can contribute to understand the distributed nature of health literacy. Assessing DHL can assist health professionals and those providing care in the community in promoting health literacy and providing models for a more patient-centred health system. © 2017 John Wiley & Sons Ltd.
Using stochastic activity networks to study the energy feasibility of automatic weather stations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cassano, Luca; Cesarini, Daniel; Avvenuti, Marco
Automatic Weather Stations (AWSs) are systems equipped with a number of environmental sensors and communication interfaces used to monitor harsh environments, such as glaciers and deserts. Designing such systems is challenging, since designers have to maximize the amount of sampled and transmitted data while considering the energy needs of the system that, in most cases, is powered by rechargeable batteries and exploits energy harvesting, e.g., solar cells and wind turbines. To support designers of AWSs in the definition of the software tasks and of the hardware configuration of the AWS we designed and implemented an energy-aware simulator of such systems.more » The simulator relies on the Stochastic Activity Networks (SANs) formalism and has been developed using the Möbius tool. In this paper we first show how we used the SAN formalism to model the various components of an AWS, we then report results from an experiment carried out to validate the simulator against a real-world AWS and we finally show some examples of usage of the proposed simulator.« less
ERIC Educational Resources Information Center
Sui, Jie; Chechlacz, Magdalena; Humphreys, Glyn W.
2012-01-01
Facial self-awareness is a basic human ability dependent on a distributed bilateral neural network and revealed through prioritized processing of our own over other faces. Using non-prosopagnosic patients we show, for the first time, that facial self-awareness can be fractionated into different component processes. Patients performed two face…
Students' Awareness of Science Teachers' Leadership, Attitudes toward Science, and Positive Thinking
ERIC Educational Resources Information Center
Lu, Ying-Yan; Chen, Hsiang-Ting; Hong, Zuway-R.; Yore, Larry D.
2016-01-01
There appears to be a complex network of cognitive and affective factors that influence students' decisions to study science and motivate their choices to engage in science-oriented careers. This study explored 330 Taiwanese senior high school students' awareness of their science teacher's learning leadership and how it relates to the students'…
ERIC Educational Resources Information Center
Giacobe, Nicklaus A.
2013-01-01
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
A novel framework for command and control of networked sensor systems
NASA Astrophysics Data System (ADS)
Chen, Genshe; Tian, Zhi; Shen, Dan; Blasch, Erik; Pham, Khanh
2007-04-01
In this paper, we have proposed a highly innovative advanced command and control framework for sensor networks used for future Integrated Fire Control (IFC). The primary goal is to enable and enhance target detection, validation, and mitigation for future military operations by graphical game theory and advanced knowledge information fusion infrastructures. The problem is approached by representing distributed sensor and weapon systems as generic warfare resources which must be optimized in order to achieve the operational benefits afforded by enabling a system of systems. This paper addresses the importance of achieving a Network Centric Warfare (NCW) foundation of information superiority-shared, accurate, and timely situational awareness upon which advanced automated management aids for IFC can be built. The approach uses the Data Fusion Information Group (DFIG) Fusion hierarchy of Level 0 through Level 4 to fuse the input data into assessments for the enemy target system threats in a battlespace to which military force is being applied. Compact graph models are employed across all levels of the fusion hierarchy to accomplish integrative data fusion and information flow control, as well as cross-layer sensor management. The functional block at each fusion level will have a set of innovative algorithms that not only exploit the corresponding graph model in a computationally efficient manner, but also permit combined functional experiments across levels by virtue of the unifying graphical model approach.
Walters, Suzan M; Rivera, Alexis V; Starbuck, Lila; Reilly, Kathleen H; Boldon, Nyasha; Anderson, Bridget J; Braunstein, Sarah
2017-07-01
Pre-exposure prophylaxis (PrEP) to reduce the risk of HIV was approved in 2012 and post-exposure prophylaxis (PEP) in 2005. We report the differences in awareness of PrEP/PEP and factors associated with awareness by examining 3 risk groups (men who have sex with men (MSM), people who inject drugs, and high-risk heterosexuals). National HIV Behavioral Surveillance system data collected in New York City (NYC) and Long Island, NY in 2011-2013 were used. Logistic regressions by region were developed to estimate adjusted associations [Adjusted Odds Ratios (AOR)] and determine differences in awareness of PrEP/PEP. Awareness of PrEP/PEP was low for all groups. In multivariate analysis controlling for sociodemographic factors, noninjection drug use, HIV status, and exposure to HIV prevention, males who inject drugs in NYC had significantly decreased odds of PrEP/PEP awareness [AOR: 0.45; confidence interval (CI): 0.25 to 0.81] compared with MSM. MSM aged 18-29 years had increased awareness of PrEP (AOR: 2.94; 95% CI 1.11 to 7.80). On Long Island, females who inject drugs (AOR: 0.18; 95% CI: 0.05 to 0.62), males who inject drugs (AOR: 0.14; 95% CI: 0.05 to 0.39), female heterosexuals (AOR: 0.25; 95% CI: 0.11 to 0.59), and male heterosexuals (AOR: 0.32; 95% CI: 0.14 to 0.73) had significantly decreased odds of PrEP/PEP awareness. Black MSM had increased awareness of PrEP (AOR: 4.08 CI:1.21 to 13.73). Large proportions of groups at-risk for HIV were unaware of PrEP/PEP. When comparing risk groups to MSM, we found MSM to have greater awareness in both regions. On Long Island, people who inject drugs and heterosexuals were far less likely to have PrEP/PEP awareness than in NYC. On Long Island, Black MSM had increased PrEP awareness and in NYC MSM aged 18-29 had increased PrEP awareness. These findings suggest that awareness may be spreading through networks and highlight the importance of targeted educational and prevention efforts by group and region.
Le Berre, Anne-Pascale; Sullivan, Edith V.
2016-01-01
In addiction, notably, Alcohol Use Disorder (AUD), patients often have a tendency to fail to acknowledge the reality of the disease and to minimize the physical, psychological, and social difficulties attendant to chronic alcohol consumption. This lack of awareness can reduce the chances of initiating and maintaining sobriety. Presented here is a model focusing on compromised awareness in individuals with AUD of mild to moderate cognitive deficits, in particular, for episodic memory impairment—the ability to learn new information, such as recent personal experiences. Early in abstinence, alcoholics can be unaware of their memory deficits and overestimate their mnemonic capacities, which can be investigated with metamemory paradigms. Relevant neuropsychological and neuroimaging results considered suggest that the alcoholics’ impairment of awareness of their attenuated memory function can be a clinical manifestation explained mechanistically by neurobiological factors, including compromise of brain systems that result in a mild form of mnemonic anosognosia. Specifically, unawareness of memory impairment in AUD may result from a lack of personal knowledge updating attributable to damage in brain regions or connections supporting conscious recollection in episodic memory. Likely candidates are posterior parietal and medial frontal regions known to be integral part of the Default Mode Network (DMN) and the insula leading to an impaired switching mechanism between the DMN and the Central-Executive Control (i.e., Lateral Prefronto-Parietal) Network. The cognitive concepts and neural substrates noted for addictive disorders may also be relevant for problems in self-identification of functional impairment resulting from injury following war-related blast, sport-related concussion, and insidiously occurring dementia. PMID:27447979
An Energy Aware Adaptive Sampling Algorithm for Energy Harvesting WSN with Energy Hungry Sensors.
Srbinovski, Bruno; Magno, Michele; Edwards-Murphy, Fiona; Pakrashi, Vikram; Popovici, Emanuel
2016-03-28
Wireless sensor nodes have a limited power budget, though they are often expected to be functional in the field once deployed for extended periods of time. Therefore, minimization of energy consumption and energy harvesting technology in Wireless Sensor Networks (WSN) are key tools for maximizing network lifetime, and achieving self-sustainability. This paper proposes an energy aware Adaptive Sampling Algorithm (ASA) for WSN with power hungry sensors and harvesting capabilities, an energy management technique that can be implemented on any WSN platform with enough processing power to execute the proposed algorithm. An existing state-of-the-art ASA developed for wireless sensor networks with power hungry sensors is optimized and enhanced to adapt the sampling frequency according to the available energy of the node. The proposed algorithm is evaluated using two in-field testbeds that are supplied by two different energy harvesting sources (solar and wind). Simulation and comparison between the state-of-the-art ASA and the proposed energy aware ASA (EASA) in terms of energy durability are carried out using in-field measured harvested energy (using both wind and solar sources) and power hungry sensors (ultrasonic wind sensor and gas sensors). The simulation results demonstrate that using ASA in combination with an energy aware function on the nodes can drastically increase the lifetime of a WSN node and enable self-sustainability. In fact, the proposed EASA in conjunction with energy harvesting capability can lead towards perpetual WSN operation and significantly outperform the state-of-the-art ASA.
Increasing social capital via local networks: analysis in the context of a surgical practice.
Thakur, Anjani; Yang, Isaac; Lee, Michael Y; Goel, Arpan; Ashok, Ashwin; Fonkalsrud, Eric W
2002-09-01
The relationship between social capital (support, trust, patient awareness, and increased practice revenue) and local networks (university hospital) in communities has received little attention. The development of computer-based communication networks (social networks) has added a new dimension to the argument, posing the question of whether local networks can (re-)create social capital in local communities. This relationship is examined through a review of the literature on local networks and social capital and a surgeon's practice management from 1990 to 2001 with respect to repair of pectus chest deformities. With respect to pectus repair there was a consistent but small number of new referrals (15-20 new patients/year), lack of patient awareness (eight to 12 self-referred patients/year), and modest practice revenue. Since the inception of an Internet website (social network) dedicated to pectus repair in 1996 there has been increased social participation (n = 630 hits/year to the website); facilitation of spread of information through E-mail messages (n = 430 messages/year); and a greater participation of groups such as women, minorities, adults, and those with disability (n = 120 patients/year). The dissemination of information via the local network has also allowed an "outward movement" with increased participation by interconnecting communities (n = 698,300 global Internet participants based on statistical ratios). We conclude that local networks have enhanced social networks providing new grounds for the development of relationships based on choice and shared interest.
Lapate, R. C.; Rokers, B.; Tromp, D. P. M.; Orfali, N. S.; Oler, J. A.; Doran, S. T.; Adluru, N.; Alexander, A. L.; Davidson, R. J.
2016-01-01
Conscious awareness of negative cues is thought to enhance emotion-regulatory capacity, but the neural mechanisms underlying this effect are unknown. Using continuous flash suppression (CFS) in the MRI scanner, we manipulated visual awareness of fearful faces during an affect misattribution paradigm, in which preferences for neutral objects can be biased by the valence of a previously presented stimulus. The amygdala responded to fearful faces independently of awareness. However, when awareness of fearful faces was prevented, individuals with greater amygdala responses displayed a negative bias toward unrelated novel neutral faces. In contrast, during the aware condition, inverse coupling between the amygdala and prefrontal cortex reduced this bias, particularly among individuals with higher structural connectivity in the major white matter pathway connecting the prefrontal cortex and amygdala. Collectively, these results indicate that awareness promotes the function of a critical emotion-regulatory network targeting the amygdala, providing a mechanistic account for the role of awareness in emotion regulation. PMID:27181344
ICS logging solution for network-based attacks using Gumistix technology
NASA Astrophysics Data System (ADS)
Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan
2013-05-01
Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.
Baldominos, Alejandro; Saez, Yago; Isasi, Pedro
2018-04-23
Human activity recognition is a challenging problem for context-aware systems and applications. It is gaining interest due to the ubiquity of different sensor sources, wearable smart objects, ambient sensors, etc. This task is usually approached as a supervised machine learning problem, where a label is to be predicted given some input data, such as the signals retrieved from different sensors. For tackling the human activity recognition problem in sensor network environments, in this paper we propose the use of deep learning (convolutional neural networks) to perform activity recognition using the publicly available OPPORTUNITY dataset. Instead of manually choosing a suitable topology, we will let an evolutionary algorithm design the optimal topology in order to maximize the classification F1 score. After that, we will also explore the performance of committees of the models resulting from the evolutionary process. Results analysis indicates that the proposed model was able to perform activity recognition within a heterogeneous sensor network environment, achieving very high accuracies when tested with new sensor data. Based on all conducted experiments, the proposed neuroevolutionary system has proved to be able to systematically find a classification model which is capable of outperforming previous results reported in the state-of-the-art, showing that this approach is useful and improves upon previously manually-designed architectures.
Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems.
Yin, Yuyu; Yu, Fangzheng; Xu, Yueshen; Yu, Lifeng; Mu, Jinglong
2017-09-08
Cyber-physical systems (CPS) have received much attention from both academia and industry. An increasing number of functions in CPS are provided in the way of services, which gives rise to an urgent task, that is, how to recommend the suitable services in a huge number of available services in CPS. In traditional service recommendation, collaborative filtering (CF) has been studied in academia, and used in industry. However, there exist several defects that limit the application of CF-based methods in CPS. One is that under the case of high data sparsity, CF-based methods are likely to generate inaccurate prediction results. In this paper, we discover that mining the potential similarity relations among users or services in CPS is really helpful to improve the prediction accuracy. Besides, most of traditional CF-based methods are only capable of using the service invocation records, but ignore the context information, such as network location, which is a typical context in CPS. In this paper, we propose a novel service recommendation method for CPS, which utilizes network location as context information and contains three prediction models using random walking. We conduct sufficient experiments on two real-world datasets, and the results demonstrate the effectiveness of our proposed methods and verify that the network location is indeed useful in QoS prediction.
2018-01-01
Human activity recognition is a challenging problem for context-aware systems and applications. It is gaining interest due to the ubiquity of different sensor sources, wearable smart objects, ambient sensors, etc. This task is usually approached as a supervised machine learning problem, where a label is to be predicted given some input data, such as the signals retrieved from different sensors. For tackling the human activity recognition problem in sensor network environments, in this paper we propose the use of deep learning (convolutional neural networks) to perform activity recognition using the publicly available OPPORTUNITY dataset. Instead of manually choosing a suitable topology, we will let an evolutionary algorithm design the optimal topology in order to maximize the classification F1 score. After that, we will also explore the performance of committees of the models resulting from the evolutionary process. Results analysis indicates that the proposed model was able to perform activity recognition within a heterogeneous sensor network environment, achieving very high accuracies when tested with new sensor data. Based on all conducted experiments, the proposed neuroevolutionary system has proved to be able to systematically find a classification model which is capable of outperforming previous results reported in the state-of-the-art, showing that this approach is useful and improves upon previously manually-designed architectures. PMID:29690587
Zhou, Mu; Xu, Yu Bin; Ma, Lin; Tian, Shuo
2012-01-01
The expected errors of RADAR sensor networks with linear probabilistic location fingerprints inside buildings with varying Wi-Fi Gaussian strength are discussed. As far as we know, the statistical errors of equal and unequal-weighted RADAR networks have been suggested as a better way to evaluate the behavior of different system parameters and the deployment of reference points (RPs). However, up to now, there is still not enough related work on the relations between the statistical errors, system parameters, number and interval of the RPs, let alone calculating the correlated analytical expressions of concern. Therefore, in response to this compelling problem, under a simple linear distribution model, much attention will be paid to the mathematical relations of the linear expected errors, number of neighbors, number and interval of RPs, parameters in logarithmic attenuation model and variations of radio signal strength (RSS) at the test point (TP) with the purpose of constructing more practical and reliable RADAR location sensor networks (RLSNs) and also guaranteeing the accuracy requirements for the location based services in future ubiquitous context-awareness environments. Moreover, the numerical results and some real experimental evaluations of the error theories addressed in this paper will also be presented for our future extended analysis. PMID:22737027
Zhou, Mu; Xu, Yu Bin; Ma, Lin; Tian, Shuo
2012-01-01
The expected errors of RADAR sensor networks with linear probabilistic location fingerprints inside buildings with varying Wi-Fi Gaussian strength are discussed. As far as we know, the statistical errors of equal and unequal-weighted RADAR networks have been suggested as a better way to evaluate the behavior of different system parameters and the deployment of reference points (RPs). However, up to now, there is still not enough related work on the relations between the statistical errors, system parameters, number and interval of the RPs, let alone calculating the correlated analytical expressions of concern. Therefore, in response to this compelling problem, under a simple linear distribution model, much attention will be paid to the mathematical relations of the linear expected errors, number of neighbors, number and interval of RPs, parameters in logarithmic attenuation model and variations of radio signal strength (RSS) at the test point (TP) with the purpose of constructing more practical and reliable RADAR location sensor networks (RLSNs) and also guaranteeing the accuracy requirements for the location based services in future ubiquitous context-awareness environments. Moreover, the numerical results and some real experimental evaluations of the error theories addressed in this paper will also be presented for our future extended analysis.
A Wi-Fi based Electronic Road Sign for Enhancing the Awareness of Vehicle Driver
NASA Astrophysics Data System (ADS)
Bhawiyuga, A.; Sabriansyah, R. A.; Yahya, W.; E Putra, R.
2017-01-01
Reducing the road accident rate is one of the city goal in the area of transportation. One of the effort to reach that goal is done by deploying various signs across the road. However, the role of those road signs can be diminished once the vehicle drivers intentionally or unintentionally disobey the rule indicated on those signs. In order to increase the awareness of the driver, we can employ the vehicular network concept in which a vehicle can communicate with another vehicles or with the infrastructure installed along the road. For realizing that idea, we propose the implementation of communication equipped road sign system which consists of two components: Road Side Unit (RSU) module deployed at road sign and On Board Unit (OBU) module deployed at each vehicle. In our proposed scheme, both of the devices communicate each other through the widely-used Wi-Fi protocol (IEEE 802.11n) operating in ad-hoc mode. While a OBU equipped vehicle is moving towards the communication range of RSU, it will make an association to a predefined wireless ad-hoc network. Once it is associated, the OBU can receive message broadcast by the RSU. Upon reception, OBU display alert message indicating that the vehicle is approaching a road sign. From performance testing we observe that the proposed system can give relatively good service the vehicle moving as fast as speed 90km/h with the distance as far as 90m.
Congestion control and routing over satellite networks
NASA Astrophysics Data System (ADS)
Cao, Jinhua
Satellite networks and transmissions find their application in fields of computer communications, telephone communications, television broadcasting, transportation, space situational awareness systems and so on. This thesis mainly focuses on two networking issues affecting satellite networking: network congestion control and network routing optimization. Congestion, which leads to long queueing delays, packet losses or both, is a networking problem that has drawn the attention of many researchers. The goal of congestion control mechanisms is to ensure high bandwidth utilization while avoiding network congestion by regulating the rate at which traffic sources inject packets into a network. In this thesis, we propose a stable congestion controller using data-driven, safe switching control theory to improve the dynamic performance of satellite Transmission Control Protocol/Active Queue Management (TCP/AQM) networks. First, the stable region of the Proportional-Integral (PI) parameters for a nominal model is explored. Then, a PI controller, whose parameters are adaptively tuned by switching among members of a given candidate set, using observed plant data, is presented and compared with some classical AQM policy examples, such as Random Early Detection (RED) and fixed PI control. A new cost detectable switching law with an interval cost function switching algorithm, which improves the performance and also saves the computational cost, is developed and compared with a law commonly used in the switching control literature. Finite-gain stability of the system is proved. A fuzzy logic PI controller is incorporated as a special candidate to achieve good performance at all nominal points with the available set of candidate controllers. Simulations are presented to validate the theory. An effocient routing algorithm plays a key role in optimizing network resources. In this thesis, we briefly analyze Low Earth Orbit (LEO) satellite networks, review the Cross Entropy (CE) method and then develop a novel on-demand routing system named Cross Entropy Accelerated Ant Routing System (CEAARS) for regular constellation LEO satellite networks. By implementing simulations on an Iridium-like satellite network, we compare the proposed CEAARS algorithm with the two approaches to adaptive routing protocols on the Internet: distance-vector (DV) and link-state (LS), as well as with the original Cross Entropy Ant Routing System (CEARS). DV algorithms are based on distributed Bellman Ford algorithm, and LS algorithms are implementation of Dijkstras single source shortest path. The results show that CEAARS not only remarkably improves the convergence speed of achieving optimal or suboptimal paths, but also reduces the number of overhead ants (management packets).
When Networks Build a Platform Students Step up. Lumina Foundation Lesson. Spring 2010
ERIC Educational Resources Information Center
Brennan, Patricia L.
2010-01-01
For the people behind the Lumina Foundation for Education, the term "network" has particular meaning. In fact, largely as a result of their work in a national college awareness and action campaign called KnowHow2GO, they have come to define networks in a specific way--and they ask their KnowHow2GO grantees and partners to form networks…
Improving Maritime Domain Awareness Using Neural Networks for Target of Interest Classification
2015-03-01
spreading SCG scaled conjugate gradient xv THIS PAGE INTENTIONALLY LEFT BLANK xvi EXECUTIVE SUMMARY The research detailed in this thesis is a...algorithms were explored for training the neural networks: resilient backpropagation (RP) and scaled conjugate gradient backpropagation ( SCG ). The...results of the neural network training performance are presented using mean squared error convergence plots. In all implementations, the SCG learning
A practical indoor context-aware surveillance system with multi-Kinect sensors
NASA Astrophysics Data System (ADS)
Jia, Lili; You, Ying; Li, Tiezhu; Zhang, Shun
2014-11-01
In this paper we develop a novel practical application, which give scalable services to the end users when abnormal actives are happening. Architecture of the application has been presented consisting of network infrared cameras and a communication module. In this intelligent surveillance system we use Kinect sensors as the input cameras. Kinect is an infrared laser camera which its user can access the raw infrared sensor stream. We install several Kinect sensors in one room to track the human skeletons. Each sensor returns the body positions with 15 coordinates in its own coordinate system. We use calibration algorithms to calibrate all the body positions points into one unified coordinate system. With the body positions points, we can infer the surveillance context. Furthermore, the messages from the metadata index matrix will be sent to mobile phone through communication module. User will instantly be aware of an abnormal case happened in the room without having to check the website. In conclusion, theoretical analysis and experimental results in this paper show that the proposed system is reasonable and efficient. And the application method introduced in this paper is not only to discourage the criminals and assist police in the apprehension of suspects, but also can enabled the end-users monitor the indoor environments anywhere and anytime by their phones.
NASA Astrophysics Data System (ADS)
McGillivary, P. A.; Borges de Sousa, J.; Wackowski, S.; Walker, G.
2011-12-01
Small remotely piloted aircraft have recently been used for maritime remote sensing, including launch and retrieval operations from land, ships and sea ice. Such aircraft can also function to collect and communicate data from other ocean observing system platforms including moorings, tagged animals, drifters, autonomous surface vessels (ASVs), and autonomous underwater vessels (AUVs). The use of small remotely piloted aircraft (or UASs, unmanned aerial systems) with a combination of these capabilities will be required to monitor the vast areas of the open ocean, as well as in harsh high-latitude ecosystems. Indeed, these aircraft are a key component of planned high latitude maritime domain awareness environmental data collection capabilities, including use of visible, IR and hyperspectral sensors, as well as lidar, meteorological sensors, and interferometric synthetic aperture radars (ISARs). We here first describe at-sea demonstrations of improved reliability and bandwidth of communications from ocean sensors on autonomous underwater vehicles to autonomous surface vessels, and then via remotely piloted aircraft to shore, ships and manned aircraft using Delay and Disruption Tolerant (DTN) communication protocols. DTN enables data exchange in communications-challenged environments, such as remote regions of the ocean including high latitudes where low satellite angles and auroral disturbances can be problematic. DTN provides a network architecture and application interface structured around optionally-reliable asynchronous message forwarding, with limited expectations of end-to-end connectivity and node resources. This communications method enables aircraft and surface vessels to function as data mules to move data between physically disparate nodes. We provide examples of the uses of this communication protocol for environmental data collection and data distribution with a variety of different remotely piloted aircraft in a coastal ocean environment. Next, we highlight use in the arctic of two different small remotely piloted aircraft (ScanEagle and RAVEN) for remote sensing of ice and ocean conditions as well as surveys of marine mammals. Finally, we explain how these can be used in future networked environments with DTN support not only for the collection of ocean and ice data for maritime domain awareness, but also for monitoring oil spill dynamics in high latitude environments, including spills in and under sea ice. The networked operation of heterogeneous air and ocean vehicle systems using DTN communications methods can provide unprecedented levels of spatial-temporal sampling resolution important to improving arctic remote sensing and maritime domain awareness capabilities.
ERIC Educational Resources Information Center
Cutajar, Maria
2017-01-01
This article reports on phenomenographic research which explored the qualitative differences in post-secondary students' accounts of their networked learning experiences. Data was generated using semi-structured interviews with a purposive sample of participants. Phenomenographic analysis led to a configuration of variation in students' accounts…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlos H. Rentel
2007-03-31
The objective of this project was to create a low-cost, robust anticipatory wireless sensor network (A-WSN) to ensure the security and reliability of the United States energy infrastructure. This document highlights Eaton Corporation's plan to bring these technologies to market.
Resource Management in QoS-Aware Wireless Cellular Networks
ERIC Educational Resources Information Center
Zhang, Zhi
2011-01-01
Emerging broadband wireless networks that support high speed packet data with heterogeneous quality of service (QoS) requirements demand more flexible and efficient use of the scarce spectral resource. Opportunistic scheduling exploits the time-varying, location-dependent channel conditions to achieve multiuser diversity. In this work, we study…