Sample records for detection network cldn

  1. CLDN1 expression in cervical cancer cells is related to tumor invasion and metastasis.

    PubMed

    Zhang, Wei-Na; Li, Wei; Wang, Xiao-Li; Hu, Zheng; Zhu, Da; Ding, Wen-Cheng; Liu, Dan; Li, Ke-Zhen; Ma, Ding; Wang, Hui

    2016-12-27

    Even though infection with human papillomaviruses (HPV) is very important, it is not the sole cause of cervical cancer. Because it is known that genetic variations that result from HPV infection are probably the most important causes of cervical cancer, we used human whole genome array comparative genomic hybridization to detect the copy number variations of genes in cervical squamous cell carcinoma. The results of the array were validated by PCR, FISH and immunohistochemistry. We find that the copy number and protein expression of claudin-1 (CLDN1) increase with the progression of cervical cancer. The strong positive staining of CLDN1 in the cervical lymph node metastasis group received a significantly higher score than the staining in the group with no lymph node metastasis of cervical cancer tissues. The overexpression of CLDN1 in SiHa cells can increase anti-apoptosis ability and promote invasive ability of these cells accompanied by a decrease in expression of the epithelial marker E-cadherin as well as an increase in the expression of the mesenchymal marker vimentin. CLDN1 induces the epithelial-mesenchymal transition (EMT) through its interaction with SNAI1. Furthermore, we demonstrate that CLDN1 overexpression has significant effects on the growth and metastasis of xenografted tumors in athymic mice. These data suggest that CLDN1 promotes invasion and metastasis in cervical cancer cells via the expression of EMT/invasion-related genes. Therefore, CLDN1 could be a potential therapeutic target for the treatment of cervical cancer.

  2. Regulation of gill claudin paralogs by salinity, cortisol and prolactin in Mozambique tilapia (Oreochromis mossambicus).

    PubMed

    Tipsmark, Christian K; Breves, Jason P; Rabeneck, D Brett; Trubitt, Rebecca T; Lerner, Darren T; Grau, E Gordon

    2016-09-01

    In euryhaline teleosts, reorganization of gill tight junctions during salinity acclimation involves dynamic expression of specific claudin (Cldn) paralogs. We identified four transcripts encoding Cldn tight junction proteins in the tilapia gill transcriptome: cldn10c, cldn10e, cldn28a and cldn30. A tissue distribution experiment found cldn10c and cldn10e expression levels in the gill to be 100-fold higher than any other tissues examined. cldn28a and cldn30 levels in the gill were 10-fold greater than levels in other tissues. Expression of these genes in Mozambique tilapia was examined during acclimation to fresh water (FW), seawater (SW), and in response to hormone treatments. Transfer of tilapia from FW to SW elevated cldn10c and cldn10e, while cldn28a and cldn30 were stimulated following transfer from SW to FW. In hypophysectomized tilapia transferred to FW, pituitary extirpation induced reduced expression of cldn10c, cldn10e and cldn28a; these effects were mitigated equally by either prolactin or cortisol replacement. In vitro experiments with gill filaments showed that cortisol stimulated expression of all four cldns examined, suggesting a direct action of cortisol in situ. Our data indicate that elevated cldn10c and cldn10e expression is important during acclimation of tilapia to SW possibly by conferring ion specific paracellular permeability. On the other hand, expression of cldn28a and cldn30 appears to contribute to reorganization of branchial epithelium during FW acclimation. Hormone treatment experiments showed that particular FW- and SW-induced cldns are controlled by cortisol and prolactin. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Claudin-16 and claudin-19 interact and form a cation-selective tight junction complex

    PubMed Central

    Hou, Jianghui; Renigunta, Aparna; Konrad, Martin; Gomes, Antonio S.; Schneeberger, Eveline E.; Paul, David L.; Waldegger, Siegfried; Goodenough, Daniel A.

    2008-01-01

    Tight junctions (TJs) play a key role in mediating paracellular ion reabsorption in the kidney. Familial hypomagnesemia with hypercalciuria and nephrocalcinosis (FHHNC) is an inherited disorder caused by mutations in the genes encoding the TJ proteins claudin-16 (CLDN16) and CLDN19; however, the mechanisms underlying the roles of these claudins in mediating paracellular ion reabsorption in the kidney are not understood. Here we showed that in pig kidney epithelial cells, CLDN19 functioned as a Cl– blocker, whereas CLDN16 functioned as a Na+ channel. Mutant forms of CLDN19 that are associated with FHHNC were unable to block Cl– permeation. Coexpression of CLDN16 and CLDN19 generated cation selectivity of the TJ in a synergistic manner, and CLDN16 and CLDN19 were observed to interact using several criteria. In addition, disruption of this interaction by introduction of FHHNC-causing mutant forms of either CLDN16 or CLDN19 abolished their synergistic effect. Our data show that CLDN16 interacts with CLDN19 and that their association confers a TJ with cation selectivity, suggesting a mechanism for the role of mutant forms of CLDN16 and CLDN19 in the development of FHHNC. PMID:18188451

  4. Transcriptomic Analysis of the Claudin Interactome in Malignant Pleural Mesothelioma: Evaluation of the Effect of Disease Phenotype, Asbestos Exposure, and CDKN2A Deletion Status

    PubMed Central

    Rouka, Erasmia; Vavougios, Georgios D.; Solenov, Evgeniy I.; Gourgoulianis, Konstantinos I.; Hatzoglou, Chrissi; Zarogiannis, Sotirios G.

    2017-01-01

    Malignant pleural mesothelioma (MPM) is a highly aggressive tumor primarily associated with asbestos exposure. Early detection of MPM is restricted by the long latency period until clinical presentation, the ineffectiveness of imaging techniques in early stage detection and the lack of non-invasive biomarkers with high sensitivity and specificity. In this study we used transcriptome data mining in order to determine which CLAUDIN (CLDN) genes are differentially expressed in MPM as compared to controls. Using the same approach we identified the interactome of the differentially expressed CLDN genes and assessed their expression profile. Subsequently, we evaluated the effect of tumor histology, asbestos exposure, CDKN2A deletion status, and gender on the gene expression level of the claudin interactome. We found that 5 out of 15 studied CLDNs (4, 5, 8, 10, 15) and 4 out of 27 available interactors (S100B, SHBG, CDH5, CXCL8) were differentially expressed in MPM specimens vs. healthy tissues. The genes encoding the CLDN-15 and S100B proteins present differences in their expression profile between the three histological subtypes of MPM. Moreover, CLDN-15 is significantly under-expressed in the cohort of patients with previous history of asbestos exposure. CLDN-15 was also found significantly underexpressed in patients lacking the CDKN2A gene. These results warrant the detailed in vitro investigation of the role of CDLN-15 in the pathobiology of MPM. PMID:28377727

  5. Transcriptomic Analysis of the Claudin Interactome in Malignant Pleural Mesothelioma: Evaluation of the Effect of Disease Phenotype, Asbestos Exposure, and CDKN2A Deletion Status.

    PubMed

    Rouka, Erasmia; Vavougios, Georgios D; Solenov, Evgeniy I; Gourgoulianis, Konstantinos I; Hatzoglou, Chrissi; Zarogiannis, Sotirios G

    2017-01-01

    Malignant pleural mesothelioma (MPM) is a highly aggressive tumor primarily associated with asbestos exposure. Early detection of MPM is restricted by the long latency period until clinical presentation, the ineffectiveness of imaging techniques in early stage detection and the lack of non-invasive biomarkers with high sensitivity and specificity. In this study we used transcriptome data mining in order to determine which CLAUDIN (CLDN) genes are differentially expressed in MPM as compared to controls. Using the same approach we identified the interactome of the differentially expressed CLDN genes and assessed their expression profile. Subsequently, we evaluated the effect of tumor histology, asbestos exposure, CDKN2A deletion status, and gender on the gene expression level of the claudin interactome. We found that 5 out of 15 studied CLDNs ( 4, 5, 8, 10, 15 ) and 4 out of 27 available interactors ( S100B, SHBG, CDH5, CXCL8 ) were differentially expressed in MPM specimens vs. healthy tissues. The genes encoding the CLDN-15 and S100B proteins present differences in their expression profile between the three histological subtypes of MPM. Moreover, CLDN-15 is significantly under-expressed in the cohort of patients with previous history of asbestos exposure. CLDN-15 was also found significantly underexpressed in patients lacking the CDKN2A gene. These results warrant the detailed in vitro investigation of the role of CDLN-15 in the pathobiology of MPM.

  6. Claudin-31 contributes to corticosteroid-induced alterations in the barrier properties of the gill epithelium.

    PubMed

    Kolosov, Dennis; Donini, Andrew; Kelly, Scott P

    2017-01-05

    The contribution of Claudin-31 (Cldn-31) to corticosteroid-induced tightening of the trout gill epithelium was examined using a primary cultured model preparation. Cldn-31 is a ∼23 kDa protein that localizes to the periphery of gill epithelial cells and diffusely in select gill cells that are Na + -K + -ATPase-immunoreactive. Transcriptional knockdown (KD) of cldn-31 reduced Cldn-31 abundance and increased epithelium permeability. Under simulated in vivo conditions (apical freshwater), cldn-31 KD increased net ion flux rates (≡ efflux). Cortisol treatment increased Cldn-31 abundance and decreased epithelium permeability. This tightening effect was diminished, but not eliminated, by cldn-31 KD, most likely due to other cortisol-sensitive TJ proteins that were transcriptionally unperturbed or enhanced in cortisol-treated cldn-31 KD preparations. However, cldn-31 KD abolished a cortisol-induced increase in Cldn-8d abundance, which may contribute to compromised cldn-31 KD epithelium permeability. Data suggest an important barrier function for Cldn-31 and an integral role for Cldn-31 in corticosteroid-induced gill epithelium tightening. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Transgenic up-regulation of Claudin-6 decreases fine diesel particulate matter (DPM)-induced pulmonary inflammation.

    PubMed

    Lewis, Joshua B; Bodine, Jared S; Gassman, Jason R; Muñoz, Samuel Arce; Milner, Dallin C; Dunaway, Todd M; Egbert, Kaleb M; Monson, Troy D; Broberg, Dallin S; Arroyo, Juan A; Reynolds, Paul R

    2018-04-25

    Claudin-6 (Cldn6) is a tetraspanin transmembrane protein that contributes to tight junctional complexes and has been implicated in the maintenance of lung epithelial barriers. In the present study, we tested the hypothesis that genetic up-regulation of Cldn-6 influences inflammation in mice exposed to short-term environmental diesel particulate matter (DPM). Mice were subjected to ten exposures of nebulized DPM (PM2.5) over a period of 20 days via a nose-only inhalation system (Scireq, Montreal, Canada). Using real-time RT-PCR, we discovered that the Cldn6 gene was up-regulated in control mice exposed to DPM and in lung-specific transgenic mice that up-regulate Cldn-6 (Cldn-6 TG). Interestingly, DPM did not further enhance Cldn-6 expression in Cldn-6 TG mice. DPM caused increased cell diapedesis into bronchoalveolar lavage fluid (BALF) from control mice; however, Cldn-6 TG mice had less total cells and PMNs in BALF following DPM exposure. Because Cldn-6 TG mice had diminished cell diapedesis, other inflammatory intermediates were screened to characterize the impact of increased Cldn-6 on inflammatory signaling. Cytokines that mediate inflammatory responses including TNF-α and IL-1β were differentially regulated in Cldn6 TG mice and controls following DPM exposure. These results demonstrate that epithelial barriers organized by Cldn-6 mediate, at least in part, diesel-induced inflammation. Further work may show that Cldn-6 is a key target in understanding pulmonary epithelial gateways exacerbated by environmental pollution.

  8. Co-Operative Learning and Development Networks.

    ERIC Educational Resources Information Center

    Hodgson, V.; McConnell, D.

    1995-01-01

    Discusses the theory, nature, and benefits of cooperative learning. Considers the Cooperative Learning and Development Network (CLDN) trial in the JITOL (Just in Time Open Learning) project and examines the relationship between theories about cooperative learning and the reality of a group of professionals participating in a virtual cooperative…

  9. Transepithelial resistance and claudin expression in trout RTgill-W1 cell line: effects of osmoregulatory hormones.

    PubMed

    Trubitt, Rebecca T; Rabeneck, D Brett; Bujak, Joanna K; Bossus, Maryline C; Madsen, Steffen S; Tipsmark, Christian K

    2015-04-01

    In the present study, we examined the trout gill cell line RTgill-W1 as a possible tool for in vitro investigation of epithelial gill function in fish. After seeding in transwells, transepithelial resistance (TER) increased until reaching a plateau after 1-2 days (20-80Ω⋅cm(2)), which was then maintained for more than 6 days. Tetrabromocinnamic acid, a known stimulator of TER via casein kinase II inhibition, elevated TER in the cell line to 125% of control values after 2 and 6h. Treatment with ethylenediaminetetraacetic acid induced a decrease in TER to <15% of pre-treatment level. Cortisol elevated TER after 12-72 h in a concentration-dependent manner, and this increase was antagonized by growth hormone (Gh). The effects of three osmoregulatory hormones, Gh, prolactin, and cortisol, on the mRNA expression of three tight junction proteins were examined: claudin-10e (Cldn-10e), Cldn-30, and zonula occludens-1 (Zo-1). The expression of cldn-10e was stimulated by all three hormones but with the strongest effect of Gh (50-fold). cldn-30 expression was stimulated especially by cortisol (20-fold) and also by Gh (4-fold). Finally, zo-1 was unresponsive to hormone treatment. Western blot analysis detected Cldn-10e and Cldn-30 immunoreactive proteins of expected molecular weight in samples from rainbow trout gills but not from RTgill-W1 cultures, possibly due to low expression levels. Collectively, these results show that the RTgill-W1 cell layers have tight junctions between cells, are sensitive to hormone treatments, and may provide a useful model for in vitro study of some in vivo gill phenomena. Copyright © 2014 Elsevier Inc. All rights reserved.

  10. Mosaic expression of claudins in thick ascending limbs of Henle results in spatial separation of paracellular Na+ and Mg2+ transport

    PubMed Central

    Wulfmeyer, Vera Christine; Drewell, Hoora; Mutig, Kerim; Hou, Jianghui; Breiderhoff, Tilman; Müller, Dominik; Fromm, Michael; Bleich, Markus; Günzel, Dorothee

    2017-01-01

    The thick ascending limb (TAL) of Henle’s loop drives paracellular Na+, Ca2+, and Mg2+ reabsorption via the tight junction (TJ). The TJ is composed of claudins that consist of four transmembrane segments, two extracellular segments (ECS1 and -2), and one intracellular loop. Claudins interact within the same (cis) and opposing (trans) plasma membranes. The claudins Cldn10b, -16, and -19 facilitate cation reabsorption in the TAL, and their absence leads to a severe disturbance of renal ion homeostasis. We combined electrophysiological measurements on microperfused mouse TAL segments with subsequent analysis of claudin expression by immunostaining and confocal microscopy. Claudin interaction properties were examined using heterologous expression in the TJ-free cell line HEK 293, live-cell imaging, and Förster/FRET. To reveal determinants of interaction properties, a set of TAL claudin protein chimeras was created and analyzed. Our main findings are that (i) TAL TJs show a mosaic expression pattern of either cldn10b or cldn3/cldn16/cldn19 in a complex; (ii) TJs dominated by cldn10b prefer Na+ over Mg2+, whereas TJs dominated by cldn16 favor Mg2+ over Na+; (iii) cldn10b does not interact with other TAL claudins, whereas cldn3 and cldn16 can interact with cldn19 to form joint strands; and (iv) further claudin segments in addition to ECS2 are crucial for trans interaction. We suggest the existence of at least two spatially distinct types of paracellular channels in TAL: a cldn10b-based channel for monovalent cations such as Na+ and a spatially distinct site for reabsorption of divalent cations such as Ca2+ and Mg2+. PMID:28028216

  11. Claudin 2 deficiency reduces bile flow and increases susceptibility to cholesterol gallstone disease in mice.

    PubMed

    Matsumoto, Kengo; Imasato, Mitsunobu; Yamazaki, Yuji; Tanaka, Hiroo; Watanabe, Mitsuhiro; Eguchi, Hidetoshi; Nagano, Hiroaki; Hikita, Hayato; Tatsumi, Tomohide; Takehara, Tetsuo; Tamura, Atsushi; Tsukita, Sachiko

    2014-11-01

    Bile formation and secretion are essential functions of the hepatobiliary system. Bile flow is generated by transepithelial transport of water and ionic/nonionic solutes via transcellular and paracellular pathways that is mainly driven by osmotic pressure. We examined the role of tight junction-based paracellular transport in bile secretion. Claudins are cell-cell adhesion molecules in tight junctions that create the paracellular barrier. The claudin family has 27 reported members, some of which have paracellular ion- and/or water-channel-like functions. Claudin 2 is a paracellular channel-forming protein that is highly expressed in hepatocytes and cholangiocytes; we examined the hepatobiliary system of claudin 2 knockout (Cldn2(-/-)) mice. We collected liver and biliary tissues from Cldn2(-/-) and Cldn2(+/+) mice and performed histologic, biochemical, and electrophysiologic analyses. We measured osmotic movement of water and/or ions in Cldn2(-/-) and Cldn2(+/+) hepatocytes and bile ducts. Mice were placed on lithogenic diets for 4 weeks and development of gallstone disease was assessed. The rate of bile flow in Cldn2(-/-) mice was half that of Cldn2(+/+) mice, resulting in significantly more concentrated bile in livers of Cldn2(-/-) mice. Consistent with these findings, osmotic gradient-driven water flow was significantly reduced in hepatocyte bile canaliculi and bile ducts isolated from Cldn2(-/-) mice, compared with Cldn2(+/+) mice. After 4 weeks on lithogenic diets, all Cldn2(-/-) mice developed macroscopically visible gallstones; the main component of the gallstones was cholesterol (>98%). In contrast, none of the Cldn2(+/+) mice placed on lithogenic diets developed gallstones. Based on studies of Cldn2(-/-) mice, claudin 2 regulates paracellular ion and water flow required for proper regulation of bile composition and flow. Dysregulation of this process increases susceptibility to cholesterol gallstone disease in mice. Copyright © 2014 AGA Institute. Published by Elsevier Inc. All rights reserved.

  12. Aberrant expression of the tight junction molecules claudin-1 and zonula occludens-1 mediates cell growth and invasion in oral squamous cell carcinoma.

    PubMed

    Babkair, Hamzah; Yamazaki, Manabu; Uddin, Md Shihab; Maruyama, Satoshi; Abé, Tatsuya; Essa, Ahmed; Sumita, Yoshimasa; Ahsan, Md Shahidul; Swelam, Wael; Cheng, Jun; Saku, Takashi

    2016-11-01

    We reported that altered cell contact mediated by E-cadherin is an initial event in the pathogenesis of oral epithelial malignancies. To assess other effects of cell adhesion, we examined the expression levels of tight junction (TJ) molecules in oral carcinoma in situ (CIS) and squamous cell carcinoma (SCC). To identify changes in the expression of TJ molecules, we conducted an analysis of the immunohistochemical profiles of claudin-1 (CLDN-1) and zonula occludens-1 (ZO-1) in surgical specimens acquired from patients with oral SCC containing foci of epithelial dysplasia or from patients with CIS. We used immunofluorescence, Western blotting, reverse-transcription polymerase chain reaction, and RNA interference to evaluate the functions of CLDN-1 and ZO-1 in cultured oral SCC cells. TJ molecules were not detected in normal oral epithelial tissues but were expressed in SCC/CIS cells. ZO-1 was localized within the nucleus of proliferating cells. When CLDN-1 expression was inhibited by transfecting cells with specific small interference RNAs, SCC cells dissociated, and their ability to proliferate and invade Matrigel was inhibited. In contrast, although RNA interference-mediated inhibition of ZO-1 expression did not affect cell morphology, it inhibited cell proliferation and invasiveness. Our findings indicated that the detection of TJ molecules in the oral epithelia may serve as a marker for the malignant phenotype of cells in which CLDN-1 regulates proliferation and invasion. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. The likelihood of winter sprites over the Gulf Stream

    NASA Astrophysics Data System (ADS)

    Price, Colin; Burrows, William; King, Patrick

    2002-11-01

    With the recent introduction of the Canadian Lightning Detection Network (CLDN), it was revealed that during the winter months every year, the highest lightning activity within the network occurs over the Gulf Stream, southeast of Nova Scotia. These storms over the Gulf Stream, in addition to being of importance to trans-Atlantic shipping and aviation, have an unusually high fraction of positive polarity lightning, with unusually large peak currents. Such intense positive lightning flashes are known to generate transient luminous events (TLEs) such as sprites and elves in the upper atmosphere. It is found that many of these large positive discharges produce extremely low frequency (ELF) electromagnetic radiation detected at a field station in the Negev Desert, Israel, 8000 km away, in agreement with previously documented sprite observations. Since these winter storms occur in the same location every year, it provides a good opportunity for field experiments focused on studying winter sprites and oceanic thunderstorms.

  14. Humanisation of a claudin-1-specific monoclonal antibody for clinical prevention and cure of HCV infection without escape.

    PubMed

    Colpitts, Che C; Tawar, Rajiv G; Mailly, Laurent; Thumann, Christine; Heydmann, Laura; Durand, Sarah C; Xiao, Fei; Robinet, Eric; Pessaux, Patrick; Zeisel, Mirjam B; Baumert, Thomas F

    2018-04-01

    HCV infection is a leading cause of chronic liver disease and a major indication for liver transplantation. Although direct-acting antivirals (DAAs) have much improved the treatment of chronic HCV infection, alternative strategies are needed for patients with treatment failure. As an essential HCV entry factor, the tight junction protein claudin-1 (CLDN1) is a promising antiviral target. However, genotype-dependent escape via CLDN6 and CLDN9 has been described in some cell lines as a possible limitation facing CLDN1-targeted therapies. Here, we evaluated the clinical potential of therapeutic strategies targeting CLDN1. We generated a humanised anti-CLDN1 monoclonal antibody (mAb) (H3L3) suitable for clinical development and characterised its anti-HCV activity using cell culture models, a large panel of primary human hepatocytes (PHH) from 12 different donors, and human liver chimeric mice. H3L3 pan-genotypically inhibited HCV pseudoparticle entry into PHH, irrespective of donor. Escape was likely precluded by low surface expression of CLDN6 and CLDN9 on PHH. Co-treatment of a panel of PHH with a CLDN6-specific mAb did not enhance the antiviral effect of H3L3, confirming that CLDN6 does not function as an entry factor in PHH from multiple donors. H3L3 also inhibited DAA-resistant strains of HCV and synergised with current DAAs. Finally, H3L3 cured persistent HCV infection in human-liver chimeric uPA-SCID mice in monotherapy. Overall, these findings underscore the clinical potential of CLDN1-targeted therapies and describe the functional characterisation of a humanised anti-CLDN1 antibody suitable for further clinical development to complement existing therapeutic strategies for HCV. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  15. Claudin-8d is a cortisol-responsive barrier protein in the gill epithelium of trout.

    PubMed

    Kolosov, Dennis; Kelly, Scott P

    2017-10-01

    The influence of claudin (Cldn) 8 tight junction (TJ) proteins on cortisol-mediated alterations in gill epithelium permeability was examined using a primary cultured trout gill epithelium model. Genes encoding three Cldn-8 proteins ( cldn-8b, -8c and -8d ) have been identified in trout and all are expressed in the model gill epithelium. Cortisol treatment 'tightened' the gill epithelium, as indicated by increased transepithelial resistance (TER) and reduced paracellular [ 3 H]polyethylene glycol (MW 400 Da; PEG-400) flux. This occurred in association with elevated cldn-8d mRNA abundance, but no alterations in cldn-8b and -8c mRNA abundance were observed. Transcriptional knockdown (KD) of cldn-8d inhibited a cortisol-induced increase in Cldn-8d abundance and reduced the 'epithelium tightening' effect of cortisol in association with increased paracellular PEG-400 flux. Under simulated in vivo conditions (i.e. apical freshwater), cldn-8d KD hindered a cortisol-mediated reduction in basolateral to apical Na + and Cl - flux (i.e. reduced the ability of cortisol to mitigate ion loss). However, cldn-8d KD did not abolish the tightening effect of cortisol on the gill epithelium. This is likely due, in part, to the effect of cortisol on genes encoding other TJ proteins, which in some cases appeared to exhibit a compensatory response. Data support the idea that Cldn-8d is a barrier protein of the gill epithelium TJ that contributes significantly to corticosteroid-mediated alterations in gill epithelium permeability. © 2017 Society for Endocrinology.

  16. The targeted overexpression of a Claudin mutant in the epidermis of transgenic mice elicits striking epidermal and hair follicle abnormalities.

    PubMed

    Troy, Tammy-Claire; Turksen, Kursad

    2007-06-01

    Skin is one of the largest organs of the body, and is formed during development through a highly orchestrated process involving mesenchymal-epithelial interactions, cell commitment, and terminal differentiation. It protects against microorganism invasion and UV irradiation, inhibits water loss, regulates body temperature, and is an important part of the immune system. Using transgenic mouse technology, we have demonstrated that Claudin (Cldn)-containing tight junctions (TJs) are intricately involved in cell signaling during epidermal differentiation and that an epidermal suprabasal overexpression of Cldn6 results in a perturbed epidermal terminal differentiation program with distinct phenotypic abnormalities. To delineate the role of the Cldn cytoplasmic tail domain in epidermal differentiation, we engineered transgenic mice targeting the overexpression of a Cldn6 cytoplasmic tail-truncation mutant in the epidermis. Transgenic mice were characterized by a lethal barrier dysfunction in addition to the existence of hyperproliferative squamous invaginations/cysts replacing hair follicles. Immunohistochemical analysis revealed an epidermal cytoplasmic accumulation of Cldn6, Cldn11, Cldn12, and Cldn18, downregulation of Cldn1 and aberrant expression of various classical markers of epidermal differentiation; namely the basal keratins as well as K1, involucrin, loricrin, and filaggrin. Collectively these studies suggest an important role for Cldns in epidermal/hair follicle differentiation programs likely involving cross talk to signaling pathways (e.g., Notch) directing cell fate selection and differentiation.

  17. Claudin-18-mediated YAP activity regulates lung stem and progenitor cell homeostasis and tumorigenesis.

    PubMed

    Zhou, Beiyun; Flodby, Per; Luo, Jiao; Castillo, Dan R; Liu, Yixin; Yu, Fa-Xing; McConnell, Alicia; Varghese, Bino; Li, Guanglei; Chimge, Nyam-Osor; Sunohara, Mitsuhiro; Koss, Michael N; Elatre, Wafaa; Conti, Peter; Liebler, Janice M; Yang, Chenchen; Marconett, Crystal N; Laird-Offringa, Ite A; Minoo, Parviz; Guan, Kunliang; Stripp, Barry R; Crandall, Edward D; Borok, Zea

    2018-03-01

    Claudins, the integral tight junction (TJ) proteins that regulate paracellular permeability and cell polarity, are frequently dysregulated in cancer; however, their role in neoplastic progression is unclear. Here, we demonstrated that knockout of Cldn18, a claudin family member highly expressed in lung alveolar epithelium, leads to lung enlargement, parenchymal expansion, increased abundance and proliferation of known distal lung progenitors, the alveolar epithelial type II (AT2) cells, activation of Yes-associated protein (YAP), increased organ size, and tumorigenesis in mice. Inhibition of YAP decreased proliferation and colony-forming efficiency (CFE) of Cldn18-/- AT2 cells and prevented increased lung size, while CLDN18 overexpression decreased YAP nuclear localization, cell proliferation, CFE, and YAP transcriptional activity. CLDN18 and YAP interacted and colocalized at cell-cell contacts, while loss of CLDN18 decreased YAP interaction with Hippo kinases p-LATS1/2. Additionally, Cldn18-/- mice had increased propensity to develop lung adenocarcinomas (LuAd) with age, and human LuAd showed stage-dependent reduction of CLDN18.1. These results establish CLDN18 as a regulator of YAP activity that serves to restrict organ size, progenitor cell proliferation, and tumorigenesis, and suggest a mechanism whereby TJ disruption may promote progenitor proliferation to enhance repair following injury.

  18. A cCPE-based xenon biosensor for magnetic resonance imaging of claudin-expressing cells.

    PubMed

    Piontek, Anna; Witte, Christopher; May Rose, Honor; Eichner, Miriam; Protze, Jonas; Krause, Gerd; Piontek, Jörg; Schröder, Leif

    2017-06-01

    The majority of malignant tumors originate from epithelial cells, and many of them are characterized by an overexpression of claudins (Cldns) and their mislocalization out of tight junctions. We utilized the C-terminal claudin-binding domain of Clostridium perfringens enterotoxin (cCPE), with its high affinity to specific members of the claudin family, as the targeting unit for a claudin-sensitive cancer biosensor. To overcome the poor sensitivity of conventional relaxivity-based magnetic resonance imaging (MRI) contrast agents, we utilized the superior sensitivity of xenon Hyper-CEST biosensors. We labeled cCPE for both xenon MRI and fluorescence detection. As one readout module, we employed a cryptophane (CrA) monoacid and, as the second, a fluorescein molecule. Both were conjugated separately to a biotin molecule via a polyethyleneglycol chemical spacer and later via avidin linked to GST-cCPE. Nontransfected HEK293 cells and HEK293 cells stably expressing Cldn4-FLAG were incubated with the cCPE-based biosensor. Fluorescence-based flow cytometry and xenon MRI demonstrated binding of the biosensor specifically to Cldn4-expressing cells. This study provides proof of concept for the use of cCPE as a carrier for diagnostic contrast agents, a novel approach for potential detection of Cldn3/-4-overexpressing tumors for noninvasive early cancer detection. © 2017 New York Academy of Sciences.

  19. Claudin 5 Expression in Mouse Seminiferous Epithelium Is Dependent upon the Transcription Factor Ets Variant 5 and Contributes to Blood-Testis Barrier Function1

    PubMed Central

    Morrow, Carla M.K.; Tyagi, Gaurav; Simon, Liz; Carnes, Kay; Murphy, Kenneth M.; Cooke, Paul S.; Hofmann, Marie-Claude C.; Hess, Rex A.

    2009-01-01

    The blood-testis barrier (BTB) is formed by tight junctions between Sertoli cells. Results of previous studies suggested that the barrier is deficient in ets variant 5 (ETV5) gene-deleted mice; therefore, microarray data were examined for changes in tight junction-associated genes. The tight junctional protein claudin 5 (CLDN5) was decreased in testes of 8-day-old Etv5−/− pups. The study reported herein examined the expression of CLDN5 in wild-type (WT) and Etv5−/− mice and evaluated its contribution to BTB function. CLDN5 protein expression was evaluated in 8-day-old WT and Etv5−/− and adult WT, Etv5−/−, and W/Wv testes by immunohistochemistry and in 8-day-old WT Sertoli cell-enriched and germ cell-enriched fractions by immunocytochemistry. Cldn5 mRNA expression was evaluated in 0- to 20-day-old and adult WT mice and in 8-day-old and adult Etv5−/− mice via quantitative PCR. Tracer studies were performed in adult WT, Etv5−/−, and W/Wv mice. The results indicate the following: 1) CLDN5 was expressed in Sertoli cells, spermatogonia, and preleptotene spermatocytes. 2) Seminiferous epithelial CLDN5 expression depended upon both the presence of germ cells and ETV5. 3) CLDN5 expression in testicular vascular endothelium and rete testis epithelium was ETV5 independent. 4) Cldn5 mRNA expression increased in the testes of juvenile mice at the time of BTB formation. 5) Testes of Etv5−/− and W/Wv mice, which are both deficient in seminiferous epithelial CLDN5 expression, had biotin tracer leakage from the interstitial space into the seminiferous tubule lumen. In conclusion, CLDN5 is expressed in the seminiferous epithelium, appears to be regulated by multiple influences, and contributes to BTB function. PMID:19571261

  20. Probing effects of pH change on dynamic response of Claudin-2 mediated adhesion using single molecule force spectroscopy.

    PubMed

    Lim, Tong Seng; Vedula, Sri Ram Krishna; Hui, Shi; Kausalya, P Jaya; Hunziker, Walter; Lim, Chwee Teck

    2008-08-15

    Claudins belong to a large family of transmembrane proteins that localize at tight junctions (TJs) where they play a central role in regulating paracellular transport of solutes and nutrients across epithelial monolayers. Their ability to regulate the paracellular pathway is highly influenced by changes in extracellular pH. However, the effect of changes in pH on the strength and kinetics of claudin mediated adhesion is poorly understood. Using atomic force microscopy, we characterized the kinetic properties of homophilic trans-interactions between full length recombinant GST tagged Claudin-2 (Cldn2) under different pH conditions. In measurements covering three orders of magnitude change in force loading rate of 10(2)-10(4) pN/s, the Cldn2/Cldn2 force spectrum (i.e., unbinding force versus loading rate) revealed a fast and a slow loading regime that characterized a steep inner activation barrier and a wide outer activation barrier throughout pH range of 4.5-8. Comparing to the neutral condition (pH 6.9), differences in the inner energy barriers for the dissociation of Cldn2/Cldn2 mediated interactions at acidic and alkaline environments were found to be <0.65 k(B)T, which is much lower than the outer dissociation energy barrier (>1.37 k(B)T). The relatively stable interaction of Cldn2/Cldn2 in neutral environment suggests that electrostatic interactions may contribute to the overall adhesion strength of Cldn2 interactions. Our results provide an insight into the changes in the inter-molecular forces and adhesion kinetics of Cldn2 mediated interactions in acidic, neutral and alkaline environments.

  1. Social stress induces neurovascular pathology promoting depression

    PubMed Central

    Menard, Caroline; Pfau, Madeline L.; Hodes, Georgia E.; Kana, Veronika; Wang, Victoria X.; Bouchard, Sylvain; Takahashi, Aki; Flanigan, Meghan E.; Aleyasin, Hossein; LeClair, Katherine B.; Janssen, William G.; Labonté, Benoit; Parise, Eric M.; Lorsch, Zachary S.; Golden, Sam A.; Heshmati, Mitra; Tamminga, Carol; Turecki, Gustavo; Campbell, Matthew; Fayad, Zahi; Tang, Cheuk Ying; Merad, Miriam; Russo, Scott J.

    2017-01-01

    Studies suggest that heightened peripheral inflammation contributes to the pathogenesis of major depressive disorder. We investigated the effect of chronic social defeat stress, a mouse model of depression, on blood-brain barrier (BBB) permeability and infiltration of peripheral immune signals. We found reduced expression of endothelial cell tight junction protein claudin-5 (cldn5) and abnormal blood vessel morphology in nucleus accumbens (NAc) of stress-susceptible but not resilient mice. CLDN5 expression was also decreased in NAc of depressed patients. Cldn5 down-regulation was sufficient to induce depression-like behaviors following subthreshold social stress while chronic antidepressant treatment rescued cldn5 loss and promoted resilience. Reduced BBB integrity in NAc of stress-susceptible or AAV-shRNA-cldn5-injected mice caused infiltration of peripheral cytokine interleukin-6 (IL-6) into brain parenchyma and subsequent expression of depression-like behaviors. These findings suggest that chronic social stress alters BBB integrity through loss of tight junction protein cldn5, promoting peripheral IL-6 passage across the BBB and depression. PMID:29184215

  2. Safety evaluation of a human chimeric monoclonal antibody that recognizes the extracellular loop domain of claudin-2.

    PubMed

    Hashimoto, Yosuke; Hata, Tomoyuki; Tada, Minoru; Iida, Manami; Watari, Akihiro; Okada, Yoshiaki; Doi, Takefumi; Kuniyasu, Hiroki; Yagi, Kiyohito; Kondoh, Masuo

    2018-05-30

    Claudin-2 (CLDN-2), a pore-forming tight junction protein with a tetra-transmembrane domain, is involved in carcinogenesis and the metastasis of some cancers. Although CLDN-2 is highly expressed in the tight junctions of the liver and kidney, whether CLDN-2 is a safe target for cancer therapy remains unknown. We recently generated a rat monoclonal antibody (mAb, clone 1A2) that recognizes the extracellular domains of human and mouse CLDN-2. Here, we investigated the safety of CLDN-2-targeted cancer therapy by using 1A2 as a model therapeutic antibody. Because most human therapeutic mAbs are IgG1 subtype that can induce antibody-dependent cellular cytotoxicity, we generated a human-rat chimeric IgG1 form of 1A2 (xi-1A2). xi-1A2 activated Fcγ receptor IIIa in the presence of CLDN-2-expressing cells, indicating that xi-1A2 likely exerts antibody-dependent cellular cytotoxicity. At 24 h after its intravenous injection, xi-1A2 was distributed into the liver, kidney, and tumor tissues of mice bearing CLDN-2-expressing fibrosarcoma cells. Treatment of the xenografted mice with xi-1A2 attenuated tumor growth without apparent adverse effects, such as changes in body weight and biochemical markers of liver and kidney injury. These results support xi-1A2 as the lead candidate mAb for safe CLDN-2-targeted cancer therapy. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Impedance Analysis of Ovarian Cancer Cells upon Challenge with C-terminal Clostridium Perfringens Enterotoxin

    NASA Astrophysics Data System (ADS)

    Gordon, Geoffrey; Lo, Chun-Min

    2007-03-01

    Both in vitro and animal studies in breast, prostate, and ovarian cancers have shown that clostridium perfringens enterotoxin (CPE), which binds to CLDN4, may have an important therapeutic benefit, as it is rapidly cytotoxic in tissues overexpressing CLDN4. This study sought to evaluate the ability of C-terminal clostridium perfringens enterotoxin (C-CPE), a CLDN4-targetting molecule, to disrupt tight junction barrier function. Electric cell-substrate impedance sensing (ECIS) was used to measure both junctional resistance and average cell-substrate separation of ovarian cancer cell lines after exposure to C-CPE. A total of 14 ovarian cancer cell lines were used, and included cell lines derived from serous, mucinous, and clear cells. Our results showed that junctional resistance increases as CLDN4 expression increases. In addition, C-CPE is non-cytotoxic in ovarian cancer cells expressing CLDN4. However, exposure to C-CPE results in a significant (p<0.05) dose- and CLDN4-dependent decrease in junctional resistance and an increase in cell-substrate separation. Treatment of ovarian cancer cell lines with C-CPE disrupts tight junction barrier function.

  4. Severe Intestinal Inflammation in the Small Intestine of Mice Induced by Controllable Deletion of Claudin-7.

    PubMed

    Li, Wen-Jing; Xu, Chang; Wang, Kun; Li, Teng-Yan; Wang, Xiao-Nan; Yang, Hui; Xing, Tiaosi; Li, Wen-Xia; Chen, Yan-Hua; Gao, Hong; Ding, Lei

    2018-05-01

    As a potential tumor suppressor gene, Claudin-7 (Cldn7), which is a component of tight junctions, may play an important role in colorectal cancer occurrence and development. To generate a knockout mouse model of inducible conditional Cldn7 in the intestine and analyze the phenotype of the mice after induction with tamoxifen. We constructed Cldn7-flox transgenic mice and crossed them with Villin-CreERT2 mice. The Cldn7 inducible conditional knockout mice appeared normal and were well developed at birth. We induced Cldn7 gene deletion by injecting different dosages of tamoxifen into the mice and then conducted a further phenotypic analysis. After induction for 5 days in succession at a dose of 200 µl tamoxifen in sunflower oil at 10 mg/ml per mouse every time, the mice appeared dehydrated, had a lower temperature, and displayed inactivity or death. The results of hematoxylin-eosin staining showed that the intestines of the Cldn7 inducible conditional knockout mice had severe intestinal defects that included epithelial cell sloughing, necrosis, inflammation and hyperplasia. Owing to the death of ICKO mice, we adjusted the dose of tamoxifen to a dose of 100 µl in sunflower oil at 10 mg/ml per mouse (aged more than 8 weeks old) every 4 days. And we could induce atypical hyperplasia and adenoma in the intestine. Immunofluorescent staining indicated that the intestinal epithelial structure was destroyed. Electron microscopy experimental analysis indicated that the intercellular gap along the basolateral membrane of Cldn7 inducible conditional knockout mice in the intestine was increased and that contact between the cells and matrix was loosened. We generated a model of intestinal Cldn7 inducible conditional knockout mice. Intestinal Cldn7 deletion induced by tamoxifen initiated inflammation and hyperplasia in mice.

  5. A variant in a cis-regulatory element enhances claudin-14 expression and is associated with pediatric-onset hypercalciuria and kidney stones.

    PubMed

    Ure, Megan E; Heydari, Emma; Pan, Wanling; Ramesh, Ajay; Rehman, Sabah; Morgan, Catherine; Pinsk, Maury; Erickson, Robin; Herrmann, Johannes M; Dimke, Henrik; Cordat, Emmanuelle; Lemaire, Mathieu; Walter, Michael; Alexander, R Todd

    2017-06-01

    The greatest risk factor for kidney stones is hypercalciuria, the etiology of which is largely unknown. A recent genome-wide association study (GWAS) linked hypercalciuria and kidney stones to a claudin-14 (CLDN14) risk haplotype. However, the underlying molecular mechanism was not delineated. Recently, renal CLDN14 expression was found to increase in response to increased plasma calcium, thereby inducing calciuria. We hypothesized therefore that some children with hypercalciuria and kidney stones harbor a CLDN14 variant that inappropriately increases gene expression. To test this hypothesis, we sequenced the CLDN14 risk haplotype in a cohort of children with idiopathic hypercalciuria and kidney stones. An intronic SNP was more frequent in affected children. Dual luciferase and cell-based assays demonstrated increased reporter or CLDN14 expression when this polymorphism was introduced. In silico studies predicted the SNP introduced a novel insulinoma-associated 1 (INSM1) transcription factor binding site. Consistent with this, repeating the dual luciferase assay in the presence of INSM1 further increased reporter expression. Our data suggest that children with the INSM1 binding site within the CLDN14 risk haplotype have a higher likelihood of hypercalciuria and kidney stones. Enhanced CLDN14 expression may play a role in the pathophysiology of their hypercalciuria. © 2017 Wiley Periodicals, Inc.

  6. MicroRNA-142-5p contributes to Hashimoto's thyroiditis by targeting CLDN1.

    PubMed

    Zhu, Jin; Zhang, Yuehua; Zhang, Weichen; Zhang, Wei; Fan, Linni; Wang, Lu; Liu, Yixiong; Liu, Shasha; Guo, Ying; Wang, Yingmei; Yi, Jun; Yan, Qingguo; Wang, Zhe; Huang, Gaosheng

    2016-06-08

    MicroRNAs have the potential as diagnostic biomarkers and therapeutic targets in autoimmune diseases. However, very limited studies have evaluated the expression of microRNA profile in thyroid gland related to Hashimoto's thyroiditis (HT). MicroRNA microarray expression profiling was performed and validated by quantitative RT-PCR. The expression pattern of miR-142-5p was detected using locked nucleic acid-in situ hybridization. The target gene was predicted and validated using miRNA targets prediction database, gene expression analysis, quantitative RT-PCR, western blot, and luciferase assay. The potential mechanisms of miR-142-5p were studied using immunohistochemistry, immunofluorescence, and quantitative assay of thyrocyte permeability. Thirty-nine microRNAs were differentially expressed in HT (Fold change ≥2, P < 0.05) and miR-142-5p, miR-142-3p, and miR-146a were only high expression in HT thyroid gland (P < 0.001). miR-142-5p, which was expressed at high levels in injured follicular epithelial cells, was also detected in HT patient serum and positively correlated with thyroglobulin antibody (r ≥ 0.6, P < 0.05). Furthermore, luciferase assay demonstrated CLDN1 was the direct target gene of miR-142-5p (P < 0.05), and Immunohistochemical staining showed a reverse expression patterns with miR-142-5p and CLDN1. Overexpression of miR-142-5p in thyrocytes resulted in reducing of the expression of claudin-1 both in mRNA and protein level (P = 0.032 and P = 0.009 respectively) and increasing the permeability of thyrocytes monolayer (P < 0.01). Our findings indicate a previously unrecognized mechanism that miR-142-5p, targeting CLDN1, plays an important role in HT pathogenesis.

  7. The temporal and spatial expression of Claudins in epidermal development and the accelerated program of epidermal differentiation in K14-CaSR transgenic mice.

    PubMed

    Troy, Tammy-Claire; Li, Yuhua; O'Malley, Lauren; Turksen, Kursad

    2007-02-01

    The importance of the epidermal permeability barrier (EPB) in protecting the mammalian species against harmful UV irradiation, microorganism invasion and water loss is well recognized, as is the role of calcium (Ca(2+)) in keratinocyte differentiation, cell-cell contact and the EPB. In a previous study, we reported that the overexpression of the Ca(2+)-sensing receptor (CaSR) in the undifferentiated basal cells of the epidermis induced a modified epidermal differentiation program including an accelerated EPB formation in transgenic mice, suggesting a role for CaSR signaling in the differentiation of embryonic epidermal cells during development. We now describe the expression profile of claudins (Cldns) and keratin markers in the accelerated EPB formation of K14-CaSR transgenic mice during development as compared to the wild type from E12.5 to newborn stages. Our data show that the transgenic epidermis undergoes an advanced epidermal differentiation program as compared to the wild type as evidenced morphologically as well as by the expression of K14, K1, loricrin, Cldn6, Cldn18 and Cldn11. In addition, we report for the first time the sequential expression of Cldns in epidermal development and describe that the localization of some Cldns change within the epidermis as it matures. Furthermore, we demonstrate that Cldn6 is expressed very early in epidermal morphogenesis, followed by Cldn18, Cldn11 and Cldn1.

  8. Claudin5a is required for proper inflation of Kupffer's vesicle lumen and organ laterality.

    PubMed

    Kim, Jeong-Gyun; Bae, Sung-Jin; Lee, Hye Shin; Park, Ji-Hyeon; Kim, Kyu-Won

    2017-01-01

    Left-right asymmetric organ development is critical to establish a proper body plan of vertebrates. In zebrafish, the Kupffer's vesicle (KV) is a fluid-filled sac which controls asymmetric organ development, and a properly inflated KV lumen by means of fluid influx is a prerequisite for the asymmetric signal transmission. However, little is known about the components that support the paracellular tightness between the KV luminal epithelial cells to sustain hydrostatic pressure during KV lumen expansion. Here, we identified that the claudin5a (cldn5a) is highly expressed at the apical surface of KV epithelial cells and tightly seals the KV lumen. Downregulation of cldn5a in zebrafish showed a failure in organ laterality that resulted from malformed KV. In addition, accelerated fluid influx into KV by combined treatment of forskolin and 3-isobutyl-1-methylxanthine failed to expand the partially-formed KV lumen in cldn5a morphants. However, malformed KV lumen and defective heart laterality in cldn5a morphants were significantly rescued by exogenous cldn5a mRNA, suggesting that the tightness between the luminal epithelial cells is important for KV lumen formation. Taken together, these findings suggest that cldn5a is required for KV lumen inflation and left-right asymmetric organ development.

  9. Claudin5a is required for proper inflation of Kupffer's vesicle lumen and organ laterality

    PubMed Central

    Kim, Jeong-gyun; Bae, Sung-Jin; Lee, Hye Shin; Park, Ji-Hyeon

    2017-01-01

    Left-right asymmetric organ development is critical to establish a proper body plan of vertebrates. In zebrafish, the Kupffer’s vesicle (KV) is a fluid-filled sac which controls asymmetric organ development, and a properly inflated KV lumen by means of fluid influx is a prerequisite for the asymmetric signal transmission. However, little is known about the components that support the paracellular tightness between the KV luminal epithelial cells to sustain hydrostatic pressure during KV lumen expansion. Here, we identified that the claudin5a (cldn5a) is highly expressed at the apical surface of KV epithelial cells and tightly seals the KV lumen. Downregulation of cldn5a in zebrafish showed a failure in organ laterality that resulted from malformed KV. In addition, accelerated fluid influx into KV by combined treatment of forskolin and 3-isobutyl-1-methylxanthine failed to expand the partially-formed KV lumen in cldn5a morphants. However, malformed KV lumen and defective heart laterality in cldn5a morphants were significantly rescued by exogenous cldn5a mRNA, suggesting that the tightness between the luminal epithelial cells is important for KV lumen formation. Taken together, these findings suggest that cldn5a is required for KV lumen inflation and left-right asymmetric organ development. PMID:28771527

  10. Generation and characterization of a human-mouse chimeric antibody against the extracellular domain of claudin-1 for cancer therapy using a mouse model.

    PubMed

    Hashimoto, Yosuke; Tada, Minoru; Iida, Manami; Nagase, Shotaro; Hata, Tomoyuki; Watari, Akihiro; Okada, Yoshiaki; Doi, Takefumi; Fukasawa, Masayoshi; Yagi, Kiyohito; Kondoh, Masuo

    2016-08-12

    Claudin-1 (CLDN-1), an integral transmembrane protein, is an attractive target for drug absorption, prevention of infection, and cancer therapy. Previously, we generated mouse anti-CLDN-1 monoclonal antibodies (mAbs) and found that they enhanced epidermal absorption of a drug and prevented hepatitis C virus infection in human hepatocytes. Here, we investigated anti-tumor activity of a human-mouse chimeric IgG1, xi-3A2, from one of the anti-CLDN-1 mAbs, clone 3A2. Xi-3A2 accumulated in the tumor tissues in mice bearing with human CLDN-1-expressing tumor cells. Xi-3A2 activated Fcγ receptor IIIa-expressing reporter cells in the presence of human CLDN-1-expressing cells, suggesting xi-3A2 has a potential to exhibit antibody-dependent cellular cytotoxicity against CLDN-1 expressing tumor cells. We also constructed a mutant xi-3A2 antibody with Gly, Ser, and Ile substituted with Ala, Asp, and Arg at positions 236, 239, and 332 of the Fc domain. This mutant antibody showed greater activation of Fcγ receptor IIIa and in vivo anti-tumor activity in mice bearing human CLDN-1-expressing tumors than xi-3A2 did. These findings indicate that the G236A/S239D/I332E mutant of xi-3A2 might be a promising lead for tumor therapy. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Activation of the Ca2+-sensing receptor increases renal claudin-14 expression and urinary Ca2+ excretion

    PubMed Central

    Dimke, Henrik; Desai, Prajakta; Borovac, Jelena; Lau, Alyssa; Pan, Wanling; Alexander, R. Todd

    2016-01-01

    Kidney stones are a prevalent clinical condition imposing a large economic burden on the health-care system. Hypercalciuria remains the major risk factor for development of a Ca2+-containing stone. The kidney’s ability to alter Ca2+ excretion in response to changes in serum Ca2+ is in part mediated by the Ca2+-sensing receptor (CaSR). Recent studies revealed renal claudin-14 (Cldn14) expression localized to the thick ascending limb (TAL) and its expression to be regulated via the CaSR. We find that Cldn14 expression is increased by high dietary Ca2+ intake and by elevated serum Ca2+ levels induced by prolonged 1,25-dihydroxyvitamin D3 administration. Consistent with this, activation of the CaSR in vivo via administration of the calcimimetic cinacalcet hydrochloride led to a 40-fold increase in Cldn14 mRNA. Moreover, overexpression of Cldn14 in two separate cell culture models decreased paracellular Ca2+ flux by preferentially decreasing cation permeability, thereby increasing transepithelial resistance. These data support the existence of a mechanism whereby activation of the CaSR in the TAL increases Cldn14 expression, which in turn blocks the paracellular reabsorption of Ca2+. This molecular mechanism likely facilitates renal Ca2+ losses in response to elevated serum Ca2+. Moreover, dys-regulation of the newly described CaSR-Cldn14 axis likely contributes to the development of hypercalciuria and kidney stones. PMID:23283989

  12. Circulating tight junction proteins mirror blood-brain barrier integrity in leukaemia central nervous system metastasis.

    PubMed

    Zhu, Jing-Cheng; Si, Meng-Ya; Li, Ya-Zhen; Chen, Huan-Zhu; Fan, Zhi-Cheng; Xie, Qing-Dong; Jiao, Xiao-Yang

    2017-09-01

    The aim of this study was to evaluate the clinical significance of circulating tight junction (TJ) proteins as biomarkers reflecting of leukaemia central nervous system (CNS) metastasis. TJs [claudin5 (CLDN5), occludin (OCLN) and ZO-1] concentrations were measured in serum and cerebrospinal fluid (CSF) samples obtained from 45 leukaemia patients. Serum ZO-1 was significantly higher (p < 0.05), but CSF ZO-1 levels were not significantly higher in the CNS leukaemia (CNSL) compared to the non-CNSL. The CNSL patients also had a lower CLDN5/ZO1 ratio in both serum and CSF than in non-CNSL patients (p < 0.05). The TJ index was negatively associated with WBC CSF , ALB CSF and BBB values in leukaemia patients. Among all of the parameters studied, CLDN5 CSF had the highest specificity in discriminating between CNSL and non-CNSL patients. Therefore, analysing serum and CSF levels of CLDN5, OCLN and the CLDN5/ZO1 ratio is valuable in evaluating the potential of leukaemia CNS metastasis. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  13. Amelogenesis imperfecta in familial hypomagnesaemia and hypercalciuria with nephrocalcinosis caused by CLDN19 gene mutations.

    PubMed

    Yamaguti, Paulo Marcio; Neves, Francisco de Assis Rocha; Hotton, Dominique; Bardet, Claire; de La Dure-Molla, Muriel; Castro, Luiz Claudio; Scher, Maria do Carmo; Barbosa, Maristela Estevão; Ditsch, Christophe; Fricain, Jean-Christophe; de La Faille, Renaud; Figueres, Marie-Lucile; Vargas-Poussou, Rosa; Houillier, Pascal; Chaussain, Catherine; Babajko, Sylvie; Berdal, Ariane; Acevedo, Ana Carolina

    2017-01-01

    Amelogenesis imperfecta (AI) is a group of genetic diseases characterised by tooth enamel defects. AI was recently described in patients with familial hypercalciuria and hypomagnesaemia with nephrocalcinosis (FHHNC) caused by CLDN16 mutations. In the kidney, claudin-16 interacts with claudin-19 to control the paracellular passage of calcium and magnesium. FHHNC can be linked to mutations in both genes. Claudin-16 was shown to be expressed during amelogenesis; however, no data are available on claudin-19. Moreover, the enamel phenotype of patients with CLDN19 mutations has never been described. In this study, we describe the clinical and genetic features of nine patients with FHHNC carrying CLDN19 mutations and the claudin-19 expression profile in rat ameloblasts. Six FHHNC Brazilian patients were subjected to mutational analysis. Three additional French patients were recruited for orodental characterisation. The expression profile of claudin-19 was evaluated by RT-qPCR and immunofluorescence using enamel epithelium from rat incisors. All patients presented AI at different degrees of severity. Two new likely pathogenic variations in CLDN19 were found: p.Arg200Gln and p.Leu90Arg. RT-qPCR revealed low Cldn19 expression in ameloblasts. Confocal analysis indicated that claudin-19 was immunolocalised at the distal poles of secretory and maturing ameloblasts. For the first time, it was demonstrated that AI is associated with FHHNC in patients carrying CLDN19 mutations. The data suggest claudin-19 as an additional determinant in enamel formation. Indeed, the coexistence of hypoplastic and hypomineralised AI in the patients was consistent with claudin-19 expression in both secretory and maturation stages. Additional indirect systemic effects cannot be excluded. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  14. Insilico modeling and molecular dynamic simulation of claudin-1 point mutations in HCV infection.

    PubMed

    Vipperla, Bhavaniprasad; Dass, J Febin Prabhu; Jayanthi, S

    2014-01-01

    Claudin-1 (CLDN1) in association with envelope glycoprotein (CD81) mediates the fusion of HCV into the cytosol. Recent studies have indicated that point mutations in CLDN1 are important for the entry of hepatitis C virus (HCV). To validate these findings, we employed a computational platform to investigate the structural effect of two point mutations (I32M and E48K). Initially, three-dimensional co-ordinates for CLDN1 receptor sequence were generated. Then, three mutant models were built using the point mutation including a double mutant (I32M/E48K) model from the native model structure. Finally, all the four model structures including the native and three mutant models were subjected to molecular dynamics (MD) simulation for a period of 25 ns to appreciate their dynamic behavior. The MD trajectory files were analyzed using cluster and principal component method. The analysis suggested that either of the single mutation has negligible effect on the overall structure of CLDN1 compared to the double mutant form. However, the double mutant model of CLDN1 shows significant negative impact through the impairment of H-bonds and the simultaneous increase in solvent accessible surface area. Our simulation results are visibly consistent with the experimental report suggesting that the CLDN1 receptor distortion is prominent due to the double mutation with large surface accessibility. This increase in accessible surface area due to the coexistence of double mutation may be presumed as one of the key factor that results in permissive action of HCV attachment and infection.

  15. Rs219780 SNP of Claudin 14 Gene is not Related to Clinical Expression in Primary Hyperparathyroidism.

    PubMed

    Piedra, María; Berja, Ana; García-Unzueta, María Teresa; Ramos, Laura; Valero, Carmen; Amado, José Antonio

    2015-01-01

    The CLDN14 gene encodes a protein involved in the regulation of paracellular permeability or ion transport at epithelial tight junctions as in the nephron. The C allele of the rs219780 SNP (single nucleotide polymorphism) of CLDN14 has been associated with renal lithiasis, high levels of parathormone (PTH), and with low bone mineral density (BMD) in healthy women. Our aim is to study the relationship between rs219780 SNP of CLDN14 and renal lithiasis, fractures, and BMD in patients with primary hyperparathyroidism (PHPT). We enrolled 298 Caucasian patients with PHPT and 328 healthy volunteers in a cross-sectional study. We analysed anthropometric data, history of fractures or kidney stones, biochemical parameters including markers for bone remodelling, abdominal ultrasound, and BMD and genotyping for the rs219780 SNP of CLDN14. We did not find any difference in the frequency of fractures or renal lithiasis between the genotype groups in PHPT patients. Moreover, we did not find any relationship between the T or C alleles and BMD or biochemical parameters. rs219780 SNP of CLDN14 does not appear to be a risk factor for the development of PHPT nor does it seem to influence the clinical expression of PHPT.

  16. Effect of individual SCFA on the epithelial barrier of sheep rumen under physiological and acidotic luminal pH conditions.

    PubMed

    Greco, Gabriele; Hagen, Franziska; Meißner, Svenja; Shen, Zanming; Lu, Zhongyan; Amasheh, Salah; Aschenbach, Jörg R

    2018-02-15

    The objective of this study was to investigate whether individual short-chain fatty acids (SCFA) have a different potential to either regulate the formation of the ruminal epithelial barrier (REB) at physiological pH or to damage the REB at acidotic ruminal pH. Ruminal epithelia of sheep were incubated in Ussing chambers on their mucosal side in buffered solutions (pH 6.1 or 5.1) containing no SCFA (control), 30 mM of either acetate, propionate or butyrate, or 100 mM acetate. Epithelial conductance (Gt), short-circuit current (Isc), and fluorescein flux rates were measured over 7 h. Thereafter, mRNA and protein abundance, as well as localization of the tight junction proteins claudin (Cldn)-1, -4, -7, and occludin were analyzed. At pH 6.1, butyrate increased Gt and decreased Isc, with additional decreases in claudin-7 mRNA and protein abundance (each P < 0.05) and disappearance of Cldn-7 immunosignals from the stratum corneum. By contrast, the mRNA abundance of Cldn-1 and/or Cldn-4 were upregulated by 30 mM propionate, 30 mM butyrate, or 100 mM acetate (P < 0.05), however, without coordinated changes in protein abundance. At luminal pH 5.1, neither Gt, Isc, nor TJ protein abundance was altered in the absence of SCFA; only fluorescein flux rates were slightly increased (P < 0.05) and fluorescein signals were no longer restricted to the stratum corneum. The presence of acetate, propionate, or butyrate at pH 5.1 increased fluorescein flux rates and Gt, and decreased Isc (each P < 0.05). Protein abundance of Cldn-1 was decreased in all SCFA treatments but 30 mM butyrate; abundance of Cldn -4 and -7 was decreased in all SCFA treatments but 30 mM acetate; and abundance of occludin was decreased in all SCFA treatments but 30 mM propionate (each P < 0.05). Immunofluorescence staining of SCFA-treated tissues at pH 5.1 showed disappearance of Cldn-7, discontinuous pattern for Cldn-4 and blurring of occludin and Cldn-1 signals in tight junction complexes. The fluorescein dye appeared to freely diffuse into deeper cell layers. The strongest increase in Gt and consistent decreases in the abundance and immunosignals of tight junction proteins were observed with 100 mM acetate at pH 5.1. We conclude that SCFA may contribute differently to the REB formation at luminal pH 6.1 with possible detrimental effects of butyrate at 30 mM concentration. At luminal pH 5.1, all SCFA elicited REB damage with concentration appearing more critical than SCFA species.

  17. A Key Claudin Extracellular Loop Domain is Critical for Epithelial Barrier Integrity

    PubMed Central

    Mrsny, Randall J.; Brown, G. Thomas; Gerner-Smidt, Kirsten; Buret, Andre G.; Meddings, Jon B.; Quan, Clifford; Koval, Michael; Nusrat, Asma

    2008-01-01

    Intercellular tight junctions (TJs) regulate epithelial barrier properties. Claudins are major structural constituents of TJs and belong to a large family of tetra-spanning membrane proteins that have two predicted extracellular loops (ELs). Given that claudin-1 is widely expressed in epithelia, we further defined the role of its EL domains in determining TJ function. The effects of several claudin-1 EL mimetic peptides on epithelial barrier structure and function were examined. Incubation of model human intestinal epithelial cells with a 27-amino acid peptide corresponding to a portion of the first EL domain (Cldn-153–80) reversibly interfered with epithelial barrier function by inducing the rearrangement of key TJ proteins: occludin, claudin-1, junctional adhesion molecule-A, and zonula occludens-1. Cldn-153–80 associated with both claudin-1 and occludin, suggesting both the direct interference with the ability of these proteins to assemble into functional TJs and their close interaction under physiological conditions. These effects were specific for Cldn-153–80, because peptides corresponding to other claudin-1 EL domains failed to influence TJ function. Furthermore, the oral administration of Cldn-153–80 to rats increased paracellular gastric permeability. Thus, the identification of a critical claudin-1 EL motif, Cldn-153–80, capable of regulating TJ structure and function, offers a useful adjunct to treatments that require drug delivery across an epithelial barrier. PMID:18349130

  18. Lightning activity during the 1999 Superior derecho

    NASA Astrophysics Data System (ADS)

    Price, Colin G.; Murphy, Brian P.

    2002-12-01

    On 4 July 1999, a severe convective windstorm, known as a derecho, caused extensive damage to forested regions along the United States/Canada border, west of Lake Superior. There were 665,000 acres of forest destroyed in the Boundary Waters Canoe Area Wilderness (BWCAW) in Minnesota and Quetico Provincial Park in Canada, with approximately 12.5 million trees blown down. This storm resulted in additional severe weather before and after the occurrence of the derecho, with continuous cloud-to-ground (CG) lightning occurring for more than 34 hours during its path across North America. At the time of the derecho the percentage of positive cloud-to-ground (+CG) lightning measured by the Canadian Lightning Detection Network (CLDN) was greater than 70% for more than three hours, with peak values reaching 97% positive CG lightning. Such high ratios of +CG are rare, and may be useful indicators of severe weather.

  19. Lightning Activity During the 1999 Superior Derecho

    NASA Astrophysics Data System (ADS)

    Price, C. G.; Murphy, B. P.

    2002-12-01

    On 4 July 1999, a severe convective windstorm, known as a derecho, caused extensive damage to forested regions along the United States/Canada border, west of Lake Superior. There were 665,000 acres of forest destroyed in the Boundary Waters Canoe Area Wilderness (BWCAW) in Minnesota and Quetico Provincial Park in Canada, with approximately 12.5 million trees blown down. This storm resulted in additional severe weather before and after the occurrence of the derecho, with continuous cloud-to-ground (CG) lightning occurring for more than 34 hours during its path across North America. At the time of the derecho the percentage of positive cloud-to-ground (+CG) lightning measured by the Canadian Lightning Detection Network (CLDN) was greater than 70% for more than three hours, with peak values reaching 97% positive CG lightning. Such high ratios of +CG are rare, and may be useful indicators of severe weather.

  20. Common genetic variants in the CLDN2 and PRSS1-PRSS2 loci alter risk for alcohol-related and sporadic pancreatitis

    PubMed Central

    Whitcomb, David C.; LaRusch, Jessica; Krasinskas, Alyssa M.; Klei, Lambertus; Smith, Jill P.; Brand, Randall E.; Neoptolemos, John P.; Lerch, Markus M.; Tector, Matt; Sandhu, Bimaljit S.; Guda, Nalini M.; Orlichenko, Lidiya; Alkaade, Samer; Amann, Stephen T.; Anderson, Michelle A.; Baillie, John; Banks, Peter A.; Conwell, Darwin; Coté, Gregory A.; Cotton, Peter B.; DiSario, James; Farrer, Lindsay A.; Forsmark, Chris E.; Johnstone, Marianne; Gardner, Timothy B.; Gelrud, Andres; Greenhalf, William; Haines, Jonathan L.; Hartman, Douglas J.; Hawes, Robert A.; Lawrence, Christopher; Lewis, Michele; Mayerle, Julia; Mayeux, Richard; Melhem, Nadine M.; Money, Mary E.; Muniraj, Thiruvengadam; Papachristou, Georgios I.; Pericak-Vance, Margaret A.; Romagnuolo, Joseph; Schellenberg, Gerard D.; Sherman, Stuart; Simon, Peter; Singh, Vijay K.; Slivka, Adam; Stolz, Donna; Sutton, Robert; Weiss, Frank Ulrich; Wilcox, C. Mel; Zarnescu, Narcis Octavian; Wisniewski, Stephen R.; O'Connell, Michael R.; Kienholz, Michelle L.; Roeder, Kathryn; Barmada, M. Michael; Yadav, Dhiraj; Devlin, Bernie; Albert, Marilyn S.; Albin, Roger L.; Apostolova, Liana G.; Arnold, Steven E.; Baldwin, Clinton T.; Barber, Robert; Barnes, Lisa L.; Beach, Thomas G.; Beecham, Gary W.; Beekly, Duane; Bennett, David A.; Bigio, Eileen H.; Bird, Thomas D.; Blacker, Deborah; Boxer, Adam; Burke, James R.; Buxbaum, Joseph D.; Cairns, Nigel J.; Cantwell, Laura B.; Cao, Chuanhai; Carney, Regina M.; Carroll, Steven L.; Chui, Helena C.; Clark, David G.; Cribbs, David H.; Crocco, Elizabeth A.; Cruchaga, Carlos; DeCarli, Charles; Demirci, F. Yesim; Dick, Malcolm; Dickson, Dennis W.; Duara, Ranjan; Ertekin-Taner, Nilufer; Faber, Kelley M.; Fallon, Kenneth B.; Farlow, Martin R.; Ferris, Steven; Foroud, Tatiana M.; Frosch, Matthew P.; Galasko, Douglas R.; Ganguli, Mary; Gearing, Marla; Geschwind, Daniel H.; Ghetti, Bernardino; Gilbert, John R.; Gilman, Sid; Glass, Jonathan D.; Goate, Alison M.; Graff-Radford, Neill R.; Green, Robert C.; Growdon, John H.; Hakonarson, Hakon; Hamilton-Nelson, Kara L.; Hamilton, Ronald L.; Harrell, Lindy E.; Head, Elizabeth; Honig, Lawrence S.; Hulette, Christine M.; Hyman, Bradley T.; Jicha, Gregory A.; Jin, Lee-Way; Jun, Gyungah; Kamboh, M. Ilyas; Karydas, Anna; Kaye, Jeffrey A.; Kim, Ronald; Koo, Edward H.; Kowall, Neil W.; Kramer, Joel H.; Kramer, Patricia; Kukull, Walter A.; LaFerla, Frank M.; Lah, James J.; Leverenz, James B.; Levey, Allan I.; Li, Ge; Lin, Chiao-Feng; Lieberman, Andrew P.; Lopez, Oscar L.; Lunetta, Kathryn L.; Lyketsos, Constantine G.; Mack, Wendy J.; Marson, Daniel C.; Martin, Eden R.; Martiniuk, Frank; Mash, Deborah C.; Masliah, Eliezer; McKee, Ann C.; Mesulam, Marsel; Miller, Bruce L.; Miller, Carol A.; Miller, Joshua W.; Montine, Thomas J.; Morris, John C.; Murrell, Jill R.; Naj, Adam C.; Olichney, John M.; Parisi, Joseph E.; Peskind, Elaine; Petersen, Ronald C.; Pierce, Aimee; Poon, Wayne W.; Potter, Huntington; Quinn, Joseph F.; Raj, Ashok; Raskind, Murray; Reiman, Eric M.; Reisberg, Barry; Reitz, Christiane; Ringman, John M.; Roberson, Erik D.; Rosen, Howard J.; Rosenberg, Roger N.; Sano, Mary; Saykin, Andrew J.; Schneider, Julie A.; Schneider, Lon S.; Seeley, William W.; Smith, Amanda G.; Sonnen, Joshua A.; Spina, Salvatore; Stern, Robert A.; Tanzi, Rudolph E.; Trojanowski, John Q.; Troncoso, Juan C.; Tsuang, Debby W.; Valladares, Otto; Van Deerlin, Vivianna M.; Van Eldik, Linda J.; Vardarajan, Badri N.; Vinters, Harry V.; Vonsattel, Jean Paul; Wang, Li-San; Weintraub, Sandra; Welsh-Bohmer, Kathleen A.; Williamson, Jennifer; Woltjer, Randall L.; Wright, Clinton B.; Younkin, Steven G.; Yu, Chang-En; Yu, Lei

    2012-01-01

    Pancreatitis is a complex, progressively destructive inflammatory disorder. Alcohol was long thought to be the primary causative agent, but genetic contributions have been of interest since the discovery that rare PRSS1, CFTR, and SPINK1 variants were associated with pancreatitis risk. We now report two significant genome-wide associations identified and replicated at PRSS1-PRSS2 (1×10-12) and x-linked CLDN2 (p < 1×10-21) through a two-stage genome-wide study (Stage 1, 676 cases and 4507 controls; Stage 2, 910 cases and 4170 controls). The PRSS1 variant affects susceptibility by altering expression of the primary trypsinogen gene. The CLDN2 risk allele is associated with atypical localization of claudin-2 in pancreatic acinar cells. The homozygous (or hemizygous male) CLDN2 genotype confers the greatest risk, and its alleles interact with alcohol consumption to amplify risk. These results could partially explain the high frequency of alcohol-related pancreatitis in men – male hemizygous frequency is 0.26, female homozygote is 0.07. PMID:23143602

  1. Claudin-4 Deficiency Results in Urothelial Hyperplasia and Lethal Hydronephrosis

    PubMed Central

    Fujita, Harumi; Hamazaki, Yoko; Noda, Yumi; Oshima, Masanobu; Minato, Nagahiro

    2012-01-01

    Claudin (Cld)-4 is one of the dominant Clds expressed in the kidney and urinary tract, including selective segments of renal nephrons and the entire urothelium from the pelvis to the bladder. We generated Cldn4 −/− mice and found that these mice had increased mortality due to hydronephrosis of relatively late onset. While the renal nephrons of Cldn4 −/− mice showed a concomitant diminution of Cld8 expression at tight junction (TJ), accumulation of Cld3 at TJ was markedly enhanced in compensation and the overall TJ structure was unaffected. Nonetheless, Cldn4 −/− mice showed slightly yet significantly increased fractional excretion of Ca2+ and Cl−, suggesting a role of Cld4 in the specific reabsorption of these ions via a paracellular route. Although the urine volume tended to be increased concordantly, Cldn4 −/− mice were capable of concentrating urine normally on dehydration, with no evidence of diabetes insipidus. In the urothelium, the formation of TJs and uroplaques as well as the gross barrier function were also unaffected. However, intravenous pyelography analysis indicated retarded urine flow prior to hydronephrosis. Histological examination revealed diffuse hyperplasia and a thickening of pelvic and ureteral urothelial layers with markedly increased BrdU uptake in vivo. These results suggest that progressive hydronephrosis in Cldn4 −/− mice arises from urinary tract obstruction due to urothelial hyperplasia, and that Cld4 plays an important role in maintaining the homeostatic integrity of normal urothelium. PMID:23284964

  2. Blood-brain barrier and intestinal epithelial barrier alterations in autism spectrum disorders.

    PubMed

    Fiorentino, Maria; Sapone, Anna; Senger, Stefania; Camhi, Stephanie S; Kadzielski, Sarah M; Buie, Timothy M; Kelly, Deanna L; Cascella, Nicola; Fasano, Alessio

    2016-01-01

    Autism spectrum disorders (ASD) are complex conditions whose pathogenesis may be attributed to gene-environment interactions. There are no definitive mechanisms explaining how environmental triggers can lead to ASD although the involvement of inflammation and immunity has been suggested. Inappropriate antigen trafficking through an impaired intestinal barrier, followed by passage of these antigens or immune-activated complexes through a permissive blood-brain barrier (BBB), can be part of the chain of events leading to these disorders. Our goal was to investigate whether an altered BBB and gut permeability is part of the pathophysiology of ASD. Postmortem cerebral cortex and cerebellum tissues from ASD, schizophrenia (SCZ), and healthy subjects (HC) and duodenal biopsies from ASD and HC were analyzed for gene and protein expression profiles. Tight junctions and other key molecules associated with the neurovascular unit integrity and function and neuroinflammation were investigated. Claudin ( CLDN )-5 and -12 were increased in the ASD cortex and cerebellum. CLDN-3 , tricellulin , and MMP-9 were higher in the ASD cortex. IL-8 , tPA , and IBA-1 were downregulated in SCZ cortex; IL-1b was increased in the SCZ cerebellum. Differences between SCZ and ASD were observed for most of the genes analyzed in both brain areas. CLDN-5 protein was increased in ASD cortex and cerebellum, while CLDN-12 appeared reduced in both ASD and SCZ cortexes. In the intestine, 75% of the ASD samples analyzed had reduced expression of barrier-forming TJ components ( CLDN-1 , OCLN , TRIC ), whereas 66% had increased pore-forming CLDNs ( CLDN-2 , -10 , -15 ) compared to controls. In the ASD brain, there is an altered expression of genes associated with BBB integrity coupled with increased neuroinflammation and possibly impaired gut barrier integrity. While these findings seem to be specific for ASD, the possibility of more distinct SCZ subgroups should be explored with additional studies.

  3. Fluid reabsorption in proximal convoluted tubules of mice with gene deletions of claudin-2 and/or aquaporin1

    PubMed Central

    Huang, Yuning; Mizel, Diane

    2013-01-01

    Deletions of claudin-2 (Cldn2) and aquaporin1 (AQP1) reduce proximal fluid reabsorption (PFR) by about 30% and 50%, respectively. Experiments were done to replicate these observations and to determine in AQP1/claudin-2 double knockout mice (DKO) if the effects of deletions of these established water pores are additive. PFR was determined in inactin/ketamine-anesthetized mice by free-flow micropuncture using single-nephron I125-iothalamate (io) clearance. Animal means of PFR [% of glomerular filtration rate (GFR)] derived from TF/Piothalamate ratios in 12 mice in each of four groups [wild type (WT), Cldn2−/−, AQP1−/−, and DKO) were 45.8 ± 0.85 (51 tubules), 35.4 ± 1 (54 tubules; P < 0.01 vs. WT), 36.8 ± 1 (63 tubules; P < 0.05 vs. WT), and 33.9 ± 1.4 (69 tubules; P < 0.01 vs. WT). Kidney and single-nephron GFRs (SNGFR) were significantly reduced in all mutant strains. The direct relationship between PFR and SNGFR was maintained in mutant mice, but the slope of this relationship was reduced in the absence of Cldn2 and/or AQP1. Transtubular osmotic pressure differences were not different between WT and Cldn2−/− mice, but markedly increased in DKO. In conclusion, the deletion of Cldn2, AQP1, or of both Cldn2 and AQP1 reduces PFR by 22.7%, 19.6%, and 26%, respectively. Our data are consistent with an up to 25% paracellular contribution to PFR. The reduced osmotic water permeability caused by absence of AQP1 augments luminal hypotonicity. Aided by a fall in filtered load, the capacity of non-AQP1-dependent transcellular reabsorption is sufficient to maintain PFR without AQP1 and claudin-2 at 75% of control. PMID:24049145

  4. Urothelial Tight Junction Barrier Dysfunction Sensitizes Bladder Afferents

    PubMed Central

    Rued, Anna C.; Taiclet, Stefanie N.; Birder, Lori A.; Kullmann, F. Aura

    2017-01-01

    Abstract Interstitial cystitis/bladder pain syndrome (IC/BPS) is a chronic voiding disorder that presents with pain in the urinary bladder and surrounding pelvic region. A growing body of evidence suggests that an increase in the permeability of the urothelium, the epithelial barrier that lines the interior of the bladder, contributes to the symptoms of IC/BPS. To examine the consequence of increased urothelial permeability on pelvic pain and afferent excitability, we overexpressed in the urothelium claudin 2 (Cldn2), a tight junction (TJ)-associated protein whose message is significantly upregulated in biopsies of IC/BPS patients. Consistent with the presence of bladder-derived pain, rats overexpressing Cldn2 showed hypersensitivity to von Frey filaments applied to the pelvic region. Overexpression of Cldn2 increased the expression of c-Fos and promoted the activation of ERK1/2 in spinal cord segments receiving bladder input, which we conceive is the result of noxious stimulation of afferent pathways. To determine whether the mechanical allodynia observed in rats with reduced urothelial barrier function results from altered afferent activity, we examined the firing of acutely isolated bladder sensory neurons. In patch-clamp recordings, about 30% of the bladder sensory neurons from rats transduced with Cldn2, but not controls transduced with GFP, displayed spontaneous activity. Furthermore, bladder sensory neurons with tetrodotoxin-sensitive (TTX-S) action potentials from rats transduced with Cldn2 showed hyperexcitability in response to suprathreshold electrical stimulation. These findings suggest that as a result of a leaky urothelium, the diffusion of urinary solutes through the urothelial barrier sensitizes bladders afferents, promoting voiding at low filling volumes and pain. PMID:28560313

  5. Cross-over endocytosis of claudins is mediated by interactions via their extracellular loops.

    PubMed

    Gehne, Nora; Lamik, Agathe; Lehmann, Martin; Haseloff, Reiner F; Andjelkovic, Anuska V; Blasig, Ingolf E

    2017-01-01

    Claudins (Cldns) are transmembrane tight junction (TJ) proteins that paracellularly seal endo- and epithelial barriers by their interactions within the TJs. However, the mechanisms allowing TJ remodeling while maintaining barrier integrity are largely unknown. Cldns and occludin are heterophilically and homophilically cross-over endocytosed into neighboring cells in large, double membrane vesicles. Super-resolution microscopy confirmed the presence of Cldns in these vesicles and revealed a distinct separation of Cldns derived from opposing cells within cross-over endocytosed vesicles. Colocalization of cross-over endocytosed Cldn with the autophagosome markers as well as inhibition of autophagosome biogenesis verified involvement of the autophagosomal pathway. Accordingly, cross-over endocytosed Cldns underwent lysosomal degradation as indicated by lysosome markers. Cross-over endocytosis of Cldn5 depended on clathrin and caveolin pathways but not on dynamin. Cross-over endocytosis also depended on Cldn-Cldn-interactions. Amino acid substitutions in the second extracellular loop of Cldn5 (F147A, Q156E) caused impaired cis- and trans-interaction, as well as diminished cross-over endocytosis. Moreover, F147A exhibited an increased mobility in the membrane, while Q156E was not as mobile but enhanced the paracellular permeability. In conclusion, the endocytosis of TJ proteins depends on their ability to interact strongly with each other in cis and trans, and the mobility of Cldns in the membrane is not necessarily an indicator of barrier permeability. TJ-remodeling via cross-over endocytosis represents a general mechanism for the degradation of transmembrane proteins in cell-cell contacts and directly links junctional membrane turnover to autophagy.

  6. Positive lightning and severe weather

    NASA Astrophysics Data System (ADS)

    Price, C.; Murphy, B.

    2003-04-01

    In recent years researchers have noticed that severe weather (tornados, hail and damaging winds) are closely related to the amount of positive lightning occurring in thunderstorms. On 4 July 1999, a severe derecho (wind storm) caused extensive damage to forested regions along the United States/Canada border, west of Lake Superior. There were 665,000 acres of forest destroyed in the Boundary Waters Canoe Area Wilderness (BWCAW) in Minnesota and Quetico Provincial Park in Canada, with approximately 12.5 million trees blown down. This storm resulted in additional severe weather before and after the occurrence of the derecho, with continuous cloud-to-ground (CG) lightning occurring for more than 34 hours during its path across North America. At the time of the derecho the percentage of positive cloud-to-ground (+CG) lightning measured by the Canadian Lightning Detection Network (CLDN) was greater than 70% for more than three hours, with peak values reaching 97% positive CG lightning. Such high ratios of +CG are rare, and may be useful indicators for short-term forecasts of severe weather.

  7. Whole exome sequencing frequently detects a monogenic cause in early onset nephrolithiasis and nephrocalcinosis.

    PubMed

    Daga, Ankana; Majmundar, Amar J; Braun, Daniela A; Gee, Heon Yung; Lawson, Jennifer A; Shril, Shirlee; Jobst-Schwan, Tilman; Vivante, Asaf; Schapiro, David; Tan, Weizhen; Warejko, Jillian K; Widmeier, Eugen; Nelson, Caleb P; Fathy, Hanan M; Gucev, Zoran; Soliman, Neveen A; Hashmi, Seema; Halbritter, Jan; Halty, Margarita; Kari, Jameela A; El-Desoky, Sherif; Ferguson, Michael A; Somers, Michael J G; Traum, Avram Z; Stein, Deborah R; Daouk, Ghaleb H; Rodig, Nancy M; Katz, Avi; Hanna, Christian; Schwaderer, Andrew L; Sayer, John A; Wassner, Ari J; Mane, Shrikant; Lifton, Richard P; Milosevic, Danko; Tasic, Velibor; Baum, Michelle A; Hildebrandt, Friedhelm

    2018-01-01

    The incidence of nephrolithiasis continues to rise. Previously, we showed that a monogenic cause could be detected in 11.4% of individuals with adult-onset nephrolithiasis or nephrocalcinosis and in 16.7-20.8% of individuals with onset before 18 years of age, using gene panel sequencing of 30 genes known to cause nephrolithiasis/nephrocalcinosis. To overcome the limitations of panel sequencing, we utilized whole exome sequencing in 51 families, who presented before age 25 years with at least one renal stone or with a renal ultrasound finding of nephrocalcinosis to identify the underlying molecular genetic cause of disease. In 15 of 51 families, we detected a monogenic causative mutation by whole exome sequencing. A mutation in seven recessive genes (AGXT, ATP6V1B1, CLDN16, CLDN19, GRHPR, SLC3A1, SLC12A1), in one dominant gene (SLC9A3R1), and in one gene (SLC34A1) with both recessive and dominant inheritance was detected. Seven of the 19 different mutations were not previously described as disease-causing. In one family, a causative mutation in one of 117 genes that may represent phenocopies of nephrolithiasis-causing genes was detected. In nine of 15 families, the genetic diagnosis may have specific implications for stone management and prevention. Several factors that correlated with the higher detection rate in our cohort were younger age at onset of nephrolithiasis/nephrocalcinosis, presence of multiple affected members in a family, and presence of consanguinity. Thus, we established whole exome sequencing as an efficient approach toward a molecular genetic diagnosis in individuals with nephrolithiasis/nephrocalcinosis who manifest before age 25 years. Copyright © 2017 International Society of Nephrology. Published by Elsevier Inc. All rights reserved.

  8. Pilot study of small bowel mucosal gene expression in patients with irritable bowel syndrome with diarrhea.

    PubMed

    Camilleri, Michael; Carlson, Paula; Valentin, Nelson; Acosta, Andres; O'Neill, Jessica; Eckert, Deborah; Dyer, Roy; Na, Jie; Klee, Eric W; Murray, Joseph A

    2016-09-01

    Prior studies in with irritable bowel syndrome with diarrhea (IBS-D) patients showed immune activation, secretion, and barrier dysfunction in jejunal or colorectal mucosa. We measured mRNA expression by RT-PCR of 91 genes reflecting tight junction proteins, chemokines, innate immunity, ion channels, transmitters, housekeeping genes, and controls for DNA contamination and PCR efficiency in small intestinal mucosa from 15 IBS-D and 7 controls (biopsies negative for celiac disease). Fold change was calculated using 2((-ΔΔCT)) formula. Nominal P values (P < 0.05) were interpreted with false detection rate (FDR) correction (q value). Cluster analysis with Lens for Enrichment and Network Studies (LENS) explored connectivity of mechanisms. Upregulated genes (uncorrected P < 0.05) were related to ion transport (INADL, MAGI1, and SONS1), barrier (TJP1, 2, and 3 and CLDN) or immune functions (TLR3, IL15, and MAPKAPK5), or histamine metabolism (HNMT); downregulated genes were related to immune function (IL-1β, TGF-β1, and CCL20) or antigen detection (TLR1 and 8). The following genes were significantly upregulated (q < 0.05) in IBS-D: INADL, MAGI1, PPP2R5C, MAPKAPK5, TLR3, and IL-15. Among the 14 nominally upregulated genes, there was clustering of barrier and PDZ domains (TJP1, TJP2, TJP3, CLDN4, INADL, and MAGI1) and clustering of downregulated genes (CCL20, TLR1, IL1B, and TLR8). Protein expression of PPP2R5C in nuclear lysates was greater in patients with IBS-D and controls. There was increase in INADL protein (median 9.4 ng/ml) in patients with IBS-D relative to controls (median 5.8 ng/ml, P > 0.05). In conclusion, altered transcriptome (and to lesser extent protein) expression of ion transport, barrier, immune, and mast cell mechanisms in small bowel may reflect different alterations in function and deserves further study in IBS-D. Copyright © 2016 the American Physiological Society.

  9. Infection with hepatitis C virus depends on TACSTD2, a regulator of claudin-1 and occludin highly downregulated in hepatocellular carcinoma

    PubMed Central

    Alayli, Farah; Melis, Marta; Kabat, Juraj; Pomerenke, Anna; Altan-Bonnet, Nihal; Zamboni, Fausto; Emerson, Suzanne U.

    2018-01-01

    Entry of hepatitis C virus (HCV) into hepatocytes is a complex process that involves numerous cellular factors, including the scavenger receptor class B type 1 (SR-B1), the tetraspanin CD81, and the tight junction (TJ) proteins claudin-1 (CLDN1) and occludin (OCLN). Despite expression of all known HCV-entry factors, in vitro models based on hepatoma cell lines do not fully reproduce the in vivo susceptibility of liver cells to primary HCV isolates, implying the existence of additional host factors which are critical for HCV entry and/or replication. Likewise, HCV replication is severely impaired within hepatocellular carcinoma (HCC) tissue in vivo, but the mechanisms responsible for this restriction are presently unknown. Here, we identify tumor-associated calcium signal transducer 2 (TACSTD2), one of the most downregulated genes in primary HCC tissue, as a host factor that interacts with CLDN1 and OCLN and regulates their cellular localization. TACSTD2 gene silencing disrupts the typical linear distribution of CLDN1 and OCLN along the cellular membrane in both hepatoma cells and primary human hepatocytes, recapitulating the pattern observed in vivo in primary HCC tissue. Mechanistic studies suggest that TACSTD2 is involved in the phosphorylation of CLDN1 and OCLN, which is required for their proper cellular localization. Silencing of TACSTD2 dramatically inhibits HCV infection with a pan-genotype effect that occurs at the level of viral entry. Our study identifies TACSTD2 as a novel regulator of two major HCV-entry factors, CLDN1 and OCLN, which is strongly downregulated in malignant hepatocytes. These results provide new insights into the complex process of HCV entry into hepatocytes and may assist in the development of more efficient cellular systems for HCV propagation in vitro. PMID:29538454

  10. Wnt/β-catenin signaling controls development of the blood–brain barrier

    PubMed Central

    Liebner, Stefan; Corada, Monica; Bangsow, Thorsten; Babbage, Jane; Taddei, Andrea; Czupalla, Cathrin J.; Reis, Marco; Felici, Angelina; Wolburg, Hartwig; Fruttiger, Marcus; Taketo, Makoto M.; von Melchner, Harald; Plate, Karl Heinz; Gerhardt, Holger; Dejana, Elisabetta

    2008-01-01

    The blood–brain barrier (BBB) is confined to the endothelium of brain capillaries and is indispensable for fluid homeostasis and neuronal function. In this study, we show that endothelial Wnt/β-catenin (β-cat) signaling regulates induction and maintenance of BBB characteristics during embryonic and postnatal development. Endothelial specific stabilization of β-cat in vivo enhances barrier maturation, whereas inactivation of β-cat causes significant down-regulation of claudin3 (Cldn3), up-regulation of plamalemma vesicle-associated protein, and BBB breakdown. Stabilization of β-cat in primary brain endothelial cells (ECs) in vitro by N-terminal truncation or Wnt3a treatment increases Cldn3 expression, BBB-type tight junction formation, and a BBB characteristic gene signature. Loss of β-cat or inhibition of its signaling abrogates this effect. Furthermore, stabilization of β-cat also increased Cldn3 and barrier properties in nonbrain-derived ECs. These findings may open new therapeutic avenues to modulate endothelial barrier function and to limit the devastating effects of BBB breakdown. PMID:18955553

  11. Specific binding of Clostridium perfringens enterotoxin fragment to Claudin-b and modulation of zebrafish epidermal barrier.

    PubMed

    Zhang, Jingjing; Ni, Chen; Yang, Zhenguo; Piontek, Anna; Chen, Huapu; Wang, Sijie; Fan, Yiming; Qin, Zhihai; Piontek, Joerg

    2015-08-01

    Claudins (Cldn) are the major components of tight junctions (TJs) sealing the paracellular cleft in tissue barriers of various organs. Zebrafish Cldnb, the homolog of mammalian Cldn4, is expressed at epithelial cell-cell contacts and is important for regulating epidermal permeability. The bacterial toxin Clostridium perfringens enterotoxin (CPE) has been shown to bind to a subset of mammalian Cldns. In this study, we used the Cldn-binding C-terminal domain of CPE (194-319 amino acids, cCPE 194-319 ) to investigate its functional role in modulating zebrafish larval epidermal barriers. In vitro analyses show that cCPE 194-319 removed Cldn4 from epithelial cells and disrupted the monolayer tightness, which could be rescued by the removal of cCPE 194-319. Incubation of zebrafish larvae with cCPE 194-319 removed Cldnb specifically from the epidermal cell membrane. Dye diffusion analysis with 4-kDa fluorescent dextran indicated that the permeability of the epidermal barrier increased due to cCPE 194-319 incubation. Electron microscopic investigation revealed reversible loss of TJ integrity by Cldnb removal. Collectively, these results suggest that cCPE 194-319 could be used as a Cldnb modulator to transiently open the epidermal barrier in zebrafish. In addition, zebrafish might be used as an in vivo system to investigate the capability of cCPE to enhance drug delivery across tissue barriers. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Tight Junction Defects in Atopic Dermatitis

    PubMed Central

    De Benedetto, Anna; Rafaels, Nicholas M.; McGirt, Laura Y.; Ivanov, Andrei I.; Georas, Steve N.; Cheadle, Chris; Berger, Alan E.; Zhang, Kunzhong; Vidyasagar, Sadasivan; Yoshida, Takeshi; Boguniewicz, Mark; Hata, Tissa; Schneider, Lynda C.; Hanifin, Jon M.; Gallo, Richard L.; Novak, Natalija; Weidinger, Stephan; Beaty, Terri H.; Leung, Donald Y.; Barnes, Kathleen C.; Beck, Lisa A.

    2010-01-01

    Background Atopic dermatitis (AD) is characterized by dry skin and a hyperreactive immune response to allergens, two cardinal features that are caused in part by epidermal barrier defects. Tight junctions (TJ) reside immediately below the stratum corneum and regulate the selective permeability of the paracellular pathway. Objective We evaluated the expression/function of the TJ protein, claudin-1 in epithelium from AD and nonatopic (NA) subjects and screened two American populations for SNPs in CLDN1. Methods Expression profiles of nonlesional epithelium from extrinsic AD, NA and psoriasis subjects were generated using Illumina’s BeadChips. Dysregulated intercellular proteins were validated by tissue staining and qPCR. Bioelectric properties of epithelium were measured in Ussing chambers. Functional relevance of claudin-1 was assessed using a knockdown approach in primary human keratinocytes (PHK). Twenty seven haplotype-tagging SNPs in CLDN1 were screened in two independent AD populations. Results We observed strikingly reduced expression of the TJ proteins claudin-1 and -23 only in AD, which were validated at the mRNA and protein levels. Claudin-1 expression inversely correlated with Th2 biomarkers. We observed a remarkable impairment of the bioelectric barrier function in AD epidermis. In vitro, we confirmed that silencing claudin-1 expression in human keratinocytes diminishes TJ function while enhancing keratinocyte proliferation. Finally, CLDN1 haplotype-tagging single nucleotide polymorphisms revealed associations with AD in two North American populations. Conclusion Taken together, these data suggest that an impaired epidermal TJ is a novel feature of skin barrier dysfunction and immune dysregulation observed in AD, and that CLDN1 may be a new susceptibility gene in this disease. PMID:21163515

  13. Omeprazole suppressed plasma magnesium level and duodenal magnesium absorption in male Sprague-Dawley rats.

    PubMed

    Thongon, Narongrit; Penguy, Jirawat; Kulwong, Sasikan; Khongmueang, Kanyanat; Thongma, Matthana

    2016-11-01

    Hypomagnesemia is the most concerned side effect of proton pump inhibitors (PPIs) in chronic users. However, the mechanism of PPIs-induced systemic Mg 2+ deficit is currently unclear. The present study aimed to elucidate the direct effect of short-term and long-term PPIs administrations on whole body Mg 2+ homeostasis and duodenal Mg 2+ absorption in rats. Mg 2+ homeostasis was studied by determining the serum Mg 2+ level, urine and fecal Mg 2+ excretions, and bone and muscle Mg 2+ contents. Duodenal Mg 2+ absorption as well as paracellular charge selectivity were studied. Our result showed that gastric and duodenal pH markedly increased in omeprazole-treated rats. Omeprazole significantly suppressed plasma Mg 2+ level, urinary Mg 2+ excretion, and bone and muscle Mg 2+ content. Thus, omeprazole induced systemic Mg 2+ deficiency. By using Ussing chamber techniques, it was shown that omeprazole markedly suppressed duodenal Mg 2+ channel-driven and Mg 2+ channel-independent Mg 2+ absorptions and cation selectivity. Inhibitors of mucosal HCO 3 - secretion significantly increased duodenal Mg 2+ absorption in omeprazole-treated rats. We therefore hypothesized that secreted HCO 3 - in duodenum decreased luminal proton, this impeded duodenal Mg 2+ absorption. Higher plasma total 25-OH vitamin D, diuresis, and urine PO 4 3- were also demonstrated in hypomagnesemic rats. As a compensatory mechanism for systemic Mg 2+ deficiency, the expressions of duodenal transient receptor potential melastatin 6 (TRPM6), cyclin M4 (CNNM4), claudin (Cldn)-2, Cldn-7, Cldn-12, and Cldn-15 proteins were enhanced in omeprazole-treated rats. Our findings support the potential role of duodenum on the regulation of Mg 2+ homeostasis.

  14. Musashi-2 (MSI2) supports TGF-β signaling and inhibits claudins to promote non-small cell lung cancer (NSCLC) metastasis.

    PubMed

    Kudinov, Alexander E; Deneka, Alexander; Nikonova, Anna S; Beck, Tim N; Ahn, Young-Ho; Liu, Xin; Martinez, Cathleen F; Schultz, Fred A; Reynolds, Samuel; Yang, Dong-Hua; Cai, Kathy Q; Yaghmour, Khaled M; Baker, Karmel A; Egleston, Brian L; Nicolas, Emmanuelle; Chikwem, Adaeze; Andrianov, Gregory; Singh, Shelly; Borghaei, Hossein; Serebriiskii, Ilya G; Gibbons, Don L; Kurie, Jonathan M; Golemis, Erica A; Boumber, Yanis

    2016-06-21

    Non-small cell lung cancer (NSCLC) has a 5-y survival rate of ∼16%, with most deaths associated with uncontrolled metastasis. We screened for stem cell identity-related genes preferentially expressed in a panel of cell lines with high versus low metastatic potential, derived from NSCLC tumors of Kras(LA1/+);P53(R172HΔG/+) (KP) mice. The Musashi-2 (MSI2) protein, a regulator of mRNA translation, was consistently elevated in metastasis-competent cell lines. MSI2 was overexpressed in 123 human NSCLC tumor specimens versus normal lung, whereas higher expression was associated with disease progression in an independent set of matched normal/primary tumor/lymph node specimens. Depletion of MSI2 in multiple independent metastatic murine and human NSCLC cell lines reduced invasion and metastatic potential, independent of an effect on proliferation. MSI2 depletion significantly induced expression of proteins associated with epithelial identity, including tight junction proteins [claudin 3 (CLDN3), claudin 5 (CLDN5), and claudin 7 (CLDN7)] and down-regulated direct translational targets associated with epithelial-mesenchymal transition, including the TGF-β receptor 1 (TGFβR1), the small mothers against decapentaplegic homolog 3 (SMAD3), and the zinc finger proteins SNAI1 (SNAIL) and SNAI2 (SLUG). Overexpression of TGFβRI reversed the loss of invasion associated with MSI2 depletion, whereas overexpression of CLDN7 inhibited MSI2-dependent invasion. Unexpectedly, MSI2 depletion reduced E-cadherin expression, reflecting a mixed epithelial-mesenchymal phenotype. Based on this work, we propose that MSI2 provides essential support for TGFβR1/SMAD3 signaling and contributes to invasive adenocarcinoma of the lung and may serve as a predictive biomarker of NSCLC aggressiveness.

  15. Possible role of HIWI2 in modulating tight junction proteins in retinal pigment epithelial cells through Akt signaling pathway.

    PubMed

    Sivagurunathan, Suganya; Palanisamy, Karthikka; Arunachalam, Jayamuruga Pandian; Chidambaram, Subbulakshmi

    2017-03-01

    PIWI subfamily of proteins is shown to be primarily expressed in germline cells. They maintain the genomic integrity by silencing the transposable elements. Although the role of PIWI proteins in germ cells has been documented, their presence and function in somatic cells remains unclear. Intriguingly, we detected all four members of PIWI-like proteins in human ocular tissues and somatic cell lines. When HIWI2 was knocked down in retinal pigment epithelial cells, the typical honeycomb morphology was affected. Further analysis showed that the expression of tight junction (TJ) proteins, CLDN1, and TJP1 were altered in HIWI2 knockdown. Moreover, confocal imaging revealed disrupted TJP1 assembly at the TJ. Previous studies report the role of GSK3β in regulating TJ proteins. Accordingly, phospho-kinase proteome profiler array indicated increased phosphorylation of Akt and GSK3α/β in HIWI2 knockdown, suggesting that HIWI2 might affect TJ proteins through Akt-GSK3α/β signaling axis. Moreover, treating the HIWI2 knockdown cells with wortmannin increased the levels of TJP1 and CLDN1. Taken together, our study demonstrates the presence of PIWI-like proteins in somatic cells and the possible role of HIWI2 in preserving the functional integrity of epithelial cells probably by modulating the phosphorylation status of Akt.

  16. Sexual maturation and changes in water and salt transport components in the kidney and intestine of three-spined stickleback (Gasterosteus aculeatus L.).

    PubMed

    Madsen, Steffen S; Weber, Claus; Nielsen, Andreas M; Mohiseni, Mohammad; Bosssus, Maryline C; Tipsmark, Christian K; Borg, Bertil

    2015-10-01

    Mature three-spined stickleback males use spiggin threads secreted from their kidney to glue together nest material. This requires strongly hypertrophied renal proximal tubular cells, which compromises renal osmoregulatory function during the breeding period. Experimental evidence suggests that the intestine takes over hypotonic fluid secretion at that stage but the mechanism is unexplored. To unravel the molecular mechanism we analyzed and compared transcript levels of several membrane proteins involved in water and salt transport in intestinal and renal tissues, in non-mature males (NM), mature males (MM), and mature females (MF). Aquaporin paralogs aqp1a, -3a, -8aa, -8ab, -10a, and -10b, two Na(+),K(+)-ATPase alpha-1 subunit isoforms (nka547, nka976), Na(+),K(+),2Cl(-)-, and Na(+),Cl(-)-cotransporters (nkcc1a, nkcc2, ncc), the cystic fibrosis transmembrane conductance regulator (cftr) and two claudin isoforms (cldn2, cldn15a) were expressed in the intestine and kidney in all groups. There were no differences in aqp and cldn expression between intestines of NM and MM; nkcc2 was lower and nka levels tended to be higher in intestines of MM than in NM. In the kidney, aqp1 and aqp8ab levels were lower in MM than in NM, whereas aqp3a, nkcc1a, cldn15a, and spiggin were markedly elevated. This was accompanied by marked hypertrophy of kidney tubules in MM. The data support an altered kidney function in terms of water handling in mature males, whereas there was no support for modified trans-epithelial water permeability or salt-secretory activity in the intestine of mature males. Salt-absorptive activity in the intestine may, however, be down-regulated during male maturation. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Cell-surface markers for colon adenoma and adenocarcinoma

    PubMed Central

    Sewda, Kamini; Coppola, Domenico; Enkemann, Steven; Yue, Binglin; Kim, Jongphil; Lopez, Alexis S.; Wojtkowiak, Jonathan W.; Stark, Valerie E.; Morse, Brian; Shibata, David; Vignesh, Shivakumar; Morse, David L.

    2016-01-01

    Early detection of colorectal cancer (CRC) is crucial for effective treatment. Among CRC screening techniques, optical colonoscopy is widely considered the gold standard. However, it is a costly and invasive procedure with a low rate of compliance. Our long-term goal is to develop molecular imaging agents for the non-invasive detection of CRC by molecular imaging-based colonoscopy using CT, MRI or fluorescence. To achieve this, cell surface targets must be identified and validated. Here, we report the discovery of cell-surface markers that distinguish CRC from surrounding tissues that could be used as molecular imaging targets. Profiling of mRNA expression microarray data from patient tissues including adenoma, adenocarcinoma, and normal gastrointestinal tissues was used to identify potential CRC specific cell-surface markers. Of the identified markers, six were selected for further validation (CLDN1, GPR56, GRM8, LY6G6D/F, SLCO1B3 and TLR4). Protein expression was confirmed by immunohistochemistry of patient tissues. Except for SLCO1B3, diffuse and low expression was observed for each marker in normal colon tissues. The three markers with the greatest protein overexpression were CLDN1, LY6G6D/F and TLR4, where at least one of these markers was overexpressed in 97% of the CRC samples. GPR56, LY6G6D/F and SLCO1B3 protein expression was significantly correlated with the proximal tumor location and with expression of mismatch repair genes. Marker expression was further validated in CRC cell lines. Hence, three cell-surface markers were discovered that distinguish CRC from surrounding normal tissues. These markers can be used to develop imaging or therapeutic agents targeted to the luminal surface of CRC. PMID:26894861

  18. Cell-surface markers for colon adenoma and adenocarcinoma.

    PubMed

    Sewda, Kamini; Coppola, Domenico; Enkemann, Steven; Yue, Binglin; Kim, Jongphil; Lopez, Alexis S; Wojtkowiak, Jonathan W; Stark, Valerie E; Morse, Brian; Shibata, David; Vignesh, Shivakumar; Morse, David L

    2016-04-05

    Early detection of colorectal cancer (CRC) is crucial for effective treatment. Among CRC screening techniques, optical colonoscopy is widely considered the gold standard. However, it is a costly and invasive procedure with a low rate of compliance. Our long-term goal is to develop molecular imaging agents for the non-invasive detection of CRC by molecular imaging-based colonoscopy using CT, MRI or fluorescence. To achieve this, cell surface targets must be identified and validated. Here, we report the discovery of cell-surface markers that distinguish CRC from surrounding tissues that could be used as molecular imaging targets. Profiling of mRNA expression microarray data from patient tissues including adenoma, adenocarcinoma, and normal gastrointestinal tissues was used to identify potential CRC specific cell-surface markers. Of the identified markers, six were selected for further validation (CLDN1, GPR56, GRM8, LY6G6D/F, SLCO1B3 and TLR4). Protein expression was confirmed by immunohistochemistry of patient tissues. Except for SLCO1B3, diffuse and low expression was observed for each marker in normal colon tissues. The three markers with the greatest protein overexpression were CLDN1, LY6G6D/F and TLR4, where at least one of these markers was overexpressed in 97% of the CRC samples. GPR56, LY6G6D/F and SLCO1B3 protein expression was significantly correlated with the proximal tumor location and with expression of mismatch repair genes. Marker expression was further validated in CRC cell lines. Hence, three cell-surface markers were discovered that distinguish CRC from surrounding normal tissues. These markers can be used to develop imaging or therapeutic agents targeted to the luminal surface of CRC.

  19. Adaptive evolution of tight junction protein claudin-14 in echolocating whales.

    PubMed

    Xu, Huihui; Liu, Yang; He, Guimei; Rossiter, Stephen J; Zhang, Shuyi

    2013-11-10

    Toothed whales and bats have independently evolved specialized ultrasonic hearing for echolocation. Recent findings have suggested that several genes including Prestin, Tmc1, Pjvk and KCNQ4 appear to have undergone molecular adaptations associated with the evolution of this ultrasonic hearing in mammals. Here we studied the hearing gene Cldn14, which encodes the claudin-14 protein and is a member of tight junction proteins that functions in the organ of Corti in the inner ear to maintain a cationic gradient between endolymph and perilymph. Particular mutations in human claudin-14 give rise to non-syndromic deafness, suggesting an essential role in hearing. Our results uncovered two bursts of positive selection, one in the ancestral branch of all toothed whales and a second in the branch leading to the delphinid, phocoenid and ziphiid whales. These two branches are the same as those previously reported to show positive selection in the Prestin gene. Furthermore, as with Prestin, the estimated hearing frequencies of whales significantly correlate with numbers of branch-wise non-synonymous substitutions in Cldn14, but not with synonymous changes. However, in contrast to Prestin, we found no evidence of positive selection in bats. Our findings from Cldn14, and comparisons with Prestin, strongly implicate multiple loci in the acquisition of echolocation in cetaceans, but also highlight possible differences in the evolutionary route to echolocation taken by whales and bats. © 2013.

  20. Claudins in teleost fishes

    PubMed Central

    Kolosov, Dennis; Bui, Phuong; Chasiotis, Helen; Kelly, Scott P

    2013-01-01

    Teleost fishes are a large and diverse animal group that represent close to 50% of all described vertebrate species. This review consolidates what is known about the claudin (Cldn) family of tight junction (TJ) proteins in teleosts. Cldns are transmembrane proteins of the vertebrate epithelial/endothelial TJ complex that largely determine TJ permeability. Cldns achieve this by expressing barrier or pore forming properties and by exhibiting distinct tissue distribution patterns. So far, ~63 genes encoding for Cldn TJ proteins have been reported in 16 teleost species. Collectively, cldns (or Cldns) are found in a broad array of teleost fish tissues, but select genes exhibit restricted expression patterns. Evidence to date strongly supports the view that Cldns play a vital role in the embryonic development of teleost fishes and in the physiology of tissues and organ systems studied thus far. PMID:24665402

  1. Molecular pathology of brain matrix metalloproteases, claudin5, and aquaporins in forensic autopsy cases with special regard to methamphetamine intoxication.

    PubMed

    Wang, Qi; Ishikawa, Takaki; Michiue, Tomomi; Zhu, Bao-Li; Guan, Da-Wei; Maeda, Hitoshi

    2014-05-01

    Methamphetamine (METH) is a highly addictive drug of abuse and toxic to the brain. Recent studies indicated that besides direct damage to dopamine and 5-HT terminals, neurotoxicity of METH may also result from its ability to modify the structure of blood-brain barrier (BBB). The present study investigated the postmortem brain mRNA and immunohistochemical expressions of matrix metalloproteases (MMPs), claudin5 (CLDN5), and aquaporins (AQPs) in forensic autopsy cases of carbon monoxide (n = 14), METH (n = 21), and phenobarbital (n = 17) intoxication, compared with mechanical asphyxia (n = 15), brain injury (n = 11), non-brain injury (n = 21), and sharp instrument injury (n = 15) cases. Relative mRNA quantification using Taqman real-time PCR assay demonstrated higher expression of AQP4 and MMP9, lower expression of CLDN5 in METH intoxication cases and lower expression of MMP2 in phenobarbital intoxication cases. Immunostaining results showed substantial interindividual variations in each group, showing no evident differences in distribution or intensity among all the causes of death. These findings suggest that METH may increase BBB permeability by altering CLDN5 and MMP9, and the self-protective system maybe activated to eliminate accumulating water from the extracellular space of the brain by up-regulating AQP4. Systematic analysis of gene expressions using real-time PCR may be a useful procedure in forensic death investigation.

  2. Impaired Hedgehog signalling-induced endothelial dysfunction is sufficient to induce neuropathy: implication in diabetes.

    PubMed

    Chapouly, Candice; Yao, Qinyu; Vandierdonck, Soizic; Larrieu-Lahargue, Frederic; Mariani, John N; Gadeau, Alain-Pierre; Renault, Marie-Ange

    2016-02-01

    Microangiopathy, i.e. endothelial dysfunction, has long been suggested to contribute to the development of diabetic neuropathy, although this has never been fully verified. In the present paper, we have identified the role of Hedgehog (Hh) signalling in endoneurial microvessel integrity and evaluated the impact of impaired Hh signalling in endothelial cells (ECs) on nerve function. By using Desert Hedgehog (Dhh)-deficient mice, we have revealed, that in the absence of Dhh, endoneurial capillaries are abnormally dense and permeable. Furthermore, Smoothened (Smo) conditional KO mice clarified that this increased vessel permeability is specifically due to impaired Hh signalling in ECs and is associated with a down-regulation of Claudin5 (Cldn5). Moreover, impairment of Hh signalling in ECs was sufficient to induce hypoalgesia and neuropathic pain. Finally in Lepr(db/db) type 2 diabetic mice, the loss of Dhh expression observed in the nerve was shown to be associated with increased endoneurial capillary permeability and decreased Cldn5 expression. Conversely, systemic administration of the Smo agonist SAG increased Cldn5 expression, decreased endoneurial capillary permeability, and restored thermal algesia to diabetic mice, demonstrating that loss of Dhh expression is crucial in the development of diabetic neuropathy. The present work demonstrates the critical role of Dhh in maintaining blood nerve barrier integrity and demonstrates for the first time that endothelial dysfunction is sufficient to induce neuropathy. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2015. For permissions please email: journals.permissions@oup.com.

  3. Suppressive effects of long-term exposure to P-nitrophenol on gonadal development, hormonal profile with disruption of tissue integrity, and activation of caspase-3 in male Japanese quail (Coturnix japonica).

    PubMed

    Ahmed, Eman; Nagaoka, Kentaro; Fayez, Mostafa; Abdel-Daim, Mohamed M; Samir, Haney; Watanabe, Gen

    2015-07-01

    P-Nitrophenol (PNP) is considered to be one of nitrophenol derivatives of diesel exhaust particles. PNP is a major metabolite of some organophosphorus compounds. PNP is a persistent organic pollutant as well as one of endocrine-disrupting compounds. Consequently, bioaccumulation of PNP potentiates toxicity. The objectives of the current study were to assess in vivo adverse effects of long-term low doses of PNP exposure on reproductive system during development stage. Twenty-eight-day-old male Japanese quails were orally administered different doses of PNP (0, 0.01, 0.1, 1 mg/kg body weight) daily for 2.5 months. Testicular histopathology, hormones, caspase-3 (CASP3), and claudin-1 (CLDN1) tight junction protein, as well as plasma hormones were analyzed. The results revealed that long-term PNP exposure caused testicular histopathological changes such as vacuolation of spermatogenic cell and spermatocyte with significant testicular and cloacal gland atrophy. PNP activated CASP3 enzyme that is an apoptosis-related cysteine peptidase. Besides, it disrupted the expression of CLDN1. Furthermore, a substantial decrease in plasma concentrations of luteinizing hormone (LH) and testosterone was observed after 2 and 2.5 months in the PNP-treated groups. Meanwhile, the pituitary LH did not significantly change. Site of action of PNP may be peripheral on testicular development and/or centrally on the hypothalamic-pituitary-gonadal axis through reduction of pulsatile secretion of gonadotrophin-releasing hormone. Consequently, it may reduce the sensitivity of the anterior pituitary gland to secrete LH. In conclusion, PNP induced profound endocrine disruption in the form of hormonal imbalance, induction of CASP3, and disruption of CLDN1 expression in the testis. Hence, it may hinder the reproductive processes.

  4. Molecular and Physiological Effects on the Small Intestine of Weaner Pigs Following Feeding with Deoxynivalenol-Contaminated Feed.

    PubMed

    Pasternak, J Alex; Aiyer, Vaishnavi Iyer Aka; Hamonic, Glenn; Beaulieu, A Denise; Columbus, Daniel A; Wilson, Heather L

    2018-01-12

    We intended to assess how exposure of piglets to deoxynivalenol (DON)-contaminated feed impacted their growth, immune response and gut development. Piglets were fed traditional Phase I, Phase II and Phase III diets with the control group receiving 0.20-0.40 ppm DON (referred to as the Control group) and treatment group receiving much higher level of DON-contaminated wheat (3.30-3.80 ppm; referred to as DON-contaminated group). Feeding a DON-contaminated diet had no impact on average daily feed intake (ADFI) ( p < 0.08) or average daily gain (ADG) ( p > 0.10) but it did significantly reduce body weight over time relative to the control piglets ( p < 0.05). Cytokine analysis after initial exposure to the DON-contaminated feed did not result in significant differences in serum interleukin (IL) IL1β, IL-8, IL-13, tumor necrosis factor (TNF)-α or interferon (IFN)-γ. After day 24, no obvious changes in jejunum or ileum gut morphology, histology or changes in gene expression for IL-1β, IL-6, IL-10, TNFα, or Toll-like receptor (TLR)-4 genes. IL-8 showed a trend towards increased expression in the ileum in DON-fed piglets. A significant increase in gene expression for claudin (CLDN) 7 gene expression and a trend towards increased CLDN 2-expression was observed in the ileum in piglets fed the highly DON-contaminated wheat. Because CLDN localization was not negatively affected, we believe that it is unlikely that gut permeability was affected. Exposure to DON-contaminated feed did not significantly impact weaner piglet performance or gut physiology.

  5. Effects of Lightning and Other Meteorological Factors on Fire Activity in the North American Boreal Forest: Implications for Fire Weather Forecasting

    NASA Technical Reports Server (NTRS)

    Peterson, D.; Wang, J.; Ichoku, C.; Remer, L. A.

    2010-01-01

    The effects of lightning and other meteorological factors on wildfire activity in the North American boreal forest are statistically analyzed during the fire seasons of 2000-2006 through an integration of the following data sets: the MODerate Resolution Imaging Spectroradiometer (MODIS) level 2 fire products, the 3-hourly 32-kin gridded meteorological data from North American Regional Reanalysis (NARR), and the lightning data collected by the Canadian Lightning Detection Network (CLDN) and the Alaska Lightning Detection Network (ALDN). Positive anomalies of the 500 hPa geopotential height field, convective available potential energy (CAPE), number of cloud-to-ground lightning strikes, and the number of consecutive dry days are found to be statistically important to the seasonal variation of MODIS fire counts in a large portion of Canada and the entirety of Alaska. Analysis of fire occurrence patterns in the eastern and western boreal forest regions shows that dry (in the absence of precipitation) lightning strikes account for only 20% of the total lightning strikes, but are associated with (and likely cause) 40% of the MODIS observed fire counts in these regions. The chance for ignition increases when a threshold of at least 10 dry strikes per NARR grid box and at least 10 consecutive dry days is reached. Due to the orientation of the large-scale pattern, complex differences in fire and lightning occurrence and variability were also found between the eastern and western sub-regions. Locations with a high percentage of dry strikes commonly experience an increased number of fire counts, but the mean number of fire counts per dry strike is more than 50% higher in western boreal forest sub-region, suggesting a geographic and possible topographic influence. While wet lightning events are found to occur with a large range of CAPE values, a high probability for dry lightning occurs only when 500 hPa geopotential heights are above 5700m and CAPE values are near the maximum observed level, underscoring the importance of low-level instability to boreal fire weather forecasts-

  6. Integrated expression analysis identifies transcription networks in mouse and human gastric neoplasia.

    PubMed

    Chen, Zheng; Soutto, Mohammed; Rahman, Bushra; Fazili, Muhammad W; Peng, DunFa; Blanca Piazuelo, Maria; Chen, Heidi; Kay Washington, M; Shyr, Yu; El-Rifai, Wael

    2017-07-01

    Gastric cancer (GC) is a leading cause of cancer-related deaths worldwide. The Tff1 knockout (KO) mouse model develops gastric lesions that include low-grade dysplasia (LGD), high-grade dysplasia (HGD), and adenocarcinomas. In this study, we used Affymetrix microarrays gene expression platforms for analysis of molecular signatures in the mouse stomach [Tff1-KO (LGD) and Tff1 wild-type (normal)] and human gastric cancer tissues and their adjacent normal tissue samples. Combined integrated bioinformatics analysis of mouse and human datasets indicated that 172 genes were consistently deregulated in both human gastric cancer samples and Tff1-KO LGD lesions (P < .05). Using Ingenuity pathway analysis, these genes mapped to important transcription networks that include MYC, STAT3, β-catenin, RELA, NFATC2, HIF1A, and ETS1 in both human and mouse. Further analysis demonstrated activation of FOXM1 and inhibition of TP53 transcription networks in human gastric cancers but not in Tff1-KO LGD lesions. Using real-time RT-PCR, we validated the deregulated expression of several genes (VCAM1, BGN, CLDN2, COL1A1, COL1A2, COL3A1, EpCAM, IFITM1, MMP9, MMP12, MMP14, PDGFRB, PLAU, and TIMP1) that map to altered transcription networks in both mouse and human gastric neoplasia. Our study demonstrates significant similarities in deregulated transcription networks in human gastric cancer and gastric tumorigenesis in the Tff1-KO mouse model. The data also suggest that activation of MYC, STAT3, RELA, and β-catenin transcription networks could be an early molecular step in gastric carcinogenesis. © 2017 Wiley Periodicals, Inc.

  7. Network-based co-expression analysis for exploring the potential diagnostic biomarkers of metastatic melanoma.

    PubMed

    Wang, Li-Xin; Li, Yang; Chen, Guan-Zhi

    2018-01-01

    Metastatic melanoma is an aggressive skin cancer and is one of the global malignancies with high mortality and morbidity. It is essential to identify and verify diagnostic biomarkers of early metastatic melanoma. Previous studies have systematically assessed protein biomarkers and mRNA-based expression characteristics. However, molecular markers for the early diagnosis of metastatic melanoma have not been identified. To explore potential regulatory targets, we have analyzed the gene microarray expression profiles of malignant melanoma samples by co-expression analysis based on the network approach. The differentially expressed genes (DEGs) were screened by the EdgeR package of R software. A weighted gene co-expression network analysis (WGCNA) was used for the identification of DEGs in the special gene modules and hub genes. Subsequently, a protein-protein interaction network was constructed to extract hub genes associated with gene modules. Finally, twenty-four important hub genes (RASGRP2, IKZF1, CXCR5, LTB, BLK, LINGO3, CCR6, P2RY10, RHOH, JUP, KRT14, PLA2G3, SPRR1A, KRT78, SFN, CLDN4, IL1RN, PKP3, CBLC, KRT16, TMEM79, KLK8, LYPD3 and LYPD5) were treated as valuable factors involved in the immune response and tumor cell development in tumorigenesis. In addition, a transcriptional regulatory network was constructed for these specific modules or hub genes, and a few core transcriptional regulators were found to be mostly associated with our hub genes, including GATA1, STAT1, SP1, and PSG1. In summary, our findings enhance our understanding of the biological process of malignant melanoma metastasis, enabling us to identify specific genes to use for diagnostic and prognostic markers and possibly for targeted therapy.

  8. Targeted Gene Next-Generation Sequencing in Chinese Children with Chronic Pancreatitis and Acute Recurrent Pancreatitis.

    PubMed

    Xiao, Yuan; Yuan, Wentao; Yu, Bo; Guo, Yan; Xu, Xu; Wang, Xinqiong; Yu, Yi; Yu, Yi; Gong, Biao; Xu, Chundi

    2017-12-01

    To identify causal mutations in certain genes in children with acute recurrent pancreatitis (ARP) or chronic pancreatitis (CP). After patients were enrolled (CP, 55; ARP, 14) and their clinical characteristics were investigated, we performed next-generation sequencing to detect nucleotide variations among the following 10 genes: cationic trypsinogen protease serine 1 (PRSS1), serine protease inhibitor, Kazal type 1 (SPINK1), cystic fibrosis transmembrane conductance regulator gene (CFTR), chymotrypsin C (CTRC), calcium-sensing receptor (CASR), cathepsin B (CTSB), keratin 8 (KRT8), CLAUDIN 2 (CLDN2), carboxypeptidase A1 (CPA1), and ATPase type 8B member 1 (ATP8B1). Mutations were searched against online databases to obtain information on the cause of the diseases. Certain novel mutations were analyzed using the SIFT2 and Polyphen-2 to predict the effect on protein function. There were 45 patients with CP and 10 patients with ARP who harbored 1 or more mutations in these genes; 45 patients had at least 1 mutation related to pancreatitis. Mutations were observed in the PRSS1, SPINK1, and CFTR genes in 17 patients, the CASR gene in 5 patients, and the CTSB, CTRC, and KRT8 genes in 1 patient. Mutations were not found in the CLDN, CPA1, or ATP8B1 genes. We found that mutations in SPINK1 may increase the risk of pancreatic duct stones (OR, 11.07; P = .003). The patients with CFTR mutations had a higher level of serum amylase (316.0 U/L vs 92.5 U/L; P = .026). Mutations, especially those in PRSS1, SPINK1, and CFTR, accounted for the major etiologies in Chinese children with CP or ARP. Children presenting mutations in the SPINK1 gene may have a higher risk of developing pancreatic duct stones. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. A Study to Assess the Efficacy of IMAB362 Plus mFOLFOX6 Compared With Placebo Plus mFOLFOX6 as First-line Treatment of Subjects With Claudin (CLDN) 18.2 Positive, HER2-Negative, Locally Advanced Unresectable or Metastatic Gastric or Gastroesophageal Junction (GEJ) Adenocarcinoma

    ClinicalTrials.gov

    2018-05-30

    Locally Advanced Unresectable Gastroesophageal Junction (GEJ) Adenocarcinoma or Cancer; Locally Advanced Unresectable Gastric Adenocarcinoma or Cancer; Metastatic Gastric Adenocarcinoma or Cancer; Metastatic Gastroesophageal Junction (GEJ) Adenocarcinoma

  10. Polymorphisms at PRSS1-PRSS2 and CLDN2-MORC4 loci associate with alcoholic and non-alcoholic chronic pancreatitis in a European replication study.

    PubMed

    Derikx, Monique H; Kovacs, Peter; Scholz, Markus; Masson, Emmanuelle; Chen, Jian-Min; Ruffert, Claudia; Lichtner, Peter; Te Morsche, Rene H M; Cavestro, Giulia Martina; Férec, Claude; Drenth, Joost P H; Witt, Heiko; Rosendahl, Jonas

    2015-09-01

    Several genetic risk factors have been identified for non-alcoholic chronic pancreatitis (NACP). A genome-wide association study reported an association of chronic pancreatitis (CP) with variants in PRSS1-PRSS2 (rs10273639; near the gene encoding cationic trypsinogen) and CLDN2-MORC4 loci (rs7057398 in RIPPLY1 and rs12688220 in MORC4). We aimed to refine these findings in a large European cohort. We studied 3062 patients with alcohol-related CP (ACP) or NACP and 5107 controls. Also, 1559 German patients with alcohol-associated cirrhosis or alcohol dependence were included for comparison. We performed several meta-analyses to examine genotype-phenotype relationships. Association with ACP was found for rs10273639 (OR, 0.63; 95% CI 0.55 to 0.72). ACP was also associated with variants rs7057398 and rs12688220 in men (OR, 2.26; 95% CI 1.94 to 2.63 and OR, 2.66; 95% CI 2.21 to 3.21, respectively) and in women (OR, 1.57; 95% CI 1.14 to 2.18 and OR 1.71; 95% CI 1.41 to 2.07, respectively). Similar results were obtained when German patients with ACP were compared with those with alcohol-associated cirrhosis or alcohol dependence. In the overall population of patients with NACP, association with rs10273639 was absent (OR, 0.93; 95% CI 0.79 to 1.01), whereas rs7057398 of the X chromosomal single nucleotide polymorphisms was associated with NACP in women only (OR, 1.32; 95% CI 1.15 to 1.51). The single-nucleotide polymorphisms rs10273639 at the PRSS1-PRSS2 locus and rs7057398 and rs12688220 at the CLDN2-MORC4 locus are associated with CP and strongly associate with ACP, but only rs7057398 with NACP in female patients. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  11. Modulation of the Proliferation and Metastasis of Human Breast Tumor Cells by SLUG (IDEA)

    DTIC Science & Technology

    2007-04-01

    70 80 90 100 110 CLDN7 Promoter E2-box mutant Lu ci fe ra se a ct iv ity (R LU ) Fig. 7. Evaluation of the effect of mutation (CACCTG is changed...Clontech), as described in the manufacturer’s protocol. The yeast strain AH109 was co-transformed with Gal4 DBD -hSLUG fusion construct in pGBKT7 together

  12. A Counterregulatory Mechanism Impacting Androgen Suppression Therapy

    DTIC Science & Technology

    2016-03-01

    lay audience can understand (Scientific American style). Testosterone, a steroid hormone , plays a key role in the development, growth , and...Sry, Sox9, Dmrt1) (20, 57–60), FSH signaling (Fshr) (61, 62), cell-cell interactions (Clmp, Cldn11, Cx30.2) (19, 38, 63), and peptide hormone ...including genes associated with sex determination (Sry, Sox9, and Dmrt1) (13–17), peptide hormone production (Inha, Inhba, and Amh) (18), gonadotropin

  13. Induction of Subacute Ruminal Acidosis Affects the Ruminal Microbiome and Epithelium

    PubMed Central

    McCann, Joshua C.; Luan, Shaoyu; Cardoso, Felipe C.; Derakhshani, Hooman; Khafipour, Ehsan; Loor, Juan J.

    2016-01-01

    Subacute ruminal acidosis (SARA) negatively impacts the dairy industry by decreasing dry matter intake, milk production, profitability, and increasing culling rate and death loss. Six ruminally cannulated, lactating Holstein cows were used in a replicated incomplete Latin square design to determine the effects of SARA induction on the ruminal microbiome and epithelium. Experimental periods were 10 days with days 1–3 for ad libitum intake of control diet, followed by 50% feed restriction on day 4, and ad libitum access on day 5 to the basal diet or the basal diet with an additional 10% of a 50:50 wheat/barley pellet. Based on subsequent ruminal pH, cows were grouped (SARA grouping; SG) as Non-SARA or SARA based on time <5.6 pH (0 and 3.4 h, respectively). Ruminal samples were collected on days 1 and 6 of each period prior to feeding and separated into liquid and solid fractions. Microbial DNA was extracted for bacterial analysis using 16S rRNA gene paired-end sequencing on the MiSeq Illumina platform and quantitative PCR (qPCR). Ruminal epithelium biopsies were taken on days 1 and 6 before feeding. Quantitative RT-PCR was used to determine gene expression in rumen epithelium. Bray–Curtis similarity indicated samples within the liquid fraction separated by day and coincided with an increased relative abundance of genera Prevotella, Ruminococcus, Streptococcus, and Lactobacillus on day 6 (P < 0.06). Although Firmicutes was the predominant phyla in the solid fraction, a SG × day interaction (P < 0.01) indicated a decrease on day 6 for SARA cows. In contrast, phylum Bacteroidetes increased on day 6 (P < 0.01) for SARA cows driven by greater genera Prevotella and YRC22 (P < 0.01). Streptococcus bovis and Succinivibrio dextrinosolvens populations tended to increase on day 6 but were not affected by SG. In ruminal epithelium, CLDN1 and CLDN4 expression increased on day 6 (P < 0.03) 24 h after SARA induction and a tendency for a SG × day interaction (P < 0.10) was observed for CLDN4. Overall, results indicate more rapid adaptation to an induced bout of SARA in the solid fraction ruminal microbiome compared with ruminal epithelium. PMID:27242724

  14. A novel scoring system for gastric cancer risk assessment based on the expression of three CLIP4 DNA methylation-associated genes

    PubMed Central

    Hu, Chenggong; Zhou, Yongfang; Liu, Chang; Kang, Yan

    2018-01-01

    Gastric cancer (GC) is the fifth most common cancer and the third leading cause of cancer-associated mortality worldwide. In the current study, comprehensive bioinformatic analyses were performed to develop a novel scoring system for GC risk assessment based on CAP-Gly domain containing linker protein family member 4 (CLIP4) DNA methylation status. Two GC datasets with methylation sequencing information and mRNA expression profiling were downloaded from the The Cancer Genome Atlas and Gene Expression Omnibus databases. Differentially expressed genes (DEGs) between the CLIP4 hypermethylation and CLIP4 hypomethylation groups were screened using the limma package in R 3.3.1, and survival analysis of these DEGs was performed using the survival package. A risk scoring system was established via regression factor-weighted gene expression based on linear combination to screen the most important genes associated with CLIP4 methylation and prognosis. Genes associated with high/low-risk value were selected using the limma package. Functional enrichment analysis of the top 500 DEGs that positively and negatively associated with risk values was performed using DAVID 6.8 online and the gene set enrichment analysis (GSEA) software. In total, 35 genes were identified to be that significantly associated with prognosis and CLIP4 DNA methylation, and three prognostic signature genes, claudin-11 (CLDN11), apolipoprotein D (APOD), and chordin like 1 (CHRDL1), were used to establish a risk assessment system. The prognostic scoring system exhibited efficiency in classifying patients with different prognoses, where the low-risk groups had significantly longer overall survival times than those in the high-risk groups. CLDN11, APOD and CHRDL1 exhibited reduced expression in the hypermethylation and low-risk groups compare with the hypomethylation and high-risk groups, respectively. Multivariate Cox analysis indicated that risk value could be used as an independent prognostic factor. In functional analysis, six functional gene ontology terms and five GSEA pathways were associated with CLDN11, APOD and CHRDL1. The results established the credibility of the scoring system in this study. Additionally, these three genes, which were significantly associated with CLIP4 DNA methylation and GC risk assessment, were identified as potential prognostic biomarkers. PMID:29901187

  15. Genomic similarity between gastroesophageal junction and esophageal Barrett's adenocarcinomas

    PubMed Central

    Kuick, Rork; Thomas, Dafydd G.; Nadal, Ernest; Lin, Jules; Chang, Andrew C.; Reddy, Rishindra M.; Orringer, Mark B.; Taylor, Jeremy M. G.; Wang, Thomas D.; Beer, David G.

    2016-01-01

    The current high mortality rate of esophageal adenocarcinoma (EAC) reflects frequent presentation at an advanced stage. Recent efforts utilizing fluorescent peptides have identified overexpressed cell surface targets for endoscopic detection of early stage Barrett's-derived EAC. Unfortunately, 30% of EAC patients present with gastroesophageal junction adenocarcinomas (GEJAC) and lack premalignant Barrett's metaplasia, limiting this early detection strategy. We compared mRNA profiles from 52 EACs (tubular EAC; tEAC) collected above the gastroesophageal junction with 70 GEJACs, 8 normal esophageal and 5 normal gastric mucosa samples. We also analyzed our previously published whole-exome sequencing data in a large cohort of these tumors. Principal component analysis, hierarchical clustering and survival-based analyses demonstrated that GEJAC and tEAC were highly similar, with only modest differences in expression and mutation profiles. The combined expression cohort allowed identification of 49 genes coding cell surface targets overexpressed in both GEJAC and tEAC. We confirmed that three of these candidates (CDH11, ICAM1 and CLDN3) were overexpressed in tumors when compared to normal esophagus, normal gastric and non-dysplastic Barrett's, and localized to the surface of tumor cells. Molecular profiling of tEAC and GEJAC tumors indicated extensive similarity and related molecular processes. Identified genes that encode cell surface proteins overexpressed in both Barrett's-derived EAC and those that arise without Barrett's metaplasia will allow simultaneous detection strategies. PMID:27363029

  16. Identification and comparison of aberrant key regulatory networks in breast, colon, liver, lung, and stomach cancers through methylome database analysis.

    PubMed

    Kim, Byungtak; Kang, Seongeun; Jeong, Gookjoo; Park, Sung-Bin; Kim, Sun Jung

    2014-01-01

    Aberrant methylation of specific CpG sites at the promoter is widely responsible for genesis and development of various cancer types. Even though the microarray-based methylome analyzing techniques have contributed to the elucidation of the methylation change at the genome-wide level, the identification of key methylation markers or top regulatory networks appearing common in highly incident cancers through comparison analysis is still limited. In this study, we in silico performed the genome-wide methylation analysis on each 10 sets of normal and cancer pairs of five tissues: breast, colon, liver, lung, and stomach. The methylation array covers 27,578 CpG sites, corresponding to 14,495 genes, and significantly hypermethylated or hypomethylated genes in the cancer were collected (FDR adjusted p-value <0.05; methylation difference >0.3). Analysis of the dataset confirmed the methylation of previously known methylation markers and further identified novel methylation markers, such as GPX2, CLDN15, and KL. Cluster analysis using the methylome dataset resulted in a diagram with a bipartite mode distinguishing cancer cells from normal cells regardless of tissue types. The analysis further revealed that breast cancer was closest with lung cancer, whereas it was farthest from colon cancer. Pathway analysis identified that either the "cancer" related network or the "cancer" related bio-function appeared as the highest confidence in all the five cancers, whereas each cancer type represents its tissue-specific gene sets. Our results contribute toward understanding the essential abnormal epigenetic pathways involved in carcinogenesis. Further, the novel methylation markers could be applied to establish markers for cancer prognosis.

  17. Gene silencing of Nox4 by CpG island methylation during hepatocarcinogenesis in rats

    PubMed Central

    López-Álvarez, Guadalupe S.; Wojdacz, Tomasz K.; García-Cuellar, Claudia M.; Monroy-Ramírez, Hugo C.; Rodríguez-Segura, Miguel A.; Pacheco-Rivera, Ruth A.; Valencia-Antúnez, Carlos A.; Cervantes-Anaya, Nancy; Soto-Reyes, Ernesto; Vásquez-Garzón, Verónica R.; Sánchez-Pérez, Yesennia; Villa-Treviño, Saúl

    2017-01-01

    ABSTRACT The association between the downregulation of genes and DNA methylation in their CpG islands has been extensively studied as a mechanism that favors carcinogenesis. The objective of this study was to analyze the methylation of a set of genes selected based on their microarray expression profiles during the process of hepatocarcinogenesis. Rats were euthanized at: 24 h, 7, 11, 16 and 30 days and 5, 9, 12 and 18 months post-treatment. We evaluated the methylation status in the CpG islands of four deregulated genes (Casp3, Cldn1, Pex11a and Nox4) using methylation-sensitive high-resolution melting technology for the samples obtained from different stages of hepatocarcinogenesis. We did not observe methylation in Casp3, Cldn1 or Pex11a. However, Nox4 exhibited altered methylation patterns, reaching a maximum of 10%, even during the early stages of hepatocarcinogenesis. We observed downregulation of mRNA and protein of Nox4 (97.5% and 40%, respectively) after the first carcinogenic stimulus relative to the untreated samples. Our results suggest that Nox4 downregulation is associated with DNA methylation of the CpG island in its promoter. We propose that methylation is a mechanism that can silence the expression of Nox4, which could contribute to the acquisition of neoplastic characteristics during hepatocarcinogenesis in rats. PMID:27895046

  18. Genetic causes of hypomagnesemia, a clinical overview.

    PubMed

    Viering, Daan H H M; de Baaij, Jeroen H F; Walsh, Stephen B; Kleta, Robert; Bockenhauer, Detlef

    2017-07-01

    Magnesium is essential to the proper functioning of numerous cellular processes. Magnesium ion (Mg 2+ ) deficits, as reflected in hypomagnesemia, can cause neuromuscular irritability, seizures and cardiac arrhythmias. With normal Mg 2+ intake, homeostasis is maintained primarily through the regulated reabsorption of Mg 2+ by the thick ascending limb of Henle's loop and distal convoluted tubule of the kidney. Inadequate reabsorption results in renal Mg 2+ wasting, as evidenced by an inappropriately high fractional Mg 2+ excretion. Familial renal Mg 2+ wasting is suggestive of a genetic cause, and subsequent studies in these hypomagnesemic families have revealed over a dozen genes directly or indirectly involved in Mg 2+ transport. Those can be classified into four groups: hypercalciuric hypomagnesemias (encompassing mutations in CLDN16, CLDN19, CASR, CLCNKB), Gitelman-like hypomagnesemias (CLCNKB, SLC12A3, BSND, KCNJ10, FYXD2, HNF1B, PCBD1), mitochondrial hypomagnesemias (SARS2, MT-TI, Kearns-Sayre syndrome) and other hypomagnesemias (TRPM6, CNMM2, EGF, EGFR, KCNA1, FAM111A). Although identification of these genes has not yet changed treatment, which remains Mg 2+ supplementation, it has contributed enormously to our understanding of Mg 2+ transport and renal function. In this review, we discuss general mechanisms and symptoms of genetic causes of hypomagnesemia as well as the specific molecular mechanisms and clinical phenotypes associated with each syndrome.

  19. Imaging the Vascular and Metabolic Impact on Claudin-7, a Tight Junction Protein, in Transgenic Human Breast Cancer Models

    DTIC Science & Technology

    2004-06-01

    intratumoral administration of CPE (10 ug) to xenograft tumors of T47D breast cancer cells in immunodeficient mice resulted in a significant reduction (p...prolongs the life of the mice by two fold. Slow release fonrmulations using polymer wafers, polymer beads and nanoparticles is ongoing to provide a... intramuscular injection of 1.5 mg/kg depo- 30 minutes. CLDN 3 and 4 protein was visualized using estradiol (Florida Infusion Co., Palm Harbor, FL

  20. Origin of Prostate Cancer-Associated Stroma: Epithellal Mesenchymal Transition (EMT)

    DTIC Science & Technology

    2006-03-01

    again at RT for another 30 minutes in peroxidase-conjugated 9 streptavidin. Color was developed with 3 , 3 diaminobenzidine (DAB) (DakoCytomation...regulation of transcription BUB1 19.7 3 cell cycle/cell proliferation CLDN23 6.0 7 cell-cell adhesion OAS2 6.7 8 immune response IF 5.4 9 immune response GBP2...HSD and a 3 - ketosteroid reductase) eliminates DHT by reducing it to the inactive androgen 5 -androstane- 3 ,17 -diol ( 3 -diol) (8-11). By contrast

  1. Comparison of Tight Junction Protein-Related Gene mRNA Expression Levels between Male and Female Gastroesophageal Reflux Disease Patients.

    PubMed

    Kim, Jin Joo; Kim, Nayoung; Park, Ji Hyun; Kim, Young Sun; Lee, Sun Min; Lee, Dong Ho; Jung, Hyun Chae

    2018-03-21

    Male predominance has been observed in the erosive reflux disease (ERD), but reverse finding in nonerosive reflux disease (NERD). This suggests sex-specific medicine approach is needed but its mechanism is remained to be elucidated. We aimed to compare clinical characteristics and mRNA expression levels of tight junction-related proteins between male and female gastroesophageal reflux disease (GERD) patients. Sixteen healthy controls, 45 ERD, and 14 NERD patients received upper endoscopies and completed questionnaires. Quantitative real-time polymerase chain reactions (qPCR) of occludin (OCLN), zonal occludens (ZO) 1, claudin1 (CDLN1) and claudin4 (CDLN4), and neurokinin 1 receptor (NK1R) were performed in the distal esophageal mucosal specimen. These results were analyzed by sex. Female GERD patients were affected more by reflux symptoms than males. The impairment of overall QoL was more prominent in female patients with reflux symptoms than male patients (5.6±0.2 vs. 4.9±0.6, p=0.009). The levels of OCLN mRNA expression were significantly lower in the male ERD group. On the other hand, those of CLDN1, CLDN4, and NK1R except ZO-1 were significantly higher in the male ERD group. We demonstrated that female ERD/NERD patients were affected more by GERD and male ERD patients showed significant changes of tight junction protein mRNA expression levels.

  2. Extracellular matrix of adipogenically differentiated mesenchymal stem cells reveals a network of collagen filaments, mostly interwoven by hexagonal structural units.

    PubMed

    Ullah, Mujib; Sittinger, Michael; Ringe, Jochen

    2013-01-01

    Extracellular matrix (ECM) is the non-cellular component of tissues, which not only provides biological shelter but also takes part in the cellular decisions for diverse functions. Every tissue has an ECM with unique composition and topology that governs the process of determination, differentiation, proliferation, migration and regeneration of cells. Little is known about the structural organization of matrix especially of MSC-derived adipogenic ECM. Here, we particularly focus on the composition and architecture of the fat ECM to understand the cellular behavior on functional bases. Thus, mesenchymal stem cells (MSC) were adipogenically differentiated, then, were transferred to adipogenic propagation medium, whereas they started the release of lipid droplets leaving bare network of ECM. Microarray analysis was performed, to indentify the molecular machinery of matrix. Adipogenesis was verified by Oil Red O staining of lipid droplets and by qPCR of adipogenic marker genes PPARG and FABP4. Antibody staining demonstrated the presence of collagen type I, II and IV filaments, while alkaline phosphatase activity verified the ossified nature of these filaments. In the adipogenic matrix, the hexagonal structures were abundant followed by octagonal structures, whereas they interwoven in a crisscross manner. Regarding molecular machinery of adipogenic ECM, the bioinformatics analysis revealed the upregulated expression of COL4A1, ITGA7, ITGA7, SDC2, ICAM3, ADAMTS9, TIMP4, GPC1, GPC4 and downregulated expression of COL14A1, ADAMTS5, TIMP2, TIMP3, BGN, LAMA3, ITGA2, ITGA4, ITGB1, ITGB8, CLDN11. Moreover, genes associated with integrins, glycoproteins, laminins, fibronectins, cadherins, selectins and linked signaling pathways were found. Knowledge of the interactive-language between cells and matrix could be beneficial for the artificial designing of biomaterials and bioscaffolds. © 2013.

  3. Spatiotemporal loss of K+ transport proteins in the developing cochlear lateral wall of guinea pigs with hereditary deafness.

    PubMed

    Jin, Zhe; Ulfendahl, Mats; Järlebark, Leif

    2008-01-01

    Genetic deafness is one of the most common human genetic birth defects. To understand the molecular mechanisms underlying human hereditary deafness, deaf animal strains have proved to be invaluable models. The German waltzing guinea pig is a new strain of animals with unidentified gene mutation(s), displaying recessively inherited cochleovestibular impairment. Histological investigations of the homozygous animals (gw/gw) revealed a collapse of the endolymphatic compartment and malformation of stria vascularis. RT-PCR showed a significant reduction in expression of the strial intermediate cell-specific gene Dct and the tight-junction gene Cldn11 in the embryonic day (E)40 and adult gw/gw cochlear lateral wall. Immunohistochemical analysis of the gw/gw cochlea showed loss of the tight junction protein CLDN11 in strial basal cells from E40, loss of the potassium channel subunit KCNJ10 in strial intermediate cells from E50, and loss of the Na-K-Cl cotransporter SLC12A2 in strial marginal cells from E50. In addition, a temporary loss of the gap junction protein GJB2 (connexin 26) between fibrocytes in the spiral ligament of the E50 gw/gw cochlea was observed. The barrier composed of tight junctions between strial basal cells was disrupted in the gw/gw cochlea as indicated by a biotin tracer permeability assay. In conclusion, spatiotemporal loss of K+ transport proteins in the cochlear lateral wall is caused by malformation of the stria vascularis in the developing German waltzing guinea pig inner ear. This new animal strain may serve as a good model for studying human genetic deafness due to disruption of inner ear ion homeostasis.

  4. A genome-wide association study of corneal astigmatism: The CREAM Consortium.

    PubMed

    Shah, Rupal L; Li, Qing; Zhao, Wanting; Tedja, Milly S; Tideman, J Willem L; Khawaja, Anthony P; Fan, Qiao; Yazar, Seyhan; Williams, Katie M; Verhoeven, Virginie J M; Xie, Jing; Wang, Ya Xing; Hess, Moritz; Nickels, Stefan; Lackner, Karl J; Pärssinen, Olavi; Wedenoja, Juho; Biino, Ginevra; Concas, Maria Pina; Uitterlinden, André; Rivadeneira, Fernando; Jaddoe, Vincent W V; Hysi, Pirro G; Sim, Xueling; Tan, Nicholas; Tham, Yih-Chung; Sensaki, Sonoko; Hofman, Albert; Vingerling, Johannes R; Jonas, Jost B; Mitchell, Paul; Hammond, Christopher J; Höhn, René; Baird, Paul N; Wong, Tien-Yin; Cheng, Chinfsg-Yu; Teo, Yik Ying; Mackey, David A; Williams, Cathy; Saw, Seang-Mei; Klaver, Caroline C W; Guggenheim, Jeremy A; Bailey-Wilson, Joan E

    2018-01-01

    To identify genes and genetic markers associated with corneal astigmatism. A meta-analysis of genome-wide association studies (GWASs) of corneal astigmatism undertaken for 14 European ancestry (n=22,250) and 8 Asian ancestry (n=9,120) cohorts was performed by the Consortium for Refractive Error and Myopia. Cases were defined as having >0.75 diopters of corneal astigmatism. Subsequent gene-based and gene-set analyses of the meta-analyzed results of European ancestry cohorts were performed using VEGAS2 and MAGMA software. Additionally, estimates of single nucleotide polymorphism (SNP)-based heritability for corneal and refractive astigmatism and the spherical equivalent were calculated for Europeans using LD score regression. The meta-analysis of all cohorts identified a genome-wide significant locus near the platelet-derived growth factor receptor alpha ( PDGFRA ) gene: top SNP: rs7673984, odds ratio=1.12 (95% CI:1.08-1.16), p=5.55×10 -9 . No other genome-wide significant loci were identified in the combined analysis or European/Asian ancestry-specific analyses. Gene-based analysis identified three novel candidate genes for corneal astigmatism in Europeans-claudin-7 ( CLDN7 ), acid phosphatase 2, lysosomal ( ACP2 ), and TNF alpha-induced protein 8 like 3 ( TNFAIP8L3 ). In addition to replicating a previously identified genome-wide significant locus for corneal astigmatism near the PDGFRA gene, gene-based analysis identified three novel candidate genes, CLDN7 , ACP2 , and TNFAIP8L3 , that warrant further investigation to understand their role in the pathogenesis of corneal astigmatism. The much lower number of genetic variants and genes demonstrating an association with corneal astigmatism compared to published spherical equivalent GWAS analyses suggest a greater influence of rare genetic variants, non-additive genetic effects, or environmental factors in the development of astigmatism.

  5. Hepatitis C virus depends on E-cadherin as an entry factor and regulates its expression in epithelial-to-mesenchymal transition.

    PubMed

    Li, Qisheng; Sodroski, Catherine; Lowey, Brianna; Schweitzer, Cameron J; Cha, Helen; Zhang, Fang; Liang, T Jake

    2016-07-05

    Hepatitis C virus (HCV) enters the host cell through interactions with a cascade of cellular factors. Although significant progress has been made in understanding HCV entry, the precise mechanisms by which HCV exploits the receptor complex and host machinery to enter the cell remain unclear. This intricate process of viral entry likely depends on additional yet-to-be-defined cellular molecules. Recently, by applying integrative functional genomics approaches, we identified and interrogated distinct sets of host dependencies in the complete HCV life cycle. Viral entry assays using HCV pseudoparticles (HCVpps) of various genotypes uncovered multiple previously unappreciated host factors, including E-cadherin, that mediate HCV entry. E-cadherin silencing significantly inhibited HCV infection in Huh7.5.1 cells, HepG2/miR122/CD81 cells, and primary human hepatocytes at a postbinding entry step. Knockdown of E-cadherin, however, had no effect on HCV RNA replication or internal ribosomal entry site (IRES)-mediated translation. In addition, an E-cadherin monoclonal antibody effectively blocked HCV entry and infection in hepatocytes. Mechanistic studies demonstrated that E-cadherin is closely associated with claudin-1 (CLDN1) and occludin (OCLN) on the cell membrane. Depletion of E-cadherin drastically diminished the cell-surface distribution of these two tight junction proteins in various hepatic cell lines, indicating that E-cadherin plays an important regulatory role in CLDN1/OCLN localization on the cell surface. Furthermore, loss of E-cadherin expression in hepatocytes is associated with HCV-induced epithelial-to-mesenchymal transition (EMT), providing an important link between HCV infection and liver cancer. Our data indicate that a dynamic interplay among E-cadherin, tight junctions, and EMT exists and mediates an important function in HCV entry.

  6. Occludin Is Involved in Adhesion, Apoptosis, Differentiation and Ca2+-Homeostasis of Human Keratinocytes: Implications for Tumorigenesis

    PubMed Central

    Ohnemus, Ulrich; Kirschner, Nina; Vidal-y-Sy, Sabine; von den Driesch, Peter; Börnchen, Christian; Eberle, Jürgen; Mildner, Michael; Vettorazzi, Eik; Rosenthal, Rita; Moll, Ingrid; Brandner, Johanna M.

    2013-01-01

    Tight junction (TJ) proteins are involved in a number of cellular functions, including paracellular barrier formation, cell polarization, differentiation, and proliferation. Altered expression of TJ proteins was reported in various epithelial tumors. Here, we used tissue samples of human cutaneous squamous cell carcinoma (SCC), its precursor tumors, as well as sun-exposed and non-sun-exposed skin as a model system to investigate TJ protein alteration at various stages of tumorigenesis. We identified that a broader localization of zonula occludens protein (ZO)-1 and claudin-4 (Cldn-4) as well as downregulation of Cldn-1 in deeper epidermal layers is a frequent event in all the tumor entities as well as in sun-exposed skin, suggesting that these changes result from chronic UV irradiation. In contrast, SCC could be distinguished from the precursor tumors and sun-exposed skin by a frequent complete loss of occludin (Ocln). To elucidate the impact of down-regulation of Ocln, we performed Ocln siRNA experiments in human keratinocytes and uncovered that Ocln downregulation results in decreased epithelial cell-cell adhesion and reduced susceptibility to apoptosis induction by UVB or TNF-related apoptosis-inducing ligand (TRAIL), cellular characteristics for tumorigenesis. Furthermore, an influence on epidermal differentiation was observed, while there was no change of E-cadherin and vimentin, markers for epithelial-mesenchymal transition. Ocln knock-down altered Ca2+-homeostasis which may contribute to alterations of cell-cell adhesion and differentiation. As downregulation of Ocln is also seen in SCC derived from other tissues, as well as in other carcinomas, we suggest this as a common principle in tumor pathogenesis, which may be used as a target for therapeutic intervention. PMID:23390516

  7. Integrative radiogenomic analysis for multicentric radiophenotype in glioblastoma

    PubMed Central

    Kong, Doo-Sik; Kim, Jinkuk; Lee, In-Hee; Kim, Sung Tae; Seol, Ho Jun; Lee, Jung-Il; Park, Woong-Yang; Ryu, Gyuha; Wang, Zichen; Ma'ayan, Avi; Nam, Do-Hyun

    2016-01-01

    We postulated that multicentric glioblastoma (GBM) represents more invasiveness form than solitary GBM and has their own genomic characteristics. From May 2004 to June 2010 we retrospectively identified 51 treatment-naïve GBM patients with available clinical information from the Samsung Medical Center data registry. Multicentricity of the tumor was defined as the presence of multiple foci on the T1 contrast enhancement of MR images or having high signal for multiple lesions without contiguity of each other on the FLAIR image. Kaplan-Meier survival analysis demonstrated that multicentric GBM had worse prognosis than solitary GBM (median, 16.03 vs. 20.57 months, p < 0.05). Copy number variation (CNV) analysis revealed there was an increase in 11 regions, and a decrease in 17 regions, in the multicentric GBM. Gene expression profiling identified 738 genes to be increased and 623 genes to be decreased in the multicentric radiophenotype (p < 0.001). Integration of the CNV and expression datasets identified twelve representative genes: CPM, LANCL2, LAMP1, GAS6, DCUN1D2, CDK4, AGAP2, TSPAN33, PDLIM1, CLDN12, and GTPBP10 having high correlation across CNV, gene expression and patient outcome. Network and enrichment analyses showed that the multicentric tumor had elevated fibrotic signaling pathways compared with a more proliferative and mitogenic signal in the solitary tumors. Noninvasive radiological imaging together with integrative radiogenomic analysis can provide an important tool in helping to advance personalized therapy for the more clinically aggressive subset of GBM. PMID:26863628

  8. 1,25-Dihydroxyvitamin D3 Controls a Cohort of Vitamin D Receptor Target Genes in the Proximal Intestine That Is Enriched for Calcium-regulating Components.

    PubMed

    Lee, Seong Min; Riley, Erin M; Meyer, Mark B; Benkusky, Nancy A; Plum, Lori A; DeLuca, Hector F; Pike, J Wesley

    2015-07-17

    1,25-Dihydroxyvitamin D3 (1,25(OH)2D3) plays an integral role in calcium homeostasis in higher organisms through its actions in the intestine, kidney, and skeleton. Interestingly, although several intestinal genes are known to play a contributory role in calcium homeostasis, the entire caste of key components remains to be identified. To examine this issue, Cyp27b1 null mice on either a normal or a high calcium/phosphate-containing rescue diet were treated with vehicle or 1,25(OH)2D3 and evaluated 6 h later. RNA samples from the duodena were then subjected to RNA sequence analysis, and the data were analyzed bioinformatically. 1,25(OH)2D3 altered expression of large collections of genes in animals under either dietary condition. 45 genes were found common to both 1,25(OH)2D3-treated groups and were composed of genes previously linked to intestinal calcium uptake, including S100g, Trpv6, Atp2b1, and Cldn2 as well as others. An additional distinct network of 56 genes was regulated exclusively by diet. We then conducted a ChIP sequence analysis of binding sites for the vitamin D receptor (VDR) across the proximal intestine in vitamin D-sufficient normal mice treated with vehicle or 1,25(OH)2D3. The residual VDR cistrome was composed of 4617 sites, which was increased almost 4-fold following hormone treatment. Interestingly, the majority of the genes regulated by 1,25(OH)2D3 in each diet group as well as those found in common in both groups contained frequent VDR sites that likely regulated their expression. This study revealed a global network of genes in the intestine that both represent direct targets of vitamin D action in mice and are involved in calcium absorption. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  9. 1,25-Dihydroxyvitamin D3 Controls a Cohort of Vitamin D Receptor Target Genes in the Proximal Intestine That Is Enriched for Calcium-regulating Components*

    PubMed Central

    Lee, Seong Min; Riley, Erin M.; Meyer, Mark B.; Benkusky, Nancy A.; Plum, Lori A.; DeLuca, Hector F.; Pike, J. Wesley

    2015-01-01

    1,25-Dihydroxyvitamin D3 (1,25(OH)2D3) plays an integral role in calcium homeostasis in higher organisms through its actions in the intestine, kidney, and skeleton. Interestingly, although several intestinal genes are known to play a contributory role in calcium homeostasis, the entire caste of key components remains to be identified. To examine this issue, Cyp27b1 null mice on either a normal or a high calcium/phosphate-containing rescue diet were treated with vehicle or 1,25(OH)2D3 and evaluated 6 h later. RNA samples from the duodena were then subjected to RNA sequence analysis, and the data were analyzed bioinformatically. 1,25(OH)2D3 altered expression of large collections of genes in animals under either dietary condition. 45 genes were found common to both 1,25(OH)2D3-treated groups and were composed of genes previously linked to intestinal calcium uptake, including S100g, Trpv6, Atp2b1, and Cldn2 as well as others. An additional distinct network of 56 genes was regulated exclusively by diet. We then conducted a ChIP sequence analysis of binding sites for the vitamin D receptor (VDR) across the proximal intestine in vitamin D-sufficient normal mice treated with vehicle or 1,25(OH)2D3. The residual VDR cistrome was composed of 4617 sites, which was increased almost 4-fold following hormone treatment. Interestingly, the majority of the genes regulated by 1,25(OH)2D3 in each diet group as well as those found in common in both groups contained frequent VDR sites that likely regulated their expression. This study revealed a global network of genes in the intestine that both represent direct targets of vitamin D action in mice and are involved in calcium absorption. PMID:26041780

  10. A genome-wide association study of corneal astigmatism: The CREAM Consortium

    PubMed Central

    Shah, Rupal L.; Li, Qing; Zhao, Wanting; Tedja, Milly S.; Tideman, J. Willem L.; Khawaja, Anthony P.; Fan, Qiao; Yazar, Seyhan; Williams, Katie M.; Verhoeven, Virginie J.M.; Xie, Jing; Wang, Ya Xing; Hess, Moritz; Nickels, Stefan; Lackner, Karl J.; Pärssinen, Olavi; Wedenoja, Juho; Biino, Ginevra; Concas, Maria Pina; Uitterlinden, André; Rivadeneira, Fernando; Jaddoe, Vincent W.V.; Hysi, Pirro G.; Sim, Xueling; Tan, Nicholas; Tham, Yih-Chung; Sensaki, Sonoko; Hofman, Albert; Vingerling, Johannes R.; Jonas, Jost B.; Mitchell, Paul; Hammond, Christopher J.; Höhn, René; Baird, Paul N.; Wong, Tien-Yin; Cheng, Chinfsg-Yu; Teo, Yik Ying; Mackey, David A.; Williams, Cathy; Saw, Seang-Mei; Klaver, Caroline C.W.; Bailey-Wilson, Joan E.

    2018-01-01

    Purpose To identify genes and genetic markers associated with corneal astigmatism. Methods A meta-analysis of genome-wide association studies (GWASs) of corneal astigmatism undertaken for 14 European ancestry (n=22,250) and 8 Asian ancestry (n=9,120) cohorts was performed by the Consortium for Refractive Error and Myopia. Cases were defined as having >0.75 diopters of corneal astigmatism. Subsequent gene-based and gene-set analyses of the meta-analyzed results of European ancestry cohorts were performed using VEGAS2 and MAGMA software. Additionally, estimates of single nucleotide polymorphism (SNP)-based heritability for corneal and refractive astigmatism and the spherical equivalent were calculated for Europeans using LD score regression. Results The meta-analysis of all cohorts identified a genome-wide significant locus near the platelet-derived growth factor receptor alpha (PDGFRA) gene: top SNP: rs7673984, odds ratio=1.12 (95% CI:1.08–1.16), p=5.55×10−9. No other genome-wide significant loci were identified in the combined analysis or European/Asian ancestry-specific analyses. Gene-based analysis identified three novel candidate genes for corneal astigmatism in Europeans—claudin-7 (CLDN7), acid phosphatase 2, lysosomal (ACP2), and TNF alpha-induced protein 8 like 3 (TNFAIP8L3). Conclusions In addition to replicating a previously identified genome-wide significant locus for corneal astigmatism near the PDGFRA gene, gene-based analysis identified three novel candidate genes, CLDN7, ACP2, and TNFAIP8L3, that warrant further investigation to understand their role in the pathogenesis of corneal astigmatism. The much lower number of genetic variants and genes demonstrating an association with corneal astigmatism compared to published spherical equivalent GWAS analyses suggest a greater influence of rare genetic variants, non-additive genetic effects, or environmental factors in the development of astigmatism. PMID:29422769

  11. CaV1.3 L-type Ca2+ channels modulate depression-like behaviour in mice independent of deaf phenotype.

    PubMed

    Busquet, Perrine; Nguyen, Ngoc Khoi; Schmid, Eduard; Tanimoto, Naoyuki; Seeliger, Mathias W; Ben-Yosef, Tamar; Mizuno, Fengxia; Akopian, Abram; Striessnig, Jörg; Singewald, Nicolas

    2010-05-01

    Mounting evidence suggests that voltage-gated L-type Ca2+ channels can modulate affective behaviour. We therefore explored the role of CaV1.3 L-type Ca2+ channels in depression- and anxiety-like behaviours using CaV1.3-deficient mice (CaV1.3-/-). We showed that CaV1.3-/- mice displayed less immobility in the forced swim test as well as in the tail suspension test, indicating an antidepressant-like phenotype. Locomotor activity in the home cage or a novel open-field test was not influenced. In the elevated plus maze (EPM), CaV1.3-/- mice entered the open arms more frequently and spent more time there indicating an anxiolytic-like phenotype which was, however, not supported in the stress-induced hyperthermia test. By performing parallel experiments in Claudin 14 knockout mice (Cldn14-/-), which like CaV1.3-/- mice are congenitally deaf, an influence of deafness on the antidepressant-like phenotype could be ruled out. On the other hand, a similar EPM behaviour indicative of an anxiolytic phenotype was also found in the Cldn14-/- animals. Using electroretinography and visual behavioural tasks we demonstrated that at least in mice, CaV1.3 channels do not significantly contribute to visual function. However, marked morphological changes were revealed in synaptic ribbons in the outer plexiform layer of CaV1.3-/- retinas by immunohistochemistry suggesting a possible role of this channel type in structural plasticity at the ribbon synapse. Taken together, our findings indicate that CaV1.3 L-type Ca2+ channels modulate depression-like behaviour but are not essential for visual function. The findings raise the possibility that selective modulation of CaV1.3 channels could be a promising new therapeutic concept for the treatment of mood disorders.

  12. Molecular pathology of brain edema after severe burns in forensic autopsy cases with special regard to the importance of reference gene selection.

    PubMed

    Wang, Qi; Ishikawa, Takaki; Michiue, Tomomi; Zhu, Bao-Li; Guan, Da-Wei; Maeda, Hitoshi

    2013-09-01

    Brain edema is believed to be linked to high mortality incidence after severe burns. The present study investigated the molecular pathology of brain damage and responses involving brain edema in forensic autopsy cases of fire fatality (n = 55) compared with sudden cardiac death (n = 11), mechanical asphyxia (n = 13), and non-brain injury cases (n = 22). Postmortem mRNA and immunohistochemical expressions of aquaporins (AQPs), claudin5 (CLDN5), and matrix metalloproteinases (MMPs) were examined. Prolonged deaths due to severe burns showed an increase in brain water content, but relative mRNA quantification, using different normalization methods, showed inconsistent results: in prolonged deaths due to severe burns, higher expression levels were detected for all markers when three previously validated reference genes, PES1, POLR2A, and IPO8, were used for normalization, higher for AQP1 and MMP9 when GAPDH alone was used for normalization and higher for MMP9, but lower for MMP2 when B2M alone was used for normalization. Additionally, when B2M alone was used for normalization, higher expression of AQP4 was detected in acute fire deaths. Furthermore, the expression stability values of these five reference genes calculated by geNorm demonstrated that B2M was the least stable one, followed by GAPDH. In immunostaining, only AQP1 and MMP9 showed differences among the causes of death: they were evident in most prolonged deaths due to severe burns. These findings suggest that systematic analysis of gene expressions using real-time PCR might be a useful procedure in forensic death investigation, and validation of reference genes is crucial.

  13. Real-time method for establishing a detection map for a network of sensors

    DOEpatents

    Nguyen, Hung D; Koch, Mark W; Giron, Casey; Rondeau, Daniel M; Russell, John L

    2012-09-11

    A method for establishing a detection map of a dynamically configurable sensor network. This method determines an appropriate set of locations for a plurality of sensor units of a sensor network and establishes a detection map for the network of sensors while the network is being set up; the detection map includes the effects of the local terrain and individual sensor performance. Sensor performance is characterized during the placement of the sensor units, which enables dynamic adjustment or reconfiguration of the placement of individual elements of the sensor network during network set-up to accommodate variations in local terrain and individual sensor performance. The reconfiguration of the network during initial set-up to accommodate deviations from idealized individual sensor detection zones improves the effectiveness of the sensor network in detecting activities at a detection perimeter and can provide the desired sensor coverage of an area while minimizing unintentional gaps in coverage.

  14. Measuring, Understanding, and Responding to Covert Social Networks: Passive and Active Tomography

    DTIC Science & Technology

    2017-11-11

    practical algorithms for sociologically principled detection of small sub- networks. To detect “foreground” networks, we need two competing models...understanding of how to model “background” network clutter, leading to principled approaches to “foreground” sub-network detection. Before the MURI...no frameworks existed for network detection theory or goodness-of-fit, nor were models and algorithms coupled to sound sociological principles

  15. Network anomaly detection system with optimized DS evidence theory.

    PubMed

    Liu, Yuan; Wang, Xiaofeng; Liu, Kaiyu

    2014-01-01

    Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network-complicated and varied. To achieve high detection rate, we present a novel network anomaly detection system with optimized Dempster-Shafer evidence theory (ODS) and regression basic probability assignment (RBPA) function. In this model, we add weights for each sensor to optimize DS evidence theory according to its previous predict accuracy. And RBPA employs sensor's regression ability to address complex network. By four kinds of experiments, we find that our novel network anomaly detection model has a better detection rate, and RBPA as well as ODS optimization methods can improve system performance significantly.

  16. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  17. Network Anomaly Detection System with Optimized DS Evidence Theory

    PubMed Central

    Liu, Yuan; Wang, Xiaofeng; Liu, Kaiyu

    2014-01-01

    Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. To achieve high detection rate, we present a novel network anomaly detection system with optimized Dempster-Shafer evidence theory (ODS) and regression basic probability assignment (RBPA) function. In this model, we add weights for each senor to optimize DS evidence theory according to its previous predict accuracy. And RBPA employs sensor's regression ability to address complex network. By four kinds of experiments, we find that our novel network anomaly detection model has a better detection rate, and RBPA as well as ODS optimization methods can improve system performance significantly. PMID:25254258

  18. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model

    NASA Astrophysics Data System (ADS)

    Tong, Xiaojun; Wang, Zhu; Yu, Haining

    2009-10-01

    A hybrid RBF/Elman neural network model that can be employed for both anomaly detection and misuse detection is presented in this paper. The IDSs using the hybrid neural network can detect temporally dispersed and collaborative attacks effectively because of its memory of past events. The RBF network is employed as a real-time pattern classification and the Elman network is employed to restore the memory of past events. The IDSs using the hybrid neural network are evaluated against the intrusion detection evaluation data sponsored by U.S. Defense Advanced Research Projects Agency (DARPA). Experimental results are presented in ROC curves. Experiments show that the IDSs using this hybrid neural network improve the detection rate and decrease the false positive rate effectively.

  19. Neural Detection of Malicious Network Activities Using a New Direct Parsing and Feature Extraction Technique

    DTIC Science & Technology

    2015-09-01

    intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a

  20. Detecting the Influence of Spreading in Social Networks with Excitable Sensor Networks

    PubMed Central

    Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2015-01-01

    Detecting spreading outbreaks in social networks with sensors is of great significance in applications. Inspired by the formation mechanism of humans’ physical sensations to external stimuli, we propose a new method to detect the influence of spreading by constructing excitable sensor networks. Exploiting the amplifying effect of excitable sensor networks, our method can better detect small-scale spreading processes. At the same time, it can also distinguish large-scale diffusion instances due to the self-inhibition effect of excitable elements. Through simulations of diverse spreading dynamics on typical real-world social networks (Facebook, coauthor, and email social networks), we find that the excitable sensor networks are capable of detecting and ranking spreading processes in a much wider range of influence than other commonly used sensor placement methods, such as random, targeted, acquaintance and distance strategies. In addition, we validate the efficacy of our method with diffusion data from a real-world online social system, Twitter. We find that our method can detect more spreading topics in practice. Our approach provides a new direction in spreading detection and should be useful for designing effective detection methods. PMID:25950181

  1. Distributed learning automata-based algorithm for community detection in complex networks

    NASA Astrophysics Data System (ADS)

    Khomami, Mohammad Mehdi Daliri; Rezvanian, Alireza; Meybodi, Mohammad Reza

    2016-03-01

    Community structure is an important and universal topological property of many complex networks such as social and information networks. The detection of communities of a network is a significant technique for understanding the structure and function of networks. In this paper, we propose an algorithm based on distributed learning automata for community detection (DLACD) in complex networks. In the proposed algorithm, each vertex of network is equipped with a learning automation. According to the cooperation among network of learning automata and updating action probabilities of each automaton, the algorithm interactively tries to identify high-density local communities. The performance of the proposed algorithm is investigated through a number of simulations on popular synthetic and real networks. Experimental results in comparison with popular community detection algorithms such as walk trap, Danon greedy optimization, Fuzzy community detection, Multi-resolution community detection and label propagation demonstrated the superiority of DLACD in terms of modularity, NMI, performance, min-max-cut and coverage.

  2. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks

    PubMed Central

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-01-01

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks. PMID:27754380

  3. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.

    PubMed

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-10-13

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks.

  4. Detection of network attacks based on adaptive resonance theory

    NASA Astrophysics Data System (ADS)

    Bukhanov, D. G.; Polyakov, V. M.

    2018-05-01

    The paper considers an approach to intrusion detection systems using a neural network of adaptive resonant theory. It suggests the structure of an intrusion detection system consisting of two types of program modules. The first module manages connections of user applications by preventing the undesirable ones. The second analyzes the incoming network traffic parameters to check potential network attacks. After attack detection, it notifies the required stations using a secure transmission channel. The paper describes the experiment on the detection and recognition of network attacks using the test selection. It also compares the obtained results with similar experiments carried out by other authors. It gives findings and conclusions on the sufficiency of the proposed approach. The obtained information confirms the sufficiency of applying the neural networks of adaptive resonant theory to analyze network traffic within the intrusion detection system.

  5. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.F.; Maccabe, A.B.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  6. Automatic detection of diabetic retinopathy using an artificial neural network: a screening tool.

    PubMed

    Gardner, G G; Keating, D; Williamson, T H; Elliott, A T

    1996-11-01

    To determine if neural networks can detect diabetic features in fundus images and compare the network against an ophthalmologist screening a set of fundus images. 147 diabetic and 32 normal images were captured from a fundus camera, stored on computer, and analysed using a back propagation neural network. The network was trained to recognise features in the retinal image. The effects of digital filtering techniques and different network variables were assessed. 200 diabetic and 101 normal images were then randomised and used to evaluate the network's performance for the detection of diabetic retinopathy against an ophthalmologist. Detection rates for the recognition of vessels, exudates, and haemorrhages were 91.7%, 93.1%, and 73.8% respectively. When compared with the results of the ophthalmologist, the network achieved a sensitivity of 88.4% and a specificity of 83.5% for the detection of diabetic retinopathy. Detection of vessels, exudates, and haemorrhages was possible, with success rates dependent upon preprocessing and the number of images used in training. When compared with the ophthalmologist, the network achieved good accuracy for the detection of diabetic retinopathy. The system could be used as an aid to the screening of diabetic patients for retinopathy.

  7. A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

    PubMed

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

  8. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  9. The architecture of a network level intrusion detection system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heady, R.; Luger, G.; Maccabe, A.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  10. Network Anomaly Detection Based on Wavelet Analysis

    NASA Astrophysics Data System (ADS)

    Lu, Wei; Ghorbani, Ali A.

    2008-12-01

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  11. Hideen Markov Models and Neural Networks for Fault Detection in Dynamic Systems

    NASA Technical Reports Server (NTRS)

    Smyth, Padhraic

    1994-01-01

    None given. (From conclusion): Neural networks plus Hidden Markov Models(HMM)can provide excellene detection and false alarm rate performance in fault detection applications. Modified models allow for novelty detection. Also covers some key contributions of neural network model, and application status.

  12. Wireless Sensor Networks for Detection of IED Emplacement

    DTIC Science & Technology

    2009-06-01

    unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Abstract We are investigating the use of wireless nonimaging -sensor...networks for the difficult problem of detection of suspicious behavior related to IED emplacement. Hardware for surveillance by nonimaging -sensor networks...with people crossing a live sensor network. We conclude that nonimaging -sensor networks can detect a variety of suspicious behavior, but

  13. Overlapping community detection in weighted networks via a Bayesian approach

    NASA Astrophysics Data System (ADS)

    Chen, Yi; Wang, Xiaolong; Xiang, Xin; Tang, Buzhou; Chen, Qingcai; Fan, Shixi; Bu, Junzhao

    2017-02-01

    Complex networks as a powerful way to represent complex systems have been widely studied during the past several years. One of the most important tasks of complex network analysis is to detect communities embedded in networks. In the real world, weighted networks are very common and may contain overlapping communities where a node is allowed to belong to multiple communities. In this paper, we propose a novel Bayesian approach, called the Bayesian mixture network (BMN) model, to detect overlapping communities in weighted networks. The advantages of our method are (i) providing soft-partition solutions in weighted networks; (ii) providing soft memberships, which quantify 'how strongly' a node belongs to a community. Experiments on a large number of real and synthetic networks show that our model has the ability in detecting overlapping communities in weighted networks and is competitive with other state-of-the-art models at shedding light on community partition.

  14. A two-stage flow-based intrusion detection model for next-generation networks.

    PubMed

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  15. A two-stage flow-based intrusion detection model for next-generation networks

    PubMed Central

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results. PMID:29329294

  16. Keypoint Density-Based Region Proposal for Fine-Grained Object Detection and Classification Using Regions with Convolutional Neural Network Features

    DTIC Science & Technology

    2015-12-15

    Keypoint Density-based Region Proposal for Fine-Grained Object Detection and Classification using Regions with Convolutional Neural Network ... Convolutional Neural Networks (CNNs) enable them to outperform conventional techniques on standard object detection and classification tasks, their...detection accuracy and speed on the fine-grained Caltech UCSD bird dataset (Wah et al., 2011). Recently, Convolutional Neural Networks (CNNs), a deep

  17. Detecting of foreign object debris on airfield pavement using convolution neural network

    NASA Astrophysics Data System (ADS)

    Cao, Xiaoguang; Gu, Yufeng; Bai, Xiangzhi

    2017-11-01

    It is of great practical significance to detect foreign object debris (FOD) timely and accurately on the airfield pavement, because the FOD is a fatal threaten for runway safety in airport. In this paper, a new FOD detection framework based on Single Shot MultiBox Detector (SSD) is proposed. Two strategies include making the detection network lighter and using dilated convolution, which are proposed to better solve the FOD detection problem. The advantages mainly include: (i) the network structure becomes lighter to speed up detection task and enhance detection accuracy; (ii) dilated convolution is applied in network structure to handle smaller FOD. Thus, we get a faster and more accurate detection system.

  18. Research on intrusion detection based on Kohonen network and support vector machine

    NASA Astrophysics Data System (ADS)

    Shuai, Chunyan; Yang, Hengcheng; Gong, Zeweiyi

    2018-05-01

    In view of the problem of low detection accuracy and the long detection time of support vector machine, which directly applied to the network intrusion detection system. Optimization of SVM parameters can greatly improve the detection accuracy, but it can not be applied to high-speed network because of the long detection time. a method based on Kohonen neural network feature selection is proposed to reduce the optimization time of support vector machine parameters. Firstly, this paper is to calculate the weights of the KDD99 network intrusion data by Kohonen network and select feature by weight. Then, after the feature selection is completed, genetic algorithm (GA) and grid search method are used for parameter optimization to find the appropriate parameters and classify them by support vector machines. By comparing experiments, it is concluded that feature selection can reduce the time of parameter optimization, which has little influence on the accuracy of classification. The experiments suggest that the support vector machine can be used in the network intrusion detection system and reduce the missing rate.

  19. Change Point Detection in Correlation Networks

    NASA Astrophysics Data System (ADS)

    Barnett, Ian; Onnela, Jukka-Pekka

    2016-01-01

    Many systems of interacting elements can be conceptualized as networks, where network nodes represent the elements and network ties represent interactions between the elements. In systems where the underlying network evolves, it is useful to determine the points in time where the network structure changes significantly as these may correspond to functional change points. We propose a method for detecting change points in correlation networks that, unlike previous change point detection methods designed for time series data, requires minimal distributional assumptions. We investigate the difficulty of change point detection near the boundaries of the time series in correlation networks and study the power of our method and competing methods through simulation. We also show the generalizable nature of the method by applying it to stock price data as well as fMRI data.

  20. Detection of protein complex from protein-protein interaction network using Markov clustering

    NASA Astrophysics Data System (ADS)

    Ochieng, P. J.; Kusuma, W. A.; Haryanto, T.

    2017-05-01

    Detection of complexes, or groups of functionally related proteins, is an important challenge while analysing biological networks. However, existing algorithms to identify protein complexes are insufficient when applied to dense networks of experimentally derived interaction data. Therefore, we introduced a graph clustering method based on Markov clustering algorithm to identify protein complex within highly interconnected protein-protein interaction networks. Protein-protein interaction network was first constructed to develop geometrical network, the network was then partitioned using Markov clustering to detect protein complexes. The interest of the proposed method was illustrated by its application to Human Proteins associated to type II diabetes mellitus. Flow simulation of MCL algorithm was initially performed and topological properties of the resultant network were analysed for detection of the protein complex. The results indicated the proposed method successfully detect an overall of 34 complexes with 11 complexes consisting of overlapping modules and 20 non-overlapping modules. The major complex consisted of 102 proteins and 521 interactions with cluster modularity and density of 0.745 and 0.101 respectively. The comparison analysis revealed MCL out perform AP, MCODE and SCPS algorithms with high clustering coefficient (0.751) network density and modularity index (0.630). This demonstrated MCL was the most reliable and efficient graph clustering algorithm for detection of protein complexes from PPI networks.

  1. Fault detection for hydraulic pump based on chaotic parallel RBF network

    NASA Astrophysics Data System (ADS)

    Lu, Chen; Ma, Ning; Wang, Zhipeng

    2011-12-01

    In this article, a parallel radial basis function network in conjunction with chaos theory (CPRBF network) is presented, and applied to practical fault detection for hydraulic pump, which is a critical component in aircraft. The CPRBF network consists of a number of radial basis function (RBF) subnets connected in parallel. The number of input nodes for each RBF subnet is determined by different embedding dimension based on chaotic phase-space reconstruction. The output of CPRBF is a weighted sum of all RBF subnets. It was first trained using the dataset from normal state without fault, and then a residual error generator was designed to detect failures based on the trained CPRBF network. Then, failure detection can be achieved by the analysis of the residual error. Finally, two case studies are introduced to compare the proposed CPRBF network with traditional RBF networks, in terms of prediction and detection accuracy.

  2. Super-Resolution Community Detection for Layer-Aggregated Multilayer Networks

    PubMed Central

    Taylor, Dane; Caceres, Rajmonda S.; Mucha, Peter J.

    2017-01-01

    Applied network science often involves preprocessing network data before applying a network-analysis method, and there is typically a theoretical disconnect between these steps. For example, it is common to aggregate time-varying network data into windows prior to analysis, and the trade-offs of this preprocessing are not well understood. Focusing on the problem of detecting small communities in multilayer networks, we study the effects of layer aggregation by developing random-matrix theory for modularity matrices associated with layer-aggregated networks with N nodes and L layers, which are drawn from an ensemble of Erdős–Rényi networks with communities planted in subsets of layers. We study phase transitions in which eigenvectors localize onto communities (allowing their detection) and which occur for a given community provided its size surpasses a detectability limit K*. When layers are aggregated via a summation, we obtain K∗∝O(NL/T), where T is the number of layers across which the community persists. Interestingly, if T is allowed to vary with L, then summation-based layer aggregation enhances small-community detection even if the community persists across a vanishing fraction of layers, provided that T/L decays more slowly than 𝒪(L−1/2). Moreover, we find that thresholding the summation can, in some cases, cause K* to decay exponentially, decreasing by orders of magnitude in a phenomenon we call super-resolution community detection. In other words, layer aggregation with thresholding is a nonlinear data filter enabling detection of communities that are otherwise too small to detect. Importantly, different thresholds generally enhance the detectability of communities having different properties, illustrating that community detection can be obscured if one analyzes network data using a single threshold. PMID:29445565

  3. Super-Resolution Community Detection for Layer-Aggregated Multilayer Networks.

    PubMed

    Taylor, Dane; Caceres, Rajmonda S; Mucha, Peter J

    2017-01-01

    Applied network science often involves preprocessing network data before applying a network-analysis method, and there is typically a theoretical disconnect between these steps. For example, it is common to aggregate time-varying network data into windows prior to analysis, and the trade-offs of this preprocessing are not well understood. Focusing on the problem of detecting small communities in multilayer networks, we study the effects of layer aggregation by developing random-matrix theory for modularity matrices associated with layer-aggregated networks with N nodes and L layers, which are drawn from an ensemble of Erdős-Rényi networks with communities planted in subsets of layers. We study phase transitions in which eigenvectors localize onto communities (allowing their detection) and which occur for a given community provided its size surpasses a detectability limit K * . When layers are aggregated via a summation, we obtain [Formula: see text], where T is the number of layers across which the community persists. Interestingly, if T is allowed to vary with L , then summation-based layer aggregation enhances small-community detection even if the community persists across a vanishing fraction of layers, provided that T/L decays more slowly than ( L -1/2 ). Moreover, we find that thresholding the summation can, in some cases, cause K * to decay exponentially, decreasing by orders of magnitude in a phenomenon we call super-resolution community detection. In other words, layer aggregation with thresholding is a nonlinear data filter enabling detection of communities that are otherwise too small to detect. Importantly, different thresholds generally enhance the detectability of communities having different properties, illustrating that community detection can be obscured if one analyzes network data using a single threshold.

  4. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    ERIC Educational Resources Information Center

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  5. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  6. Similarity between community structures of different online social networks and its impact on underlying community detection

    NASA Astrophysics Data System (ADS)

    Fan, W.; Yeung, K. H.

    2015-03-01

    As social networking services are popular, many people may register in more than one online social network. In this paper we study a set of users who have accounts of three online social networks: namely Foursquare, Facebook and Twitter. Community structure of this set of users may be reflected in these three online social networks. Therefore, high correlation between these reflections and the underlying community structure may be observed. In this work, community structures are detected in all three online social networks. Also, we investigate the similarity level of community structures across different networks. It is found that they show strong correlation with each other. The similarity between different networks may be helpful to find a community structure close to the underlying one. To verify this, we propose a method to increase the weights of some connections in networks. With this method, new networks are generated to assist community detection. By doing this, value of modularity can be improved and the new community structure match network's natural structure better. In this paper we also show that the detected community structures of online social networks are correlated with users' locations which are identified on Foursquare. This information may also be useful for underlying community detection.

  7. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  8. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks.

    PubMed

    Ren, Shaoqing; He, Kaiming; Girshick, Ross; Sun, Jian

    2017-06-01

    State-of-the-art object detection networks depend on region proposal algorithms to hypothesize object locations. Advances like SPPnet [1] and Fast R-CNN [2] have reduced the running time of these detection networks, exposing region proposal computation as a bottleneck. In this work, we introduce a Region Proposal Network (RPN) that shares full-image convolutional features with the detection network, thus enabling nearly cost-free region proposals. An RPN is a fully convolutional network that simultaneously predicts object bounds and objectness scores at each position. The RPN is trained end-to-end to generate high-quality region proposals, which are used by Fast R-CNN for detection. We further merge RPN and Fast R-CNN into a single network by sharing their convolutional features-using the recently popular terminology of neural networks with 'attention' mechanisms, the RPN component tells the unified network where to look. For the very deep VGG-16 model [3] , our detection system has a frame rate of 5 fps (including all steps) on a GPU, while achieving state-of-the-art object detection accuracy on PASCAL VOC 2007, 2012, and MS COCO datasets with only 300 proposals per image. In ILSVRC and COCO 2015 competitions, Faster R-CNN and RPN are the foundations of the 1st-place winning entries in several tracks. Code has been made publicly available.

  9. Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William

    A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less

  10. Improving the Efficiency and Effectiveness of Community Detection via Prior-Induced Equivalent Super-Network.

    PubMed

    Yang, Liang; Jin, Di; He, Dongxiao; Fu, Huazhu; Cao, Xiaochun; Fogelman-Soulie, Francoise

    2017-03-29

    Due to the importance of community structure in understanding network and a surge of interest aroused on community detectability, how to improve the community identification performance with pairwise prior information becomes a hot topic. However, most existing semi-supervised community detection algorithms only focus on improving the accuracy but ignore the impacts of priors on speeding detection. Besides, they always require to tune additional parameters and cannot guarantee pairwise constraints. To address these drawbacks, we propose a general, high-speed, effective and parameter-free semi-supervised community detection framework. By constructing the indivisible super-nodes according to the connected subgraph of the must-link constraints and by forming the weighted super-edge based on network topology and cannot-link constraints, our new framework transforms the original network into an equivalent but much smaller Super-Network. Super-Network perfectly ensures the must-link constraints and effectively encodes cannot-link constraints. Furthermore, the time complexity of super-network construction process is linear in the original network size, which makes it efficient. Meanwhile, since the constructed super-network is much smaller than the original one, any existing community detection algorithm is much faster when using our framework. Besides, the overall process will not introduce any additional parameters, making it more practical.

  11. Watchdog Sensor Network with Multi-Stage RF Signal Identification and Cooperative Intrusion Detection

    DTIC Science & Technology

    2012-03-01

    detection and physical layer authentication in mobile Ad Hoc networks and wireless sensor networks (WSNs) have been investigated. Résume Le rapport...IEEE 802.16 d and e (WiMAX); (b) IEEE 802.11 (Wi-Fi) family of a, b, g, n, and s (c) Sensor networks based on IEEE 802.15.4: Wireless USB, Bluetooth... sensor network are investigated for standard compatible wireless signals. The proposed signal existence detection and identification process consists

  12. Determining root correspondence between previously and newly detected objects

    DOEpatents

    Paglieroni, David W.; Beer, N Reginald

    2014-06-17

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  13. A network security monitor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.

    1989-11-01

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, ourmore » work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.« less

  14. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    PubMed Central

    Dong, Jian; Ren, Xiao; Zuo, Decheng; Liu, Hongwei

    2014-01-01

    The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P) networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS) can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen's classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD) is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen's model. Moreover, B-AFD has better adaptability to P2P network. PMID:25198005

  15. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    PubMed

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  16. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

    PubMed Central

    Kang, Min-Joo

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  17. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  18. Local community detection as pattern restoration by attractor dynamics of recurrent neural networks.

    PubMed

    Okamoto, Hiroshi

    2016-08-01

    Densely connected parts in networks are referred to as "communities". Community structure is a hallmark of a variety of real-world networks. Individual communities in networks form functional modules of complex systems described by networks. Therefore, finding communities in networks is essential to approaching and understanding complex systems described by networks. In fact, network science has made a great deal of effort to develop effective and efficient methods for detecting communities in networks. Here we put forward a type of community detection, which has been little examined so far but will be practically useful. Suppose that we are given a set of source nodes that includes some (but not all) of "true" members of a particular community; suppose also that the set includes some nodes that are not the members of this community (i.e., "false" members of the community). We propose to detect the community from this "imperfect" and "inaccurate" set of source nodes using attractor dynamics of recurrent neural networks. Community detection by the proposed method can be viewed as restoration of the original pattern from a deteriorated pattern, which is analogous to cue-triggered recall of short-term memory in the brain. We demonstrate the effectiveness of the proposed method using synthetic networks and real social networks for which correct communities are known. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. Attribute and topology based change detection in a constellation of previously detected objects

    DOEpatents

    Paglieroni, David W.; Beer, Reginald N.

    2016-01-19

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  20. Robust Vehicle Detection in Aerial Images Based on Cascaded Convolutional Neural Networks.

    PubMed

    Zhong, Jiandan; Lei, Tao; Yao, Guangle

    2017-11-24

    Vehicle detection in aerial images is an important and challenging task. Traditionally, many target detection models based on sliding-window fashion were developed and achieved acceptable performance, but these models are time-consuming in the detection phase. Recently, with the great success of convolutional neural networks (CNNs) in computer vision, many state-of-the-art detectors have been designed based on deep CNNs. However, these CNN-based detectors are inefficient when applied in aerial image data due to the fact that the existing CNN-based models struggle with small-size object detection and precise localization. To improve the detection accuracy without decreasing speed, we propose a CNN-based detection model combining two independent convolutional neural networks, where the first network is applied to generate a set of vehicle-like regions from multi-feature maps of different hierarchies and scales. Because the multi-feature maps combine the advantage of the deep and shallow convolutional layer, the first network performs well on locating the small targets in aerial image data. Then, the generated candidate regions are fed into the second network for feature extraction and decision making. Comprehensive experiments are conducted on the Vehicle Detection in Aerial Imagery (VEDAI) dataset and Munich vehicle dataset. The proposed cascaded detection model yields high performance, not only in detection accuracy but also in detection speed.

  1. Robust Vehicle Detection in Aerial Images Based on Cascaded Convolutional Neural Networks

    PubMed Central

    Zhong, Jiandan; Lei, Tao; Yao, Guangle

    2017-01-01

    Vehicle detection in aerial images is an important and challenging task. Traditionally, many target detection models based on sliding-window fashion were developed and achieved acceptable performance, but these models are time-consuming in the detection phase. Recently, with the great success of convolutional neural networks (CNNs) in computer vision, many state-of-the-art detectors have been designed based on deep CNNs. However, these CNN-based detectors are inefficient when applied in aerial image data due to the fact that the existing CNN-based models struggle with small-size object detection and precise localization. To improve the detection accuracy without decreasing speed, we propose a CNN-based detection model combining two independent convolutional neural networks, where the first network is applied to generate a set of vehicle-like regions from multi-feature maps of different hierarchies and scales. Because the multi-feature maps combine the advantage of the deep and shallow convolutional layer, the first network performs well on locating the small targets in aerial image data. Then, the generated candidate regions are fed into the second network for feature extraction and decision making. Comprehensive experiments are conducted on the Vehicle Detection in Aerial Imagery (VEDAI) dataset and Munich vehicle dataset. The proposed cascaded detection model yields high performance, not only in detection accuracy but also in detection speed. PMID:29186756

  2. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network

    PubMed Central

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish–Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  3. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.

    PubMed

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.

  4. Real-Time Adaptation of Decision Thresholds in Sensor Networks for Detection of Moving Targets (PREPRINT)

    DTIC Science & Technology

    2010-01-01

    target kinematics for multiple sensor detections is referred to as the track - before - detect strategy, and is commonly adopted in multi-sensor surveillance...of moving targets. Wettergren [4] presented an application of track - before - detect strategies to undersea distributed sensor networks. In de- signing...the deployment of a distributed passive sensor network that employs this track - before - detect procedure, it is impera- tive that the placement of

  5. Evaluation of a Cyber Security System for Hospital Network.

    PubMed

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  6. Detecting trends in academic research from a citation network using network representation learning

    PubMed Central

    Mori, Junichiro; Ochi, Masanao; Sakata, Ichiro

    2018-01-01

    Several network features and information retrieval methods have been proposed to elucidate the structure of citation networks and to detect important nodes. However, it is difficult to retrieve information related to trends in an academic field and to detect cutting-edge areas from the citation network. In this paper, we propose a novel framework that detects the trend as the growth direction of a citation network using network representation learning(NRL). We presume that the linear growth of citation network in latent space obtained by NRL is the result of the iterative edge additional process of a citation network. On APS datasets and papers of some domains of the Web of Science, we confirm the existence of trends by observing that an academic field grows in a specific direction linearly in latent space. Next, we calculate each node’s degree of trend-following as an indicator called the intrinsic publication year (IPY). As a result, there is a correlation between the indicator and the number of future citations. Furthermore, a word frequently used in the abstracts of cutting-edge papers (high-IPY paper) is likely to be used often in future publications. These results confirm the validity of the detected trend for predicting citation network growth. PMID:29782521

  7. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  8. An intelligent control system for failure detection and controller reconfiguration

    NASA Technical Reports Server (NTRS)

    Biswas, Saroj K.

    1994-01-01

    We present an architecture of an intelligent restructurable control system to automatically detect failure of system components, assess its impact on system performance and safety, and reconfigure the controller for performance recovery. Fault detection is based on neural network associative memories and pattern classifiers, and is implemented using a multilayer feedforward network. Details of the fault detection network along with simulation results on health monitoring of a dc motor have been presented. Conceptual developments for fault assessment using an expert system and controller reconfiguration using a neural network are outlined.

  9. Community Detection in Complex Networks via Clique Conductance.

    PubMed

    Lu, Zhenqi; Wahlström, Johan; Nehorai, Arye

    2018-04-13

    Network science plays a central role in understanding and modeling complex systems in many areas including physics, sociology, biology, computer science, economics, politics, and neuroscience. One of the most important features of networks is community structure, i.e., clustering of nodes that are locally densely interconnected. Communities reveal the hierarchical organization of nodes, and detecting communities is of great importance in the study of complex systems. Most existing community-detection methods consider low-order connection patterns at the level of individual links. But high-order connection patterns, at the level of small subnetworks, are generally not considered. In this paper, we develop a novel community-detection method based on cliques, i.e., local complete subnetworks. The proposed method overcomes the deficiencies of previous similar community-detection methods by considering the mathematical properties of cliques. We apply the proposed method to computer-generated graphs and real-world network datasets. When applied to networks with known community structure, the proposed method detects the structure with high fidelity and sensitivity. When applied to networks with no a priori information regarding community structure, the proposed method yields insightful results revealing the organization of these complex networks. We also show that the proposed method is guaranteed to detect near-optimal clusters in the bipartition case.

  10. Distributed Detection with Collisions in a Random, Single-Hop Wireless Sensor Network

    DTIC Science & Technology

    2013-05-26

    public release; distribution is unlimited. Distributed detection with collisions in a random, single-hop wireless sensor network The views, opinions...1274 2 ABSTRACT Distributed detection with collisions in a random, single-hop wireless sensor network Report Title We consider the problem of... WIRELESS SENSOR NETWORK Gene T. Whipps?† Emre Ertin† Randolph L. Moses† ?U.S. Army Research Laboratory, Adelphi, MD 20783 †The Ohio State University

  11. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Milos Manic

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, thismore » paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.« less

  12. Detecting Earthquakes over a Seismic Network using Single-Station Similarity Measures

    NASA Astrophysics Data System (ADS)

    Bergen, Karianne J.; Beroza, Gregory C.

    2018-03-01

    New blind waveform-similarity-based detection methods, such as Fingerprint and Similarity Thresholding (FAST), have shown promise for detecting weak signals in long-duration, continuous waveform data. While blind detectors are capable of identifying similar or repeating waveforms without templates, they can also be susceptible to false detections due to local correlated noise. In this work, we present a set of three new methods that allow us to extend single-station similarity-based detection over a seismic network; event-pair extraction, pairwise pseudo-association, and event resolution complete a post-processing pipeline that combines single-station similarity measures (e.g. FAST sparse similarity matrix) from each station in a network into a list of candidate events. The core technique, pairwise pseudo-association, leverages the pairwise structure of event detections in its network detection model, which allows it to identify events observed at multiple stations in the network without modeling the expected move-out. Though our approach is general, we apply it to extend FAST over a sparse seismic network. We demonstrate that our network-based extension of FAST is both sensitive and maintains a low false detection rate. As a test case, we apply our approach to two weeks of continuous waveform data from five stations during the foreshock sequence prior to the 2014 Mw 8.2 Iquique earthquake. Our method identifies nearly five times as many events as the local seismicity catalog (including 95% of the catalog events), and less than 1% of these candidate events are false detections.

  13. Improving resolution of dynamic communities in human brain networks through targeted node removal

    PubMed Central

    Turner, Benjamin O.; Miller, Michael B.; Carlson, Jean M.

    2017-01-01

    Current approaches to dynamic community detection in complex networks can fail to identify multi-scale community structure, or to resolve key features of community dynamics. We propose a targeted node removal technique to improve the resolution of community detection. Using synthetic oscillator networks with well-defined “ground truth” communities, we quantify the community detection performance of a common modularity maximization algorithm. We show that the performance of the algorithm on communities of a given size deteriorates when these communities are embedded in multi-scale networks with communities of different sizes, compared to the performance in a single-scale network. We demonstrate that targeted node removal during community detection improves performance on multi-scale networks, particularly when removing the most functionally cohesive nodes. Applying this approach to network neuroscience, we compare dynamic functional brain networks derived from fMRI data taken during both repetitive single-task and varied multi-task experiments. After the removal of regions in visual cortex, the most coherent functional brain area during the tasks, community detection is better able to resolve known functional brain systems into communities. In addition, node removal enables the algorithm to distinguish clear differences in brain network dynamics between these experiments, revealing task-switching behavior that was not identified with the visual regions present in the network. These results indicate that targeted node removal can improve spatial and temporal resolution in community detection, and they demonstrate a promising approach for comparison of network dynamics between neuroscientific data sets with different resolution parameters. PMID:29261662

  14. Community Detection Algorithm Combining Stochastic Block Model and Attribute Data Clustering

    NASA Astrophysics Data System (ADS)

    Kataoka, Shun; Kobayashi, Takuto; Yasuda, Muneki; Tanaka, Kazuyuki

    2016-11-01

    We propose a new algorithm to detect the community structure in a network that utilizes both the network structure and vertex attribute data. Suppose we have the network structure together with the vertex attribute data, that is, the information assigned to each vertex associated with the community to which it belongs. The problem addressed this paper is the detection of the community structure from the information of both the network structure and the vertex attribute data. Our approach is based on the Bayesian approach that models the posterior probability distribution of the community labels. The detection of the community structure in our method is achieved by using belief propagation and an EM algorithm. We numerically verified the performance of our method using computer-generated networks and real-world networks.

  15. Airplane detection in remote sensing images using convolutional neural networks

    NASA Astrophysics Data System (ADS)

    Ouyang, Chao; Chen, Zhong; Zhang, Feng; Zhang, Yifei

    2018-03-01

    Airplane detection in remote sensing images remains a challenging problem and has also been taking a great interest to researchers. In this paper we propose an effective method to detect airplanes in remote sensing images using convolutional neural networks. Deep learning methods show greater advantages than the traditional methods with the rise of deep neural networks in target detection, and we give an explanation why this happens. To improve the performance on detection of airplane, we combine a region proposal algorithm with convolutional neural networks. And in the training phase, we divide the background into multi classes rather than one class, which can reduce false alarms. Our experimental results show that the proposed method is effective and robust in detecting airplane.

  16. Hidden Markov models and neural networks for fault detection in dynamic systems

    NASA Technical Reports Server (NTRS)

    Smyth, Padhraic

    1994-01-01

    Neural networks plus hidden Markov models (HMM) can provide excellent detection and false alarm rate performance in fault detection applications, as shown in this viewgraph presentation. Modified models allow for novelty detection. Key contributions of neural network models are: (1) excellent nonparametric discrimination capability; (2) a good estimator of posterior state probabilities, even in high dimensions, and thus can be embedded within overall probabilistic model (HMM); and (3) simple to implement compared to other nonparametric models. Neural network/HMM monitoring model is currently being integrated with the new Deep Space Network (DSN) antenna controller software and will be on-line monitoring a new DSN 34-m antenna (DSS-24) by July, 1994.

  17. A density-based clustering model for community detection in complex networks

    NASA Astrophysics Data System (ADS)

    Zhao, Xiang; Li, Yantao; Qu, Zehui

    2018-04-01

    Network clustering (or graph partitioning) is an important technique for uncovering the underlying community structures in complex networks, which has been widely applied in various fields including astronomy, bioinformatics, sociology, and bibliometric. In this paper, we propose a density-based clustering model for community detection in complex networks (DCCN). The key idea is to find group centers with a higher density than their neighbors and a relatively large integrated-distance from nodes with higher density. The experimental results indicate that our approach is efficient and effective for community detection of complex networks.

  18. Achieving fast and stable failure detection in WDM Networks

    NASA Astrophysics Data System (ADS)

    Gao, Donghui; Zhou, Zhiyu; Zhang, Hanyi

    2005-02-01

    In dynamic networks, the failure detection time takes a major part of the convergence time, which is an important network performance index. To detect a node or link failure in the network, traditional protocols, like Hello protocol in OSPF or RSVP, exchanges keep-alive messages between neighboring nodes to keep track of the link/node state. But by default settings, it can get a minimum detection time in the measure of dozens of seconds, which can not meet the demands of fast network convergence and failure recovery. When configuring the related parameters to reduce the detection time, there will be notable instability problems. In this paper, we analyzed the problem and designed a new failure detection algorithm to reduce the network overhead of detection signaling. Through our experiment we found it is effective to enhance the stability by implicitly acknowledge other signaling messages as keep-alive messages. We conducted our proposal and the previous approaches on the ASON test-bed. The experimental results show that our algorithm gives better performances than previous schemes in about an order magnitude reduction of both false failure alarms and queuing delay to other messages, especially under light traffic load.

  19. Detecting phase transitions in a neural network and its application to classification of syndromes in traditional Chinese medicine

    NASA Astrophysics Data System (ADS)

    Chen, J.; Xi, G.; Wang, W.

    2008-02-01

    Detecting phase transitions in neural networks (determined or random) presents a challenging subject for phase transitions play a key role in human brain activity. In this paper, we detect numerically phase transitions in two types of random neural network(RNN) under proper parameters.

  20. Evolutionary neural networks for anomaly detection based on the behavior of a program.

    PubMed

    Han, Sang-Jun; Cho, Sung-Bae

    2006-06-01

    The process of learning the behavior of a given program by using machine-learning techniques (based on system-call audit data) is effective to detect intrusions. Rule learning, neural networks, statistics, and hidden Markov models (HMMs) are some of the kinds of representative methods for intrusion detection. Among them, neural networks are known for good performance in learning system-call sequences. In order to apply this knowledge to real-world problems successfully, it is important to determine the structures and weights of these call sequences. However, finding the appropriate structures requires very long time periods because there are no suitable analytical solutions. In this paper, a novel intrusion-detection technique based on evolutionary neural networks (ENNs) is proposed. One advantage of using ENNs is that it takes less time to obtain superior neural networks than when using conventional approaches. This is because they discover the structures and weights of the neural networks simultaneously. Experimental results with the 1999 Defense Advanced Research Projects Agency (DARPA) Intrusion Detection Evaluation (IDEVAL) data confirm that ENNs are promising tools for intrusion detection.

  1. Deep Spatial-Temporal Joint Feature Representation for Video Object Detection.

    PubMed

    Zhao, Baojun; Zhao, Boya; Tang, Linbo; Han, Yuqi; Wang, Wenzheng

    2018-03-04

    With the development of deep neural networks, many object detection frameworks have shown great success in the fields of smart surveillance, self-driving cars, and facial recognition. However, the data sources are usually videos, and the object detection frameworks are mostly established on still images and only use the spatial information, which means that the feature consistency cannot be ensured because the training procedure loses temporal information. To address these problems, we propose a single, fully-convolutional neural network-based object detection framework that involves temporal information by using Siamese networks. In the training procedure, first, the prediction network combines the multiscale feature map to handle objects of various sizes. Second, we introduce a correlation loss by using the Siamese network, which provides neighboring frame features. This correlation loss represents object co-occurrences across time to aid the consistent feature generation. Since the correlation loss should use the information of the track ID and detection label, our video object detection network has been evaluated on the large-scale ImageNet VID dataset where it achieves a 69.5% mean average precision (mAP).

  2. A Deep Convolutional Coupling Network for Change Detection Based on Heterogeneous Optical and Radar Images.

    PubMed

    Liu, Jia; Gong, Maoguo; Qin, Kai; Zhang, Puzhao

    2018-03-01

    We propose an unsupervised deep convolutional coupling network for change detection based on two heterogeneous images acquired by optical sensors and radars on different dates. Most existing change detection methods are based on homogeneous images. Due to the complementary properties of optical and radar sensors, there is an increasing interest in change detection based on heterogeneous images. The proposed network is symmetric with each side consisting of one convolutional layer and several coupling layers. The two input images connected with the two sides of the network, respectively, are transformed into a feature space where their feature representations become more consistent. In this feature space, the different map is calculated, which then leads to the ultimate detection map by applying a thresholding algorithm. The network parameters are learned by optimizing a coupling function. The learning process is unsupervised, which is different from most existing change detection methods based on heterogeneous images. Experimental results on both homogenous and heterogeneous images demonstrate the promising performance of the proposed network compared with several existing approaches.

  3. Independent component analysis (ICA) and self-organizing map (SOM) approach to multidetection system for network intruders

    NASA Astrophysics Data System (ADS)

    Abdi, Abdi M.; Szu, Harold H.

    2003-04-01

    With the growing rate of interconnection among computer systems, network security is becoming a real challenge. Intrusion Detection System (IDS) is designed to protect the availability, confidentiality and integrity of critical network information systems. Today"s approach to network intrusion detection involves the use of rule-based expert systems to identify an indication of known attack or anomalies. However, these techniques are less successful in identifying today"s attacks. Hackers are perpetually inventing new and previously unanticipated techniques to compromise information infrastructure. This paper proposes a dynamic way of detecting network intruders on time serious data. The proposed approach consists of a two-step process. Firstly, obtaining an efficient multi-user detection method, employing the recently introduced complexity minimization approach as a generalization of a standard ICA. Secondly, we identified unsupervised learning neural network architecture based on Kohonen"s Self-Organizing Map for potential functional clustering. These two steps working together adaptively will provide a pseudo-real time novelty detection attribute to supplement the current intrusion detection statistical methodology.

  4. Multi-Frame Convolutional Neural Networks for Object Detection in Temporal Data

    DTIC Science & Technology

    2017-03-01

    maximum 200 words) Given the problem of detecting objects in video , existing neural-network solutions rely on a post-processing step to combine...information across frames and strengthen conclusions. This technique has been successful for videos with simple, dominant objects but it cannot detect objects...Computer Science iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Given the problem of detecting objects in video , existing neural-network solutions rely

  5. Maximal Neighbor Similarity Reveals Real Communities in Networks

    PubMed Central

    Žalik, Krista Rizman

    2015-01-01

    An important problem in the analysis of network data is the detection of groups of densely interconnected nodes also called modules or communities. Community structure reveals functions and organizations of networks. Currently used algorithms for community detection in large-scale real-world networks are computationally expensive or require a priori information such as the number or sizes of communities or are not able to give the same resulting partition in multiple runs. In this paper we investigate a simple and fast algorithm that uses the network structure alone and requires neither optimization of pre-defined objective function nor information about number of communities. We propose a bottom up community detection algorithm in which starting from communities consisting of adjacent pairs of nodes and their maximal similar neighbors we find real communities. We show that the overall advantage of the proposed algorithm compared to the other community detection algorithms is its simple nature, low computational cost and its very high accuracy in detection communities of different sizes also in networks with blurred modularity structure consisting of poorly separated communities. All communities identified by the proposed method for facebook network and E-Coli transcriptional regulatory network have strong structural and functional coherence. PMID:26680448

  6. Weak signal transmission in complex networks and its application in detecting connectivity.

    PubMed

    Liang, Xiaoming; Liu, Zonghua; Li, Baowen

    2009-10-01

    We present a network model of coupled oscillators to study how a weak signal is transmitted in complex networks. Through both theoretical analysis and numerical simulations, we find that the response of other nodes to the weak signal decays exponentially with their topological distance to the signal source and the coupling strength between two neighboring nodes can be figured out by the responses. This finding can be conveniently used to detect the topology of unknown network, such as the degree distribution, clustering coefficient and community structure, etc., by repeatedly choosing different nodes as the signal source. Through four typical networks, i.e., the regular one dimensional, small world, random, and scale-free networks, we show that the features of network can be approximately given by investigating many fewer nodes than the network size, thus our approach to detect the topology of unknown network may be efficient in practical situations with large network size.

  7. Deep Neural Network for Structural Prediction and Lane Detection in Traffic Scene.

    PubMed

    Li, Jun; Mei, Xue; Prokhorov, Danil; Tao, Dacheng

    2017-03-01

    Hierarchical neural networks have been shown to be effective in learning representative image features and recognizing object classes. However, most existing networks combine the low/middle level cues for classification without accounting for any spatial structures. For applications such as understanding a scene, how the visual cues are spatially distributed in an image becomes essential for successful analysis. This paper extends the framework of deep neural networks by accounting for the structural cues in the visual signals. In particular, two kinds of neural networks have been proposed. First, we develop a multitask deep convolutional network, which simultaneously detects the presence of the target and the geometric attributes (location and orientation) of the target with respect to the region of interest. Second, a recurrent neuron layer is adopted for structured visual detection. The recurrent neurons can deal with the spatial distribution of visible cues belonging to an object whose shape or structure is difficult to explicitly define. Both the networks are demonstrated by the practical task of detecting lane boundaries in traffic scenes. The multitask convolutional neural network provides auxiliary geometric information to help the subsequent modeling of the given lane structures. The recurrent neural network automatically detects lane boundaries, including those areas containing no marks, without any explicit prior knowledge or secondary modeling.

  8. Game theory and extremal optimization for community detection in complex dynamic networks.

    PubMed

    Lung, Rodica Ioana; Chira, Camelia; Andreica, Anca

    2014-01-01

    The detection of evolving communities in dynamic complex networks is a challenging problem that recently received attention from the research community. Dynamics clearly add another complexity dimension to the difficult task of community detection. Methods should be able to detect changes in the network structure and produce a set of community structures corresponding to different timestamps and reflecting the evolution in time of network data. We propose a novel approach based on game theory elements and extremal optimization to address dynamic communities detection. Thus, the problem is formulated as a mathematical game in which nodes take the role of players that seek to choose a community that maximizes their profit viewed as a fitness function. Numerical results obtained for both synthetic and real-world networks illustrate the competitive performance of this game theoretical approach.

  9. Protecting against cyber threats in networked information systems

    NASA Astrophysics Data System (ADS)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  10. On effectiveness of network sensor-based defense framework

    NASA Astrophysics Data System (ADS)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  11. Community structure detection based on the neighbor node degree information

    NASA Astrophysics Data System (ADS)

    Tang, Li-Ying; Li, Sheng-Nan; Lin, Jian-Hong; Guo, Qiang; Liu, Jian-Guo

    2016-11-01

    Community structure detection is of great significance for better understanding the network topology property. By taking into account the neighbor degree information of the topological network as the link weight, we present an improved Nonnegative Matrix Factorization (NMF) method for detecting community structure. The results for empirical networks show that the largest improved ratio of the Normalized Mutual Information value could reach 63.21%. Meanwhile, for synthetic networks, the highest Normalized Mutual Information value could closely reach 1, which suggests that the improved method with the optimal λ can detect the community structure more accurately. This work is helpful for understanding the interplay between the link weight and the community structure detection.

  12. Using YOLO based deep learning network for real time detection and localization of lung nodules from low dose CT scans

    NASA Astrophysics Data System (ADS)

    Ramachandran S., Sindhu; George, Jose; Skaria, Shibon; V. V., Varun

    2018-02-01

    Lung cancer is the leading cause of cancer related deaths in the world. The survival rate can be improved if the presence of lung nodules are detected early. This has also led to more focus being given to computer aided detection (CAD) and diagnosis of lung nodules. The arbitrariness of shape, size and texture of lung nodules is a challenge to be faced when developing these detection systems. In the proposed work we use convolutional neural networks to learn the features for nodule detection, replacing the traditional method of handcrafting features like geometric shape or texture. Our network uses the DetectNet architecture based on YOLO (You Only Look Once) to detect the nodules in CT scans of lung. In this architecture, object detection is treated as a regression problem with a single convolutional network simultaneously predicting multiple bounding boxes and class probabilities for those boxes. By performing training using chest CT scans from Lung Image Database Consortium (LIDC), NVIDIA DIGITS and Caffe deep learning framework, we show that nodule detection using this single neural network can result in reasonably low false positive rates with high sensitivity and precision.

  13. Performance assessment of Beijing Lightning Network (BLNET) and comparison with other lightning location networks across Beijing

    NASA Astrophysics Data System (ADS)

    Srivastava, Abhay; Tian, Ye; Qie, Xiushu; Wang, Dongfang; Sun, Zhuling; Yuan, Shanfeng; Wang, Yu; Chen, Zhixiong; Xu, Wenjing; Zhang, Hongbo; Jiang, Rubin; Su, Debin

    2017-11-01

    The performances of Beijing Lightning Network (BLNET) operated in Beijing-Tianjin-Hebei urban cluster area have been evaluated in terms of detection efficiency and relative location accuracy. A self-reference method has been used to show the detection efficiency of BLNET, for which fast antenna waveforms have been manually examined. Based on the fast antenna verification, the average detection efficiency of BLNET is 97.4% for intracloud (IC) flashes, 73.9% for cloud-to-ground (CG) flashes and 93.2% for the total flashes. Result suggests the CG detection of regional dense network is highly precise when the thunderstorm passes over the network; however it changes day to day when the thunderstorms are outside the network. Further, the CG stroke data from three different lightning location networks across Beijing are compared. The relative detection efficiency of World Wide Lightning Location Network (WWLLN) and Chinese Meteorology Administration - Lightning Detection Network (CMA-LDN, also known as ADTD) are approximately 12.4% (16.8%) and 36.5% (49.4%), respectively, comparing with fast antenna (BLNET). The location of BLNET is in middle, while WWLLN and CMA-LDN average locations are southeast and northwest, respectively. Finally, the IC pulses and CG return stroke pulses have been compared with the S-band Doppler radar. This type of study is useful to know the approximate situation in a region and improve the performance of lightning location networks in the absence of ground truth. Two lightning flashes occurred on tower in the coverage of BLNET show that the horizontal location error was 52.9 m and 250 m, respectively.

  14. Augmenting groundwater monitoring networks near landfills with slurry cutoff walls.

    PubMed

    Hudak, Paul F

    2004-01-01

    This study investigated the use of slurry cutoff walls in conjunction with monitoring wells to detect contaminant releases from a solid waste landfill. The 50 m wide by 75 m long landfill was oriented oblique to regional groundwater flow in a shallow sand aquifer. Computer models calculated flow fields and the detection capability of six monitoring networks, four including a 1 m wide by 50 m long cutoff wall at various positions along the landfill's downgradient boundaries and upgradient of the landfill. Wells were positioned to take advantage of convergent flow induced downgradient of the cutoff walls. A five-well network with no cutoff wall detected 81% of contaminant plumes originating within the landfill's footprint before they reached a buffer zone boundary located 50 m from the landfill's downgradient corner. By comparison, detection efficiencies of networks augmented with cutoff walls ranged from 81 to 100%. The most efficient network detected 100% of contaminant releases with four wells, with a centrally located, downgradient cutoff wall. In general, cutoff walls increased detection efficiency by delaying transport of contaminant plumes to the buffer zone boundary, thereby allowing them to increase in size, and by inducing convergent flow at downgradient areas, thereby funneling contaminant plumes toward monitoring wells. However, increases in detection efficiency were too small to offset construction costs for cutoff walls. A 100% detection efficiency was also attained by an eight-well network with no cutoff wall, at approximately one-third the cost of the most efficient wall-augmented network.

  15. Leveraging disjoint communities for detecting overlapping community structure

    NASA Astrophysics Data System (ADS)

    Chakraborty, Tanmoy

    2015-05-01

    Network communities represent mesoscopic structure for understanding the organization of real-world networks, where nodes often belong to multiple communities and form overlapping community structure in the network. Due to non-triviality in finding the exact boundary of such overlapping communities, this problem has become challenging, and therefore huge effort has been devoted to detect overlapping communities from the network. In this paper, we present PVOC (Permanence based Vertex-replication algorithm for Overlapping Community detection), a two-stage framework to detect overlapping community structure. We build on a novel observation that non-overlapping community structure detected by a standard disjoint community detection algorithm from a network has high resemblance with its actual overlapping community structure, except the overlapping part. Based on this observation, we posit that there is perhaps no need of building yet another overlapping community finding algorithm; but one can efficiently manipulate the output of any existing disjoint community finding algorithm to obtain the required overlapping structure. We propose a new post-processing technique that by combining with any existing disjoint community detection algorithm, can suitably process each vertex using a new vertex-based metric, called permanence, and thereby finds out overlapping candidates with their community memberships. Experimental results on both synthetic and large real-world networks show that PVOC significantly outperforms six state-of-the-art overlapping community detection algorithms in terms of high similarity of the output with the ground-truth structure. Thus our framework not only finds meaningful overlapping communities from the network, but also allows us to put an end to the constant effort of building yet another overlapping community detection algorithm.

  16. Detecting earthquakes over a seismic network using single-station similarity measures

    NASA Astrophysics Data System (ADS)

    Bergen, Karianne J.; Beroza, Gregory C.

    2018-06-01

    New blind waveform-similarity-based detection methods, such as Fingerprint and Similarity Thresholding (FAST), have shown promise for detecting weak signals in long-duration, continuous waveform data. While blind detectors are capable of identifying similar or repeating waveforms without templates, they can also be susceptible to false detections due to local correlated noise. In this work, we present a set of three new methods that allow us to extend single-station similarity-based detection over a seismic network; event-pair extraction, pairwise pseudo-association, and event resolution complete a post-processing pipeline that combines single-station similarity measures (e.g. FAST sparse similarity matrix) from each station in a network into a list of candidate events. The core technique, pairwise pseudo-association, leverages the pairwise structure of event detections in its network detection model, which allows it to identify events observed at multiple stations in the network without modeling the expected moveout. Though our approach is general, we apply it to extend FAST over a sparse seismic network. We demonstrate that our network-based extension of FAST is both sensitive and maintains a low false detection rate. As a test case, we apply our approach to 2 weeks of continuous waveform data from five stations during the foreshock sequence prior to the 2014 Mw 8.2 Iquique earthquake. Our method identifies nearly five times as many events as the local seismicity catalogue (including 95 per cent of the catalogue events), and less than 1 per cent of these candidate events are false detections.

  17. Transcriptome Profiling of a Multiple Recurrent Muscle-Invasive Urothelial Carcinoma of the Bladder by Deep Sequencing

    PubMed Central

    Zhang, Shufang; Liu, Yanxuan; Liu, Zhenxiang; Zhang, Chong; Cao, Hui; Ye, Yongqing; Wang, Shunlan; Zhang, Ying'ai; Xiao, Sifang; Yang, Peng; Li, Jindong; Bai, Zhiming

    2014-01-01

    Urothelial carcinoma of the bladder (UCB) is one of the commonly diagnosed cancers in the world. The UCB has the highest rate of recurrence of any malignancy. A genome-wide screening of transcriptome dysregulation between cancer and normal tissue would provide insight into the molecular basis of UCB recurrence and is a key step to discovering biomarkers for diagnosis and therapeutic targets. Compared with microarray technology, which is commonly used to identify expression level changes, the recently developed RNA-seq technique has the ability to detect other abnormal regulations in the cancer transcriptome, such as alternative splicing. In this study, we performed high-throughput transcriptome sequencing at ∼50× coverage on a recurrent muscle-invasive cisplatin-resistance UCB tissue and the adjacent non-tumor tissue. The results revealed cancer-specific differentially expressed genes between the tumor and non-tumor tissue enriched in the cell adhesion molecules, focal adhesion and ECM-receptor interaction pathway. Five dysregulated genes, including CDH1, VEGFA, PTPRF, CLDN7, and MMP2 were confirmed by Real time qPCR in the sequencing samples and the additional eleven samples. Our data revealed that more than three hundred genes showed differential splicing patterns between tumor tissue and non-tumor tissue. Among these genes, we filtered 24 cancer-associated alternative splicing genes with differential exon usage. The findings from RNA-Seq were validated by Real time qPCR for CD44, PDGFA, NUMB, and LPHN2. This study provides a comprehensive survey of the UCB transcriptome, which provides better insight into the complexity of regulatory changes during recurrence and metastasis. PMID:24622401

  18. Altered paracellular cation permeability due to a rare CLDN10B variant causes anhidrosis and kidney damage.

    PubMed

    Klar, Joakim; Piontek, Jörg; Milatz, Susanne; Tariq, Muhammad; Jameel, Muhammad; Breiderhoff, Tilman; Schuster, Jens; Fatima, Ambrin; Asif, Maria; Sher, Muhammad; Mäbert, Katrin; Fromm, Anja; Baig, Shahid M; Günzel, Dorothee; Dahl, Niklas

    2017-07-01

    Claudins constitute the major component of tight junctions and regulate paracellular permeability of epithelia. Claudin-10 occurs in two major isoforms that form paracellular channels with ion selectivity. We report on two families segregating an autosomal recessive disorder characterized by generalized anhidrosis, severe heat intolerance and mild kidney failure. All affected individuals carry a rare homozygous missense mutation c.144C>G, p.(N48K) specific for the claudin-10b isoform. Immunostaining of sweat glands from patients suggested that the disease is associated with reduced levels of claudin-10b in the plasma membranes and in canaliculi of the secretory portion. Expression of claudin-10b N48K in a 3D cell model of sweat secretion indicated perturbed paracellular Na+ transport. Analysis of paracellular permeability revealed that claudin-10b N48K maintained cation over anion selectivity but with a reduced general ion conductance. Furthermore, freeze fracture electron microscopy showed that claudin-10b N48K was associated with impaired tight junction strand formation and altered cis-oligomer formation. These data suggest that claudin-10b N48K causes anhidrosis and our findings are consistent with a combined effect from perturbed TJ function and increased degradation of claudin-10b N48K in the sweat glands. Furthermore, affected individuals present with Mg2+ retention, secondary hyperparathyroidism and mild kidney failure that suggest a disturbed reabsorption of cations in the kidneys. These renal-derived features recapitulate several phenotypic aspects detected in mice with kidney specific loss of both claudin-10 isoforms. Our study adds to the spectrum of phenotypes caused by tight junction proteins and demonstrates a pivotal role for claudin-10b in maintaining paracellular Na+ permeability for sweat production and kidney function.

  19. A system for distributed intrusion detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snapp, S.R.; Brentano, J.; Dias, G.V.

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of ourmore » present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.« less

  20. DeepMitosis: Mitosis detection via deep detection, verification and segmentation networks.

    PubMed

    Li, Chao; Wang, Xinggang; Liu, Wenyu; Latecki, Longin Jan

    2018-04-01

    Mitotic count is a critical predictor of tumor aggressiveness in the breast cancer diagnosis. Nowadays mitosis counting is mainly performed by pathologists manually, which is extremely arduous and time-consuming. In this paper, we propose an accurate method for detecting the mitotic cells from histopathological slides using a novel multi-stage deep learning framework. Our method consists of a deep segmentation network for generating mitosis region when only a weak label is given (i.e., only the centroid pixel of mitosis is annotated), an elaborately designed deep detection network for localizing mitosis by using contextual region information, and a deep verification network for improving detection accuracy by removing false positives. We validate the proposed deep learning method on two widely used Mitosis Detection in Breast Cancer Histological Images (MITOSIS) datasets. Experimental results show that we can achieve the highest F-score on the MITOSIS dataset from ICPR 2012 grand challenge merely using the deep detection network. For the ICPR 2014 MITOSIS dataset that only provides the centroid location of mitosis, we employ the segmentation model to estimate the bounding box annotation for training the deep detection network. We also apply the verification model to eliminate some false positives produced from the detection model. By fusing scores of the detection and verification models, we achieve the state-of-the-art results. Moreover, our method is very fast with GPU computing, which makes it feasible for clinical practice. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. Regulation of zebrafish heart regeneration by miR-133

    PubMed Central

    Yin, Viravuth P.; Lepilina, Alexandra; Smith, Ashley; Poss, Kenneth D.

    2012-01-01

    Zebrafish regenerate cardiac muscle after severe injuries through the activation and proliferation of spared cardiomyocytes. Little is known about factors that control these events. Here we investigated the extent to which miRNAs regulate zebrafish heart regeneration. Microarray analysis identified many miRNAs with increased or reduced levels during regeneration. miR-133, a miRNA with known roles in cardiac development and disease, showed diminished expression during regeneration. Induced transgenic elevation of miR-133 levels after injury inhibited myocardial regeneration, while transgenic miR-133 depletion enhanced cardiomyocyte proliferation. Expression analyses indicated that cell cycle factors mps1, cdc37, and PA2G4, and cell junction components cx43 and cldn5, are miR-133 targets during regeneration. With pharmacological inhibition and EGFP sensor interaction studies, we demonstrated that cx43 is a new miR-133 target and regeneration gene. Our results reveal dynamic regulation of miRNAs during heart regeneration, and indicate that miR-133 restricts injury-induced cardiomyocyte proliferation. PMID:22374218

  2. Min-max hyperellipsoidal clustering for anomaly detection in network security.

    PubMed

    Sarasamma, Suseela T; Zhu, Qiuming A

    2006-08-01

    A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in network security. Hyperellipsoidal clusters toward maximum intracluster similarity and minimum intercluster similarity are generated from training data sets. The novelty of the technique lies in the fact that the parameters needed to construct higher order data models in general multivariate Gaussian functions are incrementally derived from the data sets using accretive processes. The technique is implemented in a feedforward neural network that uses a Gaussian radial basis function as the model generator. An evaluation based on the inclusiveness and exclusiveness of samples with respect to specific criteria is applied to accretively learn the output clusters of the neural network. One significant advantage of this is its ability to detect individual anomaly types that are hard to detect with other anomaly-detection schemes. Applying this technique, several feature subsets of the tcptrace network-connection records that give above 95% detection at false-positive rates below 5% were identified.

  3. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  4. Target-based optimization of advanced gravitational-wave detector network operations

    NASA Astrophysics Data System (ADS)

    Szölgyén, Á.; Dálya, G.; Gondán, L.; Raffai, P.

    2017-04-01

    We introduce two novel time-dependent figures of merit for both online and offline optimizations of advanced gravitational-wave (GW) detector network operations with respect to (i) detecting continuous signals from known source locations and (ii) detecting GWs of neutron star binary coalescences from known local galaxies, which thereby have the highest potential for electromagnetic counterpart detection. For each of these scientific goals, we characterize an N-detector network, and all its (N  -  1)-detector subnetworks, to identify subnetworks and individual detectors (key contributors) that contribute the most to achieving the scientific goal. Our results show that aLIGO-Hanford is expected to be the key contributor in 2017 to the goal of detecting GWs from the Crab pulsar within the network of LIGO and Virgo detectors. For the same time period and for the same network, both LIGO detectors are key contributors to the goal of detecting GWs from the Vela pulsar, as well as to detecting signals from 10 high interest pulsars. Key contributors to detecting continuous GWs from the Galactic Center can only be identified for finite time intervals within each sidereal day with either the 3-detector network of the LIGO and Virgo detectors in 2017, or the 4-detector network of the LIGO, Virgo, and KAGRA detectors in 2019-2020. Characterization of the LIGO-Virgo detectors with respect to goal (ii) identified the two LIGO detectors as key contributors. Additionally, for all analyses, we identify time periods within a day when lock losses or scheduled service operations could result with the least amount of signal-to-noise or transient detection probability loss for a detector network.

  5. Detection of Pigment Networks in Dermoscopy Images

    NASA Astrophysics Data System (ADS)

    Eltayef, Khalid; Li, Yongmin; Liu, Xiaohui

    2017-02-01

    One of the most important structures in dermoscopy images is the pigment network, which is also one of the most challenging and fundamental task for dermatologists in early detection of melanoma. This paper presents an automatic system to detect pigment network from dermoscopy images. The design of the proposed algorithm consists of four stages. First, a pre-processing algorithm is carried out in order to remove the noise and improve the quality of the image. Second, a bank of directional filters and morphological connected component analysis are applied to detect the pigment networks. Third, features are extracted from the detected image, which can be used in the subsequent stage. Fourth, the classification process is performed by applying feed-forward neural network, in order to classify the region as either normal or abnormal skin. The method was tested on a dataset of 200 dermoscopy images from Hospital Pedro Hispano (Matosinhos), and better results were produced compared to previous studies.

  6. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation

    NASA Astrophysics Data System (ADS)

    Li, Hong; Ding, Xue

    2017-03-01

    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  7. Closed-loop control of a fragile network: application to seizure-like dynamics of an epilepsy model

    PubMed Central

    Ehrens, Daniel; Sritharan, Duluxan; Sarma, Sridevi V.

    2015-01-01

    It has recently been proposed that the epileptic cortex is fragile in the sense that seizures manifest through small perturbations in the synaptic connections that render the entire cortical network unstable. Closed-loop therapy could therefore entail detecting when the network goes unstable, and then stimulating with an exogenous current to stabilize the network. In this study, a non-linear stochastic model of a neuronal network was used to simulate both seizure and non-seizure activity. In particular, synaptic weights between neurons were chosen such that the network's fixed point is stable during non-seizure periods, and a subset of these connections (the most fragile) were perturbed to make the same fixed point unstable to model seizure events; and, the model randomly transitions between these two modes. The goal of this study was to measure spike train observations from this epileptic network and then apply a feedback controller that (i) detects when the network goes unstable, and then (ii) applies a state-feedback gain control input to the network to stabilize it. The stability detector is based on a 2-state (stable, unstable) hidden Markov model (HMM) of the network, and detects the transition from the stable mode to the unstable mode from using the firing rate of the most fragile node in the network (which is the output of the HMM). When the unstable mode is detected, a state-feedback gain is applied to generate a control input to the fragile node bringing the network back to the stable mode. Finally, when the network is detected as stable again, the feedback control input is switched off. High performance was achieved for the stability detector, and feedback control suppressed seizures within 2 s after onset. PMID:25784851

  8. Optimizing a neural network for detection of moving vehicles in video

    NASA Astrophysics Data System (ADS)

    Fischer, Noëlle M.; Kruithof, Maarten C.; Bouma, Henri

    2017-10-01

    In the field of security and defense, it is extremely important to reliably detect moving objects, such as cars, ships, drones and missiles. Detection and analysis of moving objects in cameras near borders could be helpful to reduce illicit trading, drug trafficking, irregular border crossing, trafficking in human beings and smuggling. Many recent benchmarks have shown that convolutional neural networks are performing well in the detection of objects in images. Most deep-learning research effort focuses on classification or detection on single images. However, the detection of dynamic changes (e.g., moving objects, actions and events) in streaming video is extremely relevant for surveillance and forensic applications. In this paper, we combine an end-to-end feedforward neural network for static detection with a recurrent Long Short-Term Memory (LSTM) network for multi-frame analysis. We present a practical guide with special attention to the selection of the optimizer and batch size. The end-to-end network is able to localize and recognize the vehicles in video from traffic cameras. We show an efficient way to collect relevant in-domain data for training with minimal manual labor. Our results show that the combination with LSTM improves performance for the detection of moving vehicles.

  9. Information dynamics algorithm for detecting communities in networks

    NASA Astrophysics Data System (ADS)

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  10. Salient object detection based on multi-scale contrast.

    PubMed

    Wang, Hai; Dai, Lei; Cai, Yingfeng; Sun, Xiaoqiang; Chen, Long

    2018-05-01

    Due to the development of deep learning networks, a salient object detection based on deep learning networks, which are used to extract the features, has made a great breakthrough compared to the traditional methods. At present, the salient object detection mainly relies on very deep convolutional network, which is used to extract the features. In deep learning networks, an dramatic increase of network depth may cause more training errors instead. In this paper, we use the residual network to increase network depth and to mitigate the errors caused by depth increase simultaneously. Inspired by image simplification, we use color and texture features to obtain simplified image with multiple scales by means of region assimilation on the basis of super-pixels in order to reduce the complexity of images and to improve the accuracy of salient target detection. We refine the feature on pixel level by the multi-scale feature correction method to avoid the feature error when the image is simplified at the above-mentioned region level. The final full connection layer not only integrates features of multi-scale and multi-level but also works as classifier of salient targets. The experimental results show that proposed model achieves better results than other salient object detection models based on original deep learning networks. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Detecting event-related changes in organizational networks using optimized neural network models.

    PubMed

    Li, Ze; Sun, Duoyong; Zhu, Renqi; Lin, Zihan

    2017-01-01

    Organizational external behavior changes are caused by the internal structure and interactions. External behaviors are also known as the behavioral events of an organization. Detecting event-related changes in organizational networks could efficiently be used to monitor the dynamics of organizational behaviors. Although many different methods have been used to detect changes in organizational networks, these methods usually ignore the correlation between the internal structure and external events. Event-related change detection considers the correlation and could be used for event recognition based on social network modeling and supervised classification. Detecting event-related changes could be effectively useful in providing early warnings and faster responses to both positive and negative organizational activities. In this study, event-related change in an organizational network was defined, and artificial neural network models were used to quantitatively determine whether and when a change occurred. To achieve a higher accuracy, Back Propagation Neural Networks (BPNNs) were optimized using Genetic Algorithms (GAs) and Particle Swarm Optimization (PSO). We showed the feasibility of the proposed method by comparing its performance with that of other methods using two cases. The results suggested that the proposed method could identify organizational events based on a correlation between the organizational networks and events. The results also suggested that the proposed method not only has a higher precision but also has a better robustness than the previously used techniques.

  12. Detecting event-related changes in organizational networks using optimized neural network models

    PubMed Central

    Sun, Duoyong; Zhu, Renqi; Lin, Zihan

    2017-01-01

    Organizational external behavior changes are caused by the internal structure and interactions. External behaviors are also known as the behavioral events of an organization. Detecting event-related changes in organizational networks could efficiently be used to monitor the dynamics of organizational behaviors. Although many different methods have been used to detect changes in organizational networks, these methods usually ignore the correlation between the internal structure and external events. Event-related change detection considers the correlation and could be used for event recognition based on social network modeling and supervised classification. Detecting event-related changes could be effectively useful in providing early warnings and faster responses to both positive and negative organizational activities. In this study, event-related change in an organizational network was defined, and artificial neural network models were used to quantitatively determine whether and when a change occurred. To achieve a higher accuracy, Back Propagation Neural Networks (BPNNs) were optimized using Genetic Algorithms (GAs) and Particle Swarm Optimization (PSO). We showed the feasibility of the proposed method by comparing its performance with that of other methods using two cases. The results suggested that the proposed method could identify organizational events based on a correlation between the organizational networks and events. The results also suggested that the proposed method not only has a higher precision but also has a better robustness than the previously used techniques. PMID:29190799

  13. Detection performance of three different lightning location networks in Beijing area based on accurate fast antenna records

    NASA Astrophysics Data System (ADS)

    Srivastava, A.; Tian, Y.; Wang, D.; Yuan, S.; Chen, Z.; Sun, Z.; Qie, X.

    2016-12-01

    Scientists have developed the regional and worldwide lightning location network to study the lightning physics and locating the lightning stroke. One of the key issue in all the networks; to recognize the performance of the network. The performance of each network would be different based on the regional geographic conditions and the instrumental limitation. To improve the performance of the network. it is necessary to know the ground truth of the network and to discuss about the detection efficiency (DE) and location accuracy (LA). A comparative study has been discussed among World Wide Lightning Location Network (WWLLN), ADvanced TOA and Direction system (ADTD) and Beijing Lightning NETwork (BLNET) lightning detection network in Beijing area. WWLLN locate the cloud to ground (CG) and strong inter cloud (IC) globally without demonstrating any differences. ADTD locate the CG strokes in the entire China as regional. Both these networks are long range detection system that does not provide the focused details of a thunderstorm. BLNET can locate the CG and IC and is focused on thunderstorm detection. The waveform of fast antenna checked manually and the relative DE among the three networks has been obtained based on the CG strokes. The relative LA has been obtained using the matched flashes among these networks as well as LA obtained using the strike on the tower. The relative DE of BLNET is much higher than the ADTD and WWLLN as these networks has approximately similar relative DE. The relative LA of WWLLN and ADTD location is eastward and northward respectively from the BLNET. The LA based on tower observation is relatively high-quality in favor of BLNET. The ground truth of WWLLN, ADTD and BLNET has been obtained and found the performance of BLNET network is much better. This study is helpful to improve the performance of the networks and to provide a belief of LA that can follow the thunderstorm path with the prediction and forecasting of thunderstorm and lightning.

  14. Learning a detection map for a network of unattended ground sensors.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nguyen, Hung D.; Koch, Mark William

    2010-03-01

    We have developed algorithms to automatically learn a detection map of a deployed sensor field for a virtual presence and extended defense (VPED) system without apriori knowledge of the local terrain. The VPED system is an unattended network of sensor pods, with each pod containing acoustic and seismic sensors. Each pod has the ability to detect and classify moving targets at a limited range. By using a network of pods we can form a virtual perimeter with each pod responsible for a certain section of the perimeter. The site's geography and soil conditions can affect the detection performance of themore » pods. Thus, a network in the field may not have the same performance as a network designed in the lab. To solve this problem we automatically estimate a network's detection performance as it is being installed at a site by a mobile deployment unit (MDU). The MDU will wear a GPS unit, so the system not only knows when it can detect the MDU, but also the MDU's location. In this paper, we demonstrate how to handle anisotropic sensor-configurations, geography, and soil conditions.« less

  15. Automatic data processing and analysis system for monitoring region around a planned nuclear power plant

    NASA Astrophysics Data System (ADS)

    Kortström, Jari; Tiira, Timo; Kaisko, Outi

    2016-03-01

    The Institute of Seismology of University of Helsinki is building a new local seismic network, called OBF network, around planned nuclear power plant in Northern Ostrobothnia, Finland. The network will consist of nine new stations and one existing station. The network should be dense enough to provide azimuthal coverage better than 180° and automatic detection capability down to ML -0.1 within a radius of 25 km from the site.The network construction work began in 2012 and the first four stations started operation at the end of May 2013. We applied an automatic seismic signal detection and event location system to a network of 13 stations consisting of the four new stations and the nearest stations of Finnish and Swedish national seismic networks. Between the end of May and December 2013 the network detected 214 events inside the predefined area of 50 km radius surrounding the planned nuclear power plant site. Of those detections, 120 were identified as spurious events. A total of 74 events were associated with known quarries and mining areas. The average location error, calculated as a difference between the announced location from environment authorities and companies and the automatic location, was 2.9 km. During the same time period eight earthquakes between magnitude range 0.1-1.0 occurred within the area. Of these seven could be automatically detected. The results from the phase 1 stations of the OBF network indicates that the planned network can achieve its goals.

  16. Fast Flux Watch: A mechanism for online detection of fast flux networks.

    PubMed

    Al-Duwairi, Basheer N; Al-Hammouri, Ahmad T

    2014-07-01

    Fast flux networks represent a special type of botnets that are used to provide highly available web services to a backend server, which usually hosts malicious content. Detection of fast flux networks continues to be a challenging issue because of the similar behavior between these networks and other legitimate infrastructures, such as CDNs and server farms. This paper proposes Fast Flux Watch (FF-Watch), a mechanism for online detection of fast flux agents. FF-Watch is envisioned to exist as a software agent at leaf routers that connect stub networks to the Internet. The core mechanism of FF-Watch is based on the inherent feature of fast flux networks: flux agents within stub networks take the role of relaying client requests to point-of-sale websites of spam campaigns. The main idea of FF-Watch is to correlate incoming TCP connection requests to flux agents within a stub network with outgoing TCP connection requests from the same agents to the point-of-sale website. Theoretical and traffic trace driven analysis shows that the proposed mechanism can be utilized to efficiently detect fast flux agents within a stub network.

  17. A Shadowing Problem in the Detection of Overlapping Communities: Lifting the Resolution Limit through a Cascading Procedure

    PubMed Central

    Young, Jean-Gabriel; Allard, Antoine; Hébert-Dufresne, Laurent; Dubé, Louis J.

    2015-01-01

    Community detection is the process of assigning nodes and links in significant communities (e.g. clusters, function modules) and its development has led to a better understanding of complex networks. When applied to sizable networks, we argue that most detection algorithms correctly identify prominent communities, but fail to do so across multiple scales. As a result, a significant fraction of the network is left uncharted. We show that this problem stems from larger or denser communities overshadowing smaller or sparser ones, and that this effect accounts for most of the undetected communities and unassigned links. We propose a generic cascading approach to community detection that circumvents the problem. Using real and artificial network datasets with three widely used community detection algorithms, we show how a simple cascading procedure allows for the detection of the missing communities. This work highlights a new detection limit of community structure, and we hope that our approach can inspire better community detection algorithms. PMID:26461919

  18. The ground truth about metadata and community detection in networks.

    PubMed

    Peel, Leto; Larremore, Daniel B; Clauset, Aaron

    2017-05-01

    Across many scientific domains, there is a common need to automatically extract a simplified view or coarse-graining of how a complex system's components interact. This general task is called community detection in networks and is analogous to searching for clusters in independent vector data. It is common to evaluate the performance of community detection algorithms by their ability to find so-called ground truth communities. This works well in synthetic networks with planted communities because these networks' links are formed explicitly based on those known communities. However, there are no planted communities in real-world networks. Instead, it is standard practice to treat some observed discrete-valued node attributes, or metadata, as ground truth. We show that metadata are not the same as ground truth and that treating them as such induces severe theoretical and practical problems. We prove that no algorithm can uniquely solve community detection, and we prove a general No Free Lunch theorem for community detection, which implies that there can be no algorithm that is optimal for all possible community detection tasks. However, community detection remains a powerful tool and node metadata still have value, so a careful exploration of their relationship with network structure can yield insights of genuine worth. We illustrate this point by introducing two statistical techniques that can quantify the relationship between metadata and community structure for a broad class of models. We demonstrate these techniques using both synthetic and real-world networks, and for multiple types of metadata and community structures.

  19. Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications

    DTIC Science & Technology

    2014-08-01

    computing, modeling and analysis of wireless networks , network topol- ogy, and architecture design. Dr. Wang has been a Member of the Association for...important, yet open research question is how to model and detect jamming attacks in such wireless networks , where communication traffic is more time...against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics

  20. Stochastic fluctuations and the detectability limit of network communities.

    PubMed

    Floretta, Lucio; Liechti, Jonas; Flammini, Alessandro; De Los Rios, Paolo

    2013-12-01

    We have analyzed the detectability limits of network communities in the framework of the popular Girvan and Newman benchmark. By carefully taking into account the inevitable stochastic fluctuations that affect the construction of each and every instance of the benchmark, we come to the conclusion that the native, putative partition of the network is completely lost even before the in-degree/out-degree ratio becomes equal to that of a structureless Erdös-Rényi network. We develop a simple iterative scheme, analytically well described by an infinite branching process, to provide an estimate of the true detectability limit. Using various algorithms based on modularity optimization, we show that all of them behave (semiquantitatively) in the same way, with the same functional form of the detectability threshold as a function of the network parameters. Because the same behavior has also been found by further modularity-optimization methods and for methods based on different heuristics implementations, we conclude that indeed a correct definition of the detectability limit must take into account the stochastic fluctuations of the network construction.

  1. Community detection in complex networks by using membrane algorithm

    NASA Astrophysics Data System (ADS)

    Liu, Chuang; Fan, Linan; Liu, Zhou; Dai, Xiang; Xu, Jiamei; Chang, Baoren

    Community detection in complex networks is a key problem of network analysis. In this paper, a new membrane algorithm is proposed to solve the community detection in complex networks. The proposed algorithm is based on membrane systems, which consists of objects, reaction rules, and a membrane structure. Each object represents a candidate partition of a complex network, and the quality of objects is evaluated according to network modularity. The reaction rules include evolutionary rules and communication rules. Evolutionary rules are responsible for improving the quality of objects, which employ the differential evolutionary algorithm to evolve objects. Communication rules implement the information exchanged among membranes. Finally, the proposed algorithm is evaluated on synthetic, real-world networks with real partitions known and the large-scaled networks with real partitions unknown. The experimental results indicate the superior performance of the proposed algorithm in comparison with other experimental algorithms.

  2. Alerts Visualization and Clustering in Network-based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administratormore » with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.« less

  3. miR-16 and miR-125b are involved in barrier function dysregulation through the modulation of claudin-2 and cingulin expression in the jejunum in IBS with diarrhoea.

    PubMed

    Martínez, Cristina; Rodiño-Janeiro, Bruno K; Lobo, Beatriz; Stanifer, Megan L; Klaus, Bernd; Granzow, Martin; González-Castro, Ana M; Salvo-Romero, Eloisa; Alonso-Cotoner, Carmen; Pigrau, Marc; Roeth, Ralph; Rappold, Gudrun; Huber, Wolfgang; González-Silos, Rosa; Lorenzo, Justo; de Torres, Inés; Azpiroz, Fernando; Boulant, Steeve; Vicario, María; Niesler, Beate; Santos, Javier

    2017-09-01

    Micro-RNAs (miRNAs) play a crucial role in controlling intestinal epithelial barrier function partly by modulating the expression of tight junction (TJ) proteins. We have previously shown differential messenger RNA (mRNA) expression correlated with ultrastructural abnormalities of the epithelial barrier in patients with diarrhoea-predominant IBS (IBS-D). However, the participation of miRNAs in these differential mRNA-associated findings remains to be established. Our aims were (1) to identify miRNAs differentially expressed in the small bowel mucosa of patients with IBS-D and (2) to explore putative target genes specifically involved in epithelial barrier function that are controlled by specific dysregulated IBS-D miRNAs. Healthy controls and patients meeting Rome III IBS-D criteria were studied. Intestinal tissue samples were analysed to identify potential candidates by: (a) miRNA-mRNA profiling; (b) miRNA-mRNA pairing analysis to assess the co-expression profile of miRNA-mRNA pairs; (c) pathway analysis and upstream regulator identification; (d) miRNA and target mRNA validation. Candidate miRNA-mRNA pairs were functionally assessed in intestinal epithelial cells. IBS-D samples showed distinct miRNA and mRNA profiles compared with healthy controls. TJ signalling was associated with the IBS-D transcriptional profile. Further validation of selected genes showed consistent upregulation in 75% of genes involved in epithelial barrier function. Bioinformatic analysis of putative miRNA binding sites identified hsa-miR-125b-5p and hsa-miR-16 as regulating expression of the TJ genes CGN (cingulin) and CLDN2 (claudin-2), respectively. Consistently, protein expression of CGN and CLDN2 was upregulated in IBS-D, while the respective targeting miRNAs were downregulated. In addition, bowel dysfunction, perceived stress and depression and number of mast cells correlated with the expression of hsa-miR-125b-5p and hsa-miR-16 and their respective target proteins. Modulation of the intestinal epithelial barrier function in IBS-D involves both transcriptional and post-transcriptional mechanisms. These molecular mechanisms include miRNAs as master regulators in controlling the expression of TJ proteins and are associated with major clinical symptoms. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  4. Statistical Model Applied to NetFlow for Network Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Proto, André; Alexandre, Leandro A.; Batista, Maira L.; Oliveira, Isabela L.; Cansian, Adriano M.

    The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application.

  5. Incorporating profile information in community detection for online social networks

    NASA Astrophysics Data System (ADS)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  6. Complete graph model for community detection

    NASA Astrophysics Data System (ADS)

    Sun, Peng Gang; Sun, Xiya

    2017-04-01

    Community detection brings plenty of considerable problems, which has attracted more attention for many years. This paper develops a new framework, which tries to measure the interior and the exterior of a community based on a same metric, complete graph model. In particular, the exterior is modeled as a complete bipartite. We partition a network into subnetworks by maximizing the difference between the interior and the exterior of the subnetworks. In addition, we compare our approach with some state of the art methods on computer-generated networks based on the LFR benchmark as well as real-world networks. The experimental results indicate that our approach obtains better results for community detection, is capable of splitting irregular networks and achieves perfect results on the karate network and the dolphin network.

  7. The study and implementation of the wireless network data security model

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  8. Variable Discretisation for Anomaly Detection using Bayesian Networks

    DTIC Science & Technology

    2017-01-01

    UNCLASSIFIED DST- Group –TR–3328 1 Introduction Bayesian network implementations usually require each variable to take on a finite number of mutually...UNCLASSIFIED Variable Discretisation for Anomaly Detection using Bayesian Networks Jonathan Legg National Security and ISR Division Defence Science...and Technology Group DST- Group –TR–3328 ABSTRACT Anomaly detection is the process by which low probability events are automatically found against a

  9. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  10. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  11. Distributed clone detection in static wireless sensor networks: random walk with network division.

    PubMed

    Khan, Wazir Zada; Aalsalem, Mohammed Y; Saad, N M

    2015-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.

  12. Utilizing Weak Indicators to Detect Anomalous Behaviors in Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Egid, Adin Ezra

    We consider the use of a novel weak in- dicator alongside more commonly used weak indicators to help detect anomalous behavior in a large computer network. The data of the network which we are studying in this research paper concerns remote log-in information (Virtual Private Network, or VPN sessions) from the internal network of Los Alamos National Laboratory (LANL). The novel indicator we are utilizing is some- thing which, while novel in its application to data science/cyber security research, is a concept borrowed from the business world. The Her ndahl-Hirschman Index (HHI) is a computationally trivial index which provides amore » useful heuristic for regulatory agencies to ascertain the relative competitiveness of a particular industry. Using this index as a lagging indicator in the monthly format we have studied could help to detect anomalous behavior by a particular or small set of users on the network. Additionally, we study indicators related to the speed of movement of a user based on the physical location of their current and previous logins. This data can be ascertained from the IP addresses of the users, and is likely very similar to the fraud detection schemes regularly utilized by credit card networks to detect anomalous activity. In future work we would look to nd a way to combine these indicators for use as an internal fraud detection system.« less

  13. Detecting communities in large networks

    NASA Astrophysics Data System (ADS)

    Capocci, A.; Servedio, V. D. P.; Caldarelli, G.; Colaiori, F.

    2005-07-01

    We develop an algorithm to detect community structure in complex networks. The algorithm is based on spectral methods and takes into account weights and link orientation. Since the method detects efficiently clustered nodes in large networks even when these are not sharply partitioned, it turns to be specially suitable for the analysis of social and information networks. We test the algorithm on a large-scale data-set from a psychological experiment of word association. In this case, it proves to be successful both in clustering words, and in uncovering mental association patterns.

  14. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  15. Dynamic baseline detection method for power data network service

    NASA Astrophysics Data System (ADS)

    Chen, Wei

    2017-08-01

    This paper proposes a dynamic baseline Traffic detection Method which is based on the historical traffic data for the Power data network. The method uses Cisco's NetFlow acquisition tool to collect the original historical traffic data from network element at fixed intervals. This method uses three dimensions information including the communication port, time, traffic (number of bytes or number of packets) t. By filtering, removing the deviation value, calculating the dynamic baseline value, comparing the actual value with the baseline value, the method can detect whether the current network traffic is abnormal.

  16. Detecting and evaluating communities in complex human and biological networks

    NASA Astrophysics Data System (ADS)

    Morrison, Greg; Mahadevan, L.

    2012-02-01

    We develop a simple method for detecting the community structure in a network can by utilizing a measure of closeness between nodes. This approach readily leads to a method of coarse graining the network, which allows the detection of the natural hierarchy (or hierarchies) of community structure without appealing to an unknown resolution parameter. The closeness measure can also be used to evaluate the robustness of an individual node's assignment to its community (rather than evaluating only the quality of the global structure). Each of these methods in community detection and evaluation are illustrated using a variety of real world networks of either biological or sociological importance and illustrate the power and flexibility of the approach.

  17. Deep Constrained Siamese Hash Coding Network and Load-Balanced Locality-Sensitive Hashing for Near Duplicate Image Detection.

    PubMed

    Hu, Weiming; Fan, Yabo; Xing, Junliang; Sun, Liang; Cai, Zhaoquan; Maybank, Stephen

    2018-09-01

    We construct a new efficient near duplicate image detection method using a hierarchical hash code learning neural network and load-balanced locality-sensitive hashing (LSH) indexing. We propose a deep constrained siamese hash coding neural network combined with deep feature learning. Our neural network is able to extract effective features for near duplicate image detection. The extracted features are used to construct a LSH-based index. We propose a load-balanced LSH method to produce load-balanced buckets in the hashing process. The load-balanced LSH significantly reduces the query time. Based on the proposed load-balanced LSH, we design an effective and feasible algorithm for near duplicate image detection. Extensive experiments on three benchmark data sets demonstrate the effectiveness of our deep siamese hash encoding network and load-balanced LSH.

  18. A mathematical programming approach for sequential clustering of dynamic networks

    NASA Astrophysics Data System (ADS)

    Silva, Jonathan C.; Bennett, Laura; Papageorgiou, Lazaros G.; Tsoka, Sophia

    2016-02-01

    A common analysis performed on dynamic networks is community structure detection, a challenging problem that aims to track the temporal evolution of network modules. An emerging area in this field is evolutionary clustering, where the community structure of a network snapshot is identified by taking into account both its current state as well as previous time points. Based on this concept, we have developed a mixed integer non-linear programming (MINLP) model, SeqMod, that sequentially clusters each snapshot of a dynamic network. The modularity metric is used to determine the quality of community structure of the current snapshot and the historical cost is accounted for by optimising the number of node pairs co-clustered at the previous time point that remain so in the current snapshot partition. Our method is tested on social networks of interactions among high school students, college students and members of the Brazilian Congress. We show that, for an adequate parameter setting, our algorithm detects the classes that these students belong more accurately than partitioning each time step individually or by partitioning the aggregated snapshots. Our method also detects drastic discontinuities in interaction patterns across network snapshots. Finally, we present comparative results with similar community detection methods for time-dependent networks from the literature. Overall, we illustrate the applicability of mathematical programming as a flexible, adaptable and systematic approach for these community detection problems. Contribution to the Topical Issue "Temporal Network Theory and Applications", edited by Petter Holme.

  19. Multitask assessment of roads and vehicles network (MARVN)

    NASA Astrophysics Data System (ADS)

    Yang, Fang; Yi, Meng; Cai, Yiran; Blasch, Erik; Sullivan, Nichole; Sheaff, Carolyn; Chen, Genshe; Ling, Haibin

    2018-05-01

    Vehicle detection in wide area motion imagery (WAMI) has drawn increasing attention from the computer vision research community in recent decades. In this paper, we present a new architecture for vehicle detection on road using multi-task network, which is able to detect and segment vehicles, estimate their pose, and meanwhile yield road isolation for a given region. The multi-task network consists of three components: 1) vehicle detection, 2) vehicle and road segmentation, and 3) detection screening. Segmentation and detection components share the same backbone network and are trained jointly in an end-to-end way. Unlike background subtraction or frame differencing based methods, the proposed Multitask Assessment of Roads and Vehicles Network (MARVN) method can detect vehicles which are slowing down, stopped, and/or partially occluded in a single image. In addition, the method can eliminate the detections which are located at outside road using yielded road segmentation so as to decrease the false positive rate. As few WAMI datasets have road mask and vehicles bounding box anotations, we extract 512 frames from WPAFB 2009 dataset and carefully refine the original annotations. The resulting dataset is thus named as WAMI512. We extensively compare the proposed method with state-of-the-art methods on WAMI512 dataset, and demonstrate superior performance in terms of efficiency and accuracy.

  20. Coarse-to-fine deep neural network for fast pedestrian detection

    NASA Astrophysics Data System (ADS)

    Li, Yaobin; Yang, Xinmei; Cao, Lijun

    2017-11-01

    Pedestrian detection belongs to a category of object detection is a key issue in the field of video surveillance and automatic driving. Although recent object detection methods, such as Fast/Faster RCNN, have achieved excellent performance, it is difficult to meet real-time requirements and limits the application in real scenarios. A coarse-to-fine deep neural network for fast pedestrian detection is proposed in this paper. Two-stage approach is presented to realize fine trade-off between accuracy and speed. In the coarse stage, we train a fast deep convolution neural network to generate most pedestrian candidates at the cost of a number of false positives. The detector can cover the majority of scales, sizes, and occlusions of pedestrians. After that, a classification network is introduced to refine the pedestrian candidates generated from the previous stage. Refining through classification network, most of false detections will be excluded easily and the final pedestrian predictions with bounding box and confidence score are produced. Competitive results have been achieved on INRIA dataset in terms of accuracy, especially the method can achieve real-time detection that is faster than the previous leading methods. The effectiveness of coarse-to-fine approach to detect pedestrians is verified, and the accuracy and stability are also improved.

  1. A novel end-to-end fault detection and localization protocol for wavelength-routed WDM networks

    NASA Astrophysics Data System (ADS)

    Zeng, Hongqing; Vukovic, Alex; Huang, Changcheng

    2005-09-01

    Recently the wavelength division multiplexing (WDM) networks are becoming prevalent for telecommunication networks. However, even a very short disruption of service caused by network faults may lead to high data loss in such networks due to the high date rates, increased wavelength numbers and density. Therefore, the network survivability is critical and has been intensively studied, where fault detection and localization is the vital part but has received disproportional attentions. In this paper we describe and analyze an end-to-end lightpath fault detection scheme in data plane with the fault notification in control plane. The endeavor is focused on reducing the fault detection time. In this protocol, the source node of each lightpath keeps sending hello packets to the destination node exactly following the path for data traffic. The destination node generates an alarm once a certain number of consecutive hello packets are missed within a given time period. Then the network management unit collects all alarms and locates the faulty source based on the network topology, as well as sends fault notification messages via control plane to either the source node or all upstream nodes along the lightpath. The performance evaluation shows such a protocol can achieve fast fault detection, and at the same time, the overhead brought to the user data by hello packets is negligible.

  2. A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Sainani, Varsha

    The increasing number of network security related incidents have made it necessary for the organizations to actively protect their sensitive data with network intrusion detection systems (IDSs). IDSs are expected to analyze a large volume of data while not placing a significantly added load on the monitoring systems and networks. This requires good data mining strategies which take less time and give accurate results. In this study, a novel data mining assisted multiagent-based intrusion detection system (DMAS-IDS) is proposed, particularly with the support of multiclass supervised classification. These agents can detect and take predefined actions against malicious activities, and data mining techniques can help detect them. Our proposed DMAS-IDS shows superior performance compared to central sniffing IDS techniques, and saves network resources compared to other distributed IDS with mobile agents that activate too many sniffers causing bottlenecks in the network. This is one of the major motivations to use a distributed model based on multiagent platform along with a supervised classification technique.

  3. Evaluation of Earthquake Detection Performance in Terms of Quality and Speed in SEISCOMP3 Using New Modules Qceval, Npeval and Sceval

    NASA Astrophysics Data System (ADS)

    Roessler, D.; Weber, B.; Ellguth, E.; Spazier, J.

    2017-12-01

    The geometry of seismic monitoring networks, site conditions and data availability as well as monitoring targets and strategies typically impose trade-offs between data quality, earthquake detection sensitivity, false detections and alert times. Network detection capabilities typically change with alteration of the seismic noise level by human activity or by varying weather and sea conditions. To give helpful information to operators and maintenance coordinators, gempa developed a range of tools to evaluate earthquake detection and network performance including qceval, npeval and sceval. qceval is a module which analyzes waveform quality parameters in real-time and deactivates and reactivates data streams based on waveform quality thresholds for automatic processing. For example, thresholds can be defined for latency, delay, timing quality, spikes and gaps count and rms. As changes in the automatic processing have a direct influence on detection quality and speed, another tool called "npeval" was designed to calculate in real-time the expected time needed to detect and locate earthquakes by evaluating the effective network geometry. The effective network geometry is derived from the configuration of stations participating in the detection. The detection times are shown as an additional layer on the map and updated in real-time as soon as the effective network geometry changes. Yet another new tool, "sceval", is an automatic module which classifies located seismic events (Origins) in real-time. sceval evaluates the spatial distribution of the stations contributing to an Origin. It confirms or rejects the status of Origins, adds comments or leaves the Origin unclassified. The comments are passed to an additional sceval plug-in where the end user can customize event types. This unique identification of real and fake events in earthquake catalogues allows to lower network detection thresholds. In real-time monitoring situations operators can limit the processing to events with unclassified Origins, reducing their workload. Classified Origins can be treated specifically by other procedures. These modules have been calibrated and fully tested by several complex seismic monitoring networks in the region of Indonesia and Northern Chile.

  4. Experimental study of thin film sensor networks for wind turbine blade damage detection

    NASA Astrophysics Data System (ADS)

    Downey, A.; Laflamme, S.; Ubertini, F.; Sauder, H.; Sarkar, P.

    2017-02-01

    Damage detection of wind turbine blades is difficult due to their complex geometry and large size, for which large deployment of sensing systems is typically not economical. A solution is to develop and deploy dedicated sensor networks fabricated from inexpensive materials and electronics. The authors have recently developed a novel skin-type strain gauge for measuring strain over very large surfaces. The skin, a type of large-area electronics, is constituted from a network of soft elastomeric capacitors. The sensing system is analogous to a biological skin, where local strain can be monitored over a global area. In this paper, we propose the utilization of a dense network of soft elastomeric capacitors to detect, localize, and quantify damage on wind turbine blades. We also leverage mature off-the-shelf technologies, in particular resistive strain gauges, to augment such dense sensor network with high accuracy data at key locations, therefore constituting a hybrid dense sensor network. The proposed hybrid dense sensor network is installed inside a wind turbine blade model, and tested in a wind tunnel to simulate an operational environment. Results demonstrate the ability of the hybrid dense sensor network to detect, localize, and quantify damage.

  5. Cellular telephone-based radiation sensor and wide-area detection network

    DOEpatents

    Craig, William W [Pittsburg, CA; Labov, Simon E [Berkeley, CA

    2006-12-12

    A network of radiation detection instruments, each having a small solid state radiation sensor module integrated into a cellular phone for providing radiation detection data and analysis directly to a user. The sensor module includes a solid-state crystal bonded to an ASIC readout providing a low cost, low power, light weight compact instrument to detect and measure radiation energies in the local ambient radiation field. In particular, the photon energy, time of event, and location of the detection instrument at the time of detection is recorded for real time transmission to a central data collection/analysis system. The collected data from the entire network of radiation detection instruments are combined by intelligent correlation/analysis algorithms which map the background radiation and detect, identify and track radiation anomalies in the region.

  6. Cellular telephone-based wide-area radiation detection network

    DOEpatents

    Craig, William W [Pittsburg, CA; Labov, Simon E [Berkeley, CA

    2009-06-09

    A network of radiation detection instruments, each having a small solid state radiation sensor module integrated into a cellular phone for providing radiation detection data and analysis directly to a user. The sensor module includes a solid-state crystal bonded to an ASIC readout providing a low cost, low power, light weight compact instrument to detect and measure radiation energies in the local ambient radiation field. In particular, the photon energy, time of event, and location of the detection instrument at the time of detection is recorded for real time transmission to a central data collection/analysis system. The collected data from the entire network of radiation detection instruments are combined by intelligent correlation/analysis algorithms which map the background radiation and detect, identify and track radiation anomalies in the region.

  7. Characterizing and Detecting Unrevealed Elements of Network Systems

    DTIC Science & Technology

    2009-03-01

    refers to the direct interaction of persons in so far as this affects the future behavior or attitude of participants (such that this differs from... CHARACTERIZING AND DETECTING UNREVEALED ELEMENTS OF NETWORK SYSTEMS DISSERTATION James A. Leinart, Lieutenant Colonel, USAF AFIT/DS/ENS/08-01W...Air Force, Department of Defense or the United States Government. AFIT/DS/ENS/08-01W CHARACTERIZING AND DETECTING UNREVEALED ELEMENTS OF NETWORK

  8. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  9. Empirical Evaluation of Different Feature Representations for Social Circles Detection

    DTIC Science & Technology

    2015-06-16

    study and compare the performance on the available labelled Facebook data from the Kaggle competition on learning social circles in networks . We...Kaggle competition on learning social circles in networks [5]. The data consist of hand- labelled friendship egonets from Facebook and a set of 57...16. SECURITY CLASSIFICATION OF: Social circles detection is a special case of community detection in social network that is currently attracting a

  10. LP-LPA: A link influence-based label propagation algorithm for discovering community structures in networks

    NASA Astrophysics Data System (ADS)

    Berahmand, Kamal; Bouyer, Asgarali

    2018-03-01

    Community detection is an essential approach for analyzing the structural and functional properties of complex networks. Although many community detection algorithms have been recently presented, most of them are weak and limited in different ways. Label Propagation Algorithm (LPA) is a well-known and efficient community detection technique which is characterized by the merits of nearly-linear running time and easy implementation. However, LPA has some significant problems such as instability, randomness, and monster community detection. In this paper, an algorithm, namely node’s label influence policy for label propagation algorithm (LP-LPA) was proposed for detecting efficient community structures. LP-LPA measures link strength value for edges and nodes’ label influence value for nodes in a new label propagation strategy with preference on link strength and for initial nodes selection, avoid of random behavior in tiebreak states, and efficient updating order and rule update. These procedures can sort out the randomness issue in an original LPA and stabilize the discovered communities in all runs of the same network. Experiments on synthetic networks and a wide range of real-world social networks indicated that the proposed method achieves significant accuracy and high stability. Indeed, it can obviously solve monster community problem with regard to detecting communities in networks.

  11. Fully automatic detection and segmentation of abdominal aortic thrombus in post-operative CTA images using Deep Convolutional Neural Networks.

    PubMed

    López-Linares, Karen; Aranjuelo, Nerea; Kabongo, Luis; Maclair, Gregory; Lete, Nerea; Ceresa, Mario; García-Familiar, Ainhoa; Macía, Iván; González Ballester, Miguel A

    2018-05-01

    Computerized Tomography Angiography (CTA) based follow-up of Abdominal Aortic Aneurysms (AAA) treated with Endovascular Aneurysm Repair (EVAR) is essential to evaluate the progress of the patient and detect complications. In this context, accurate quantification of post-operative thrombus volume is required. However, a proper evaluation is hindered by the lack of automatic, robust and reproducible thrombus segmentation algorithms. We propose a new fully automatic approach based on Deep Convolutional Neural Networks (DCNN) for robust and reproducible thrombus region of interest detection and subsequent fine thrombus segmentation. The DetecNet detection network is adapted to perform region of interest extraction from a complete CTA and a new segmentation network architecture, based on Fully Convolutional Networks and a Holistically-Nested Edge Detection Network, is presented. These networks are trained, validated and tested in 13 post-operative CTA volumes of different patients using a 4-fold cross-validation approach to provide more robustness to the results. Our pipeline achieves a Dice score of more than 82% for post-operative thrombus segmentation and provides a mean relative volume difference between ground truth and automatic segmentation that lays within the experienced human observer variance without the need of human intervention in most common cases. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. Network capability estimation. Vela network evaluation and automatic processing research. Technical report. [NETWORTH

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snell, N.S.

    1976-09-24

    NETWORTH is a computer program which calculates the detection and location capability of seismic networks. A modified version of NETWORTH has been developed. This program has been used to evaluate the effect of station 'downtime', the signal amplitude variance, and the station detection threshold upon network detection capability. In this version all parameters may be changed separately for individual stations. The capability of using signal amplitude corrections has been added. The function of amplitude corrections is to remove possible bias in the magnitude estimate due to inhomogeneous signal attenuation. These corrections may be applied to individual stations, individual epicenters, ormore » individual station/epicenter combinations. An option has been added to calculate the effect of station 'downtime' upon network capability. This study indicates that, if capability loss due to detection errors can be minimized, then station detection threshold and station reliability will be the fundamental limits to network performance. A baseline network of thirteen stations has been performed. These stations are as follows: Alaskan Long Period Array, (ALPA); Ankara, (ANK); Chiang Mai, (CHG); Korean Seismic Research Station, (KSRS); Large Aperture Seismic Array, (LASA); Mashhad, (MSH); Mundaring, (MUN); Norwegian Seismic Array, (NORSAR); New Delhi, (NWDEL); Red Knife, Ontario, (RK-ON); Shillong, (SHL); Taipei, (TAP); and White Horse, Yukon, (WH-YK).« less

  13. Detection and localization of change points in temporal networks with the aid of stochastic block models

    NASA Astrophysics Data System (ADS)

    De Ridder, Simon; Vandermarliere, Benjamin; Ryckebusch, Jan

    2016-11-01

    A framework based on generalized hierarchical random graphs (GHRGs) for the detection of change points in the structure of temporal networks has recently been developed by Peel and Clauset (2015 Proc. 29th AAAI Conf. on Artificial Intelligence). We build on this methodology and extend it to also include the versatile stochastic block models (SBMs) as a parametric family for reconstructing the empirical networks. We use five different techniques for change point detection on prototypical temporal networks, including empirical and synthetic ones. We find that none of the considered methods can consistently outperform the others when it comes to detecting and locating the expected change points in empirical temporal networks. With respect to the precision and the recall of the results of the change points, we find that the method based on a degree-corrected SBM has better recall properties than other dedicated methods, especially for sparse networks and smaller sliding time window widths.

  14. Fault detection and classification in electrical power transmission system using artificial neural network.

    PubMed

    Jamil, Majid; Sharma, Sanjeev Kumar; Singh, Rajveer

    2015-01-01

    This paper focuses on the detection and classification of the faults on electrical power transmission line using artificial neural networks. The three phase currents and voltages of one end are taken as inputs in the proposed scheme. The feed forward neural network along with back propagation algorithm has been employed for detection and classification of the fault for analysis of each of the three phases involved in the process. A detailed analysis with varying number of hidden layers has been performed to validate the choice of the neural network. The simulation results concluded that the present method based on the neural network is efficient in detecting and classifying the faults on transmission lines with satisfactory performances. The different faults are simulated with different parameters to check the versatility of the method. The proposed method can be extended to the Distribution network of the Power System. The various simulations and analysis of signals is done in the MATLAB(®) environment.

  15. Z-Score-Based Modularity for Community Detection in Networks

    PubMed Central

    Miyauchi, Atsushi; Kawase, Yasushi

    2016-01-01

    Identifying community structure in networks is an issue of particular interest in network science. The modularity introduced by Newman and Girvan is the most popular quality function for community detection in networks. In this study, we identify a problem in the concept of modularity and suggest a solution to overcome this problem. Specifically, we obtain a new quality function for community detection. We refer to the function as Z-modularity because it measures the Z-score of a given partition with respect to the fraction of the number of edges within communities. Our theoretical analysis shows that Z-modularity mitigates the resolution limit of the original modularity in certain cases. Computational experiments using both artificial networks and well-known real-world networks demonstrate the validity and reliability of the proposed quality function. PMID:26808270

  16. Event Detection in Aerospace Systems using Centralized Sensor Networks: A Comparative Study of Several Methodologies

    NASA Technical Reports Server (NTRS)

    Mehr, Ali Farhang; Sauvageon, Julien; Agogino, Alice M.; Tumer, Irem Y.

    2006-01-01

    Recent advances in micro electromechanical systems technology, digital electronics, and wireless communications have enabled development of low-cost, low-power, multifunctional miniature smart sensors. These sensors can be deployed throughout a region in an aerospace vehicle to build a network for measurement, detection and surveillance applications. Event detection using such centralized sensor networks is often regarded as one of the most promising health management technologies in aerospace applications where timely detection of local anomalies has a great impact on the safety of the mission. In this paper, we propose to conduct a qualitative comparison of several local event detection algorithms for centralized redundant sensor networks. The algorithms are compared with respect to their ability to locate and evaluate an event in the presence of noise and sensor failures for various node geometries and densities.

  17. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  18. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  19. Simple Random Sampling-Based Probe Station Selection for Fault Detection in Wireless Sensor Networks

    PubMed Central

    Huang, Rimao; Qiu, Xuesong; Rui, Lanlan

    2011-01-01

    Fault detection for wireless sensor networks (WSNs) has been studied intensively in recent years. Most existing works statically choose the manager nodes as probe stations and probe the network at a fixed frequency. This straightforward solution leads however to several deficiencies. Firstly, by only assigning the fault detection task to the manager node the whole network is out of balance, and this quickly overloads the already heavily burdened manager node, which in turn ultimately shortens the lifetime of the whole network. Secondly, probing with a fixed frequency often generates too much useless network traffic, which results in a waste of the limited network energy. Thirdly, the traditional algorithm for choosing a probing node is too complicated to be used in energy-critical wireless sensor networks. In this paper, we study the distribution characters of the fault nodes in wireless sensor networks, validate the Pareto principle that a small number of clusters contain most of the faults. We then present a Simple Random Sampling-based algorithm to dynamic choose sensor nodes as probe stations. A dynamic adjusting rule for probing frequency is also proposed to reduce the number of useless probing packets. The simulation experiments demonstrate that the algorithm and adjusting rule we present can effectively prolong the lifetime of a wireless sensor network without decreasing the fault detected rate. PMID:22163789

  20. Simple random sampling-based probe station selection for fault detection in wireless sensor networks.

    PubMed

    Huang, Rimao; Qiu, Xuesong; Rui, Lanlan

    2011-01-01

    Fault detection for wireless sensor networks (WSNs) has been studied intensively in recent years. Most existing works statically choose the manager nodes as probe stations and probe the network at a fixed frequency. This straightforward solution leads however to several deficiencies. Firstly, by only assigning the fault detection task to the manager node the whole network is out of balance, and this quickly overloads the already heavily burdened manager node, which in turn ultimately shortens the lifetime of the whole network. Secondly, probing with a fixed frequency often generates too much useless network traffic, which results in a waste of the limited network energy. Thirdly, the traditional algorithm for choosing a probing node is too complicated to be used in energy-critical wireless sensor networks. In this paper, we study the distribution characters of the fault nodes in wireless sensor networks, validate the Pareto principle that a small number of clusters contain most of the faults. We then present a Simple Random Sampling-based algorithm to dynamic choose sensor nodes as probe stations. A dynamic adjusting rule for probing frequency is also proposed to reduce the number of useless probing packets. The simulation experiments demonstrate that the algorithm and adjusting rule we present can effectively prolong the lifetime of a wireless sensor network without decreasing the fault detected rate.

  1. Biological network motif detection and evaluation

    PubMed Central

    2011-01-01

    Background Molecular level of biological data can be constructed into system level of data as biological networks. Network motifs are defined as over-represented small connected subgraphs in networks and they have been used for many biological applications. Since network motif discovery involves computationally challenging processes, previous algorithms have focused on computational efficiency. However, we believe that the biological quality of network motifs is also very important. Results We define biological network motifs as biologically significant subgraphs and traditional network motifs are differentiated as structural network motifs in this paper. We develop five algorithms, namely, EDGEGO-BNM, EDGEBETWEENNESS-BNM, NMF-BNM, NMFGO-BNM and VOLTAGE-BNM, for efficient detection of biological network motifs, and introduce several evaluation measures including motifs included in complex, motifs included in functional module and GO term clustering score in this paper. Experimental results show that EDGEGO-BNM and EDGEBETWEENNESS-BNM perform better than existing algorithms and all of our algorithms are applicable to find structural network motifs as well. Conclusion We provide new approaches to finding network motifs in biological networks. Our algorithms efficiently detect biological network motifs and further improve existing algorithms to find high quality structural network motifs, which would be impossible using existing algorithms. The performances of the algorithms are compared based on our new evaluation measures in biological contexts. We believe that our work gives some guidelines of network motifs research for the biological networks. PMID:22784624

  2. Applied Graph-Mining Algorithms to Study Biomolecular Interaction Networks

    PubMed Central

    2014-01-01

    Protein-protein interaction (PPI) networks carry vital information on the organization of molecular interactions in cellular systems. The identification of functionally relevant modules in PPI networks is one of the most important applications of biological network analysis. Computational analysis is becoming an indispensable tool to understand large-scale biomolecular interaction networks. Several types of computational methods have been developed and employed for the analysis of PPI networks. Of these computational methods, graph comparison and module detection are the two most commonly used strategies. This review summarizes current literature on graph kernel and graph alignment methods for graph comparison strategies, as well as module detection approaches including seed-and-extend, hierarchical clustering, optimization-based, probabilistic, and frequent subgraph methods. Herein, we provide a comprehensive review of the major algorithms employed under each theme, including our recently published frequent subgraph method, for detecting functional modules commonly shared across multiple cancer PPI networks. PMID:24800226

  3. Performances of Machine Learning Algorithms for Binary Classification of Network Anomaly Detection System

    NASA Astrophysics Data System (ADS)

    Nawir, Mukrimah; Amir, Amiza; Lynn, Ong Bi; Yaakob, Naimah; Badlishah Ahmad, R.

    2018-05-01

    The rapid growth of technologies might endanger them to various network attacks due to the nature of data which are frequently exchange their data through Internet and large-scale data that need to be handle. Moreover, network anomaly detection using machine learning faced difficulty when dealing the involvement of dataset where the number of labelled network dataset is very few in public and this caused many researchers keep used the most commonly network dataset (KDDCup99) which is not relevant to employ the machine learning (ML) algorithms for a classification. Several issues regarding these available labelled network datasets are discussed in this paper. The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.

  4. A hybrid network-based method for the detection of disease-related genes

    NASA Astrophysics Data System (ADS)

    Cui, Ying; Cai, Meng; Dai, Yang; Stanley, H. Eugene

    2018-02-01

    Detecting disease-related genes is crucial in disease diagnosis and drug design. The accepted view is that neighbors of a disease-causing gene in a molecular network tend to cause the same or similar diseases, and network-based methods have been recently developed to identify novel hereditary disease-genes in available biomedical networks. Despite the steady increase in the discovery of disease-associated genes, there is still a large fraction of disease genes that remains under the tip of the iceberg. In this paper we exploit the topological properties of the protein-protein interaction (PPI) network to detect disease-related genes. We compute, analyze, and compare the topological properties of disease genes with non-disease genes in PPI networks. We also design an improved random forest classifier based on these network topological features, and a cross-validation test confirms that our method performs better than previous similar studies.

  5. Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division

    PubMed Central

    Khan, Wazir Zada; Aalsalem, Mohammed Y.; Saad, N. M.

    2015-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads. PMID:25992913

  6. Wireless sensor networks for heritage object deformation detection and tracking algorithm.

    PubMed

    Xie, Zhijun; Huang, Guangyan; Zarei, Roozbeh; He, Jing; Zhang, Yanchun; Ye, Hongwu

    2014-10-31

    Deformation is the direct cause of heritage object collapse. It is significant to monitor and signal the early warnings of the deformation of heritage objects. However, traditional heritage object monitoring methods only roughly monitor a simple-shaped heritage object as a whole, but cannot monitor complicated heritage objects, which may have a large number of surfaces inside and outside. Wireless sensor networks, comprising many small-sized, low-cost, low-power intelligent sensor nodes, are more useful to detect the deformation of every small part of the heritage objects. Wireless sensor networks need an effective mechanism to reduce both the communication costs and energy consumption in order to monitor the heritage objects in real time. In this paper, we provide an effective heritage object deformation detection and tracking method using wireless sensor networks (EffeHDDT). In EffeHDDT, we discover a connected core set of sensor nodes to reduce the communication cost for transmitting and collecting the data of the sensor networks. Particularly, we propose a heritage object boundary detecting and tracking mechanism. Both theoretical analysis and experimental results demonstrate that our EffeHDDT method outperforms the existing methods in terms of network traffic and the precision of the deformation detection.

  7. NetMOD version 1.0 user's manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Merchant, Bion John

    2014-01-01

    NetMOD (Network Monitoring for Optimal Detection) is a Java-based software package for conducting simulation of seismic networks. Specifically, NetMOD simulates the detection capabilities of seismic monitoring networks. Network simulations have long been used to study network resilience to station outages and to determine where additional stations are needed to reduce monitoring thresholds. NetMOD makes use of geophysical models to determine the source characteristics, signal attenuation along the path between the source and station, and the performance and noise properties of the station. These geophysical models are combined to simulate the relative amplitudes of signal and noise that are observed atmore » each of the stations. From these signal-to-noise ratios (SNR), the probability of detection can be computed given a detection threshold. This manual describes how to configure and operate NetMOD to perform seismic detection simulations. In addition, NetMOD is distributed with a simulation dataset for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) International Monitoring System (IMS) seismic network for the purpose of demonstrating NetMOD's capabilities and providing user training. The tutorial sections of this manual use this dataset when describing how to perform the steps involved when running a simulation.« less

  8. Towards a Low-Cost Remote Memory Attestation for the Smart Grid

    PubMed Central

    Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing

    2015-01-01

    In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes. PMID:26307998

  9. Towards a Low-Cost Remote Memory Attestation for the Smart Grid.

    PubMed

    Yang, Xinyu; He, Xiaofei; Yu, Wei; Lin, Jie; Li, Rui; Yang, Qingyu; Song, Houbing

    2015-08-21

    In the smart grid, measurement devices may be compromised by adversaries, and their operations could be disrupted by attacks. A number of schemes to efficiently and accurately detect these compromised devices remotely have been proposed. Nonetheless, most of the existing schemes detecting compromised devices depend on the incremental response time in the attestation process, which are sensitive to data transmission delay and lead to high computation and network overhead. To address the issue, in this paper, we propose a low-cost remote memory attestation scheme (LRMA), which can efficiently and accurately detect compromised smart meters considering real-time network delay and achieve low computation and network overhead. In LRMA, the impact of real-time network delay on detecting compromised nodes can be eliminated via investigating the time differences reported from relay nodes. Furthermore, the attestation frequency in LRMA is dynamically adjusted with the compromised probability of each node, and then, the total number of attestations could be reduced while low computation and network overhead can be achieved. Through a combination of extensive theoretical analysis and evaluations, our data demonstrate that our proposed scheme can achieve better detection capacity and lower computation and network overhead in comparison to existing schemes.

  10. SCOUT: simultaneous time segmentation and community detection in dynamic networks

    PubMed Central

    Hulovatyy, Yuriy; Milenković, Tijana

    2016-01-01

    Many evolving complex real-world systems can be modeled via dynamic networks. An important problem in dynamic network research is community detection, which finds groups of topologically related nodes. Typically, this problem is approached by assuming either that each time point has a distinct community organization or that all time points share a single community organization. The reality likely lies between these two extremes. To find the compromise, we consider community detection in the context of the problem of segment detection, which identifies contiguous time periods with consistent network structure. Consequently, we formulate a combined problem of segment community detection (SCD), which simultaneously partitions the network into contiguous time segments with consistent community organization and finds this community organization for each segment. To solve SCD, we introduce SCOUT, an optimization framework that explicitly considers both segmentation quality and partition quality. SCOUT addresses limitations of existing methods that can be adapted to solve SCD, which consider only one of segmentation quality or partition quality. In a thorough evaluation, SCOUT outperforms the existing methods in terms of both accuracy and computational complexity. We apply SCOUT to biological network data to study human aging. PMID:27881879

  11. Wireless Sensor Networks for Heritage Object Deformation Detection and Tracking Algorithm

    PubMed Central

    Xie, Zhijun; Huang, Guangyan; Zarei, Roozbeh; He, Jing; Zhang, Yanchun; Ye, Hongwu

    2014-01-01

    Deformation is the direct cause of heritage object collapse. It is significant to monitor and signal the early warnings of the deformation of heritage objects. However, traditional heritage object monitoring methods only roughly monitor a simple-shaped heritage object as a whole, but cannot monitor complicated heritage objects, which may have a large number of surfaces inside and outside. Wireless sensor networks, comprising many small-sized, low-cost, low-power intelligent sensor nodes, are more useful to detect the deformation of every small part of the heritage objects. Wireless sensor networks need an effective mechanism to reduce both the communication costs and energy consumption in order to monitor the heritage objects in real time. In this paper, we provide an effective heritage object deformation detection and tracking method using wireless sensor networks (EffeHDDT). In EffeHDDT, we discover a connected core set of sensor nodes to reduce the communication cost for transmitting and collecting the data of the sensor networks. Particularly, we propose a heritage object boundary detecting and tracking mechanism. Both theoretical analysis and experimental results demonstrate that our EffeHDDT method outperforms the existing methods in terms of network traffic and the precision of the deformation detection. PMID:25365458

  12. Multilayer Statistical Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine

    2008-12-01

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.

  13. Network exploitation using WAMI tracks

    NASA Astrophysics Data System (ADS)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  14. Detection of pseudosinusoidal epileptic seizure segments in the neonatal EEG by cascading a rule-based algorithm with a neural network.

    PubMed

    Karayiannis, Nicolaos B; Mukherjee, Amit; Glover, John R; Ktonas, Periklis Y; Frost, James D; Hrachovy, Richard A; Mizrahi, Eli M

    2006-04-01

    This paper presents an approach to detect epileptic seizure segments in the neonatal electroencephalogram (EEG) by characterizing the spectral features of the EEG waveform using a rule-based algorithm cascaded with a neural network. A rule-based algorithm screens out short segments of pseudosinusoidal EEG patterns as epileptic based on features in the power spectrum. The output of the rule-based algorithm is used to train and compare the performance of conventional feedforward neural networks and quantum neural networks. The results indicate that the trained neural networks, cascaded with the rule-based algorithm, improved the performance of the rule-based algorithm acting by itself. The evaluation of the proposed cascaded scheme for the detection of pseudosinusoidal seizure segments reveals its potential as a building block of the automated seizure detection system under development.

  15. Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier

    PubMed Central

    Akram, M. Usman; Khan, Shoab A.; Javed, Muhammad Younus

    2014-01-01

    National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict key players from a covert network by applying a hybrid framework. The proposed system calculates certain centrality measures for each node in the network and then applies novel hybrid classifier for detection of key players. Our system also applies anomaly detection to predict any terrorist activity in order to help law enforcement agencies to destabilize the involved network. As a proof of concept, the proposed framework has been implemented and tested using different case studies including two publicly available datasets and one local network. PMID:25136674

  16. Pickless event detection and location: The waveform correlation event detection system (WCEDS) revisited

    DOE PAGES

    Arrowsmith, Stephen John; Young, Christopher J.; Ballard, Sanford; ...

    2016-01-01

    The standard paradigm for seismic event monitoring breaks the event detection problem down into a series of processing stages that can be categorized at the highest level into station-level processing and network-level processing algorithms (e.g., Le Bras and Wuster (2002)). At the station-level, waveforms are typically processed to detect signals and identify phases, which may subsequently be updated based on network processing. At the network-level, phase picks are associated to form events, which are subsequently located. Furthermore, waveforms are typically directly exploited only at the station-level, while network-level operations rely on earth models to associate and locate the events thatmore » generated the phase picks.« less

  17. A cooperative game framework for detecting overlapping communities in social networks

    NASA Astrophysics Data System (ADS)

    Jonnalagadda, Annapurna; Kuppusamy, Lakshmanan

    2018-02-01

    Community detection in social networks is a challenging and complex task, which received much attention from researchers of multiple domains in recent years. The evolution of communities in social networks happens merely due to the self-interest of the nodes. The interesting feature of community structure in social networks is the multi membership of the nodes resulting in overlapping communities. Assuming the nodes of the social network as self-interested players, the dynamics of community formation can be captured in the form of a game. In this paper, we propose a greedy algorithm, namely, Weighted Graph Community Game (WGCG), in order to model the interactions among the self-interested nodes of the social network. The proposed algorithm employs the Shapley value mechanism to discover the inherent communities of the underlying social network. The experimental evaluation on the real-world and synthetic benchmark networks demonstrates that the performance of the proposed algorithm is superior to the state-of-the-art overlapping community detection algorithms.

  18. A fast community detection method in bipartite networks by distance dynamics

    NASA Astrophysics Data System (ADS)

    Sun, Hong-liang; Ch'ng, Eugene; Yong, Xi; Garibaldi, Jonathan M.; See, Simon; Chen, Duan-bing

    2018-04-01

    Many real bipartite networks are found to be divided into two-mode communities. In this paper, we formulate a new two-mode community detection algorithm BiAttractor. It is based on distance dynamics model Attractor proposed by Shao et al. with extension from unipartite to bipartite networks. Since Jaccard coefficient of distance dynamics model is incapable to measure distances of different types of vertices in bipartite networks, our main contribution is to extend distance dynamics model from unipartite to bipartite networks using a novel measure Local Jaccard Distance (LJD). Furthermore, distances between different types of vertices are not affected by common neighbors in the original method. This new idea makes clear assumptions and yields interpretable results in linear time complexity O(| E |) in sparse networks, where | E | is the number of edges. Experiments on synthetic networks demonstrate it is capable to overcome resolution limit compared with existing other methods. Further research on real networks shows that this model can accurately detect interpretable community structures in a short time.

  19. Evolutionary method for finding communities in bipartite networks.

    PubMed

    Zhan, Weihua; Zhang, Zhongzhi; Guan, Jihong; Zhou, Shuigeng

    2011-06-01

    An important step in unveiling the relation between network structure and dynamics defined on networks is to detect communities, and numerous methods have been developed separately to identify community structure in different classes of networks, such as unipartite networks, bipartite networks, and directed networks. Here, we show that the finding of communities in such networks can be unified in a general framework-detection of community structure in bipartite networks. Moreover, we propose an evolutionary method for efficiently identifying communities in bipartite networks. To this end, we show that both unipartite and directed networks can be represented as bipartite networks, and their modularity is completely consistent with that for bipartite networks, the detection of modular structure on which can be reformulated as modularity maximization. To optimize the bipartite modularity, we develop a modified adaptive genetic algorithm (MAGA), which is shown to be especially efficient for community structure detection. The high efficiency of the MAGA is based on the following three improvements we make. First, we introduce a different measure for the informativeness of a locus instead of the standard deviation, which can exactly determine which loci mutate. This measure is the bias between the distribution of a locus over the current population and the uniform distribution of the locus, i.e., the Kullback-Leibler divergence between them. Second, we develop a reassignment technique for differentiating the informative state a locus has attained from the random state in the initial phase. Third, we present a modified mutation rule which by incorporating related operations can guarantee the convergence of the MAGA to the global optimum and can speed up the convergence process. Experimental results show that the MAGA outperforms existing methods in terms of modularity for both bipartite and unipartite networks.

  20. Low-complexity object detection with deep convolutional neural network for embedded systems

    NASA Astrophysics Data System (ADS)

    Tripathi, Subarna; Kang, Byeongkeun; Dane, Gokce; Nguyen, Truong

    2017-09-01

    We investigate low-complexity convolutional neural networks (CNNs) for object detection for embedded vision applications. It is well-known that consolidation of an embedded system for CNN-based object detection is more challenging due to computation and memory requirement comparing with problems like image classification. To achieve these requirements, we design and develop an end-to-end TensorFlow (TF)-based fully-convolutional deep neural network for generic object detection task inspired by one of the fastest framework, YOLO.1 The proposed network predicts the localization of every object by regressing the coordinates of the corresponding bounding box as in YOLO. Hence, the network is able to detect any objects without any limitations in the size of the objects. However, unlike YOLO, all the layers in the proposed network is fully-convolutional. Thus, it is able to take input images of any size. We pick face detection as an use case. We evaluate the proposed model for face detection on FDDB dataset and Widerface dataset. As another use case of generic object detection, we evaluate its performance on PASCAL VOC dataset. The experimental results demonstrate that the proposed network can predict object instances of different sizes and poses in a single frame. Moreover, the results show that the proposed method achieves comparative accuracy comparing with the state-of-the-art CNN-based object detection methods while reducing the model size by 3× and memory-BW by 3 - 4× comparing with one of the best real-time CNN-based object detectors, YOLO. Our 8-bit fixed-point TF-model provides additional 4× memory reduction while keeping the accuracy nearly as good as the floating-point model. Moreover, the fixed- point model is capable of achieving 20× faster inference speed comparing with the floating-point model. Thus, the proposed method is promising for embedded implementations.

  1. Progress towards design elements for a Great Lakes-wide aquatic invasive species early detection network

    EPA Science Inventory

    Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...

  2. P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks

    PubMed Central

    El Emam, Khaled; Arbuckle, Luk; Neri, Emilio; Rose, Sean; Jonker, Elizabeth

    2012-01-01

    Background Users of peer-to-peer (P2P) file-sharing networks risk the inadvertent disclosure of personal health information (PHI). In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health information custodians. Automated PHI detection tools that crawl the P2P networks can identify PHI and alert custodians. While there has been previous work on the detection of personal information in electronic health records, there has been a dearth of research on the automated detection of PHI in heterogeneous user files. Objective To build a system that accurately detects PHI in files sent through P2P file-sharing networks. The system, which we call P2P Watch, uses a pipeline of text processing techniques to automatically detect PHI in files exchanged through P2P networks. P2P Watch processes unstructured texts regardless of the file format, document type, and content. Methods We developed P2P Watch to extract and analyze PHI in text files exchanged on P2P networks. We labeled texts as PHI if they contained identifiable information about a person (eg, name and date of birth) and specifics of the person’s health (eg, diagnosis, prescriptions, and medical procedures). We evaluated the system’s performance through its efficiency and effectiveness on 3924 files gathered from three P2P networks. Results P2P Watch successfully processed 3924 P2P files of unknown content. A manual examination of 1578 randomly selected files marked by the system as non-PHI confirmed that these files indeed did not contain PHI, making the false-negative detection rate equal to zero. Of 57 files marked by the system as PHI, all contained both personally identifiable information and health information: 11 files were PHI disclosures, and 46 files contained organizational materials such as unfilled insurance forms, job applications by medical professionals, and essays. Conclusions PHI can be successfully detected in free-form textual files exchanged through P2P networks. Once the files with PHI are detected, affected individuals or data custodians can be alerted to take remedial action. PMID:22776692

  3. P2P watch: personal health information detection in peer-to-peer file-sharing networks.

    PubMed

    Sokolova, Marina; El Emam, Khaled; Arbuckle, Luk; Neri, Emilio; Rose, Sean; Jonker, Elizabeth

    2012-07-09

    Users of peer-to-peer (P2P) file-sharing networks risk the inadvertent disclosure of personal health information (PHI). In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health information custodians. Automated PHI detection tools that crawl the P2P networks can identify PHI and alert custodians. While there has been previous work on the detection of personal information in electronic health records, there has been a dearth of research on the automated detection of PHI in heterogeneous user files. To build a system that accurately detects PHI in files sent through P2P file-sharing networks. The system, which we call P2P Watch, uses a pipeline of text processing techniques to automatically detect PHI in files exchanged through P2P networks. P2P Watch processes unstructured texts regardless of the file format, document type, and content. We developed P2P Watch to extract and analyze PHI in text files exchanged on P2P networks. We labeled texts as PHI if they contained identifiable information about a person (eg, name and date of birth) and specifics of the person's health (eg, diagnosis, prescriptions, and medical procedures). We evaluated the system's performance through its efficiency and effectiveness on 3924 files gathered from three P2P networks. P2P Watch successfully processed 3924 P2P files of unknown content. A manual examination of 1578 randomly selected files marked by the system as non-PHI confirmed that these files indeed did not contain PHI, making the false-negative detection rate equal to zero. Of 57 files marked by the system as PHI, all contained both personally identifiable information and health information: 11 files were PHI disclosures, and 46 files contained organizational materials such as unfilled insurance forms, job applications by medical professionals, and essays. PHI can be successfully detected in free-form textual files exchanged through P2P networks. Once the files with PHI are detected, affected individuals or data custodians can be alerted to take remedial action.

  4. Assessment of SRS ambient air monitoring network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, K.; Jannik, T.

    Three methodologies have been used to assess the effectiveness of the existing ambient air monitoring system in place at the Savannah River Site in Aiken, SC. Effectiveness was measured using two metrics that have been utilized in previous quantification of air-monitoring network performance; frequency of detection (a measurement of how frequently a minimum number of samplers within the network detect an event), and network intensity (a measurement of how consistent each sampler within the network is at detecting events). In addition to determining the effectiveness of the current system, the objective of performing this assessment was to determine what, ifmore » any, changes could make the system more effective. Methodologies included 1) the Waite method of determining sampler distribution, 2) the CAP88- PC annual dose model, and 3) a puff/plume transport model used to predict air concentrations at sampler locations. Data collected from air samplers at SRS in 2015 compared with predicted data resulting from the methodologies determined that the frequency of detection for the current system is 79.2% with sampler efficiencies ranging from 5% to 45%, and a mean network intensity of 21.5%. One of the air monitoring stations had an efficiency of less than 10%, and detected releases during just one sampling period of the entire year, adding little to the overall network intensity. By moving or removing this sampler, the mean network intensity increased to about 23%. Further work in increasing the network intensity and simulating accident scenarios to further test the ambient air system at SRS is planned« less

  5. Anti-correlations in the degree distribution increase stimulus detection performance in noisy spiking neural networks.

    PubMed

    Martens, Marijn B; Houweling, Arthur R; E Tiesinga, Paul H

    2017-02-01

    Neuronal circuits in the rodent barrel cortex are characterized by stable low firing rates. However, recent experiments show that short spike trains elicited by electrical stimulation in single neurons can induce behavioral responses. Hence, the underlying neural networks provide stability against internal fluctuations in the firing rate, while simultaneously making the circuits sensitive to small external perturbations. Here we studied whether stability and sensitivity are affected by the connectivity structure in recurrently connected spiking networks. We found that anti-correlation between the number of afferent (in-degree) and efferent (out-degree) synaptic connections of neurons increases stability against pathological bursting, relative to networks where the degrees were either positively correlated or uncorrelated. In the stable network state, stimulation of a few cells could lead to a detectable change in the firing rate. To quantify the ability of networks to detect the stimulation, we used a receiver operating characteristic (ROC) analysis. For a given level of background noise, networks with anti-correlated degrees displayed the lowest false positive rates, and consequently had the highest stimulus detection performance. We propose that anti-correlation in the degree distribution may be a computational strategy employed by sensory cortices to increase the detectability of external stimuli. We show that networks with anti-correlated degrees can in principle be formed by applying learning rules comprised of a combination of spike-timing dependent plasticity, homeostatic plasticity and pruning to networks with uncorrelated degrees. To test our prediction we suggest a novel experimental method to estimate correlations in the degree distribution.

  6. A Viola-Jones based hybrid face detection framework

    NASA Astrophysics Data System (ADS)

    Murphy, Thomas M.; Broussard, Randy; Schultz, Robert; Rakvic, Ryan; Ngo, Hau

    2013-12-01

    Improvements in face detection performance would benefit many applications. The OpenCV library implements a standard solution, the Viola-Jones detector, with a statistically boosted rejection cascade of binary classifiers. Empirical evidence has shown that Viola-Jones underdetects in some instances. This research shows that a truncated cascade augmented by a neural network could recover these undetected faces. A hybrid framework is constructed, with a truncated Viola-Jones cascade followed by an artificial neural network, used to refine the face decision. Optimally, a truncation stage that captured all faces and allowed the neural network to remove the false alarms is selected. A feedforward backpropagation network with one hidden layer is trained to discriminate faces based upon the thresholding (detection) values of intermediate stages of the full rejection cascade. A clustering algorithm is used as a precursor to the neural network, to group significant overlappings. Evaluated on the CMU/VASC Image Database, comparison with an unmodified OpenCV approach shows: (1) a 37% increase in detection rates if constrained by the requirement of no increase in false alarms, (2) a 48% increase in detection rates if some additional false alarms are tolerated, and (3) an 82% reduction in false alarms with no reduction in detection rates. These results demonstrate improved face detection and could address the need for such improvement in various applications.

  7. Quantitative evaluation of an air-monitoring network using atmospheric transport modeling and frequency of detection methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rood, Arthur S.; Sondrup, A. Jeffrey; Ritter, Paul D.

    A methodology to quantify the performance of an air monitoring network in terms of frequency of detection has been developed. The methodology utilizes an atmospheric transport model to predict air concentrations of radionuclides at the samplers for a given release time and duration. Frequency of detection is defined as the fraction of “events” that result in a detection at either a single sampler or network of samplers. An “event” is defined as a release of finite duration that begins on a given day and hour of the year from a facility with the potential to emit airborne radionuclides. Another metricmore » of interest is the network intensity, which is defined as the fraction of samplers in the network that have a positive detection for a given event. The frequency of detection methodology allows for evaluation of short-term releases that include effects of short-term variability in meteorological conditions. The methodology was tested using the U.S. Department of Energy Idaho National Laboratory (INL) Site ambient air monitoring network consisting of 37 low-volume air samplers in 31 different locations covering a 17,630 km 2 region. Releases from six major INL facilities distributed over an area of 1,435 km 2 were modeled and included three stack sources and eight ground-level sources. A Lagrangian Puff air dispersion model (CALPUFF) was used to model atmospheric transport. The model was validated using historical 125Sb releases and measurements. Relevant one-week release quantities from each emission source were calculated based on a dose of 1.9 × 10 –4 mSv at a public receptor (0.01 mSv assuming release persists over a year). Important radionuclides considered include 241Am, 137Cs, 238Pu, 239Pu, 90Sr, and tritium. Results show the detection frequency is over 97.5% for the entire network considering all sources and radionuclides. Network intensities ranged from 3.75% to 62.7%. Evaluation of individual samplers indicated some samplers were poorly situated and add little to the overall effectiveness of the network. As a result, using the frequency of detection methods, optimum sampler placements were simulated that could substantially improve the performance and efficiency of the network.« less

  8. Quantitative evaluation of an air-monitoring network using atmospheric transport modeling and frequency of detection methods

    DOE PAGES

    Rood, Arthur S.; Sondrup, A. Jeffrey; Ritter, Paul D.

    2016-04-01

    A methodology to quantify the performance of an air monitoring network in terms of frequency of detection has been developed. The methodology utilizes an atmospheric transport model to predict air concentrations of radionuclides at the samplers for a given release time and duration. Frequency of detection is defined as the fraction of “events” that result in a detection at either a single sampler or network of samplers. An “event” is defined as a release of finite duration that begins on a given day and hour of the year from a facility with the potential to emit airborne radionuclides. Another metricmore » of interest is the network intensity, which is defined as the fraction of samplers in the network that have a positive detection for a given event. The frequency of detection methodology allows for evaluation of short-term releases that include effects of short-term variability in meteorological conditions. The methodology was tested using the U.S. Department of Energy Idaho National Laboratory (INL) Site ambient air monitoring network consisting of 37 low-volume air samplers in 31 different locations covering a 17,630 km 2 region. Releases from six major INL facilities distributed over an area of 1,435 km 2 were modeled and included three stack sources and eight ground-level sources. A Lagrangian Puff air dispersion model (CALPUFF) was used to model atmospheric transport. The model was validated using historical 125Sb releases and measurements. Relevant one-week release quantities from each emission source were calculated based on a dose of 1.9 × 10 –4 mSv at a public receptor (0.01 mSv assuming release persists over a year). Important radionuclides considered include 241Am, 137Cs, 238Pu, 239Pu, 90Sr, and tritium. Results show the detection frequency is over 97.5% for the entire network considering all sources and radionuclides. Network intensities ranged from 3.75% to 62.7%. Evaluation of individual samplers indicated some samplers were poorly situated and add little to the overall effectiveness of the network. As a result, using the frequency of detection methods, optimum sampler placements were simulated that could substantially improve the performance and efficiency of the network.« less

  9. Community detection using preference networks

    NASA Astrophysics Data System (ADS)

    Tasgin, Mursel; Bingol, Haluk O.

    2018-04-01

    Community detection is the task of identifying clusters or groups of nodes in a network where nodes within the same group are more connected with each other than with nodes in different groups. It has practical uses in identifying similar functions or roles of nodes in many biological, social and computer networks. With the availability of very large networks in recent years, performance and scalability of community detection algorithms become crucial, i.e. if time complexity of an algorithm is high, it cannot run on large networks. In this paper, we propose a new community detection algorithm, which has a local approach and is able to run on large networks. It has a simple and effective method; given a network, algorithm constructs a preference network of nodes where each node has a single outgoing edge showing its preferred node to be in the same community with. In such a preference network, each connected component is a community. Selection of the preferred node is performed using similarity based metrics of nodes. We use two alternatives for this purpose which can be calculated in 1-neighborhood of nodes, i.e. number of common neighbors of selector node and its neighbors and, the spread capability of neighbors around the selector node which is calculated by the gossip algorithm of Lind et.al. Our algorithm is tested on both computer generated LFR networks and real-life networks with ground-truth community structure. It can identify communities accurately in a fast way. It is local, scalable and suitable for distributed execution on large networks.

  10. Context-aided analysis of community evolution in networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pallotta, Giuliana; Konjevod, Goran; Cadena, Jose

    Here, we are interested in detecting and analyzing global changes in dynamic networks (networks that evolve with time). More precisely, we consider changes in the activity distribution within the network, in terms of density (ie, edge existence) and intensity (ie, edge weight). Detecting change in local properties, as well as individual measurements or metrics, has been well studied and often reduces to traditional statistical process control. In contrast, detecting change in larger scale structure of the network is more challenging and not as well understood. We address this problem by proposing a framework for detecting change in network structure basedmore » on separate pieces: a probabilistic model for partitioning nodes by their behavior, a label-unswitching heuristic, and an approach to change detection for sequences of complex objects. We examine the performance of one instantiation of such a framework using mostly previously available pieces. The dataset we use for these investigations is the publicly available New York City Taxi and Limousine Commission dataset covering all taxi trips in New York City since 2009. Using it, we investigate the evolution of an ensemble of networks under different spatiotemporal resolutions. We identify the community structure by fitting a weighted stochastic block model. In conclusion, we offer insights on different node ranking and clustering methods, their ability to capture the rhythm of life in the Big Apple, and their potential usefulness in highlighting changes in the underlying network structure.« less

  11. Context-aided analysis of community evolution in networks

    DOE PAGES

    Pallotta, Giuliana; Konjevod, Goran; Cadena, Jose; ...

    2017-09-15

    Here, we are interested in detecting and analyzing global changes in dynamic networks (networks that evolve with time). More precisely, we consider changes in the activity distribution within the network, in terms of density (ie, edge existence) and intensity (ie, edge weight). Detecting change in local properties, as well as individual measurements or metrics, has been well studied and often reduces to traditional statistical process control. In contrast, detecting change in larger scale structure of the network is more challenging and not as well understood. We address this problem by proposing a framework for detecting change in network structure basedmore » on separate pieces: a probabilistic model for partitioning nodes by their behavior, a label-unswitching heuristic, and an approach to change detection for sequences of complex objects. We examine the performance of one instantiation of such a framework using mostly previously available pieces. The dataset we use for these investigations is the publicly available New York City Taxi and Limousine Commission dataset covering all taxi trips in New York City since 2009. Using it, we investigate the evolution of an ensemble of networks under different spatiotemporal resolutions. We identify the community structure by fitting a weighted stochastic block model. In conclusion, we offer insights on different node ranking and clustering methods, their ability to capture the rhythm of life in the Big Apple, and their potential usefulness in highlighting changes in the underlying network structure.« less

  12. Fault detection on a sewer network by a combination of a Kalman filter and a binary sequential probability ratio test

    NASA Astrophysics Data System (ADS)

    Piatyszek, E.; Voignier, P.; Graillot, D.

    2000-05-01

    One of the aims of sewer networks is the protection of population against floods and the reduction of pollution rejected to the receiving water during rainy events. To meet these goals, managers have to equip the sewer networks with and to set up real-time control systems. Unfortunately, a component fault (leading to intolerable behaviour of the system) or sensor fault (deteriorating the process view and disturbing the local automatism) makes the sewer network supervision delicate. In order to ensure an adequate flow management during rainy events it is essential to set up procedures capable of detecting and diagnosing these anomalies. This article introduces a real-time fault detection method, applicable to sewer networks, for the follow-up of rainy events. This method consists in comparing the sensor response with a forecast of this response. This forecast is provided by a model and more precisely by a state estimator: a Kalman filter. This Kalman filter provides not only a flow estimate but also an entity called 'innovation'. In order to detect abnormal operations within the network, this innovation is analysed with the binary sequential probability ratio test of Wald. Moreover, by crossing available information on several nodes of the network, a diagnosis of the detected anomalies is carried out. This method provided encouraging results during the analysis of several rains, on the sewer network of Seine-Saint-Denis County, France.

  13. Rate based failure detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, Brett Emery Trabun; Gamage, Thoshitha Thanushka; Bakken, David Edward

    This disclosure describes, in part, a system management component and failure detection component for use in a power grid data network to identify anomalies within the network and systematically adjust the quality of service of data published by publishers and subscribed to by subscribers within the network. In one implementation, subscribers may identify a desired data rate, a minimum acceptable data rate, desired latency, minimum acceptable latency and a priority for each subscription. The failure detection component may identify an anomaly within the network and a source of the anomaly. Based on the identified anomaly, data rates and or datamore » paths may be adjusted in real-time to ensure that the power grid data network does not become overloaded and/or fail.« less

  14. A light and faster regional convolutional neural network for object detection in optical remote sensing images

    NASA Astrophysics Data System (ADS)

    Ding, Peng; Zhang, Ye; Deng, Wei-Jian; Jia, Ping; Kuijper, Arjan

    2018-07-01

    Detection of objects from satellite optical remote sensing images is very important for many commercial and governmental applications. With the development of deep convolutional neural networks (deep CNNs), the field of object detection has seen tremendous advances. Currently, objects in satellite remote sensing images can be detected using deep CNNs. In general, optical remote sensing images contain many dense and small objects, and the use of the original Faster Regional CNN framework does not yield a suitably high precision. Therefore, after careful analysis we adopt dense convoluted networks, a multi-scale representation and various combinations of improvement schemes to enhance the structure of the base VGG16-Net for improving the precision. We propose an approach to reduce the test-time (detection time) and memory requirements. To validate the effectiveness of our approach, we perform experiments using satellite remote sensing image datasets of aircraft and automobiles. The results show that the improved network structure can detect objects in satellite optical remote sensing images more accurately and efficiently.

  15. Enhanced Detectability of Community Structure in Multilayer Networks through Layer Aggregation.

    PubMed

    Taylor, Dane; Shai, Saray; Stanley, Natalie; Mucha, Peter J

    2016-06-03

    Many systems are naturally represented by a multilayer network in which edges exist in multiple layers that encode different, but potentially related, types of interactions, and it is important to understand limitations on the detectability of community structure in these networks. Using random matrix theory, we analyze detectability limitations for multilayer (specifically, multiplex) stochastic block models (SBMs) in which L layers are derived from a common SBM. We study the effect of layer aggregation on detectability for several aggregation methods, including summation of the layers' adjacency matrices for which we show the detectability limit vanishes as O(L^{-1/2}) with increasing number of layers, L. Importantly, we find a similar scaling behavior when the summation is thresholded at an optimal value, providing insight into the common-but not well understood-practice of thresholding pairwise-interaction data to obtain sparse network representations.

  16. Optimization of neural network architecture using genetic programming improves detection and modeling of gene-gene interactions in studies of human diseases

    PubMed Central

    Ritchie, Marylyn D; White, Bill C; Parker, Joel S; Hahn, Lance W; Moore, Jason H

    2003-01-01

    Background Appropriate definition of neural network architecture prior to data analysis is crucial for successful data mining. This can be challenging when the underlying model of the data is unknown. The goal of this study was to determine whether optimizing neural network architecture using genetic programming as a machine learning strategy would improve the ability of neural networks to model and detect nonlinear interactions among genes in studies of common human diseases. Results Using simulated data, we show that a genetic programming optimized neural network approach is able to model gene-gene interactions as well as a traditional back propagation neural network. Furthermore, the genetic programming optimized neural network is better than the traditional back propagation neural network approach in terms of predictive ability and power to detect gene-gene interactions when non-functional polymorphisms are present. Conclusion This study suggests that a machine learning strategy for optimizing neural network architecture may be preferable to traditional trial-and-error approaches for the identification and characterization of gene-gene interactions in common, complex human diseases. PMID:12846935

  17. NMESys: An expert system for network fault detection

    NASA Technical Reports Server (NTRS)

    Nelson, Peter C.; Warpinski, Janet

    1991-01-01

    The problem of network management is becoming an increasingly difficult and challenging task. It is very common today to find heterogeneous networks consisting of many different types of computers, operating systems, and protocols. The complexity of implementing a network with this many components is difficult enough, while the maintenance of such a network is an even larger problem. A prototype network management expert system, NMESys, implemented in the C Language Integrated Production System (CLIPS). NMESys concentrates on solving some of the critical problems encountered in managing a large network. The major goal of NMESys is to provide a network operator with an expert system tool to quickly and accurately detect hard failures, potential failures, and to minimize or eliminate user down time in a large network.

  18. VMSoar: a cognitive agent for network security

    NASA Astrophysics Data System (ADS)

    Benjamin, David P.; Shankar-Iyer, Ranjita; Perumal, Archana

    2005-03-01

    VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration"s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from experience, the ability to solve a wide range of complex problems, and use of natural language to interact with humans. The approach used by VMSoar is very different from that taken by other vulnerability assessment or intrusion detection systems. VMSoar performs vulnerability assessments by using VMWare to create a virtual copy of the target machine then attacking the simulated machine with a wide assortment of exploits. VMSoar uses this same ability to perform intrusion detection. When trying to understand a sequence of network packets, VMSoar uses VMWare to make a virtual copy of the local portion of the network and then attempts to generate the observed packets on the simulated network by performing various exploits. This approach is initially slow, but VMSoar"s learning ability significantly speeds up both vulnerability assessment and intrusion detection. This paper describes the design and implementation of VMSoar, and initial experiments with Windows NT and XP.

  19. Overlapping Community Detection based on Network Decomposition

    NASA Astrophysics Data System (ADS)

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-04-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.

  20. A clustering algorithm for determining community structure in complex networks

    NASA Astrophysics Data System (ADS)

    Jin, Hong; Yu, Wei; Li, ShiJun

    2018-02-01

    Clustering algorithms are attractive for the task of community detection in complex networks. DENCLUE is a representative density based clustering algorithm which has a firm mathematical basis and good clustering properties allowing for arbitrarily shaped clusters in high dimensional datasets. However, this method cannot be directly applied to community discovering due to its inability to deal with network data. Moreover, it requires a careful selection of the density parameter and the noise threshold. To solve these issues, a new community detection method is proposed in this paper. First, we use a spectral analysis technique to map the network data into a low dimensional Euclidean Space which can preserve node structural characteristics. Then, DENCLUE is applied to detect the communities in the network. A mathematical method named Sheather-Jones plug-in is chosen to select the density parameter which can describe the intrinsic clustering structure accurately. Moreover, every node on the network is meaningful so there were no noise nodes as a result the noise threshold can be ignored. We test our algorithm on both benchmark and real-life networks, and the results demonstrate the effectiveness of our algorithm over other popularity density based clustering algorithms adopted to community detection.

  1. Hearing, feeling or seeing a beat recruits a supramodal network in the auditory dorsal stream.

    PubMed

    Araneda, Rodrigo; Renier, Laurent; Ebner-Karestinos, Daniela; Dricot, Laurence; De Volder, Anne G

    2017-06-01

    Hearing a beat recruits a wide neural network that involves the auditory cortex and motor planning regions. Perceiving a beat can potentially be achieved via vision or even touch, but it is currently not clear whether a common neural network underlies beat processing. Here, we used functional magnetic resonance imaging (fMRI) to test to what extent the neural network involved in beat processing is supramodal, that is, is the same in the different sensory modalities. Brain activity changes in 27 healthy volunteers were monitored while they were attending to the same rhythmic sequences (with and without a beat) in audition, vision and the vibrotactile modality. We found a common neural network for beat detection in the three modalities that involved parts of the auditory dorsal pathway. Within this network, only the putamen and the supplementary motor area (SMA) showed specificity to the beat, while the brain activity in the putamen covariated with the beat detection speed. These results highlighted the implication of the auditory dorsal stream in beat detection, confirmed the important role played by the putamen in beat detection and indicated that the neural network for beat detection is mostly supramodal. This constitutes a new example of convergence of the same functional attributes into one centralized representation in the brain. © 2016 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  2. Multi-target Detection, Tracking, and Data Association on Road Networks Using Unmanned Aerial Vehicles

    NASA Astrophysics Data System (ADS)

    Barkley, Brett E.

    A cooperative detection and tracking algorithm for multiple targets constrained to a road network is presented for fixed-wing Unmanned Air Vehicles (UAVs) with a finite field of view. Road networks of interest are formed into graphs with nodes that indicate the target likelihood ratio (before detection) and position probability (after detection). A Bayesian likelihood ratio tracker recursively assimilates target observations until the cumulative observations at a particular location pass a detection criterion. At this point, a target is considered detected and a position probability is generated for the target on the graph. Data association is subsequently used to route future measurements to update the likelihood ratio tracker (for undetected target) or to update a position probability (a previously detected target). Three strategies for motion planning of UAVs are proposed to balance searching for new targets with tracking known targets for a variety of scenarios. Performance was tested in Monte Carlo simulations for a variety of mission parameters, including tracking on road networks with varying complexity and using UAVs at various altitudes.

  3. A framework for detecting communities of unbalanced sizes in networks

    NASA Astrophysics Data System (ADS)

    Žalik, Krista Rizman; Žalik, Borut

    2018-01-01

    Community detection in large networks has been a focus of recent research in many of fields, including biology, physics, social sciences, and computer science. Most community detection methods partition the entire network into communities, groups of nodes that have many connections within communities and few connections between them and do not identify different roles that nodes can have in communities. We propose a community detection model that integrates more different measures that can fast identify communities of different sizes and densities. We use node degree centrality, strong similarity with one node from community, maximal similarity of node to community, compactness of communities and separation between communities. Each measure has its own strength and weakness. Thus, combining different measures can benefit from the strengths of each one and eliminate encountered problems of using an individual measure. We present a fast local expansion algorithm for uncovering communities of different sizes and densities and reveals rich information on input networks. Experimental results show that the proposed algorithm is better or as effective as the other community detection algorithms for both real-world and synthetic networks while it requires less time.

  4. Joint Sensing/Sampling Optimization for Surface Drifting Mine Detection with High-Resolution Drift Model

    DTIC Science & Technology

    2012-09-01

    as potential tools for large area detection coverage while being moderately inexpensive (Wettergren, Performance of Search via Track - Before - Detect for...via Track - Before - Detect for Distribute 34 Sensor Networks, 2008). These statements highlight three specific needs to further sensor network research...Bay hydrography. Journal of Marine Systems, 12, 221–236. Wettergren, T. A. (2008). Performance of search via track - before - detect for distributed

  5. Android malware detection based on evolutionary super-network

    NASA Astrophysics Data System (ADS)

    Yan, Haisheng; Peng, Lingling

    2018-04-01

    In the paper, an android malware detection method based on evolutionary super-network is proposed in order to improve the precision of android malware detection. Chi square statistics method is used for selecting characteristics on the basis of analyzing android authority. Boolean weighting is utilized for calculating characteristic weight. Processed characteristic vector is regarded as the system training set and test set; hyper edge alternative strategy is used for training super-network classification model, thereby classifying test set characteristic vectors, and it is compared with traditional classification algorithm. The results show that the detection method proposed in the paper is close to or better than traditional classification algorithm. The proposed method belongs to an effective Android malware detection means.

  6. Anomaly detection of turbopump vibration in Space Shuttle Main Engine using statistics and neural networks

    NASA Technical Reports Server (NTRS)

    Lo, C. F.; Wu, K.; Whitehead, B. A.

    1993-01-01

    The statistical and neural networks methods have been applied to investigate the feasibility in detecting anomalies in turbopump vibration of SSME. The anomalies are detected based on the amplitude of peaks of fundamental and harmonic frequencies in the power spectral density. These data are reduced to the proper format from sensor data measured by strain gauges and accelerometers. Both methods are feasible to detect the vibration anomalies. The statistical method requires sufficient data points to establish a reasonable statistical distribution data bank. This method is applicable for on-line operation. The neural networks method also needs to have enough data basis to train the neural networks. The testing procedure can be utilized at any time so long as the characteristics of components remain unchanged.

  7. Power to Detect Intervention Effects on Ensembles of Social Networks

    ERIC Educational Resources Information Center

    Sweet, Tracy M.; Junker, Brian W.

    2016-01-01

    The hierarchical network model (HNM) is a framework introduced by Sweet, Thomas, and Junker for modeling interventions and other covariate effects on ensembles of social networks, such as what would be found in randomized controlled trials in education research. In this article, we develop calculations for the power to detect an intervention…

  8. Detection of Oil Chestnuts Infected by Blue Mold Using Near-Infrared Hyperspectral Imaging Combined with Artificial Neural Networks.

    PubMed

    Feng, Lei; Zhu, Susu; Lin, Fucheng; Su, Zhenzhu; Yuan, Kangpei; Zhao, Yiying; He, Yong; Zhang, Chu

    2018-06-15

    Mildew damage is a major reason for chestnut poor quality and yield loss. In this study, a near-infrared hyperspectral imaging system in the 874⁻1734 nm spectral range was applied to detect the mildew damage to chestnuts caused by blue mold. Principal component analysis (PCA) scored images were firstly employed to qualitatively and intuitively distinguish moldy chestnuts from healthy chestnuts. Spectral data were extracted from the hyperspectral images. A successive projections algorithm (SPA) was used to select 12 optimal wavelengths. Artificial neural networks, including back propagation neural network (BPNN), evolutionary neural network (ENN), extreme learning machine (ELM), general regression neural network (GRNN) and radial basis neural network (RBNN) were used to build models using the full spectra and optimal wavelengths to distinguish moldy chestnuts. BPNN and ENN models using full spectra and optimal wavelengths obtained satisfactory performances, with classification accuracies all surpassing 99%. The results indicate the potential for the rapid and non-destructive detection of moldy chestnuts by hyperspectral imaging, which would help to develop online detection system for healthy and blue mold infected chestnuts.

  9. Improving Earth/Prediction Models to Improve Network Processing

    NASA Astrophysics Data System (ADS)

    Wagner, G. S.

    2017-12-01

    The United States Atomic Energy Detection System (USAEDS) primaryseismic network consists of a relatively small number of arrays andthree-component stations. The relatively small number of stationsin the USAEDS primary network make it both necessary and feasibleto optimize both station and network processing.Station processing improvements include detector tuning effortsthat use Receiver Operator Characteristic (ROC) curves to helpjudiciously set acceptable Type 1 (false) vs. Type 2 (miss) errorrates. Other station processing improvements include the use ofempirical/historical observations and continuous background noisemeasurements to compute time-varying, maximum likelihood probabilityof detection thresholds.The USAEDS network processing software makes extensive use of theazimuth and slowness information provided by frequency-wavenumberanalysis at array sites, and polarization analysis at three-componentsites. Most of the improvements in USAEDS network processing aredue to improvements in the models used to predict azimuth, slowness,and probability of detection. Kriged travel-time, azimuth andslowness corrections-and associated uncertainties-are computedusing a ground truth database. Improvements in station processingand the use of improved models for azimuth, slowness, and probabilityof detection have led to significant improvements in USADES networkprocessing.

  10. SA-SOM algorithm for detecting communities in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Luogeng; Wang, Yanran; Huang, Xiaoming; Hu, Mengyu; Hu, Fang

    2017-10-01

    Currently, community detection is a hot topic. This paper, based on the self-organizing map (SOM) algorithm, introduced the idea of self-adaptation (SA) that the number of communities can be identified automatically, a novel algorithm SA-SOM of detecting communities in complex networks is proposed. Several representative real-world networks and a set of computer-generated networks by LFR-benchmark are utilized to verify the accuracy and the efficiency of this algorithm. The experimental findings demonstrate that this algorithm can identify the communities automatically, accurately and efficiently. Furthermore, this algorithm can also acquire higher values of modularity, NMI and density than the SOM algorithm does.

  11. Dense module enumeration in biological networks

    NASA Astrophysics Data System (ADS)

    Tsuda, Koji; Georgii, Elisabeth

    2009-12-01

    Analysis of large networks is a central topic in various research fields including biology, sociology, and web mining. Detection of dense modules (a.k.a. clusters) is an important step to analyze the networks. Though numerous methods have been proposed to this aim, they often lack mathematical rigorousness. Namely, there is no guarantee that all dense modules are detected. Here, we present a novel reverse-search-based method for enumerating all dense modules. Furthermore, constraints from additional data sources such as gene expression profiles or customer profiles can be integrated, so that we can systematically detect dense modules with interesting profiles. We report successful applications in human protein interaction network analyses.

  12. Automated detection of geological landforms on Mars using Convolutional Neural Networks

    NASA Astrophysics Data System (ADS)

    Palafox, Leon F.; Hamilton, Christopher W.; Scheidt, Stephen P.; Alvarez, Alexander M.

    2017-04-01

    The large volume of high-resolution images acquired by the Mars Reconnaissance Orbiter has opened a new frontier for developing automated approaches to detecting landforms on the surface of Mars. However, most landform classifiers focus on crater detection, which represents only one of many geological landforms of scientific interest. In this work, we use Convolutional Neural Networks (ConvNets) to detect both volcanic rootless cones and transverse aeolian ridges. Our system, named MarsNet, consists of five networks, each of which is trained to detect landforms of different sizes. We compare our detection algorithm with a widely used method for image recognition, Support Vector Machines (SVMs) using Histogram of Oriented Gradients (HOG) features. We show that ConvNets can detect a wide range of landforms and has better accuracy and recall in testing data than traditional classifiers based on SVMs.

  13. Automated detection of geological landforms on Mars using Convolutional Neural Networks.

    PubMed

    Palafox, Leon F; Hamilton, Christopher W; Scheidt, Stephen P; Alvarez, Alexander M

    2017-04-01

    The large volume of high-resolution images acquired by the Mars Reconnaissance Orbiter has opened a new frontier for developing automated approaches to detecting landforms on the surface of Mars. However, most landform classifiers focus on crater detection, which represents only one of many geological landforms of scientific interest. In this work, we use Convolutional Neural Networks (ConvNets) to detect both volcanic rootless cones and transverse aeolian ridges. Our system, named MarsNet, consists of five networks, each of which is trained to detect landforms of different sizes. We compare our detection algorithm with a widely used method for image recognition, Support Vector Machines (SVMs) using Histogram of Oriented Gradients (HOG) features. We show that ConvNets can detect a wide range of landforms and has better accuracy and recall in testing data than traditional classifiers based on SVMs.

  14. Statistical Traffic Anomaly Detection in Time-Varying Communication Networks

    DTIC Science & Technology

    2015-02-01

    methods perform better than their vanilla counterparts, which assume that normal traffic is stationary. Statistical Traffic Anomaly Detection in Time...our methods perform better than their vanilla counterparts, which assume that normal traffic is stationary. Index Terms—Statistical anomaly detection...anomaly detection but also for understanding the normal traffic in time-varying networks. C. Comparison with vanilla stochastic methods For both types

  15. Statistical Traffic Anomaly Detection in Time Varying Communication Networks

    DTIC Science & Technology

    2015-02-01

    methods perform better than their vanilla counterparts, which assume that normal traffic is stationary. Statistical Traffic Anomaly Detection in Time...our methods perform better than their vanilla counterparts, which assume that normal traffic is stationary. Index Terms—Statistical anomaly detection...anomaly detection but also for understanding the normal traffic in time-varying networks. C. Comparison with vanilla stochastic methods For both types

  16. A source-attractor approach to network detection of radiation sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Qishi; Barry, M. L..; Grieme, M.

    Radiation source detection using a network of detectors is an active field of research for homeland security and defense applications. We propose Source-attractor Radiation Detection (SRD) method to aggregate measurements from a network of detectors for radiation source detection. SRD method models a potential radiation source as a magnet -like attractor that pulls in pre-computed virtual points from the detector locations. A detection decision is made if a sufficient level of attraction, quantified by the increase in the clustering of the shifted virtual points, is observed. Compared with traditional methods, SRD has the following advantages: i) it does not requiremore » an accurate estimate of the source location from limited and noise-corrupted sensor readings, unlike the localizationbased methods, and ii) its virtual point shifting and clustering calculation involve simple arithmetic operations based on the number of detectors, avoiding the high computational complexity of grid-based likelihood estimation methods. We evaluate its detection performance using canonical datasets from Domestic Nuclear Detection Office s (DNDO) Intelligence Radiation Sensors Systems (IRSS) tests. SRD achieves both lower false alarm rate and false negative rate compared to three existing algorithms for network source detection.« less

  17. RPT: A Low Overhead Single-End Probing Tool for Detecting Network Congestion Positions

    DTIC Science & Technology

    2003-12-20

    complete evaluation on the Internet , we need to know the real available bandwidth on all the links of a network path. But that information is hard to...School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Abstract Detecting the points of network congestion is an intriguing...research problem, because this infor- mation can benefit both regular network users and Internet Service Providers. This is also a highly challenging

  18. Proof of Concept in Disrupted Tactical Networking

    DTIC Science & Technology

    2017-09-01

    because of the risk of detection. In this study , we design projectile-based mesh networking prototypes as one potential type of short-living network...to communicate because of the risk of detection. In this study , we design projectile-based mesh networking prototypes as one potential type of short...reader with a background in systems-theory. This study is designed using systems theory and uses systems theory as a lens through which to observe

  19. Angle of Arrival Detection Through Artificial Neural Network Analysis of Optical Fiber Intensity Patterns

    DTIC Science & Technology

    1990-12-01

    ARTIFICIAL NEURAL NETWORK ANALYSIS OF OPTICAL FIBER INTENSITY PATTERNS THESIS Scott Thomas Captain, USAF AFIT/GE/ENG/90D-62 DTIC...ELECTE ao • JAN08 1991 Approved for public release; distribution unlimited. AFIT/GE/ENG/90D-62 ANGLE OF ARRIVAL DETECTION THROUGH ARTIFICIAL NEURAL NETWORK ANALYSIS... ARTIFICIAL NEURAL NETWORK ANALYSIS OF OPTICAL FIBER INTENSITY PATTERNS L Introduction The optical sensors of United States Air Force reconnaissance

  20. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.

    PubMed

    Sarafijanović, Slavisa; Le Boudec, Jean-Yves

    2005-09-01

    In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.

  1. An approach to online network monitoring using clustered patterns

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kim, Jinoh; Sim, Alex; Suh, Sang C.

    Network traffic monitoring is a core element in network operations and management for various purposes such as anomaly detection, change detection, and fault/failure detection. In this study, we introduce a new approach to online monitoring using a pattern-based representation of the network traffic. Unlike the past online techniques limited to a single variable to summarize (e.g., sketch), the focus of this study is on capturing the network state from the multivariate attributes under consideration. To this end, we employ clustering with its benefit of the aggregation of multidimensional variables. The clustered result represents the state of the network with regardmore » to the monitored variables, which can also be compared with the previously observed patterns visually and quantitatively. Finally, we demonstrate the proposed method with two popular use cases, one for estimating state changes and the other for identifying anomalous states, to confirm its feasibility.« less

  2. Ant colony clustering with fitness perception and pheromone diffusion for community detection in complex networks

    NASA Astrophysics Data System (ADS)

    Ji, Junzhong; Song, Xiangjing; Liu, Chunnian; Zhang, Xiuzhen

    2013-08-01

    Community structure detection in complex networks has been intensively investigated in recent years. In this paper, we propose an adaptive approach based on ant colony clustering to discover communities in a complex network. The focus of the method is the clustering process of an ant colony in a virtual grid, where each ant represents a node in the complex network. During the ant colony search, the method uses a new fitness function to percept local environment and employs a pheromone diffusion model as a global information feedback mechanism to realize information exchange among ants. A significant advantage of our method is that the locations in the grid environment and the connections of the complex network structure are simultaneously taken into account in ants moving. Experimental results on computer-generated and real-world networks show the capability of our method to successfully detect community structures.

  3. Computational cost for detecting inspiralling binaries using a network of laser interferometric detectors

    NASA Astrophysics Data System (ADS)

    Pai, Archana; Bose, Sukanta; Dhurandhar, Sanjeev

    2002-04-01

    We extend a coherent network data-analysis strategy developed earlier for detecting Newtonian waveforms to the case of post-Newtonian (PN) waveforms. Since the PN waveform depends on the individual masses of the inspiralling binary, the parameter-space dimension increases by one from that of the Newtonian case. We obtain the number of templates and estimate the computational costs for PN waveforms: for a lower mass limit of 1Msolar, for LIGO-I noise and with 3% maximum mismatch, the online computational speed requirement for single detector is a few Gflops; for a two-detector network it is hundreds of Gflops and for a three-detector network it is tens of Tflops. Apart from idealistic networks, we obtain results for realistic networks comprising of LIGO and VIRGO. Finally, we compare costs incurred in a coincidence detection strategy with those incurred in the coherent strategy detailed above.

  4. Utilizing Weak Indicators to Detect Anomalous Behaviors in Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Egid, Adin

    We consider the use of a novel weak in- dicator alongside more commonly used weak indicators to help detect anomalous behavior in a large computer network. The data of the network which we are studying in this research paper concerns remote log-in information (Virtual Private Network, or VPN sessions) from the internal network of Los Alamos National Laboratory (LANL). The novel indicator we are utilizing is some- thing which, while novel in its application to data science/cyber security research, is a concept borrowed from the business world. The Her ndahl-Hirschman Index (HHI) is a computationally trivial index which provides amore » useful heuristic for regulatory agencies to ascertain the relative competitiveness of a particular industry. Using this index as a lagging indicator in the monthly format we have studied could help to detect anomalous behavior by a particular or small set of users on the network.« less

  5. An approach to online network monitoring using clustered patterns

    DOE PAGES

    Kim, Jinoh; Sim, Alex; Suh, Sang C.; ...

    2017-03-13

    Network traffic monitoring is a core element in network operations and management for various purposes such as anomaly detection, change detection, and fault/failure detection. In this study, we introduce a new approach to online monitoring using a pattern-based representation of the network traffic. Unlike the past online techniques limited to a single variable to summarize (e.g., sketch), the focus of this study is on capturing the network state from the multivariate attributes under consideration. To this end, we employ clustering with its benefit of the aggregation of multidimensional variables. The clustered result represents the state of the network with regardmore » to the monitored variables, which can also be compared with the previously observed patterns visually and quantitatively. Finally, we demonstrate the proposed method with two popular use cases, one for estimating state changes and the other for identifying anomalous states, to confirm its feasibility.« less

  6. Progress towards an AIS early detection monitoring network for the Great Lakes

    EPA Science Inventory

    As an invasion prone location, the lower St. Louis River system (SLR) has been a case study for ongoing research to develop the framework for a practical Great Lakes monitoring network for early detection of aquatic invasive species (AIS). Early detection, however, necessitates f...

  7. Automated Network Anomaly Detection with Learning, Control and Mitigation

    ERIC Educational Resources Information Center

    Ippoliti, Dennis

    2014-01-01

    Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…

  8. Artificial-neural-network-based failure detection and isolation

    NASA Astrophysics Data System (ADS)

    Sadok, Mokhtar; Gharsalli, Imed; Alouani, Ali T.

    1998-03-01

    This paper presents the design of a systematic failure detection and isolation system that uses the concept of failure sensitive variables (FSV) and artificial neural networks (ANN). The proposed approach was applied to tube leak detection in a utility boiler system. Results of the experimental testing are presented in the paper.

  9. Detection of IED Emplacement in Urban Environments

    DTIC Science & Technology

    2008-09-01

    confidence is achieved in the prediction. The scope of this thesis will be to conduct various experiments using wireless sensor network motes to detect the...A wireless sensor network configured with proper equipment provides useful results for detecting IEDs and shows potential for correctly predicting behavior associated personnel carrying IED material.

  10. Discriminative Cooperative Networks for Detecting Phase Transitions

    NASA Astrophysics Data System (ADS)

    Liu, Ye-Hua; van Nieuwenburg, Evert P. L.

    2018-04-01

    The classification of states of matter and their corresponding phase transitions is a special kind of machine-learning task, where physical data allow for the analysis of new algorithms, which have not been considered in the general computer-science setting so far. Here we introduce an unsupervised machine-learning scheme for detecting phase transitions with a pair of discriminative cooperative networks (DCNs). In this scheme, a guesser network and a learner network cooperate to detect phase transitions from fully unlabeled data. The new scheme is efficient enough for dealing with phase diagrams in two-dimensional parameter spaces, where we can utilize an active contour model—the snake—from computer vision to host the two networks. The snake, with a DCN "brain," moves and learns actively in the parameter space, and locates phase boundaries automatically.

  11. The ground truth about metadata and community detection in networks

    PubMed Central

    Peel, Leto; Larremore, Daniel B.; Clauset, Aaron

    2017-01-01

    Across many scientific domains, there is a common need to automatically extract a simplified view or coarse-graining of how a complex system’s components interact. This general task is called community detection in networks and is analogous to searching for clusters in independent vector data. It is common to evaluate the performance of community detection algorithms by their ability to find so-called ground truth communities. This works well in synthetic networks with planted communities because these networks’ links are formed explicitly based on those known communities. However, there are no planted communities in real-world networks. Instead, it is standard practice to treat some observed discrete-valued node attributes, or metadata, as ground truth. We show that metadata are not the same as ground truth and that treating them as such induces severe theoretical and practical problems. We prove that no algorithm can uniquely solve community detection, and we prove a general No Free Lunch theorem for community detection, which implies that there can be no algorithm that is optimal for all possible community detection tasks. However, community detection remains a powerful tool and node metadata still have value, so a careful exploration of their relationship with network structure can yield insights of genuine worth. We illustrate this point by introducing two statistical techniques that can quantify the relationship between metadata and community structure for a broad class of models. We demonstrate these techniques using both synthetic and real-world networks, and for multiple types of metadata and community structures. PMID:28508065

  12. CHARACTERIZATION OF THE COMPLETE FIBER NETWORK TOPOLOGY OF PLANAR FIBROUS TISSUES AND SCAFFOLDS

    PubMed Central

    D'Amore, Antonio; Stella, John A.; Wagner, William R.; Sacks, Michael S.

    2010-01-01

    Understanding how engineered tissue scaffold architecture affects cell morphology, metabolism, phenotypic expression, as well as predicting material mechanical behavior have recently received increased attention. In the present study, an image-based analysis approach that provides an automated tool to characterize engineered tissue fiber network topology is presented. Micro-architectural features that fully defined fiber network topology were detected and quantified, which include fiber orientation, connectivity, intersection spatial density, and diameter. Algorithm performance was tested using scanning electron microscopy (SEM) images of electrospun poly(ester urethane)urea (ES-PEUU) scaffolds. SEM images of rabbit mesenchymal stem cell (MSC) seeded collagen gel scaffolds and decellularized rat carotid arteries were also analyzed to further evaluate the ability of the algorithm to capture fiber network morphology regardless of scaffold type and the evaluated size scale. The image analysis procedure was validated qualitatively and quantitatively, comparing fiber network topology manually detected by human operators (n=5) with that automatically detected by the algorithm. Correlation values between manual detected and algorithm detected results for the fiber angle distribution and for the fiber connectivity distribution were 0.86 and 0.93 respectively. Algorithm detected fiber intersections and fiber diameter values were comparable (within the mean ± standard deviation) with those detected by human operators. This automated approach identifies and quantifies fiber network morphology as demonstrated for three relevant scaffold types and provides a means to: (1) guarantee objectivity, (2) significantly reduce analysis time, and (3) potentiate broader analysis of scaffold architecture effects on cell behavior and tissue development both in vitro and in vivo. PMID:20398930

  13. Anomalous Signal Detection in ELF Band Electromagnetic Wave using Multi-layer Neural Network with Wavelet Decomposition

    NASA Astrophysics Data System (ADS)

    Itai, Akitoshi; Yasukawa, Hiroshi; Takumi, Ichi; Hata, Masayasu

    It is well known that electromagnetic waves radiated from the earth's crust are useful for predicting earthquakes. We analyze the electromagnetic waves received at the extremely low frequency band of 223Hz. These observed signals contain the seismic radiation from the earth's crust, but also include several undesired signals. Our research focuses on the signal detection technique to identify an anomalous signal corresponding to the seismic radiation in the observed signal. Conventional anomalous signal detections lack a wide applicability due to their assumptions, e.g. the digital data have to be observed at the same time or the same sensor. In order to overcome the limitation related to the observed signal, we proposed the anomalous signals detection based on a multi-layer neural network which is trained by digital data observed during a span of a day. In the neural network approach, training data do not need to be recorded at the same place or the same time. However, some noises, which have a large amplitude, are detected as the anomalous signal. This paper develops a multi-layer neural network to decrease the false detection of the anomalous signal from the electromagnetic wave. The training data for the proposed network is the decomposed signal of the observed signal during several days, since the seismic radiations are often recorded from several days to a couple of weeks. Results show that the proposed neural network is useful to achieve the accurate detection of the anomalous signal that indicates seismic activity.

  14. Towards Online Multiresolution Community Detection in Large-Scale Networks

    PubMed Central

    Huang, Jianbin; Sun, Heli; Liu, Yaguang; Song, Qinbao; Weninger, Tim

    2011-01-01

    The investigation of community structure in networks has aroused great interest in multiple disciplines. One of the challenges is to find local communities from a starting vertex in a network without global information about the entire network. Many existing methods tend to be accurate depending on a priori assumptions of network properties and predefined parameters. In this paper, we introduce a new quality function of local community and present a fast local expansion algorithm for uncovering communities in large-scale networks. The proposed algorithm can detect multiresolution community from a source vertex or communities covering the whole network. Experimental results show that the proposed algorithm is efficient and well-behaved in both real-world and synthetic networks. PMID:21887325

  15. Holographic neural networks versus conventional neural networks: a comparative evaluation for the classification of landmine targets in ground-penetrating radar images

    NASA Astrophysics Data System (ADS)

    Mudigonda, Naga R.; Kacelenga, Ray; Edwards, Mark

    2004-09-01

    This paper evaluates the performance of a holographic neural network in comparison with a conventional feedforward backpropagation neural network for the classification of landmine targets in ground penetrating radar images. The data used in the study was acquired from four different test sites using the landmine detection system developed by General Dynamics Canada Ltd., in collaboration with the Defense Research and Development Canada, Suffield. A set of seven features extracted for each detected alarm is used as stimulus inputs for the networks. The recall responses of the networks are then evaluated against the ground truth to declare true or false detections. The area computed under the receiver operating characteristic curve is used for comparative purposes. With a large dataset comprising of data from multiple sites, both the holographic and conventional networks showed comparable trends in recall accuracies with area values of 0.88 and 0.87, respectively. By using independent validation datasets, the holographic network"s generalization performance was observed to be better (mean area = 0.86) as compared to the conventional network (mean area = 0.82). Despite the widely publicized theoretical advantages of the holographic technology, use of more than the required number of cortical memory elements resulted in an over-fitting phenomenon of the holographic network.

  16. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  17. Network hydraulics inclusion in water quality event detection using multiple sensor stations data.

    PubMed

    Oliker, Nurit; Ostfeld, Avi

    2015-09-01

    Event detection is one of the current most challenging topics in water distribution systems analysis: how regular on-line hydraulic (e.g., pressure, flow) and water quality (e.g., pH, residual chlorine, turbidity) measurements at different network locations can be efficiently utilized to detect water quality contamination events. This study describes an integrated event detection model which combines multiple sensor stations data with network hydraulics. To date event detection modelling is likely limited to single sensor station location and dataset. Single sensor station models are detached from network hydraulics insights and as a result might be significantly exposed to false positive alarms. This work is aimed at decreasing this limitation through integrating local and spatial hydraulic data understanding into an event detection model. The spatial analysis complements the local event detection effort through discovering events with lower signatures by exploring the sensors mutual hydraulic influences. The unique contribution of this study is in incorporating hydraulic simulation information into the overall event detection process of spatially distributed sensors. The methodology is demonstrated on two example applications using base runs and sensitivity analyses. Results show a clear advantage of the suggested model over single-sensor event detection schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Adaptive multi-resolution Modularity for detecting communities in networks

    NASA Astrophysics Data System (ADS)

    Chen, Shi; Wang, Zhi-Zhong; Bao, Mei-Hua; Tang, Liang; Zhou, Ji; Xiang, Ju; Li, Jian-Ming; Yi, Chen-He

    2018-02-01

    Community structure is a common topological property of complex networks, which attracted much attention from various fields. Optimizing quality functions for community structures is a kind of popular strategy for community detection, such as Modularity optimization. Here, we introduce a general definition of Modularity, by which several classical (multi-resolution) Modularity can be derived, and then propose a kind of adaptive (multi-resolution) Modularity that can combine the advantages of different Modularity. By applying the Modularity to various synthetic and real-world networks, we study the behaviors of the methods, showing the validity and advantages of the multi-resolution Modularity in community detection. The adaptive Modularity, as a kind of multi-resolution method, can naturally solve the first-type limit of Modularity and detect communities at different scales; it can quicken the disconnecting of communities and delay the breakup of communities in heterogeneous networks; and thus it is expected to generate the stable community structures in networks more effectively and have stronger tolerance against the second-type limit of Modularity.

  19. Pre-Scheduled and Self Organized Sleep-Scheduling Algorithms for Efficient K-Coverage in Wireless Sensor Networks

    PubMed Central

    Hwang, I-Shyan

    2017-01-01

    The K-coverage configuration that guarantees coverage of each location by at least K sensors is highly popular and is extensively used to monitor diversified applications in wireless sensor networks. Long network lifetime and high detection quality are the essentials of such K-covered sleep-scheduling algorithms. However, the existing sleep-scheduling algorithms either cause high cost or cannot preserve the detection quality effectively. In this paper, the Pre-Scheduling-based K-coverage Group Scheduling (PSKGS) and Self-Organized K-coverage Scheduling (SKS) algorithms are proposed to settle the problems in the existing sleep-scheduling algorithms. Simulation results show that our pre-scheduled-based KGS approach enhances the detection quality and network lifetime, whereas the self-organized-based SKS algorithm minimizes the computation and communication cost of the nodes and thereby is energy efficient. Besides, SKS outperforms PSKGS in terms of network lifetime and detection quality as it is self-organized. PMID:29257078

  20. Adaptively Adjusted Event-Triggering Mechanism on Fault Detection for Networked Control Systems.

    PubMed

    Wang, Yu-Long; Lim, Cheng-Chew; Shi, Peng

    2016-12-08

    This paper studies the problem of adaptively adjusted event-triggering mechanism-based fault detection for a class of discrete-time networked control system (NCS) with applications to aircraft dynamics. By taking into account the fault occurrence detection progress and the fault occurrence probability, and introducing an adaptively adjusted event-triggering parameter, a novel event-triggering mechanism is proposed to achieve the efficient utilization of the communication network bandwidth. Both the sensor-to-control station and the control station-to-actuator network-induced delays are taken into account. The event-triggered sensor and the event-triggered control station are utilized simultaneously to establish new network-based closed-loop models for the NCS subject to faults. Based on the established models, the event-triggered simultaneous design of fault detection filter (FDF) and controller is presented. A new algorithm for handling the adaptively adjusted event-triggering parameter is proposed. Performance analysis verifies the effectiveness of the adaptively adjusted event-triggering mechanism, and the simultaneous design of FDF and controller.

  1. Supervised machine learning on a network scale: application to seismic event classification and detection

    NASA Astrophysics Data System (ADS)

    Reynen, Andrew; Audet, Pascal

    2017-09-01

    A new method using a machine learning technique is applied to event classification and detection at seismic networks. This method is applicable to a variety of network sizes and settings. The algorithm makes use of a small catalogue of known observations across the entire network. Two attributes, the polarization and frequency content, are used as input to regression. These attributes are extracted at predicted arrival times for P and S waves using only an approximate velocity model, as attributes are calculated over large time spans. This method of waveform characterization is shown to be able to distinguish between blasts and earthquakes with 99 per cent accuracy using a network of 13 stations located in Southern California. The combination of machine learning with generalized waveform features is further applied to event detection in Oklahoma, United States. The event detection algorithm makes use of a pair of unique seismic phases to locate events, with a precision directly related to the sampling rate of the generalized waveform features. Over a week of data from 30 stations in Oklahoma, United States are used to automatically detect 25 times more events than the catalogue of the local geological survey, with a false detection rate of less than 2 per cent. This method provides a highly confident way of detecting and locating events. Furthermore, a large number of seismic events can be automatically detected with low false alarm, allowing for a larger automatic event catalogue with a high degree of trust.

  2. An AIEE fluorescent supramolecular cross-linked polymer network based on pillar[5]arene host-guest recognition: construction and application in explosive detection.

    PubMed

    Shao, Li; Sun, Jifu; Hua, Bin; Huang, Feihe

    2018-05-08

    Here a novel fluorescent supramolecular cross-linked polymer network with aggregation induced enhanced emission (AIEE) properties was constructed via pillar[5]arene-based host-guest recognition. Furthermore, the supramolecular polymer network can be used for explosive detection in both solution and thin films.

  3. Coherent ambient infrasound recorded by the global IMS network

    NASA Astrophysics Data System (ADS)

    Matoza, R. S.; Landes, M.; Le Pichon, A.; Ceranna, L.; Brown, D.

    2011-12-01

    The International Monitoring System (IMS) includes a global network of infrasound arrays, which is designed to detect atmospheric nuclear explosions anywhere on the planet. The infrasound network also has potential application in detection of natural hazards such as large volcanic explosions and severe weather. Ambient noise recorded by the network includes incoherent wind noise and coherent infrasound. We present a statistical analysis of coherent infrasound recorded by the IMS network. We have applied broadband (0.01 to 5 Hz) array processing systematically to the multi-year IMS historical dataset (2005-present) using an implementation of the Progressive Multi-Channel Correlation (PMCC) algorithm in log-frequency space. We show that IMS arrays consistently record coherent ambient infrasound across the broad frequency range from 0.01 to 5 Hz when wind-noise levels permit. Multi-year averaging of PMCC detection bulletins emphasizes continuous signals such as oceanic microbaroms, as well as persistent transient signals such as repetitive volcanic, surf, or anthropogenic activity (e.g., mining or industrial activity). While many of these continuous or repetitive signals are of interest in their own right, they may dominate IMS array detection bulletins and obscure or complicate detection of specific signals of interest. The new PMCC detection bulletins have numerous further applications, including in volcano and microbarom studies, and in IMS data quality assessment.

  4. Regulation of zebrafish heart regeneration by miR-133.

    PubMed

    Yin, Viravuth P; Lepilina, Alexandra; Smith, Ashley; Poss, Kenneth D

    2012-05-15

    Zebrafish regenerate cardiac muscle after severe injuries through the activation and proliferation of spared cardiomyocytes. Little is known about factors that control these events. Here we investigated the extent to which miRNAs regulate zebrafish heart regeneration. Microarray analysis identified many miRNAs with increased or reduced levels during regeneration. miR-133, a miRNA with known roles in cardiac development and disease, showed diminished expression during regeneration. Induced transgenic elevation of miR-133 levels after injury inhibited myocardial regeneration, while transgenic miR-133 depletion enhanced cardiomyocyte proliferation. Expression analyses indicated that cell cycle factors mps1, cdc37, and PA2G4, and cell junction components cx43 and cldn5, are miR-133 targets during regeneration. Using pharmacological inhibition and EGFP sensor interaction studies, we found that cx43 is a new miR-133 target and regeneration gene. Our results reveal dynamic regulation of miRNAs during heart regeneration, and indicate that miR-133 restricts injury-induced cardiomyocyte proliferation. Copyright © 2012. Published by Elsevier Inc.

  5. Subsurface event detection and classification using Wireless Signal Networks.

    PubMed

    Yoon, Suk-Un; Ghazanfari, Ehsan; Cheng, Liang; Pamukcu, Sibel; Suleiman, Muhannad T

    2012-11-05

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  6. Subsurface Event Detection and Classification Using Wireless Signal Networks

    PubMed Central

    Yoon, Suk-Un; Ghazanfari, Ehsan; Cheng, Liang; Pamukcu, Sibel; Suleiman, Muhannad T.

    2012-01-01

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events. PMID:23202191

  7. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  8. Change detection in multitemporal synthetic aperture radar images using dual-channel convolutional neural network

    NASA Astrophysics Data System (ADS)

    Liu, Tao; Li, Ying; Cao, Ying; Shen, Qiang

    2017-10-01

    This paper proposes a model of dual-channel convolutional neural network (CNN) that is designed for change detection in SAR images, in an effort to acquire higher detection accuracy and lower misclassification rate. This network model contains two parallel CNN channels, which can extract deep features from two multitemporal SAR images. For comparison and validation, the proposed method is tested along with other change detection algorithms on both simulated SAR images and real-world SAR images captured by different sensors. The experimental results demonstrate that the presented method outperforms the state-of-the-art techniques by a considerable margin.

  9. A scalable architecture for online anomaly detection of WLCG batch jobs

    NASA Astrophysics Data System (ADS)

    Kuehn, E.; Fischer, M.; Giffels, M.; Jung, C.; Petzold, A.

    2016-10-01

    For data centres it is increasingly important to monitor the network usage, and learn from network usage patterns. Especially configuration issues or misbehaving batch jobs preventing a smooth operation need to be detected as early as possible. At the GridKa data and computing centre we therefore operate a tool BPNetMon for monitoring traffic data and characteristics of WLCG batch jobs and pilots locally on different worker nodes. On the one hand local information itself are not sufficient to detect anomalies for several reasons, e.g. the underlying job distribution on a single worker node might change or there might be a local misconfiguration. On the other hand a centralised anomaly detection approach does not scale regarding network communication as well as computational costs. We therefore propose a scalable architecture based on concepts of a super-peer network.

  10. Model-Based Design of Tree WSNs for Decentralized Detection.

    PubMed

    Tantawy, Ashraf; Koutsoukos, Xenofon; Biswas, Gautam

    2015-08-20

    The classical decentralized detection problem of finding the optimal decision rules at the sensor and fusion center, as well as variants that introduce physical channel impairments have been studied extensively in the literature. The deployment of WSNs in decentralized detection applications brings new challenges to the field. Protocols for different communication layers have to be co-designed to optimize the detection performance. In this paper, we consider the communication network design problem for a tree WSN. We pursue a system-level approach where a complete model for the system is developed that captures the interactions between different layers, as well as different sensor quality measures. For network optimization, we propose a hierarchical optimization algorithm that lends itself to the tree structure, requiring only local network information. The proposed design approach shows superior performance over several contentionless and contention-based network design approaches.

  11. Neural network-based landmark detection for mobile robot

    NASA Astrophysics Data System (ADS)

    Sekiguchi, Minoru; Okada, Hiroyuki; Watanabe, Nobuo

    1996-03-01

    The mobile robot can essentially have only the relative position data for the real world. However, there are many cases that the robot has to know where it is located. In those cases, the useful method is to detect landmarks in the real world and adjust its position using detected landmarks. In this point of view, it is essential to develop a mobile robot that can accomplish the path plan successfully using natural or artificial landmarks. However, artificial landmarks are often difficult to construct and natural landmarks are very complicated to detect. In this paper, the method of acquiring landmarks by using the sensor data from the mobile robot necessary for planning the path is described. The landmark we discuss here is the natural one and is composed of the compression of sensor data from the robot. The sensor data is compressed and memorized by using five layered neural network that is called a sand glass model. The input and output data that neural network should learn is the sensor data of the robot that are exactly the same. Using the intermediate output data of the network, a compressed data is obtained, which expresses a landmark data. If the sensor data is ambiguous or enormous, it is easy to detect the landmark because the data is compressed and classified by the neural network. Using the backward three layers, the compressed landmark data is expanded to original data at some level. The studied neural network categorizes the detected sensor data to the known landmark.

  12. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  13. Bank-firm credit network in Japan: an analysis of a bipartite network.

    PubMed

    Marotta, Luca; Miccichè, Salvatore; Fujiwara, Yoshi; Iyetomi, Hiroshi; Aoyama, Hideaki; Gallegati, Mauro; Mantegna, Rosario N

    2015-01-01

    We investigate the networked nature of the Japanese credit market. Our investigation is performed with tools of network science. In our investigation we perform community detection with an algorithm which is identifying communities composed of both banks and firms. We show that the communities obtained by directly working on the bipartite network carry information about the networked nature of the Japanese credit market. Our analysis is performed for each calendar year during the time period from 1980 to 2011. To investigate the time evolution of the networked structure of the credit market we introduce a new statistical method to track the time evolution of detected communities. We then characterize the time evolution of communities by detecting for each time evolving set of communities the over-expression of attributes of firms and banks. Specifically, we consider as attributes the economic sector and the geographical location of firms and the type of banks. In our 32-year-long analysis we detect a persistence of the over-expression of attributes of communities of banks and firms together with a slow dynamic of changes from some specific attributes to new ones. Our empirical observations show that the credit market in Japan is a networked market where the type of banks, geographical location of firms and banks, and economic sector of the firm play a role in shaping the credit relationships between banks and firms.

  14. Bank-Firm Credit Network in Japan: An Analysis of a Bipartite Network

    PubMed Central

    Marotta, Luca; Miccichè, Salvatore; Fujiwara, Yoshi; Iyetomi, Hiroshi; Aoyama, Hideaki; Gallegati, Mauro; Mantegna, Rosario N.

    2015-01-01

    We investigate the networked nature of the Japanese credit market. Our investigation is performed with tools of network science. In our investigation we perform community detection with an algorithm which is identifying communities composed of both banks and firms. We show that the communities obtained by directly working on the bipartite network carry information about the networked nature of the Japanese credit market. Our analysis is performed for each calendar year during the time period from 1980 to 2011. To investigate the time evolution of the networked structure of the credit market we introduce a new statistical method to track the time evolution of detected communities. We then characterize the time evolution of communities by detecting for each time evolving set of communities the over-expression of attributes of firms and banks. Specifically, we consider as attributes the economic sector and the geographical location of firms and the type of banks. In our 32-year-long analysis we detect a persistence of the over-expression of attributes of communities of banks and firms together with a slow dynamic of changes from some specific attributes to new ones. Our empirical observations show that the credit market in Japan is a networked market where the type of banks, geographical location of firms and banks, and economic sector of the firm play a role in shaping the credit relationships between banks and firms. PMID:25933413

  15. A Comparative Analysis of Community Detection Algorithms on Artificial Networks

    PubMed Central

    Yang, Zhao; Algesheimer, René; Tessone, Claudio J.

    2016-01-01

    Many community detection algorithms have been developed to uncover the mesoscopic properties of complex networks. However how good an algorithm is, in terms of accuracy and computing time, remains still open. Testing algorithms on real-world network has certain restrictions which made their insights potentially biased: the networks are usually small, and the underlying communities are not defined objectively. In this study, we employ the Lancichinetti-Fortunato-Radicchi benchmark graph to test eight state-of-the-art algorithms. We quantify the accuracy using complementary measures and algorithms’ computing time. Based on simple network properties and the aforementioned results, we provide guidelines that help to choose the most adequate community detection algorithm for a given network. Moreover, these rules allow uncovering limitations in the use of specific algorithms given macroscopic network properties. Our contribution is threefold: firstly, we provide actual techniques to determine which is the most suited algorithm in most circumstances based on observable properties of the network under consideration. Secondly, we use the mixing parameter as an easily measurable indicator of finding the ranges of reliability of the different algorithms. Finally, we study the dependency with network size focusing on both the algorithm’s predicting power and the effective computing time. PMID:27476470

  16. Recurrent neural network based virtual detection line

    NASA Astrophysics Data System (ADS)

    Kadikis, Roberts

    2018-04-01

    The paper proposes an efficient method for detection of moving objects in the video. The objects are detected when they cross a virtual detection line. Only the pixels of the detection line are processed, which makes the method computationally efficient. A Recurrent Neural Network processes these pixels. The machine learning approach allows one to train a model that works in different and changing outdoor conditions. Also, the same network can be trained for various detection tasks, which is demonstrated by the tests on vehicle and people counting. In addition, the paper proposes a method for semi-automatic acquisition of labeled training data. The labeling method is used to create training and testing datasets, which in turn are used to train and evaluate the accuracy and efficiency of the detection method. The method shows similar accuracy as the alternative efficient methods but provides greater adaptability and usability for different tasks.

  17. Ship detection in optical remote sensing images based on deep convolutional neural networks

    NASA Astrophysics Data System (ADS)

    Yao, Yuan; Jiang, Zhiguo; Zhang, Haopeng; Zhao, Danpei; Cai, Bowen

    2017-10-01

    Automatic ship detection in optical remote sensing images has attracted wide attention for its broad applications. Major challenges for this task include the interference of cloud, wave, wake, and the high computational expenses. We propose a fast and robust ship detection algorithm to solve these issues. The framework for ship detection is designed based on deep convolutional neural networks (CNNs), which provide the accurate locations of ship targets in an efficient way. First, the deep CNN is designed to extract features. Then, a region proposal network (RPN) is applied to discriminate ship targets and regress the detection bounding boxes, in which the anchors are designed by intrinsic shape of ship targets. Experimental results on numerous panchromatic images demonstrate that, in comparison with other state-of-the-art ship detection methods, our method is more efficient and achieves higher detection accuracy and more precise bounding boxes in different complex backgrounds.

  18. A New Network Modeling Tool for the Ground-based Nuclear Explosion Monitoring Community

    NASA Astrophysics Data System (ADS)

    Merchant, B. J.; Chael, E. P.; Young, C. J.

    2013-12-01

    Network simulations have long been used to assess the performance of monitoring networks to detect events for such purposes as planning station deployments and network resilience to outages. The standard tool has been the SAIC-developed NetSim package. With correct parameters, NetSim can produce useful simulations; however, the package has several shortcomings: an older language (FORTRAN), an emphasis on seismic monitoring with limited support for other technologies, limited documentation, and a limited parameter set. Thus, we are developing NetMOD (Network Monitoring for Optimal Detection), a Java-based tool designed to assess the performance of ground-based networks. NetMOD's advantages include: coded in a modern language that is multi-platform, utilizes modern computing performance (e.g. multi-core processors), incorporates monitoring technologies other than seismic, and includes a well-validated default parameter set for the IMS stations. NetMOD is designed to be extendable through a plugin infrastructure, so new phenomenological models can be added. Development of the Seismic Detection Plugin is being pursued first. Seismic location and infrasound and hydroacoustic detection plugins will follow. By making NetMOD an open-release package, it can hopefully provide a common tool that the monitoring community can use to produce assessments of monitoring networks and to verify assessments made by others.

  19. Early detection monitoring of aquatic invasive species: Measuring performance success in a Lake Superior pilot network

    EPA Science Inventory

    The Great Lakes Water Quality Agreement, Annex 6 calls for a U.S.-Canada, basin-wide aquatic invasive species early detection network by 2015. The objective of our research is to explore survey design strategies that can improve detection efficiency, and to develop performance me...

  20. A novel approach for pilot error detection using Dynamic Bayesian Networks.

    PubMed

    Saada, Mohamad; Meng, Qinggang; Huang, Tingwen

    2014-06-01

    In the last decade Dynamic Bayesian Networks (DBNs) have become one type of the most attractive probabilistic modelling framework extensions of Bayesian Networks (BNs) for working under uncertainties from a temporal perspective. Despite this popularity not many researchers have attempted to study the use of these networks in anomaly detection or the implications of data anomalies on the outcome of such models. An abnormal change in the modelled environment's data at a given time, will cause a trailing chain effect on data of all related environment variables in current and consecutive time slices. Albeit this effect fades with time, it still can have an ill effect on the outcome of such models. In this paper we propose an algorithm for pilot error detection, using DBNs as the modelling framework for learning and detecting anomalous data. We base our experiments on the actions of an aircraft pilot, and a flight simulator is created for running the experiments. The proposed anomaly detection algorithm has achieved good results in detecting pilot errors and effects on the whole system.

  1. A lightweight network anomaly detection technique

    DOE PAGES

    Kim, Jinoh; Yoo, Wucherl; Sim, Alex; ...

    2017-03-13

    While the network anomaly detection is essential in network operations and management, it becomes further challenging to perform the first line of detection against the exponentially increasing volume of network traffic. In this paper, we develop a technique for the first line of online anomaly detection with two important considerations: (i) availability of traffic attributes during the monitoring time, and (ii) computational scalability for streaming data. The presented learning technique is lightweight and highly scalable with the beauty of approximation based on the grid partitioning of the given dimensional space. With the public traffic traces of KDD Cup 1999 andmore » NSL-KDD, we show that our technique yields 98.5% and 83% of detection accuracy, respectively, only with a couple of readily available traffic attributes that can be obtained without the help of post-processing. Finally, the results are at least comparable with the classical learning methods including decision tree and random forest, with approximately two orders of magnitude faster learning performance.« less

  2. A lightweight network anomaly detection technique

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kim, Jinoh; Yoo, Wucherl; Sim, Alex

    While the network anomaly detection is essential in network operations and management, it becomes further challenging to perform the first line of detection against the exponentially increasing volume of network traffic. In this paper, we develop a technique for the first line of online anomaly detection with two important considerations: (i) availability of traffic attributes during the monitoring time, and (ii) computational scalability for streaming data. The presented learning technique is lightweight and highly scalable with the beauty of approximation based on the grid partitioning of the given dimensional space. With the public traffic traces of KDD Cup 1999 andmore » NSL-KDD, we show that our technique yields 98.5% and 83% of detection accuracy, respectively, only with a couple of readily available traffic attributes that can be obtained without the help of post-processing. Finally, the results are at least comparable with the classical learning methods including decision tree and random forest, with approximately two orders of magnitude faster learning performance.« less

  3. Community detection enhancement using non-negative matrix factorization with graph regularization

    NASA Astrophysics Data System (ADS)

    Liu, Xiao; Wei, Yi-Ming; Wang, Jian; Wang, Wen-Jun; He, Dong-Xiao; Song, Zhan-Jie

    2016-06-01

    Community detection is a meaningful task in the analysis of complex networks, which has received great concern in various domains. A plethora of exhaustive studies has made great effort and proposed many methods on community detection. Particularly, a kind of attractive one is the two-step method which first makes a preprocessing for the network and then identifies its communities. However, not all types of methods can achieve satisfactory results by using such preprocessing strategy, such as the non-negative matrix factorization (NMF) methods. In this paper, rather than using the above two-step method as most works did, we propose a graph regularized-based model to improve, specialized, the NMF-based methods for the detection of communities, namely NMFGR. In NMFGR, we introduce the similarity metric which contains both the global and local information of networks, to reflect the relationships between two nodes, so as to improve the accuracy of community detection. Experimental results on both artificial and real-world networks demonstrate the superior performance of NMFGR to some competing methods.

  4. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  5. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  6. Sensitivity of the Positive and Negative Syndrome Scale (PANSS) in Detecting Treatment Effects via Network Analysis.

    PubMed

    Esfahlani, Farnaz Zamani; Sayama, Hiroki; Visser, Katherine Frost; Strauss, Gregory P

    2017-12-01

    Objective: The Positive and Negative Syndrome Scale is a primary outcome measure in clinical trials examining the efficacy of antipsychotic medications. Although the Positive and Negative Syndrome Scale has demonstrated sensitivity as a measure of treatment change in studies using traditional univariate statistical approaches, its sensitivity to detecting network-level changes in dynamic relationships among symptoms has yet to be demonstrated using more sophisticated multivariate analyses. In the current study, we examined the sensitivity of the Positive and Negative Syndrome Scale to detecting antipsychotic treatment effects as revealed through network analysis. Design: Participants included 1,049 individuals diagnosed with psychotic disorders from the Phase I portion of the Clinical Antipsychotic Trials of Intervention Effectiveness (CATIE) study. Of these participants, 733 were clinically determined to be treatment-responsive and 316 were found to be treatment-resistant. Item level data from the Positive and Negative Syndrome Scale were submitted to network analysis, and macroscopic, mesoscopic, and microscopic network properties were evaluated for the treatment-responsive and treatment-resistant groups at baseline and post-phase I antipsychotic treatment. Results: Network analysis indicated that treatment-responsive patients had more densely connected symptom networks after antipsychotic treatment than did treatment-responsive patients at baseline, and that symptom centralities increased following treatment. In contrast, symptom networks of treatment-resistant patients behaved more randomly before and after treatment. Conclusions: These results suggest that the Positive and Negative Syndrome Scale is sensitive to detecting treatment effects as revealed through network analysis. Its findings also provide compelling new evidence that strongly interconnected symptom networks confer an overall greater probability of treatment responsiveness in patients with psychosis, suggesting that antipsychotics achieve their effect by enhancing a number of central symptoms, which then facilitate reduction of other highly coupled symptoms in a network-like fashion.

  7. Bayesian network models for error detection in radiotherapy plans

    NASA Astrophysics Data System (ADS)

    Kalet, Alan M.; Gennari, John H.; Ford, Eric C.; Phillips, Mark H.

    2015-04-01

    The purpose of this study is to design and develop a probabilistic network for detecting errors in radiotherapy plans for use at the time of initial plan verification. Our group has initiated a multi-pronged approach to reduce these errors. We report on our development of Bayesian models of radiotherapy plans. Bayesian networks consist of joint probability distributions that define the probability of one event, given some set of other known information. Using the networks, we find the probability of obtaining certain radiotherapy parameters, given a set of initial clinical information. A low probability in a propagated network then corresponds to potential errors to be flagged for investigation. To build our networks we first interviewed medical physicists and other domain experts to identify the relevant radiotherapy concepts and their associated interdependencies and to construct a network topology. Next, to populate the network’s conditional probability tables, we used the Hugin Expert software to learn parameter distributions from a subset of de-identified data derived from a radiation oncology based clinical information database system. These data represent 4990 unique prescription cases over a 5 year period. Under test case scenarios with approximately 1.5% introduced error rates, network performance produced areas under the ROC curve of 0.88, 0.98, and 0.89 for the lung, brain and female breast cancer error detection networks, respectively. Comparison of the brain network to human experts performance (AUC of 0.90 ± 0.01) shows the Bayes network model performs better than domain experts under the same test conditions. Our results demonstrate the feasibility and effectiveness of comprehensive probabilistic models as part of decision support systems for improved detection of errors in initial radiotherapy plan verification procedures.

  8. Automatic detection and segmentation of brain metastases on multimodal MR images with a deep convolutional neural network.

    PubMed

    Charron, Odelin; Lallement, Alex; Jarnet, Delphine; Noblet, Vincent; Clavier, Jean-Baptiste; Meyer, Philippe

    2018-04-01

    Stereotactic treatments are today the reference techniques for the irradiation of brain metastases in radiotherapy. The dose per fraction is very high, and delivered in small volumes (diameter <1 cm). As part of these treatments, effective detection and precise segmentation of lesions are imperative. Many methods based on deep-learning approaches have been developed for the automatic segmentation of gliomas, but very little for that of brain metastases. We adapted an existing 3D convolutional neural network (DeepMedic) to detect and segment brain metastases on MRI. At first, we sought to adapt the network parameters to brain metastases. We then explored the single or combined use of different MRI modalities, by evaluating network performance in terms of detection and segmentation. We also studied the interest of increasing the database with virtual patients or of using an additional database in which the active parts of the metastases are separated from the necrotic parts. Our results indicated that a deep network approach is promising for the detection and the segmentation of brain metastases on multimodal MRI. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments

    PubMed Central

    Avalappampatty Sivasamy, Aneetha; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  10. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.

    PubMed

    Sivasamy, Aneetha Avalappampatty; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

  11. An ant colony based algorithm for overlapping community detection in complex networks

    NASA Astrophysics Data System (ADS)

    Zhou, Xu; Liu, Yanheng; Zhang, Jindong; Liu, Tuming; Zhang, Di

    2015-06-01

    Community detection is of great importance to understand the structures and functions of networks. Overlap is a significant feature of networks and overlapping community detection has attracted an increasing attention. Many algorithms have been presented to detect overlapping communities. In this paper, we present an ant colony based overlapping community detection algorithm which mainly includes ants' location initialization, ants' movement and post processing phases. An ants' location initialization strategy is designed to identify initial location of ants and initialize label list stored in each node. During the ants' movement phase, the entire ants move according to the transition probability matrix, and a new heuristic information computation approach is redefined to measure similarity between two nodes. Every node keeps a label list through the cooperation made by ants until a termination criterion is reached. A post processing phase is executed on the label list to get final overlapping community structure naturally. We illustrate the capability of our algorithm by making experiments on both synthetic networks and real world networks. The results demonstrate that our algorithm will have better performance in finding overlapping communities and overlapping nodes in synthetic datasets and real world datasets comparing with state-of-the-art algorithms.

  12. An uncertainty-based distributed fault detection mechanism for wireless sensor networks.

    PubMed

    Yang, Yang; Gao, Zhipeng; Zhou, Hang; Qiu, Xuesong

    2014-04-25

    Exchanging too many messages for fault detection will cause not only a degradation of the network quality of service, but also represents a huge burden on the limited energy of sensors. Therefore, we propose an uncertainty-based distributed fault detection through aided judgment of neighbors for wireless sensor networks. The algorithm considers the serious influence of sensing measurement loss and therefore uses Markov decision processes for filling in missing data. Most important of all, fault misjudgments caused by uncertainty conditions are the main drawbacks of traditional distributed fault detection mechanisms. We draw on the experience of evidence fusion rules based on information entropy theory and the degree of disagreement function to increase the accuracy of fault detection. Simulation results demonstrate our algorithm can effectively reduce communication energy overhead due to message exchanges and provide a higher detection accuracy ratio.

  13. Comparison of the KSC-ER Cloud-to-Ground Lightning Surveillance System (CGLSS) and the U.S. National Lightning Detection Network(TradeMark)(NLDN)

    NASA Technical Reports Server (NTRS)

    Ward, Jennifer G.; Cummins, Kenneth L.; Krider, E. Philip

    2007-01-01

    The NASA Kennedy Space Center (KSC) and Air Force Eastern Range (ER) use data from two cloud-to-ground lightning detection networks, CGLSS and NLDN, during ground and launch operations at the KSC-ER. For these applications, it is very important to understand the location accuracy and detection efficiency of each network near the KSC-ER. If a cloud-to-ground (CG) lightning strike is missed or mis-located by even a small amount, the result could have significant safety implications, require expensive retests, or create unnecessary delays or scrubs in launches. Therefore, it is important to understand the performance of each lightning detection system in considerable detail. To evaluate recent upgrades in the CGLSS sensors in 2000 and the entire NLDN in 2002- 2003, we have compared. measurements provided by these independent networks in the summers of 2005 and 2006. Our analyses have focused on the fraction of first strokes reported individually and in-common by each network (flash detection efficiency), the spatial separation between the strike points reported by both networks (relative location accuracy), and the values of the estimated peak current, Ip, reported by each network. The results within 100 km of the KSC-ER show that the networks produce very similar values of Ip (except for a small scaling difference) and that the relative location accuracy is consistent with model estimates that give median values of 200-300m for the CGLSS and 600-700m for the NLDN in the region of the KSC-ER. Because of differences in the network geometries and sensor gains, the NLDN does not report 10-20% of the flashes that have a low Ip (2 kA < |Ip| < 16 kA), both networks report 99 % of the flashes that have intermediate values of Ip (16< |Ip| < 50 kA), and the CGLSS fails to report 20-30% of the high-current events (|Ip| >=0 kA).

  14. Seismic monitoring at Cascade Volcanic Centers, 2004?status and recommendations

    USGS Publications Warehouse

    Moran, Seth C.

    2004-01-01

    The purpose of this report is to assess the current (May, 2004) status of seismic monitoring networks at the 13 major Cascade volcanic centers. Included in this assessment are descriptions of each network, analyses of the ability of each network to detect and to locate seismic activity, identification of specific weaknesses in each network, and a prioritized list of those networks that are most in need of additional seismic stations. At the outset it should be recognized that no Cascade volcanic center currently has an adequate seismic network relative to modern-day networks at Usu Volcano (Japan) or Etna and Stromboli volcanoes (Italy). For a system the size of Three Sisters, for example, a modern-day, cutting-edge seismic network would ideally consist of a minimum of 10 to 12 short-period three-component seismometers (for determining particle motions, reliable S-wave picks, moment tensor inversions, fault-plane solutions, and other important seismic parameters) and 7 to 10 broadband sensors (which, amongst other considerations, enable detection and location of very long period (VLP) and other low-frequency events, moment tensor inversions, and, because of their wide dynamic range, on-scale recording of large-amplitude events). Such a dense, multi component seismic network would give the ability to, for example, detect in near-real-time earthquake migrations over a distance of ~0.5km or less, locate tremor sources, determine the nature of a seismic source (that is, pure shear, implosive, explosive), provide on-scale recordings of very small and very large-amplitude seismic signals, and detect localized changes in seismic stress tensor orientations caused by movement of magma bodies. However, given that programmatic resources are currently limited, installation of such networks at this time is unrealistic. Instead, this report focuses on identifying what additional stations are needed to guarantee that anomalous seismicity associated with volcanic unrest will be detected in a timely manner and, in the case of magnitude = 1 earthquakes, reliably located.

  15. Automatic Detection of Nausea Using Bio-Signals During Immerging in A Virtual Reality Environment

    DTIC Science & Technology

    2001-10-25

    reduce the redundancy in those parameters, and constructed an artificial neural network with those principal components. Using the network we constructed, we could partially detect nausea in real time.

  16. Network for the Detection of Atmospheric Composition Change (NDACC)

    Science.gov Websites

    , state and local government web resources and services. Home > Network for the Detection of and troposphere, and establishing links between climate change and atmospheric composition. Following

  17. Control range: a controllability-based index for node significance in directed networks

    NASA Astrophysics Data System (ADS)

    Wang, Bingbo; Gao, Lin; Gao, Yong

    2012-04-01

    While a large number of methods for module detection have been developed for undirected networks, it is difficult to adapt them to handle directed networks due to the lack of consensus criteria for measuring the node significance in a directed network. In this paper, we propose a novel structural index, the control range, motivated by recent studies on the structural controllability of large-scale directed networks. The control range of a node quantifies the size of the subnetwork that the node can effectively control. A related index, called the control range similarity, is also introduced to measure the structural similarity between two nodes. When applying the index of control range to several real-world and synthetic directed networks, it is observed that the control range of the nodes is mainly influenced by the network's degree distribution and that nodes with a low degree may have a high control range. We use the index of control range similarity to detect and analyze functional modules in glossary networks and the enzyme-centric network of homo sapiens. Our results, as compared with other approaches to module detection such as modularity optimization algorithm, dynamic algorithm and clique percolation method, indicate that the proposed indices are effective and practical in depicting structural and modular characteristics of sparse directed networks.

  18. On detection and visualization techniques for cyber security situation awareness

    NASA Astrophysics Data System (ADS)

    Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao

    2013-05-01

    Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.

  19. Alignment and integration of complex networks by hypergraph-based spectral clustering

    NASA Astrophysics Data System (ADS)

    Michoel, Tom; Nachtergaele, Bruno

    2012-11-01

    Complex networks possess a rich, multiscale structure reflecting the dynamical and functional organization of the systems they model. Often there is a need to analyze multiple networks simultaneously, to model a system by more than one type of interaction, or to go beyond simple pairwise interactions, but currently there is a lack of theoretical and computational methods to address these problems. Here we introduce a framework for clustering and community detection in such systems using hypergraph representations. Our main result is a generalization of the Perron-Frobenius theorem from which we derive spectral clustering algorithms for directed and undirected hypergraphs. We illustrate our approach with applications for local and global alignment of protein-protein interaction networks between multiple species, for tripartite community detection in folksonomies, and for detecting clusters of overlapping regulatory pathways in directed networks.

  20. Alignment and integration of complex networks by hypergraph-based spectral clustering.

    PubMed

    Michoel, Tom; Nachtergaele, Bruno

    2012-11-01

    Complex networks possess a rich, multiscale structure reflecting the dynamical and functional organization of the systems they model. Often there is a need to analyze multiple networks simultaneously, to model a system by more than one type of interaction, or to go beyond simple pairwise interactions, but currently there is a lack of theoretical and computational methods to address these problems. Here we introduce a framework for clustering and community detection in such systems using hypergraph representations. Our main result is a generalization of the Perron-Frobenius theorem from which we derive spectral clustering algorithms for directed and undirected hypergraphs. We illustrate our approach with applications for local and global alignment of protein-protein interaction networks between multiple species, for tripartite community detection in folksonomies, and for detecting clusters of overlapping regulatory pathways in directed networks.

  1. Structure and inference in annotated networks

    PubMed Central

    Newman, M. E. J.; Clauset, Aaron

    2016-01-01

    For many networks of scientific interest we know both the connections of the network and information about the network nodes, such as the age or gender of individuals in a social network. Here we demonstrate how this ‘metadata' can be used to improve our understanding of network structure. We focus in particular on the problem of community detection in networks and develop a mathematically principled approach that combines a network and its metadata to detect communities more accurately than can be done with either alone. Crucially, the method does not assume that the metadata are correlated with the communities we are trying to find. Instead, the method learns whether a correlation exists and correctly uses or ignores the metadata depending on whether they contain useful information. We demonstrate our method on synthetic networks with known structure and on real-world networks, large and small, drawn from social, biological and technological domains. PMID:27306566

  2. Structure and inference in annotated networks

    NASA Astrophysics Data System (ADS)

    Newman, M. E. J.; Clauset, Aaron

    2016-06-01

    For many networks of scientific interest we know both the connections of the network and information about the network nodes, such as the age or gender of individuals in a social network. Here we demonstrate how this `metadata' can be used to improve our understanding of network structure. We focus in particular on the problem of community detection in networks and develop a mathematically principled approach that combines a network and its metadata to detect communities more accurately than can be done with either alone. Crucially, the method does not assume that the metadata are correlated with the communities we are trying to find. Instead, the method learns whether a correlation exists and correctly uses or ignores the metadata depending on whether they contain useful information. We demonstrate our method on synthetic networks with known structure and on real-world networks, large and small, drawn from social, biological and technological domains.

  3. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  4. Lifespan anxiety is reflected in human amygdala cortical connectivity

    PubMed Central

    He, Ye; Xu, Ting; Zhang, Wei

    2016-01-01

    Abstract The amygdala plays a pivotal role in processing anxiety and connects to large‐scale brain networks. However, intrinsic functional connectivity (iFC) between amygdala and these networks has rarely been examined in relation to anxiety, especially across the lifespan. We employed resting‐state functional MRI data from 280 healthy adults (18–83.5 yrs) to elucidate the relationship between anxiety and amygdala iFC with common cortical networks including the visual network, somatomotor network, dorsal attention network, ventral attention network, limbic network, frontoparietal network, and default network. Global and network‐specific iFC were separately computed as mean iFC of amygdala with the entire cerebral cortex and each cortical network. We detected negative correlation between global positive amygdala iFC and trait anxiety. Network‐specific associations between amygdala iFC and anxiety were also detectable. Specifically, the higher iFC strength between the left amygdala and the limbic network predicted lower state anxiety. For the trait anxiety, left amygdala anxiety–connectivity correlation was observed in both somatomotor and dorsal attention networks, whereas the right amygdala anxiety–connectivity correlation was primarily distributed in the frontoparietal and ventral attention networks. Ventral attention network exhibited significant anxiety–gender interactions on its iFC with amygdala. Together with findings from additional vertex‐wise analysis, these data clearly indicated that both low‐level sensory networks and high‐level associative networks could contribute to detectable predictions of anxiety behaviors by their iFC profiles with the amygdala. This set of systems neuroscience findings could lead to novel functional network models on neural correlates of human anxiety and provide targets for novel treatment strategies on anxiety disorders. Hum Brain Mapp 37:1178–1193, 2016. © 2015 The Authors Human Brain Mapping Published by Wiley Periodicals, Inc. PMID:26859312

  5. Development and application of deep convolutional neural network in target detection

    NASA Astrophysics Data System (ADS)

    Jiang, Xiaowei; Wang, Chunping; Fu, Qiang

    2018-04-01

    With the development of big data and algorithms, deep convolution neural networks with more hidden layers have more powerful feature learning and feature expression ability than traditional machine learning methods, making artificial intelligence surpass human level in many fields. This paper first reviews the development and application of deep convolutional neural networks in the field of object detection in recent years, then briefly summarizes and ponders some existing problems in the current research, and the future development of deep convolutional neural network is prospected.

  6. Network Algorithms for Detection of Radiation Sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S; Brooks, Richard R; Wu, Qishi

    In support of national defense, Domestic Nuclear Detection Office s (DNDO) Intelligent Radiation Sensor Systems (IRSS) program supported the development of networks of radiation counters for detecting, localizing and identifying low-level, hazardous radiation sources. Industry teams developed the first generation of such networks with tens of counters, and demonstrated several of their capabilities in indoor and outdoor characterization tests. Subsequently, these test measurements have been used in algorithm replays using various sub-networks of counters. Test measurements combined with algorithm outputs are used to extract Key Measurements and Benchmark (KMB) datasets. We present two selective analyses of these datasets: (a) amore » notional border monitoring scenario that highlights the benefits of a network of counters compared to individual detectors, and (b) new insights into the Sequential Probability Ratio Test (SPRT) detection method, which lead to its adaptations for improved detection. Using KMB datasets from an outdoor test, we construct a notional border monitoring scenario, wherein twelve 2 *2 NaI detectors are deployed on the periphery of 21*21meter square region. A Cs-137 (175 uCi) source is moved across this region, starting several meters from outside and finally moving away. The measurements from individual counters and the network were processed using replays of a particle filter algorithm developed under IRSS program. The algorithm outputs from KMB datasets clearly illustrate the benefits of combining measurements from all networked counters: the source was detected before it entered the region, during its trajectory inside, and until it moved several meters away. When individual counters are used for detection, the source was detected for much shorter durations, and sometimes was missed in the interior region. The application of SPRT for detecting radiation sources requires choosing the detection threshold, which in turn requires a source strength estimate, typically specified as a multiplier of the background radiation level. A judicious selection of this source multiplier is essential to achieve optimal detection probability at a specified false alarm rate. Typically, this threshold is chosen from the Receiver Operating Characteristic (ROC) by varying the source multiplier estimate. ROC is expected to have a monotonically increasing profile between the detection probability and false alarm rate. We derived ROCs for multiple indoor tests using KMB datasets, which revealed an unexpected loop shape: as the multiplier increases, detection probability and false alarm rate both increase until a limit, and then both contract. Consequently, two detection probabilities correspond to the same false alarm rate, and the higher is achieved at a lower multiplier, which is the desired operating point. Using the Chebyshev s inequality we analytically confirm this shape. Then, we present two improved network-SPRT methods by (a) using the threshold off-set as a weighting factor for the binary decisions from individual detectors in a weighted majority voting fusion rule, and (b) applying a composite SPRT derived using measurements from all counters.« less

  7. A neural network approach to burst detection.

    PubMed

    Mounce, S R; Day, A J; Wood, A S; Khan, A; Widdop, P D; Machell, J

    2002-01-01

    This paper describes how hydraulic and water quality data from a distribution network may be used to provide a more efficient leakage management capability for the water industry. The research presented concerns the application of artificial neural networks to the issue of detection and location of leakage in treated water distribution systems. An architecture for an Artificial Neural Network (ANN) based system is outlined. The neural network uses time series data produced by sensors to directly construct an empirical model for predication and classification of leaks. Results are presented using data from an experimental site in Yorkshire Water's Keighley distribution system.

  8. Effective contaminant detection networks in uncertain groundwater flow fields.

    PubMed

    Hudak, P F

    2001-01-01

    A mass transport simulation model tested seven contaminant detection-monitoring networks under a 40 degrees range of groundwater flow directions. Each monitoring network contained five wells located 40 m from a rectangular landfill. The 40-m distance (lag) was measured in different directions, depending upon the strategy used to design a particular monitoring network. Lagging the wells parallel to the central flow path was more effective than alternative design strategies. Other strategies allowed higher percentages of leaks to migrate between monitoring wells. Results of this study suggest that centrally lagged groundwater monitoring networks perform most effectively in uncertain groundwater-flow fields.

  9. Communities detection as a tool to assess a reform of the Italian interlocking directorship network

    NASA Astrophysics Data System (ADS)

    Drago, Carlo; Ricciuti, Roberto

    2017-01-01

    Interlocking directorships are important communication channels among companies and may have anticompetitive effect. A corporate governance reform was introduced in 2011 to prevent interlocking directorships in the financial sector. We apply community detection techniques to the analysis of the networks in 2009 and 2012 to ascertain the effect of such reform on the Italian directorship network. We find that, although the number of interlocking directorships decreases in 2012, the reduction takes place mainly at the periphery of the network. The network core is stable, allowing the most connected companies to keep their strategic position.

  10. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  11. Anomaly Detection in Dynamic Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turcotte, Melissa

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. Amore » second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the communication counts. In a sequential analysis, anomalous behavior is then identified from outlying behavior with respect to the fitted predictive probability models. Seasonality is again incorporated into the model and is treated as a changepoint model on the transition probabilities of a discrete time Markov process. Second stage analytics are then developed which combine anomalous edges to identify anomalous substructures in the network.« less

  12. A Plane Target Detection Algorithm in Remote Sensing Images based on Deep Learning Network Technology

    NASA Astrophysics Data System (ADS)

    Shuxin, Li; Zhilong, Zhang; Biao, Li

    2018-01-01

    Plane is an important target category in remote sensing targets and it is of great value to detect the plane targets automatically. As remote imaging technology developing continuously, the resolution of the remote sensing image has been very high and we can get more detailed information for detecting the remote sensing targets automatically. Deep learning network technology is the most advanced technology in image target detection and recognition, which provided great performance improvement in the field of target detection and recognition in the everyday scenes. We combined the technology with the application in the remote sensing target detection and proposed an algorithm with end to end deep network, which can learn from the remote sensing images to detect the targets in the new images automatically and robustly. Our experiments shows that the algorithm can capture the feature information of the plane target and has better performance in target detection with the old methods.

  13. Efficient discovery of overlapping communities in massive networks

    PubMed Central

    Gopalan, Prem K.; Blei, David M.

    2013-01-01

    Detecting overlapping communities is essential to analyzing and exploring natural networks such as social networks, biological networks, and citation networks. However, most existing approaches do not scale to the size of networks that we regularly observe in the real world. In this paper, we develop a scalable approach to community detection that discovers overlapping communities in massive real-world networks. Our approach is based on a Bayesian model of networks that allows nodes to participate in multiple communities, and a corresponding algorithm that naturally interleaves subsampling from the network and updating an estimate of its communities. We demonstrate how we can discover the hidden community structure of several real-world networks, including 3.7 million US patents, 575,000 physics articles from the arXiv preprint server, and 875,000 connected Web pages from the Internet. Furthermore, we demonstrate on large simulated networks that our algorithm accurately discovers the true community structure. This paper opens the door to using sophisticated statistical models to analyze massive networks. PMID:23950224

  14. Relationships Between Long-Range Lightning Networks and TRMM/LIS Observations

    NASA Technical Reports Server (NTRS)

    Rudlosky, Scott D.; Holzworth, Robert H.; Carey, Lawrence D.; Schultz, Chris J.; Bateman, Monte; Cummins, Kenneth L.; Cummins, Kenneth L.; Blakeslee, Richard J.; Goodman, Steven J.

    2012-01-01

    Recent advances in long-range lightning detection technologies have improved our understanding of thunderstorm evolution in the data sparse oceanic regions. Although the expansion and improvement of long-range lightning datasets have increased their applicability, these applications (e.g., data assimilation, atmospheric chemistry, and aviation weather hazards) require knowledge of the network detection capabilities. The present study intercompares long-range lightning data with observations from the Lightning Imaging Sensor (LIS) aboard the Tropical Rainfall Measurement Mission (TRMM) satellite. The study examines network detection efficiency and location accuracy relative to LIS observations, describes spatial variability in these performance metrics, and documents the characteristics of LIS flashes that are detected by the long-range networks. Improved knowledge of relationships between these datasets will allow researchers, algorithm developers, and operational users to better prepare for the spatial and temporal coverage of the upcoming GOES-R Geostationary Lightning Mapper (GLM).

  15. Model-Based Design of Tree WSNs for Decentralized Detection †

    PubMed Central

    Tantawy, Ashraf; Koutsoukos, Xenofon; Biswas, Gautam

    2015-01-01

    The classical decentralized detection problem of finding the optimal decision rules at the sensor and fusion center, as well as variants that introduce physical channel impairments have been studied extensively in the literature. The deployment of WSNs in decentralized detection applications brings new challenges to the field. Protocols for different communication layers have to be co-designed to optimize the detection performance. In this paper, we consider the communication network design problem for a tree WSN. We pursue a system-level approach where a complete model for the system is developed that captures the interactions between different layers, as well as different sensor quality measures. For network optimization, we propose a hierarchical optimization algorithm that lends itself to the tree structure, requiring only local network information. The proposed design approach shows superior performance over several contentionless and contention-based network design approaches. PMID:26307989

  16. Probabilistic track coverage in cooperative sensor networks.

    PubMed

    Ferrari, Silvia; Zhang, Guoxian; Wettergren, Thomas A

    2010-12-01

    The quality of service of a network performing cooperative track detection is represented by the probability of obtaining multiple elementary detections over time along a target track. Recently, two different lines of research, namely, distributed-search theory and geometric transversals, have been used in the literature for deriving the probability of track detection as a function of random and deterministic sensors' positions, respectively. In this paper, we prove that these two approaches are equivalent under the same problem formulation. Also, we present a new performance function that is derived by extending the geometric-transversal approach to the case of random sensors' positions using Poisson flats. As a result, a unified approach for addressing track detection in both deterministic and probabilistic sensor networks is obtained. The new performance function is validated through numerical simulations and is shown to bring about considerable computational savings for both deterministic and probabilistic sensor networks.

  17. Label propagation algorithm for community detection based on node importance and label influence

    NASA Astrophysics Data System (ADS)

    Zhang, Xian-Kun; Ren, Jing; Song, Chen; Jia, Jia; Zhang, Qian

    2017-09-01

    Recently, the detection of high-quality community has become a hot spot in the research of social network. Label propagation algorithm (LPA) has been widely concerned since it has the advantages of linear time complexity and is unnecessary to define objective function and the number of community in advance. However, LPA has the shortcomings of uncertainty and randomness in the label propagation process, which affects the accuracy and stability of the community. For large-scale social network, this paper proposes a novel label propagation algorithm for community detection based on node importance and label influence (LPA_NI). The experiments with comparative algorithms on real-world networks and synthetic networks have shown that LPA_NI can significantly improve the quality of community detection and shorten the iteration period. Also, it has better accuracy and stability in the case of similar complexity.

  18. Searching Information Sources in Networks

    DTIC Science & Technology

    2017-06-14

    SECURITY CLASSIFICATION OF: During the course of this project, we made significant progresses in multiple directions of the information detection...result on information source detection on non-tree networks; (2) The development of information source localization algorithms to detect multiple... information sources. The algorithms have provable performance guarantees and outperform existing algorithms in 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND

  19. Quantitative Assessment of Detection Frequency for the INL Ambient Air Monitoring Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sondrup, A. Jeffrey; Rood, Arthur S.

    A quantitative assessment of the Idaho National Laboratory (INL) air monitoring network was performed using frequency of detection as the performance metric. The INL air monitoring network consists of 37 low-volume air samplers in 31 different locations. Twenty of the samplers are located on INL (onsite) and 17 are located off INL (offsite). Detection frequencies were calculated using both BEA and ESER laboratory minimum detectable activity (MDA) levels. The CALPUFF Lagrangian puff dispersion model, coupled with 1 year of meteorological data, was used to calculate time-integrated concentrations at sampler locations for a 1-hour release of unit activity (1 Ci) formore » every hour of the year. The unit-activity time-integrated concentration (TICu) values were calculated at all samplers for releases from eight INL facilities. The TICu values were then scaled and integrated for a given release quantity and release duration. All facilities modeled a ground-level release emanating either from the center of the facility or at a point where significant emissions are possible. In addition to ground-level releases, three existing stacks at the Advanced Test Reactor Complex, Idaho Nuclear Technology and Engineering Center, and Material and Fuels Complex were also modeled. Meteorological data from the 35 stations comprising the INL Mesonet network, data from the Idaho Falls Regional airport, upper air data from the Boise airport, and three-dimensional gridded data from the weather research forecasting model were used for modeling. Three representative radionuclides identified as key radionuclides in INL’s annual National Emission Standards for Hazardous Air Pollutants evaluations were considered for the frequency of detection analysis: Cs-137 (beta-gamma emitter), Pu-239 (alpha emitter), and Sr-90 (beta emitter). Source-specific release quantities were calculated for each radionuclide, such that the maximum inhalation dose at any publicly accessible sampler or the National Emission Standards for Hazardous Air Pollutants maximum exposed individual location (i.e., Frenchman’s Cabin) was no more than 0.1 mrem yr–1 (i.e., 1% of the 10 mrem yr–1 standard). Detection frequencies were calculated separately for the onsite and offsite monitoring network. As expected, detection frequencies were generally less for the offsite sampling network compared to the onsite network. Overall, the monitoring network is very effective at detecting the potential releases of Cs-137 or Sr-90 from all sources/facilities using either the ESER or BEA MDAs. The network was less effective at detecting releases of Pu-239. Maximum detection frequencies for Pu-239 using ESER MDAs ranged from 27.4 to 100% for onsite samplers and 3 to 80% for offsite samplers. Using BEA MDAs, the maximum detection frequencies for Pu-239 ranged from 2.1 to 100% for onsite samplers and 0 to 5.9% for offsite samplers. The only release that was not detected by any of the samplers under any conditions was a release of Pu-239 from the Idaho Nuclear Technology and Engineering Center main stack (CPP-708). The methodology described in this report could be used to improve sampler placement and detection frequency, provided clear performance objectives are defined.« less

  20. Assessing the detection capability of a dense infrasound network in the southern Korean Peninsula

    NASA Astrophysics Data System (ADS)

    Che, Il-Young; Le Pichon, Alexis; Kim, Kwangsu; Shin, In-Cheol

    2017-08-01

    The Korea Infrasound Network (KIN) is a dense seismoacoustic array network consisting of eight small-aperture arrays with an average interarray spacing of ∼100 km. The processing of the KIN historical recordings over 10 yr in the 0.05-5 Hz frequency band shows that the dominant sources of signals are microbaroms and human activities. The number of detections correlates well with the seasonal and daily variability of the stratospheric wind dynamics. The quantification of the spatiotemporal variability of the KIN detection performance is simulated using a frequency-dependent semi-empirical propagation modelling technique. The average detection thresholds predicted for the region of interest by using both the KIN arrays and the International Monitoring System (IMS) infrasound station network at a given frequency of 1.6 Hz are estimated to be 5.6 and 10.0 Pa for two- and three-station coverage, respectively, which was about three times lower than the thresholds predicted by using only the IMS stations. The network performance is significantly enhanced from May to August, with detection thresholds being one order of magnitude lower than the rest of the year due to prevailing steady stratospheric winds. To validate the simulations, the amplitudes of ground-truth repeated surface mining explosions at an open-pit limestone mine were measured over a 19-month period. Focusing on the spatiotemporal variability of the stratospheric winds which control to first order where infrasound signals are expected to be detected, the predicted detectable signal amplitude at the mine and the detection capability at one KIN array located at a distance of 175 km are found to be in good agreement with the observations from the measurement campaign. The detection threshold in summer is ∼2 Pa and increases up to ∼300 Pa in winter. Compared with the low and stable thresholds in summer, the high temporal variability of the KIN performance is well predicted throughout the year. Simulations show that the performance of the global infrasound network of the IMS is significantly improved by adding KIN. This study shows the usefulness of dense regional networks to enhance detection capability in regions of interest in the context of future verification of the Comprehensive Nuclear-Test-Ban Treaty.

  1. Shallow Transits—Deep Learning. I. Feasibility Study of Deep Learning to Detect Periodic Transits of Exoplanets

    NASA Astrophysics Data System (ADS)

    Zucker, Shay; Giryes, Raja

    2018-04-01

    Transits of habitable planets around solar-like stars are expected to be shallow, and to have long periods, which means low information content. The current bottleneck in the detection of such transits is caused in large part by the presence of red (correlated) noise in the light curves obtained from the dedicated space telescopes. Based on the groundbreaking results deep learning achieves in many signal and image processing applications, we propose to use deep neural networks to solve this problem. We present a feasibility study, in which we applied a convolutional neural network on a simulated training set. The training set comprised light curves received from a hypothetical high-cadence space-based telescope. We simulated the red noise by using Gaussian Processes with a wide variety of hyper-parameters. We then tested the network on a completely different test set simulated in the same way. Our study proves that very difficult cases can indeed be detected. Furthermore, we show how detection trends can be studied and detection biases quantified. We have also checked the robustness of the neural-network performance against practical artifacts such as outliers and discontinuities, which are known to affect space-based high-cadence light curves. Future work will allow us to use the neural networks to characterize the transit model and identify individual transits. This new approach will certainly be an indispensable tool for the detection of habitable planets in the future planet-detection space missions such as PLATO.

  2. Fast learning method for convolutional neural networks using extreme learning machine and its application to lane detection.

    PubMed

    Kim, Jihun; Kim, Jonghong; Jang, Gil-Jin; Lee, Minho

    2017-03-01

    Deep learning has received significant attention recently as a promising solution to many problems in the area of artificial intelligence. Among several deep learning architectures, convolutional neural networks (CNNs) demonstrate superior performance when compared to other machine learning methods in the applications of object detection and recognition. We use a CNN for image enhancement and the detection of driving lanes on motorways. In general, the process of lane detection consists of edge extraction and line detection. A CNN can be used to enhance the input images before lane detection by excluding noise and obstacles that are irrelevant to the edge detection result. However, training conventional CNNs requires considerable computation and a big dataset. Therefore, we suggest a new learning algorithm for CNNs using an extreme learning machine (ELM). The ELM is a fast learning method used to calculate network weights between output and hidden layers in a single iteration and thus, can dramatically reduce learning time while producing accurate results with minimal training data. A conventional ELM can be applied to networks with a single hidden layer; as such, we propose a stacked ELM architecture in the CNN framework. Further, we modify the backpropagation algorithm to find the targets of hidden layers and effectively learn network weights while maintaining performance. Experimental results confirm that the proposed method is effective in reducing learning time and improving performance. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. A generalised significance test for individual communities in networks.

    PubMed

    Kojaku, Sadamori; Masuda, Naoki

    2018-05-09

    Many empirical networks have community structure, in which nodes are densely interconnected within each community (i.e., a group of nodes) and sparsely across different communities. Like other local and meso-scale structure of networks, communities are generally heterogeneous in various aspects such as the size, density of edges, connectivity to other communities and significance. In the present study, we propose a method to statistically test the significance of individual communities in a given network. Compared to the previous methods, the present algorithm is unique in that it accepts different community-detection algorithms and the corresponding quality function for single communities. The present method requires that a quality of each community can be quantified and that community detection is performed as optimisation of such a quality function summed over the communities. Various community detection algorithms including modularity maximisation and graph partitioning meet this criterion. Our method estimates a distribution of the quality function for randomised networks to calculate a likelihood of each community in the given network. We illustrate our algorithm by synthetic and empirical networks.

  4. Optimal Detection of a Localized Perturbation in Random Networks of Integrate-and-Fire Neurons.

    PubMed

    Bernardi, Davide; Lindner, Benjamin

    2017-06-30

    Experimental and theoretical studies suggest that cortical networks are chaotic and coding relies on averages over large populations. However, there is evidence that rats can respond to the short stimulation of a single cortical cell, a theoretically unexplained fact. We study effects of single-cell stimulation on a large recurrent network of integrate-and-fire neurons and propose a simple way to detect the perturbation. Detection rates obtained from simulations and analytical estimates are similar to experimental response rates if the readout is slightly biased towards specific neurons. Near-optimal detection is attained for a broad range of intermediate values of the mean coupling between neurons.

  5. Fabric defect detection based on faster R-CNN

    NASA Astrophysics Data System (ADS)

    Liu, Zhoufeng; Liu, Xianghui; Li, Chunlei; Li, Bicao; Wang, Baorui

    2018-04-01

    In order to effectively detect the defects for fabric image with complex texture, this paper proposed a novel detection algorithm based on an end-to-end convolutional neural network. First, the proposal regions are generated by RPN (regional proposal Network). Then, Fast Region-based Convolutional Network method (Fast R-CNN) is adopted to determine whether the proposal regions extracted by RPN is a defect or not. Finally, Soft-NMS (non-maximum suppression) and data augmentation strategies are utilized to improve the detection precision. Experimental results demonstrate that the proposed method can locate the fabric defect region with higher accuracy compared with the state-of- art, and has better adaptability to all kinds of the fabric image.

  6. Optimal Detection of a Localized Perturbation in Random Networks of Integrate-and-Fire Neurons

    NASA Astrophysics Data System (ADS)

    Bernardi, Davide; Lindner, Benjamin

    2017-06-01

    Experimental and theoretical studies suggest that cortical networks are chaotic and coding relies on averages over large populations. However, there is evidence that rats can respond to the short stimulation of a single cortical cell, a theoretically unexplained fact. We study effects of single-cell stimulation on a large recurrent network of integrate-and-fire neurons and propose a simple way to detect the perturbation. Detection rates obtained from simulations and analytical estimates are similar to experimental response rates if the readout is slightly biased towards specific neurons. Near-optimal detection is attained for a broad range of intermediate values of the mean coupling between neurons.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S; Sen, Satyabrata; Berry, M. L..

    Domestic Nuclear Detection Office s (DNDO) Intelligence Radiation Sensors Systems (IRSS) program supported the development of networks of commercial-off-the-shelf (COTS) radiation counters for detecting, localizing, and identifying low-level radiation sources. Under this program, a series of indoor and outdoor tests were conducted with multiple source strengths and types, different background profiles, and various types of source and detector movements. Following the tests, network algorithms were replayed in various re-constructed scenarios using sub-networks. These measurements and algorithm traces together provide a rich collection of highly valuable datasets for testing the current and next generation radiation network algorithms, including the ones (tomore » be) developed by broader R&D communities such as distributed detection, information fusion, and sensor networks. From this multiple TeraByte IRSS database, we distilled out and packaged the first batch of canonical datasets for public release. They include measurements from ten indoor and two outdoor tests which represent increasingly challenging baseline scenarios for robustly testing radiation network algorithms.« less

  8. Application of artificial neural network to search for gravitational-wave signals associated with short gamma-ray bursts

    NASA Astrophysics Data System (ADS)

    Kim, Kyungmin; Harry, Ian W.; Hodge, Kari A.; Kim, Young-Min; Lee, Chang-Hwan; Lee, Hyun Kyu; Oh, John J.; Oh, Sang Hoon; Son, Edwin J.

    2015-12-01

    We apply a machine learning algorithm, the artificial neural network, to the search for gravitational-wave signals associated with short gamma-ray bursts (GRBs). The multi-dimensional samples consisting of data corresponding to the statistical and physical quantities from the coherent search pipeline are fed into the artificial neural network to distinguish simulated gravitational-wave signals from background noise artifacts. Our result shows that the data classification efficiency at a fixed false alarm probability (FAP) is improved by the artificial neural network in comparison to the conventional detection statistic. Specifically, the distance at 50% detection probability at a fixed false positive rate is increased about 8%-14% for the considered waveform models. We also evaluate a few seconds of the gravitational-wave data segment using the trained networks and obtain the FAP. We suggest that the artificial neural network can be a complementary method to the conventional detection statistic for identifying gravitational-wave signals related to the short GRBs.

  9. Detecting network communities beyond assortativity-related attributes

    NASA Astrophysics Data System (ADS)

    Liu, Xin; Murata, Tsuyoshi; Wakita, Ken

    2014-07-01

    In network science, assortativity refers to the tendency of links to exist between nodes with similar attributes. In social networks, for example, links tend to exist between individuals of similar age, nationality, location, race, income, educational level, religious belief, and language. Thus, various attributes jointly affect the network topology. An interesting problem is to detect community structure beyond some specific assortativity-related attributes ρ, i.e., to take out the effect of ρ on network topology and reveal the hidden community structures which are due to other attributes. An approach to this problem is to redefine the null model of the modularity measure, so as to simulate the effect of ρ on network topology. However, a challenge is that we do not know to what extent the network topology is affected by ρ and by other attributes. In this paper, we propose a distance modularity, which allows us to freely choose any suitable function to simulate the effect of ρ. Such freedom can help us probe the effect of ρ and detect the hidden communities which are due to other attributes. We test the effectiveness of distance modularity on synthetic benchmarks and two real-world networks.

  10. From trees to forest: relational complexity network and workload of air traffic controllers.

    PubMed

    Zhang, Jingyu; Yang, Jiazhong; Wu, Changxu

    2015-01-01

    In this paper, we propose a relational complexity (RC) network framework based on RC metric and network theory to model controllers' workload in conflict detection and resolution. We suggest that, at the sector level, air traffic showing a centralised network pattern can provide cognitive benefits in visual search and resolution decision which will in turn result in lower workload. We found that the network centralisation index can account for more variance in predicting perceived workload and task completion time in both a static conflict detection task (Study 1) and a dynamic one (Study 2) in addition to other aircraft-level and pair-level factors. This finding suggests that linear combination of aircraft-level or dyad-level information may not be adequate and the global-pattern-based index is necessary. Theoretical and practical implications of using this framework to improve future workload modelling and management are discussed. We propose a RC network framework to model the workload of air traffic controllers. The effect of network centralisation was examined in both a static conflict detection task and a dynamic one. Network centralisation was predictive of perceived workload and task completion time over and above other control variables.

  11. Predicting and Detecting Emerging Cyberattack Patterns Using StreamWorks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chin, George; Choudhury, Sutanay; Feo, John T.

    2014-06-30

    The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network. Such cyberattack graphs could providemore » cybersecurity analysts with powerful conceptual representations that are natural to express and analyze. We have been researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection. The advanced dynamic graph algorithms we are developing will be packaged into a streaming network analysis framework known as StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns. The scalable emerging subgraph pattern algorithms will match on both structural and semantic network properties.« less

  12. The Network for the Detection of Atmospheric Composition Change (NDACC): history, status and perspectives

    NASA Astrophysics Data System (ADS)

    De Mazière, Martine; Thompson, Anne M.; Kurylo, Michael J.; Wild, Jeannette D.; Bernhard, Germar; Blumenstock, Thomas; Braathen, Geir O.; Hannigan, James W.; Lambert, Jean-Christopher; Leblanc, Thierry; McGee, Thomas J.; Nedoluha, Gerald; Petropavlovskikh, Irina; Seckmeyer, Gunther; Simon, Paul C.; Steinbrecht, Wolfgang; Strahan, Susan E.

    2018-04-01

    The Network for the Detection of Atmospheric Composition Change (NDACC) is an international global network of more than 90 stations making high-quality measurements of atmospheric composition that began official operations in 1991 after 5 years of planning. Apart from sonde measurements, all measurements in the network are performed by ground-based remote-sensing techniques. Originally named the Network for the Detection of Stratospheric Change (NDSC), the name of the network was changed to NDACC in 2005 to better reflect the expanded scope of its measurements. The primary goal of NDACC is to establish long-term databases for detecting changes and trends in the chemical and physical state of the atmosphere (mesosphere, stratosphere, and troposphere) and to assess the coupling of such changes with climate and air quality. NDACC's origins, station locations, organizational structure, and data archiving are described. NDACC is structured around categories of ground-based observational techniques (sonde, lidar, microwave radiometers, Fourier-transform infrared, UV-visible DOAS (differential optical absorption spectroscopy)-type, and Dobson-Brewer spectrometers, as well as spectral UV radiometers), timely cross-cutting themes (ozone, water vapour, measurement strategies, cross-network data integration), satellite measurement systems, and theory and analyses. Participation in NDACC requires compliance with strict measurement and data protocols to ensure that the network data are of high and consistent quality. To widen its scope, NDACC has established formal collaborative agreements with eight other cooperating networks and Global Atmosphere Watch (GAW). A brief history is provided, major accomplishments of NDACC during its first 25 years of operation are reviewed, and a forward-looking perspective is presented.

  13. The Network for the Detection of Atmospheric Composition Change (NDACC): History, Status and Perspectives

    NASA Technical Reports Server (NTRS)

    Simon, Paul C.; De Maziere, Martine; Bernhard, Germar; Blumenstock, Thomas; McGee, Thomas J.; Petropavlovskikh, Irina; Steinbrecht, Wolfgang; Wild, Jeannette D.; Lambert, Jean-Christopher; Seckmeyer, Gunther; hide

    2018-01-01

    The Network for the Detection of Atmospheric Composition Change (NDACC) is an international global network of more than 90 stations making high-quality measurements of atmospheric composition that began official operations in 1991 after 5 years of planning. Apart from sonde measurements, all measurements in the network are performed by ground-based remote-sensing techniques. Originally named the Network for the Detection of Stratospheric Change (NDSC), the name of the network was changed to NDACC in 2005 to better reflect the expanded scope of its measurements. The primary goal of NDACC is to establish long-term databases for detecting changes and trends in the chemical and physical state of the atmosphere (mesosphere, stratosphere, and troposphere) and to assess the coupling of such changes with climate and air quality. NDACC's origins, station locations, organizational structure, and data archiving are described. NDACC is structured around categories of ground-based observational techniques (sonde, lidar, microwave radiometers, Fourier-transform infrared, UV-visible DOAS (differential optical absorption spectroscopy)-type, and Dobson-Brewer spectrometers, as well as spectral UV radiometers), timely cross-cutting themes (ozone, water vapour, measurement strategies, cross-network data integration), satellite measurement systems, and theory and analyses. Participation in NDACC requires compliance with strict measurement and data protocols to ensure that the network data are of high and consistent quality. To widen its scope, NDACC has established formal collaborative agreements with eight other cooperating networks and Global Atmosphere Watch (GAW). A brief history is provided, major accomplishments of NDACC during its first 25 years of operation are reviewed, and a forward-looking perspective is presented.

  14. Prevalence and test characteristics of national health safety network ventilator-associated events.

    PubMed

    Lilly, Craig M; Landry, Karen E; Sood, Rahul N; Dunnington, Cheryl H; Ellison, Richard T; Bagley, Peter H; Baker, Stephen P; Cody, Shawn; Irwin, Richard S

    2014-09-01

    The primary aim of the study was to measure the test characteristics of the National Health Safety Network ventilator-associated event/ventilator-associated condition constructs for detecting ventilator-associated pneumonia. Its secondary aims were to report the clinical features of patients with National Health Safety Network ventilator-associated event/ventilator-associated condition, measure costs of surveillance, and its susceptibility to manipulation. Prospective cohort study. Two inpatient campuses of an academic medical center. Eight thousand four hundred eight mechanically ventilated adults discharged from an ICU. None. The National Health Safety Network ventilator-associated event/ventilator-associated condition constructs detected less than a third of ventilator-associated pneumonia cases with a sensitivity of 0.325 and a positive predictive value of 0.07. Most National Health Safety Network ventilator-associated event/ventilator-associated condition cases (93%) did not have ventilator-associated pneumonia or other hospital-acquired complications; 71% met the definition for acute respiratory distress syndrome. Similarly, most patients with National Health Safety Network probable ventilator-associated pneumonia did not have ventilator-associated pneumonia because radiographic criteria were not met. National Health Safety Network ventilator-associated event/ventilator-associated condition rates were reduced 93% by an unsophisticated manipulation of ventilator management protocols. The National Health Safety Network ventilator-associated event/ventilator-associated condition constructs failed to detect many patients who had ventilator-associated pneumonia, detected many cases that did not have a hospital complication, and were susceptible to manipulation. National Health Safety Network ventilator-associated event/ventilator-associated condition surveillance did not perform as well as ventilator-associated pneumonia surveillance and had several undesirable characteristics.

  15. A collaborative computing framework of cloud network and WBSN applied to fall detection and 3-D motion reconstruction.

    PubMed

    Lai, Chin-Feng; Chen, Min; Pan, Jeng-Shyang; Youn, Chan-Hyun; Chao, Han-Chieh

    2014-03-01

    As cloud computing and wireless body sensor network technologies become gradually developed, ubiquitous healthcare services prevent accidents instantly and effectively, as well as provides relevant information to reduce related processing time and cost. This study proposes a co-processing intermediary framework integrated cloud and wireless body sensor networks, which is mainly applied to fall detection and 3-D motion reconstruction. In this study, the main focuses includes distributed computing and resource allocation of processing sensing data over the computing architecture, network conditions and performance evaluation. Through this framework, the transmissions and computing time of sensing data are reduced to enhance overall performance for the services of fall events detection and 3-D motion reconstruction.

  16. GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harshaw, Chris R; Bridges, Robert A; Iannacone, Michael D

    This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called \\textit{GraphPrints}. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets\\textemdash small induced subgraphs that describe local topology. By performing outlier detection on the sequence of graphlet counts, anomalous intervals of traffic are identified, and furthermore, individual IPs experiencing abnormal behavior are singled-out. Initial testing of GraphPrints is performed on real network data with an implanted anomaly. Evaluation shows false positive rates bounded by 2.84\\% at the time-interval level, and 0.05\\% at the IP-level with 100\\% truemore » positive rates at both.« less

  17. Early driver fatigue detection from electroencephalography signals using artificial neural networks.

    PubMed

    King, L M; Nguyen, H T; Lal, S K L

    2006-01-01

    This paper describes a driver fatigue detection system using an artificial neural network (ANN). Using electroencephalogram (EEG) data sampled from 20 professional truck drivers and 35 non professional drivers, the time domain data are processed into alpha, beta, delta and theta bands and then presented to the neural network to detect the onset of driver fatigue. The neural network uses a training optimization technique called the magnified gradient function (MGF). This technique reduces the time required for training by modifying the standard back propagation (SBP) algorithm. The MGF is shown to classify professional driver fatigue with 81.49% accuracy (80.53% sensitivity, 82.44% specificity) and non-professional driver fatigue with 83.06% accuracy (84.04% sensitivity and 82.08% specificity).

  18. A novel wavelet neural network based pathological stage detection technique for an oral precancerous condition

    PubMed Central

    Paul, R R; Mukherjee, A; Dutta, P K; Banerjee, S; Pal, M; Chatterjee, J; Chaudhuri, K; Mukkerjee, K

    2005-01-01

    Aim: To describe a novel neural network based oral precancer (oral submucous fibrosis; OSF) stage detection method. Method: The wavelet coefficients of transmission electron microscopy images of collagen fibres from normal oral submucosa and OSF tissues were used to choose the feature vector which, in turn, was used to train the artificial neural network. Results: The trained network was able to classify normal and oral precancer stages (less advanced and advanced) after obtaining the image as an input. Conclusions: The results obtained from this proposed technique were promising and suggest that with further optimisation this method could be used to detect and stage OSF, and could be adapted for other conditions. PMID:16126873

  19. Probabilistic Signal Recovery and Random Matrices

    DTIC Science & Technology

    2016-12-08

    applications in statistics , biomedical data analysis, quantization, dimen- sion reduction, and networks science. 1. High-dimensional inference and geometry Our...low-rank approxima- tion, with applications to community detection in networks, Annals of Statistics 44 (2016), 373–400. [7] C. Le, E. Levina, R...approximation, with applications to community detection in networks, Annals of Statistics 44 (2016), 373–400. C. Le, E. Levina, R. Vershynin, Concentration

  20. Design and Evaluation for the End-to-End Detection of TCP/IP Header Manipulation

    DTIC Science & Technology

    2014-06-01

    Cooperative Association for Internet Data Analysis CDN content delivery network CE congestion encountered CRC cyclic redundancy check CWR congestion...Switzerland was primarily developed as a network neutrality analysis tool to detect when internet service providers (ISPs) were interfering with...maximum 200 words) Understanding, measuring, and debugging IP networks , particularly across administrative domains, is challenging. One aspect of the

  1. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Yan

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm ismore » significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.« less

  2. Confabulation Based Real-time Anomaly Detection for Wide-area Surveillance Using Heterogeneous High Performance Computing Architecture

    DTIC Science & Technology

    2015-06-01

    system accuracy. The AnRAD system was also generalized for the additional application of network intrusion detection . A self-structuring technique...to Host- based Intrusion Detection Systems using Contiguous and Discontiguous System Call Patterns,” IEEE Transactions on Computer, 63(4), pp. 807...square kilometer areas. The anomaly recognition and detection (AnRAD) system was built as a cogent confabulation network . It represented road

  3. Evaluation of Long-Range Lightning Detection Networks Using TRMM/LIS Observations

    NASA Technical Reports Server (NTRS)

    Rudlosky, Scott D.; Holzworth, Robert H.; Carey, Lawrence D.; Schultz, Chris J.; Bateman, Monte; Cecil, Daniel J.; Cummins, Kenneth L.; Petersen, Walter A.; Blakeslee, Richard J.; Goodman, Steven J.

    2011-01-01

    Recent advances in long-range lightning detection technologies have improved our understanding of thunderstorm evolution in the data sparse oceanic regions. Although the expansion and improvement of long-range lightning datasets have increased their applicability, these applications (e.g., data assimilation, atmospheric chemistry, and aviation weather hazards) require knowledge of the network detection capabilities. Toward this end, the present study evaluates data from the World Wide Lightning Location Network (WWLLN) using observations from the Lightning Imaging Sensor (LIS) aboard the Tropical Rainfall Measurement Mission (TRMM) satellite. The study documents the WWLLN detection efficiency and location accuracy relative to LIS observations, describes the spatial variability in these performance metrics, and documents the characteristics of LIS flashes that are detected by WWLLN. Improved knowledge of the WWLLN detection capabilities will allow researchers, algorithm developers, and operational users to better prepare for the spatial and temporal coverage of the upcoming GOES-R Geostationary Lightning Mapper (GLM).

  4. An Uncertainty-Based Distributed Fault Detection Mechanism for Wireless Sensor Networks

    PubMed Central

    Yang, Yang; Gao, Zhipeng; Zhou, Hang; Qiu, Xuesong

    2014-01-01

    Exchanging too many messages for fault detection will cause not only a degradation of the network quality of service, but also represents a huge burden on the limited energy of sensors. Therefore, we propose an uncertainty-based distributed fault detection through aided judgment of neighbors for wireless sensor networks. The algorithm considers the serious influence of sensing measurement loss and therefore uses Markov decision processes for filling in missing data. Most important of all, fault misjudgments caused by uncertainty conditions are the main drawbacks of traditional distributed fault detection mechanisms. We draw on the experience of evidence fusion rules based on information entropy theory and the degree of disagreement function to increase the accuracy of fault detection. Simulation results demonstrate our algorithm can effectively reduce communication energy overhead due to message exchanges and provide a higher detection accuracy ratio. PMID:24776937

  5. Container-code recognition system based on computer vision and deep neural networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi; Li, Tianjian; Jiang, Li; Liang, Xiaoyao

    2018-04-01

    Automatic container-code recognition system becomes a crucial requirement for ship transportation industry in recent years. In this paper, an automatic container-code recognition system based on computer vision and deep neural networks is proposed. The system consists of two modules, detection module and recognition module. The detection module applies both algorithms based on computer vision and neural networks, and generates a better detection result through combination to avoid the drawbacks of the two methods. The combined detection results are also collected for online training of the neural networks. The recognition module exploits both character segmentation and end-to-end recognition, and outputs the recognition result which passes the verification. When the recognition module generates false recognition, the result will be corrected and collected for online training of the end-to-end recognition sub-module. By combining several algorithms, the system is able to deal with more situations, and the online training mechanism can improve the performance of the neural networks at runtime. The proposed system is able to achieve 93% of overall recognition accuracy.

  6. Modelling cointegration and Granger causality network to detect long-term equilibrium and diffusion paths in the financial system.

    PubMed

    Gao, Xiangyun; Huang, Shupei; Sun, Xiaoqi; Hao, Xiaoqing; An, Feng

    2018-03-01

    Microscopic factors are the basis of macroscopic phenomena. We proposed a network analysis paradigm to study the macroscopic financial system from a microstructure perspective. We built the cointegration network model and the Granger causality network model based on econometrics and complex network theory and chose stock price time series of the real estate industry and its upstream and downstream industries as empirical sample data. Then, we analysed the cointegration network for understanding the steady long-term equilibrium relationships and analysed the Granger causality network for identifying the diffusion paths of the potential risks in the system. The results showed that the influence from a few key stocks can spread conveniently in the system. The cointegration network and Granger causality network are helpful to detect the diffusion path between the industries. We can also identify and intervene in the transmission medium to curb risk diffusion.

  7. Modelling cointegration and Granger causality network to detect long-term equilibrium and diffusion paths in the financial system

    PubMed Central

    Huang, Shupei; Sun, Xiaoqi; Hao, Xiaoqing; An, Feng

    2018-01-01

    Microscopic factors are the basis of macroscopic phenomena. We proposed a network analysis paradigm to study the macroscopic financial system from a microstructure perspective. We built the cointegration network model and the Granger causality network model based on econometrics and complex network theory and chose stock price time series of the real estate industry and its upstream and downstream industries as empirical sample data. Then, we analysed the cointegration network for understanding the steady long-term equilibrium relationships and analysed the Granger causality network for identifying the diffusion paths of the potential risks in the system. The results showed that the influence from a few key stocks can spread conveniently in the system. The cointegration network and Granger causality network are helpful to detect the diffusion path between the industries. We can also identify and intervene in the transmission medium to curb risk diffusion. PMID:29657804

  8. Detecting central fixation by means of artificial neural networks in a pediatric vision screener using retinal birefringence scanning.

    PubMed

    Gramatikov, Boris I

    2017-04-27

    Reliable detection of central fixation and eye alignment is essential in the diagnosis of amblyopia ("lazy eye"), which can lead to blindness. Our lab has developed and reported earlier a pediatric vision screener that performs scanning of the retina around the fovea and analyzes changes in the polarization state of light as the scan progresses. Depending on the direction of gaze and the instrument design, the screener produces several signal frequencies that can be utilized in the detection of central fixation. The objective of this study was to compare artificial neural networks with classical statistical methods, with respect to their ability to detect central fixation reliably. A classical feedforward, pattern recognition, two-layer neural network architecture was used, consisting of one hidden layer and one output layer. The network has four inputs, representing normalized spectral powers at four signal frequencies generated during retinal birefringence scanning. The hidden layer contains four neurons. The output suggests presence or absence of central fixation. Backpropagation was used to train the network, using the gradient descent algorithm and the cross-entropy error as the performance function. The network was trained, validated and tested on a set of controlled calibration data obtained from 600 measurements from ten eyes in a previous study, and was additionally tested on a clinical set of 78 eyes, independently diagnosed by an ophthalmologist. In the first part of this study, a neural network was designed around the calibration set. With a proper architecture and training, the network provided performance that was comparable to classical statistical methods, allowing perfect separation between the central and paracentral fixation data, with both the sensitivity and the specificity of the instrument being 100%. In the second part of the study, the neural network was applied to the clinical data. It allowed reliable separation between normal subjects and affected subjects, its accuracy again matching that of the statistical methods. With a proper choice of a neural network architecture and a good, uncontaminated training data set, the artificial neural network can be an efficient classification tool for detecting central fixation based on retinal birefringence scanning.

  9. A new hierarchical method to find community structure in networks

    NASA Astrophysics Data System (ADS)

    Saoud, Bilal; Moussaoui, Abdelouahab

    2018-04-01

    Community structure is very important to understand a network which represents a context. Many community detection methods have been proposed like hierarchical methods. In our study, we propose a new hierarchical method for community detection in networks based on genetic algorithm. In this method we use genetic algorithm to split a network into two networks which maximize the modularity. Each new network represents a cluster (community). Then we repeat the splitting process until we get one node at each cluster. We use the modularity function to measure the strength of the community structure found by our method, which gives us an objective metric for choosing the number of communities into which a network should be divided. We demonstrate that our method are highly effective at discovering community structure in both computer-generated and real-world network data.

  10. Detecting Anomalies in Process Control Networks

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Kang, Kyoung-Don

    This paper presents the estimation-inspection algorithm, a statistical algorithm for anomaly detection in process control networks. The algorithm determines if the payload of a network packet that is about to be processed by a control system is normal or abnormal based on the effect that the packet will have on a variable stored in control system memory. The estimation part of the algorithm uses logistic regression integrated with maximum likelihood estimation in an inductive machine learning process to estimate a series of statistical parameters; these parameters are used in conjunction with logistic regression formulas to form a probability mass function for each variable stored in control system memory. The inspection part of the algorithm uses the probability mass functions to estimate the normalcy probability of a specific value that a network packet writes to a variable. Experimental results demonstrate that the algorithm is very effective at detecting anomalies in process control networks.

  11. Detection of pigment network in dermatoscopy images using texture analysis

    PubMed Central

    Anantha, Murali; Moss, Randy H.; Stoecker, William V.

    2011-01-01

    Dermatoscopy, also known as dermoscopy or epiluminescence microscopy (ELM), is a non-invasive, in vivo technique, which permits visualization of features of pigmented melanocytic neoplasms that are not discernable by examination with the naked eye. ELM offers a completely new range of visual features. One such prominent feature is the pigment network. Two texture-based algorithms are developed for the detection of pigment network. These methods are applicable to various texture patterns in dermatoscopy images, including patterns that lack fine lines such as cobblestone, follicular, or thickened network patterns. Two texture algorithms, Laws energy masks and the neighborhood gray-level dependence matrix (NGLDM) large number emphasis, were optimized on a set of 155 dermatoscopy images and compared. Results suggest superiority of Laws energy masks for pigment network detection in dermatoscopy images. For both methods, a texel width of 10 pixels or approximately 0.22 mm is found for dermatoscopy images. PMID:15249068

  12. Using new edges for anomaly detection in computer networks

    DOEpatents

    Neil, Joshua Charles

    2017-07-04

    Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed. Baseline models of behavior among the edges in the network may be established based on the analysis of the historical data. A new edge that deviates from a respective baseline model by more than a predetermined threshold during a time window may be detected. The new edge may be flagged as potentially anomalous when the deviation from the respective baseline model is detected. Probabilities for both new and existing edges may be obtained for all edges in a path or other subgraph. The probabilities may then be combined to obtain a score for the path or other subgraph. A threshold may be obtained by calculating an empirical distribution of the scores under historical conditions.

  13. SNM-DAT: Simulation of a heterogeneous network for nuclear border security

    NASA Astrophysics Data System (ADS)

    Nemzek, R.; Kenyon, G.; Koehler, A.; Lee, D. M.; Priedhorsky, W.; Raby, E. Y.

    2007-08-01

    We approach the problem of detecting Special Nuclear Material (SNM) smuggling across open borders by modeling a heterogeneous sensor network using an agent-based simulation. Our simulation SNM Data Analysis Tool (SNM-DAT) combines fixed seismic, metal, and radiation detectors with a mobile gamma spectrometer. Decision making within the simulation determines threat levels by combined signatures. The spectrometer is a limited-availability asset, and is only deployed for substantial threats. "Crossers" can be benign or carrying shielded SNM. Signatures and sensors are physics based, allowing us to model realistic sensor networks. The heterogeneous network provides great gains in detection efficiency compared to a radiation-only system. We can improve the simulation through better sensor and terrain models, additional signatures, and crossers that mimic actual trans-border traffic. We expect further gains in our ability to design sensor networks as we learn the emergent properties of heterogeneous detection, and potential adversary responses.

  14. Using new edges for anomaly detection in computer networks

    DOEpatents

    Neil, Joshua Charles

    2015-05-19

    Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed. Baseline models of behavior among the edges in the network may be established based on the analysis of the historical data. A new edge that deviates from a respective baseline model by more than a predetermined threshold during a time window may be detected. The new edge may be flagged as potentially anomalous when the deviation from the respective baseline model is detected. Probabilities for both new and existing edges may be obtained for all edges in a path or other subgraph. The probabilities may then be combined to obtain a score for the path or other subgraph. A threshold may be obtained by calculating an empirical distribution of the scores under historical conditions.

  15. Diabetic retinopathy screening using deep neural network.

    PubMed

    Ramachandran, Nishanthan; Hong, Sheng Chiong; Sime, Mary J; Wilson, Graham A

    2017-09-07

    There is a burgeoning interest in the use of deep neural network in diabetic retinal screening. To determine whether a deep neural network could satisfactorily detect diabetic retinopathy that requires referral to an ophthalmologist from a local diabetic retinal screening programme and an international database. Retrospective audit. Diabetic retinal photos from Otago database photographed during October 2016 (485 photos), and 1200 photos from Messidor international database. Receiver operating characteristic curve to illustrate the ability of a deep neural network to identify referable diabetic retinopathy (moderate or worse diabetic retinopathy or exudates within one disc diameter of the fovea). Area under the receiver operating characteristic curve, sensitivity and specificity. For detecting referable diabetic retinopathy, the deep neural network had an area under receiver operating characteristic curve of 0.901 (95% confidence interval 0.807-0.995), with 84.6% sensitivity and 79.7% specificity for Otago and 0.980 (95% confidence interval 0.973-0.986), with 96.0% sensitivity and 90.0% specificity for Messidor. This study has shown that a deep neural network can detect referable diabetic retinopathy with sensitivities and specificities close to or better than 80% from both an international and a domestic (New Zealand) database. We believe that deep neural networks can be integrated into community screening once they can successfully detect both diabetic retinopathy and diabetic macular oedema. © 2017 Royal Australian and New Zealand College of Ophthalmologists.

  16. Detection of 5-hydroxytryptamine (5-HT) in vitro using a hippocampal neuronal network-based biosensor with extracellular potential analysis of neurons.

    PubMed

    Hu, Liang; Wang, Qin; Qin, Zhen; Su, Kaiqi; Huang, Liquan; Hu, Ning; Wang, Ping

    2015-04-15

    5-hydroxytryptamine (5-HT) is an important neurotransmitter in regulating emotions and related behaviors in mammals. To detect and monitor the 5-HT, effective and convenient methods are demanded in investigation of neuronal network. In this study, hippocampal neuronal networks (HNNs) endogenously expressing 5-HT receptors were employed as sensing elements to build an in vitro neuronal network-based biosensor. The electrophysiological characteristics were analyzed in both neuron and network levels. The firing rates and amplitudes were derived from signal to determine the biosensor response characteristics. The experimental results demonstrate a dose-dependent inhibitory effect of 5-HT on hippocampal neuron activities, indicating the effectiveness of this hybrid biosensor in detecting 5-HT with a response range from 0.01μmol/L to 10μmol/L. In addition, the cross-correlation analysis of HNNs activities suggests 5-HT could weaken HNN connectivity reversibly, providing more specificity of this biosensor in detecting 5-HT. Moreover, 5-HT induced spatiotemporal firing pattern alterations could be monitored in neuron and network levels simultaneously by this hybrid biosensor in a convenient and direct way. With those merits, this neuronal network-based biosensor will be promising to be a valuable and utility platform for the study of neurotransmitter in vitro. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. A Probabilistic Approach to Network Event Formation from Pre-Processed Waveform Data

    NASA Astrophysics Data System (ADS)

    Kohl, B. C.; Given, J.

    2017-12-01

    The current state of the art for seismic event detection still largely depends on signal detection at individual sensor stations, including picking accurate arrivals times and correctly identifying phases, and relying on fusion algorithms to associate individual signal detections to form event hypotheses. But increasing computational capability has enabled progress toward the objective of fully utilizing body-wave recordings in an integrated manner to detect events without the necessity of previously recorded ground truth events. In 2011-2012 Leidos (then SAIC) operated a seismic network to monitor activity associated with geothermal field operations in western Nevada. We developed a new association approach for detecting and quantifying events by probabilistically combining pre-processed waveform data to deal with noisy data and clutter at local distance ranges. The ProbDet algorithm maps continuous waveform data into continuous conditional probability traces using a source model (e.g. Brune earthquake or Mueller-Murphy explosion) to map frequency content and an attenuation model to map amplitudes. Event detection and classification is accomplished by combining the conditional probabilities from the entire network using a Bayesian formulation. This approach was successful in producing a high-Pd, low-Pfa automated bulletin for a local network and preliminary tests with regional and teleseismic data show that it has promise for global seismic and nuclear monitoring applications. The approach highlights several features that we believe are essential to achieving low-threshold automated event detection: Minimizes the utilization of individual seismic phase detections - in traditional techniques, errors in signal detection, timing, feature measurement and initial phase ID compound and propagate into errors in event formation, Has a formalized framework that utilizes information from non-detecting stations, Has a formalized framework that utilizes source information, in particular the spectral characteristics of events of interest, Is entirely model-based, i.e. does not rely on a priori's - particularly important for nuclear monitoring, Does not rely on individualized signal detection thresholds - it's the network solution that matters.

  18. Convolution neural networks for real-time needle detection and localization in 2D ultrasound.

    PubMed

    Mwikirize, Cosmas; Nosher, John L; Hacihaliloglu, Ilker

    2018-05-01

    We propose a framework for automatic and accurate detection of steeply inserted needles in 2D ultrasound data using convolution neural networks. We demonstrate its application in needle trajectory estimation and tip localization. Our approach consists of a unified network, comprising a fully convolutional network (FCN) and a fast region-based convolutional neural network (R-CNN). The FCN proposes candidate regions, which are then fed to a fast R-CNN for finer needle detection. We leverage a transfer learning paradigm, where the network weights are initialized by training with non-medical images, and fine-tuned with ex vivo ultrasound scans collected during insertion of a 17G epidural needle into freshly excised porcine and bovine tissue at depth settings up to 9 cm and [Formula: see text]-[Formula: see text] insertion angles. Needle detection results are used to accurately estimate needle trajectory from intensity invariant needle features and perform needle tip localization from an intensity search along the needle trajectory. Our needle detection model was trained and validated on 2500 ex vivo ultrasound scans. The detection system has a frame rate of 25 fps on a GPU and achieves 99.6% precision, 99.78% recall rate and an [Formula: see text] score of 0.99. Validation for needle localization was performed on 400 scans collected using a different imaging platform, over a bovine/porcine lumbosacral spine phantom. Shaft localization error of [Formula: see text], tip localization error of [Formula: see text] mm, and a total processing time of 0.58 s were achieved. The proposed method is fully automatic and provides robust needle localization results in challenging scanning conditions. The accurate and robust results coupled with real-time detection and sub-second total processing make the proposed method promising in applications for needle detection and localization during challenging minimally invasive ultrasound-guided procedures.

  19. Markov Dynamics as a Zooming Lens for Multiscale Community Detection: Non Clique-Like Communities and the Field-of-View Limit

    PubMed Central

    Schaub, Michael T.; Delvenne, Jean-Charles; Yaliraki, Sophia N.; Barahona, Mauricio

    2012-01-01

    In recent years, there has been a surge of interest in community detection algorithms for complex networks. A variety of computational heuristics, some with a long history, have been proposed for the identification of communities or, alternatively, of good graph partitions. In most cases, the algorithms maximize a particular objective function, thereby finding the ‘right’ split into communities. Although a thorough comparison of algorithms is still lacking, there has been an effort to design benchmarks, i.e., random graph models with known community structure against which algorithms can be evaluated. However, popular community detection methods and benchmarks normally assume an implicit notion of community based on clique-like subgraphs, a form of community structure that is not always characteristic of real networks. Specifically, networks that emerge from geometric constraints can have natural non clique-like substructures with large effective diameters, which can be interpreted as long-range communities. In this work, we show that long-range communities escape detection by popular methods, which are blinded by a restricted ‘field-of-view’ limit, an intrinsic upper scale on the communities they can detect. The field-of-view limit means that long-range communities tend to be overpartitioned. We show how by adopting a dynamical perspective towards community detection [1], [2], in which the evolution of a Markov process on the graph is used as a zooming lens over the structure of the network at all scales, one can detect both clique- or non clique-like communities without imposing an upper scale to the detection. Consequently, the performance of algorithms on inherently low-diameter, clique-like benchmarks may not always be indicative of equally good results in real networks with local, sparser connectivity. We illustrate our ideas with constructive examples and through the analysis of real-world networks from imaging, protein structures and the power grid, where a multiscale structure of non clique-like communities is revealed. PMID:22384178

  20. NCI Awards 18 Grants to Continue the Early Detection Research Network (EDRN) Biomarkers Effort | Division of Cancer Prevention

    Cancer.gov

    The NCI has awarded 18 grants to continue the Early Detection Research Network (EDRN), a national infrastructure that supports the integrated development, validation, and clinical application of biomarkers for the early detection of cancer. The awards fund 7 Biomarker Developmental Laboratories, 8 Clinical Validation Centers, 2 Biomarker Reference Laboratories, and a Data

  1. How Travel Demand Affects Detection of Non-Recurrent Traffic Congestion on Urban Road Networks

    NASA Astrophysics Data System (ADS)

    Anbaroglu, B.; Heydecker, B.; Cheng, T.

    2016-06-01

    Occurrence of non-recurrent traffic congestion hinders the economic activity of a city, as travellers could miss appointments or be late for work or important meetings. Similarly, for shippers, unexpected delays may disrupt just-in-time delivery and manufacturing processes, which could lose them payment. Consequently, research on non-recurrent congestion detection on urban road networks has recently gained attention. By analysing large amounts of traffic data collected on a daily basis, traffic operation centres can improve their methods to detect non-recurrent congestion rapidly and then revise their existing plans to mitigate its effects. Space-time clusters of high link journey time estimates correspond to non-recurrent congestion events. Existing research, however, has not considered the effect of travel demand on the effectiveness of non-recurrent congestion detection methods. Therefore, this paper investigates how travel demand affects detection of non-recurrent traffic congestion detection on urban road networks. Travel demand has been classified into three categories as low, normal and high. The experiments are carried out on London's urban road network, and the results demonstrate the necessity to adjust the relative importance of the component evaluation criteria depending on the travel demand level.

  2. Fiber Bragg Grating Sensor for Fault Detection in Radial and Network Transmission Lines

    PubMed Central

    Moghadas, Amin A.; Shadaram, Mehdi

    2010-01-01

    In this paper, a fiber optic based sensor capable of fault detection in both radial and network overhead transmission power line systems is investigated. Bragg wavelength shift is used to measure the fault current and detect fault in power systems. Magnetic fields generated by currents in the overhead transmission lines cause a strain in magnetostrictive material which is then detected by Fiber Bragg Grating (FBG). The Fiber Bragg interrogator senses the reflected FBG signals, and the Bragg wavelength shift is calculated and the signals are processed. A broadband light source in the control room scans the shift in the reflected signal. Any surge in the magnetic field relates to an increased fault current at a certain location. Also, fault location can be precisely defined with an artificial neural network (ANN) algorithm. This algorithm can be easily coordinated with other protective devices. It is shown that the faults in the overhead transmission line cause a detectable wavelength shift on the reflected signal of FBG and can be used to detect and classify different kind of faults. The proposed method has been extensively tested by simulation and results confirm that the proposed scheme is able to detect different kinds of fault in both radial and network system. PMID:22163416

  3. Identification of Patient Zero in Static and Temporal Networks: Robustness and Limitations

    NASA Astrophysics Data System (ADS)

    Antulov-Fantulin, Nino; Lančić, Alen; Šmuc, Tomislav; Štefančić, Hrvoje; Šikić, Mile

    2015-06-01

    Detection of patient zero can give new insights to epidemiologists about the nature of first transmissions into a population. In this Letter, we study the statistical inference problem of detecting the source of epidemics from a snapshot of spreading on an arbitrary network structure. By using exact analytic calculations and Monte Carlo estimators, we demonstrate the detectability limits for the susceptible-infected-recovered model, which primarily depend on the spreading process characteristics. Finally, we demonstrate the applicability of the approach in a case of a simulated sexually transmitted infection spreading over an empirical temporal network of sexual interactions.

  4. a Cloud Boundary Detection Scheme Combined with Aslic and Cnn Using ZY-3, GF-1/2 Satellite Imagery

    NASA Astrophysics Data System (ADS)

    Guo, Z.; Li, C.; Wang, Z.; Kwok, E.; Wei, X.

    2018-04-01

    Remote sensing optical image cloud detection is one of the most important problems in remote sensing data processing. Aiming at the information loss caused by cloud cover, a cloud detection method based on convolution neural network (CNN) is presented in this paper. Firstly, a deep CNN network is used to extract the multi-level feature generation model of cloud from the training samples. Secondly, the adaptive simple linear iterative clustering (ASLIC) method is used to divide the detected images into superpixels. Finally, the probability of each superpixel belonging to the cloud region is predicted by the trained network model, thereby generating a cloud probability map. The typical region of GF-1/2 and ZY-3 were selected to carry out the cloud detection test, and compared with the traditional SLIC method. The experiment results show that the average accuracy of cloud detection is increased by more than 5 %, and it can detected thin-thick cloud and the whole cloud boundary well on different imaging platforms.

  5. Discovering SIFIs in Interbank Communities

    PubMed Central

    Pecora, Nicolò; Rovira Kaltwasser, Pablo; Spelta, Alessandro

    2016-01-01

    This paper proposes a new methodology based on non-negative matrix factorization to detect communities and to identify central nodes in a network as well as within communities. The method is specifically designed for directed weighted networks and, consequently, it has been applied to the interbank network derived from the e-MID interbank market. In an interbank network indeed links are directed, representing flows of funds between lenders and borrowers. Besides distinguishing between Systemically Important Borrowers and Lenders, the technique complements the detection of systemically important banks, revealing the community structure of the network, that proxies the most plausible areas of contagion of institutions’ distress. PMID:28002445

  6. A spectral method to detect community structure based on distance modularity matrix

    NASA Astrophysics Data System (ADS)

    Yang, Jin-Xuan; Zhang, Xiao-Dong

    2017-08-01

    There are many community organizations in social and biological networks. How to identify these community structure in complex networks has become a hot issue. In this paper, an algorithm to detect community structure of networks is proposed by using spectra of distance modularity matrix. The proposed algorithm focuses on the distance of vertices within communities, rather than the most weakly connected vertex pairs or number of edges between communities. The experimental results show that our method achieves better effectiveness to identify community structure for a variety of real-world networks and computer generated networks with a little more time-consumption.

  7. Methods and systems for detecting abnormal digital traffic

    DOEpatents

    Goranson, Craig A [Kennewick, WA; Burnette, John R [Kennewick, WA

    2011-03-22

    Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.

  8. Network clustering and community detection using modulus of families of loops.

    PubMed

    Shakeri, Heman; Poggi-Corradini, Pietro; Albin, Nathan; Scoglio, Caterina

    2017-01-01

    We study the structure of loops in networks using the notion of modulus of loop families. We introduce an alternate measure of network clustering by quantifying the richness of families of (simple) loops. Modulus tries to minimize the expected overlap among loops by spreading the expected link usage optimally. We propose weighting networks using these expected link usages to improve classical community detection algorithms. We show that the proposed method enhances the performance of certain algorithms, such as spectral partitioning and modularity maximization heuristics, on standard benchmarks.

  9. Nutrient Stress Detection in Corn Using Neural Networks and AVIRIS Hyperspectral Imagery

    NASA Technical Reports Server (NTRS)

    Estep, Lee

    2001-01-01

    AVIRIS image cube data has been processed for the detection of nutrient stress in corn by both known, ratio-type algorithms and by trained neural networks. The USDA Shelton, NE, ARS Variable Rate Nitrogen Application (VRAT) experimental farm was the site used in the study. Upon application of ANOVA and Dunnett multiple comparsion tests on the outcome of both the neural network processing and the ratio-type algorithm results, it was found that the neural network methodology provides a better overall capability to separate nutrient stressed crops from in-field controls.

  10. Saliency detection by conditional generative adversarial network

    NASA Astrophysics Data System (ADS)

    Cai, Xiaoxu; Yu, Hui

    2018-04-01

    Detecting salient objects in images has been a fundamental problem in computer vision. In recent years, deep learning has shown its impressive performance in dealing with many kinds of vision tasks. In this paper, we propose a new method to detect salient objects by using Conditional Generative Adversarial Network (GAN). This type of network not only learns the mapping from RGB images to salient regions, but also learns a loss function for training the mapping. To the best of our knowledge, this is the first time that Conditional GAN has been used in salient object detection. We evaluate our saliency detection method on 2 large publicly available datasets with pixel accurate annotations. The experimental results have shown the significant and consistent improvements over the state-of-the-art method on a challenging dataset, and the testing speed is much faster.

  11. Early distinction system of mine fire in underground by using a neural-network system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ohga, Kotaro; Higuchi, Kiyoshi

    1996-12-31

    In our laboratory, a new detection system using smell detectors was developed to detect the spontaneous combustion of coal and the combustion of other materials used underground. The results of experiments clearly the combustion of materials can be detected earlier by this detection system than by conventional detectors for gas and smoke, and there were significant differences between output data from each smell detector for coal, rubber, oil and wood. In order to discern the source of combustion gases, we have been developing a distinction system using a neural-network system. It has shown successful results in laboratory tests. This papermore » describes our detection system using smell detectors and our distinction system which uses a neural-network system, and presents results of experiments using both systems.« less

  12. Flash Detection Efficiencies of Long Range Lightning Detection Networks During GRIP

    NASA Technical Reports Server (NTRS)

    Mach, Douglas M.; Bateman, Monte G.; Blakeslee, Richard J.

    2012-01-01

    We flew our Lightning Instrument Package (LIP) on the NASA Global Hawk as a part of the Genesis and Rapid Intensification Processes (GRIP) field program. The GRIP program was a NASA Earth science field experiment during the months of August and September, 2010. During the program, the LIP detected lighting from 48 of the 213 of the storms overflown by the Global Hawk. The time and location of tagged LIP flashes can be used as a "ground truth" dataset for checking the detection efficiency of the various long or extended range ground-based lightning detection systems available during the GRIP program. The systems analyzed included Vaisala Long Range (LR), Vaisala GLD360, the World Wide Lightning Location Network (WWLLN), and the Earth Networks Total Lightning Network (ENTLN). The long term goal of our research is to help understand the advantages and limitations of these systems so that we can utilize them for both proxy data applications and cross sensor validation of the GOES-R Geostationary Lightning Mapper (GLM) sensor when it is launched in the 2015 timeframe.

  13. Detecting Mild Traumatic Brain Injury Using Resting State Magnetoencephalographic Connectivity

    PubMed Central

    da Costa, Leodante; Jetly, Rakesh; Pang, Elizabeth W.; Taylor, Margot J.

    2016-01-01

    Accurate means to detect mild traumatic brain injury (mTBI) using objective and quantitative measures remain elusive. Conventional imaging typically detects no abnormalities despite post-concussive symptoms. In the present study, we recorded resting state magnetoencephalograms (MEG) from adults with mTBI and controls. Atlas-guided reconstruction of resting state activity was performed for 90 cortical and subcortical regions, and calculation of inter-regional oscillatory phase synchrony at various frequencies was performed. We demonstrate that mTBI is associated with reduced network connectivity in the delta and gamma frequency range (>30 Hz), together with increased connectivity in the slower alpha band (8–12 Hz). A similar temporal pattern was associated with correlations between network connectivity and the length of time between the injury and the MEG scan. Using such resting state MEG network synchrony we were able to detect mTBI with 88% accuracy. Classification confidence was also correlated with clinical symptom severity scores. These results provide the first evidence that imaging of MEG network connectivity, in combination with machine learning, has the potential to accurately detect and determine the severity of mTBI. PMID:27906973

  14. Using Cognitive Control in Software Defined Networking for Port Scan Detection

    DTIC Science & Technology

    2017-07-01

    ARL-TR-8059 ● July 2017 US Army Research Laboratory Using Cognitive Control in Software-Defined Networking for Port Scan...Cognitive Control in Software-Defined Networking for Port Scan Detection by Vinod K Mishra Computational and Information Sciences Directorate, ARL...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) July 2017 2. REPORT TYPE

  15. A Hopfield neural network for image change detection.

    PubMed

    Pajares, Gonzalo

    2006-09-01

    This paper outlines an optimization relaxation approach based on the analog Hopfield neural network (HNN) for solving the image change detection problem between two images. A difference image is obtained by subtracting pixel by pixel both images. The network topology is built so that each pixel in the difference image is a node in the network. Each node is characterized by its state, which determines if a pixel has changed. An energy function is derived, so that the network converges to stable states. The analog Hopfield's model allows each node to take on analog state values. Unlike most widely used approaches, where binary labels (changed/unchanged) are assigned to each pixel, the analog property provides the strength of the change. The main contribution of this paper is reflected in the customization of the analog Hopfield neural network to derive an automatic image change detection approach. When a pixel is being processed, some existing image change detection procedures consider only interpixel relations on its neighborhood. The main drawback of such approaches is the labeling of this pixel as changed or unchanged according to the information supplied by its neighbors, where its own information is ignored. The Hopfield model overcomes this drawback and for each pixel allows a tradeoff between the influence of its neighborhood and its own criterion. This is mapped under the energy function to be minimized. The performance of the proposed method is illustrated by comparative analysis against some existing image change detection methods.

  16. Formal Methods for Information Protection Technology. Task 2: Mathematical Foundations, Architecture and Principles of Implementation of Multi-Agent Learning Components for Attack Detection in Computer Networks. Part 2

    DTIC Science & Technology

    2003-11-01

    Lafayette, IN 47907. [Lane et al-97b] T. Lane and C . E. Brodley. Sequence matching and learning in anomaly detection for computer security. Proceedings of...Mining, pp 259-263. 1998. [Lane et al-98b] T. Lane and C . E. Brodley. Temporal sequence learning and data reduction for anomaly detection ...W. Lee, C . Park, and S. Stolfo. Towards Automatic Intrusion Detection using NFR. 1st USENIX Workshop on Intrusion Detection and Network Monitoring

  17. Scalable Track Detection in SAR CCD Images

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chow, James G; Quach, Tu-Thach

    Existing methods to detect vehicle tracks in coherent change detection images, a product of combining two synthetic aperture radar images ta ken at different times of the same scene, rely on simple, fast models to label track pixels. These models, however, are often too simple to capture natural track features such as continuity and parallelism. We present a simple convolutional network architecture consisting of a series of 3-by-3 convolutions to detect tracks. The network is trained end-to-end to learn natural track features entirely from data. The network is computationally efficient and improves the F-score on a standard dataset to 0.988,more » up fr om 0.907 obtained by the current state-of-the-art method.« less

  18. Intelligent Foreign Particle Inspection Machine for Injection Liquid Examination Based on Modified Pulse-Coupled Neural Networks

    PubMed Central

    Ge, Ji; Wang, YaoNan; Zhou, BoWen; Zhang, Hui

    2009-01-01

    A biologically inspired spiking neural network model, called pulse-coupled neural networks (PCNN), has been applied in an automatic inspection machine to detect visible foreign particles intermingled in glucose or sodium chloride injection liquids. Proper mechanisms and improved spin/stop techniques are proposed to avoid the appearance of air bubbles, which increases the algorithms' complexity. Modified PCNN is adopted to segment the difference images, judging the existence of foreign particles according to the continuity and smoothness properties of their moving traces. Preliminarily experimental results indicate that the inspection machine can detect the visible foreign particles effectively and the detection speed, accuracy and correct detection rate also satisfying the needs of medicine preparation. PMID:22412318

  19. Neurometaplasticity: Glucoallostasis control of plasticity of the neural networks of error commission, detection, and correction modulates neuroplasticity to influence task precision

    NASA Astrophysics Data System (ADS)

    Welcome, Menizibeya O.; Dane, Şenol; Mastorakis, Nikos E.; Pereverzev, Vladimir A.

    2017-12-01

    The term "metaplasticity" is a recent one, which means plasticity of synaptic plasticity. Correspondingly, neurometaplasticity simply means plasticity of neuroplasticity, indicating that a previous plastic event determines the current plasticity of neurons. Emerging studies suggest that neurometaplasticity underlie many neural activities and neurobehavioral disorders. In our previous work, we indicated that glucoallostasis is essential for the control of plasticity of the neural network that control error commission, detection and correction. Here we review recent works, which suggest that task precision depends on the modulatory effects of neuroplasticity on the neural networks of error commission, detection, and correction. Furthermore, we discuss neurometaplasticity and its role in error commission, detection, and correction.

  20. Improving the Detectability of the Catalan Seismic Network for Local Seismic Activity Monitoring

    NASA Astrophysics Data System (ADS)

    Jara, Jose Antonio; Frontera, Tànit; Batlló, Josep; Goula, Xavier

    2016-04-01

    The seismic survey of the territory of Catalonia is mainly performed by the regional seismic network operated by the Cartographic and Geologic Institute of Catalonia (ICGC). After successive deployments and upgrades, the current network consists of 16 permanent stations equipped with 3 component broadband seismometers (STS2, STS2.5, CMG3ESP and CMG3T), 24 bits digitizers (Nanometrics Trident) and VSAT telemetry. Data are continuously sent in real-time via Hispasat 1D satellite to the ICGC datacenter in Barcelona. Additionally, data from other 10 stations of neighboring areas (Spain, France and Andorra) are continuously received since 2011 via Internet or VSAT, contributing both to detect and to locate events affecting the region. More than 300 local events with Ml ≥ 0.7 have been yearly detected and located in the region. Nevertheless, small magnitude earthquakes, especially those located in the south and south-west of Catalonia may still go undetected by the automatic detection system (DAS), based on Earthworm (USGS). Thus, in order to improve the detection and characterization of these missed events, one or two new stations should be installed. Before making the decision about where to install these new stations, the performance of each existing station is evaluated taking into account the fraction of detected events using the station records, compared to the total number of events in the catalogue, occurred during the station operation time from January 1, 2011 to December 31, 2014. These evaluations allow us to build an Event Detection Probability Map (EDPM), a required tool to simulate EDPMs resulting from different network topology scenarios depending on where these new stations are sited, and becoming essential for the decision-making process to increase and optimize the event detection probability of the seismic network.

  1. Network traffic intelligence using a low interaction honeypot

    NASA Astrophysics Data System (ADS)

    Nyamugudza, Tendai; Rajasekar, Venkatesh; Sen, Prasad; Nirmala, M.; Madhu Viswanatham, V.

    2017-11-01

    Advancements in networking technology have seen more and more devices becoming connected day by day. This has given organizations capacity to extend their networks beyond their boundaries to remote offices and remote employees. However as the network grows security becomes a major challenge since the attack surface also increases. There is need to guard the network against different types of attacks like intrusion and malware through using different tools at different networking levels. This paper describes how network intelligence can be acquired through implementing a low-interaction honeypot which detects and track network intrusion. Honeypot allows an organization to interact and gather information about an attack earlier before it compromises the network. This process is important because it allows the organization to learn about future attacks of the same nature and allows them to develop counter measures. The paper further shows how honeypot-honey net based model for interruption detection system (IDS) can be used to get the best valuable information about the attacker and prevent unexpected harm to the network.

  2. Colonic mucosal gene expression and genotype in irritable bowel syndrome patients with normal or elevated fecal bile acid excretion

    PubMed Central

    Carlson, Paula; Acosta, Andres; Busciglio, Irene

    2015-01-01

    The mucosal gene expression in rectosigmoid mucosa (RSM) in irritable bowel syndrome with diarrhea (IBS-D) is unknown. Our objectives were, first, to study mRNA expression [by RT2 PCR of 19 genes pertaining to tight junctions, immune activation, intestinal ion transport and bile acid (BA) homeostasis] in RSM in IBS-D patients (n = 47) and healthy controls (n = 17) and study expression of a selected protein (PDZD3) in 10 IBS-D patients and 4 healthy controls; second, to assess RSM mRNA expression according to genotype and fecal BA excretion (high ≥2,337 μmol/48 h); and third, to determine whether genotype or mucosal mRNA expression is associated with colonic transit or BA parameters. Fold changes were corrected for false detection rate for 19 genes studied (P < 0.00263). In RSM in IBS-D patients compared with controls, mRNA expression of GUC2AB, PDZD3, and PR2Y4 was increased, whereas CLDN1 and FN1 were decreased. One immune-related gene was upregulated (C4BP4) and one downregulated (CCL20). There was increased expression of a selected ion transport protein (PDZD3) on immunohistochemistry and Western blot in IBS-D compared with controls (P = 0.02). There were no significant differences in mucosal mRNA in 20 IBS-D patients with high compared with 27 IBS-D patients with normal BA excretion. GPBAR1 (P < 0.05) was associated with colonic transit. We concluded that mucosal ion transport mRNA (for several genes and PDZD3 protein) is upregulated and barrier protein mRNA downregulated in IBS-D compared with healthy controls, independent of genotype. There are no differences in gene expression in IBS-D with high compared with normal fecal BA excretion. PMID:25930081

  3. Colonic mucosal gene expression and genotype in irritable bowel syndrome patients with normal or elevated fecal bile acid excretion.

    PubMed

    Camilleri, Michael; Carlson, Paula; Acosta, Andres; Busciglio, Irene

    2015-07-01

    The mucosal gene expression in rectosigmoid mucosa (RSM) in irritable bowel syndrome with diarrhea (IBS-D) is unknown. Our objectives were, first, to study mRNA expression [by RT(2) PCR of 19 genes pertaining to tight junctions, immune activation, intestinal ion transport and bile acid (BA) homeostasis] in RSM in IBS-D patients (n = 47) and healthy controls (n = 17) and study expression of a selected protein (PDZD3) in 10 IBS-D patients and 4 healthy controls; second, to assess RSM mRNA expression according to genotype and fecal BA excretion (high ≥ 2,337 μmol/48 h); and third, to determine whether genotype or mucosal mRNA expression is associated with colonic transit or BA parameters. Fold changes were corrected for false detection rate for 19 genes studied (P < 0.00263). In RSM in IBS-D patients compared with controls, mRNA expression of GUC2AB, PDZD3, and PR2Y4 was increased, whereas CLDN1 and FN1 were decreased. One immune-related gene was upregulated (C4BP4) and one downregulated (CCL20). There was increased expression of a selected ion transport protein (PDZD3) on immunohistochemistry and Western blot in IBS-D compared with controls (P = 0.02). There were no significant differences in mucosal mRNA in 20 IBS-D patients with high compared with 27 IBS-D patients with normal BA excretion. GPBAR1 (P < 0.05) was associated with colonic transit. We concluded that mucosal ion transport mRNA (for several genes and PDZD3 protein) is upregulated and barrier protein mRNA downregulated in IBS-D compared with healthy controls, independent of genotype. There are no differences in gene expression in IBS-D with high compared with normal fecal BA excretion. Copyright © 2015 the American Physiological Society.

  4. Intrusion Detection System Visualization of Network Alerts

    DTIC Science & Technology

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  5. Detection and Localization of Robotic Tools in Robot-Assisted Surgery Videos Using Deep Neural Networks for Region Proposal and Detection.

    PubMed

    Sarikaya, Duygu; Corso, Jason J; Guru, Khurshid A

    2017-07-01

    Video understanding of robot-assisted surgery (RAS) videos is an active research area. Modeling the gestures and skill level of surgeons presents an interesting problem. The insights drawn may be applied in effective skill acquisition, objective skill assessment, real-time feedback, and human-robot collaborative surgeries. We propose a solution to the tool detection and localization open problem in RAS video understanding, using a strictly computer vision approach and the recent advances of deep learning. We propose an architecture using multimodal convolutional neural networks for fast detection and localization of tools in RAS videos. To the best of our knowledge, this approach will be the first to incorporate deep neural networks for tool detection and localization in RAS videos. Our architecture applies a region proposal network (RPN) and a multimodal two stream convolutional network for object detection to jointly predict objectness and localization on a fusion of image and temporal motion cues. Our results with an average precision of 91% and a mean computation time of 0.1 s per test frame detection indicate that our study is superior to conventionally used methods for medical imaging while also emphasizing the benefits of using RPN for precision and efficiency. We also introduce a new data set, ATLAS Dione, for RAS video understanding. Our data set provides video data of ten surgeons from Roswell Park Cancer Institute, Buffalo, NY, USA, performing six different surgical tasks on the daVinci Surgical System (dVSS) with annotations of robotic tools per frame.

  6. Networked gamma radiation detection system for tactical deployment

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  7. A multi-layer steganographic method based on audio time domain segmented and network steganography

    NASA Astrophysics Data System (ADS)

    Xue, Pengfei; Liu, Hanlin; Hu, Jingsong; Hu, Ronggui

    2018-05-01

    Both audio steganography and network steganography are belong to modern steganography. Audio steganography has a large capacity. Network steganography is difficult to detect or track. In this paper, a multi-layer steganographic method based on the collaboration of them (MLS-ATDSS&NS) is proposed. MLS-ATDSS&NS is realized in two covert layers (audio steganography layer and network steganography layer) by two steps. A new audio time domain segmented steganography (ATDSS) method is proposed in step 1, and the collaboration method of ATDSS and NS is proposed in step 2. The experimental results showed that the advantage of MLS-ATDSS&NS over others is better trade-off between capacity, anti-detectability and robustness, that means higher steganographic capacity, better anti-detectability and stronger robustness.

  8. Wavelet-based higher-order neural networks for mine detection in thermal IR imagery

    NASA Astrophysics Data System (ADS)

    Baertlein, Brian A.; Liao, Wen-Jiao

    2000-08-01

    An image processing technique is described for the detection of miens in RI imagery. The proposed technique is based on a third-order neural network, which processes the output of a wavelet packet transform. The technique is inherently invariant to changes in signature position, rotation and scaling. The well-known memory limitations that arise with higher-order neural networks are addressed by (1) the data compression capabilities of wavelet packets, (2) protections of the image data into a space of similar triangles, and (3) quantization of that 'triangle space'. Using these techniques, image chips of size 28 by 28, which would require 0(109) neural net weights, are processed by a network having 0(102) weights. ROC curves are presented for mine detection in real and simulated imagery.

  9. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  10. Detection of generalized synchronization using echo state networks

    NASA Astrophysics Data System (ADS)

    Ibáñez-Soria, D.; Garcia-Ojalvo, J.; Soria-Frisch, A.; Ruffini, G.

    2018-03-01

    Generalized synchronization between coupled dynamical systems is a phenomenon of relevance in applications that range from secure communications to physiological modelling. Here, we test the capabilities of reservoir computing and, in particular, echo state networks for the detection of generalized synchronization. A nonlinear dynamical system consisting of two coupled Rössler chaotic attractors is used to generate temporal series consisting of time-locked generalized synchronized sequences interleaved with unsynchronized ones. Correctly tuned, echo state networks are able to efficiently discriminate between unsynchronized and synchronized sequences even in the presence of relatively high levels of noise. Compared to other state-of-the-art techniques of synchronization detection, the online capabilities of the proposed Echo State Network based methodology make it a promising choice for real-time applications aiming to monitor dynamical synchronization changes in continuous signals.

  11. High-speed and high-fidelity system and method for collecting network traffic

    DOEpatents

    Weigle, Eric H [Los Alamos, NM

    2010-08-24

    A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

  12. Online Community Detection for Large Complex Networks

    PubMed Central

    Pan, Gang; Zhang, Wangsheng; Wu, Zhaohui; Li, Shijian

    2014-01-01

    Complex networks describe a wide range of systems in nature and society. To understand complex networks, it is crucial to investigate their community structure. In this paper, we develop an online community detection algorithm with linear time complexity for large complex networks. Our algorithm processes a network edge by edge in the order that the network is fed to the algorithm. If a new edge is added, it just updates the existing community structure in constant time, and does not need to re-compute the whole network. Therefore, it can efficiently process large networks in real time. Our algorithm optimizes expected modularity instead of modularity at each step to avoid poor performance. The experiments are carried out using 11 public data sets, and are measured by two criteria, modularity and NMI (Normalized Mutual Information). The results show that our algorithm's running time is less than the commonly used Louvain algorithm while it gives competitive performance. PMID:25061683

  13. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  14. Automatic Ship Detection in Remote Sensing Images from Google Earth of Complex Scenes Based on Multiscale Rotation Dense Feature Pyramid Networks

    NASA Astrophysics Data System (ADS)

    Yang, Xue; Sun, Hao; Fu, Kun; Yang, Jirui; Sun, Xian; Yan, Menglong; Guo, Zhi

    2018-01-01

    Ship detection has been playing a significant role in the field of remote sensing for a long time but it is still full of challenges. The main limitations of traditional ship detection methods usually lie in the complexity of application scenarios, the difficulty of intensive object detection and the redundancy of detection region. In order to solve such problems above, we propose a framework called Rotation Dense Feature Pyramid Networks (R-DFPN) which can effectively detect ship in different scenes including ocean and port. Specifically, we put forward the Dense Feature Pyramid Network (DFPN), which is aimed at solving the problem resulted from the narrow width of the ship. Compared with previous multi-scale detectors such as Feature Pyramid Network (FPN), DFPN builds the high-level semantic feature-maps for all scales by means of dense connections, through which enhances the feature propagation and encourages the feature reuse. Additionally, in the case of ship rotation and dense arrangement, we design a rotation anchor strategy to predict the minimum circumscribed rectangle of the object so as to reduce the redundant detection region and improve the recall. Furthermore, we also propose multi-scale ROI Align for the purpose of maintaining the completeness of semantic and spatial information. Experiments based on remote sensing images from Google Earth for ship detection show that our detection method based on R-DFPN representation has a state-of-the-art performance.

  15. A multiscale method for a robust detection of the default mode network

    NASA Astrophysics Data System (ADS)

    Baquero, Katherine; Gómez, Francisco; Cifuentes, Christian; Guldenmund, Pieter; Demertzi, Athena; Vanhaudenhuyse, Audrey; Gosseries, Olivia; Tshibanda, Jean-Flory; Noirhomme, Quentin; Laureys, Steven; Soddu, Andrea; Romero, Eduardo

    2013-11-01

    The Default Mode Network (DMN) is a resting state network widely used for the analysis and diagnosis of mental disorders. It is normally detected in fMRI data, but for its detection in data corrupted by motion artefacts or low neuronal activity, the use of a robust analysis method is mandatory. In fMRI it has been shown that the signal-to-noise ratio (SNR) and the detection sensitivity of neuronal regions is increased with di erent smoothing kernels sizes. Here we propose to use a multiscale decomposition based of a linear scale-space representation for the detection of the DMN. Three main points are proposed in this methodology: rst, the use of fMRI data at di erent smoothing scale-spaces, second, detection of independent neuronal components of the DMN at each scale by using standard preprocessing methods and ICA decomposition at scale-level, and nally, a weighted contribution of each scale by the Goodness of Fit measurement. This method was applied to a group of control subjects and was compared with a standard preprocesing baseline. The detection of the DMN was improved at single subject level and at group level. Based on these results, we suggest to use this methodology to enhance the detection of the DMN in data perturbed with artefacts or applied to subjects with low neuronal activity. Furthermore, the multiscale method could be extended for the detection of other resting state neuronal networks.

  16. Automated Detection of Clinically Significant Prostate Cancer in mp-MRI Images Based on an End-to-End Deep Neural Network.

    PubMed

    Wang, Zhiwei; Liu, Chaoyue; Cheng, Danpeng; Wang, Liang; Yang, Xin; Cheng, Kwang-Ting

    2018-05-01

    Automated methods for detecting clinically significant (CS) prostate cancer (PCa) in multi-parameter magnetic resonance images (mp-MRI) are of high demand. Existing methods typically employ several separate steps, each of which is optimized individually without considering the error tolerance of other steps. As a result, they could either involve unnecessary computational cost or suffer from errors accumulated over steps. In this paper, we present an automated CS PCa detection system, where all steps are optimized jointly in an end-to-end trainable deep neural network. The proposed neural network consists of concatenated subnets: 1) a novel tissue deformation network (TDN) for automated prostate detection and multimodal registration and 2) a dual-path convolutional neural network (CNN) for CS PCa detection. Three types of loss functions, i.e., classification loss, inconsistency loss, and overlap loss, are employed for optimizing all parameters of the proposed TDN and CNN. In the training phase, the two nets mutually affect each other and effectively guide registration and extraction of representative CS PCa-relevant features to achieve results with sufficient accuracy. The entire network is trained in a weakly supervised manner by providing only image-level annotations (i.e., presence/absence of PCa) without exact priors of lesions' locations. Compared with most existing systems which require supervised labels, e.g., manual delineation of PCa lesions, it is much more convenient for clinical usage. Comprehensive evaluation based on fivefold cross validation using 360 patient data demonstrates that our system achieves a high accuracy for CS PCa detection, i.e., a sensitivity of 0.6374 and 0.8978 at 0.1 and 1 false positives per normal/benign patient.

  17. Dynamic Network Change Detection

    DTIC Science & Technology

    2008-12-01

    Change Detection 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...Fisher and Mackenzie, 1922). These methods are used in quality engineering to detect small changes in a process (Montgomery, 1991; Ryan , 2000). Larger...Social Network Modeling and Analysis: Workshop Summary and Papers, Ronald Breiger, Kathleen Carley, and Philippa Pattison, (Eds

  18. Efficient and accurate Greedy Search Methods for mining functional modules in protein interaction networks.

    PubMed

    He, Jieyue; Li, Chaojun; Ye, Baoliu; Zhong, Wei

    2012-06-25

    Most computational algorithms mainly focus on detecting highly connected subgraphs in PPI networks as protein complexes but ignore their inherent organization. Furthermore, many of these algorithms are computationally expensive. However, recent analysis indicates that experimentally detected protein complexes generally contain Core/attachment structures. In this paper, a Greedy Search Method based on Core-Attachment structure (GSM-CA) is proposed. The GSM-CA method detects densely connected regions in large protein-protein interaction networks based on the edge weight and two criteria for determining core nodes and attachment nodes. The GSM-CA method improves the prediction accuracy compared to other similar module detection approaches, however it is computationally expensive. Many module detection approaches are based on the traditional hierarchical methods, which is also computationally inefficient because the hierarchical tree structure produced by these approaches cannot provide adequate information to identify whether a network belongs to a module structure or not. In order to speed up the computational process, the Greedy Search Method based on Fast Clustering (GSM-FC) is proposed in this work. The edge weight based GSM-FC method uses a greedy procedure to traverse all edges just once to separate the network into the suitable set of modules. The proposed methods are applied to the protein interaction network of S. cerevisiae. Experimental results indicate that many significant functional modules are detected, most of which match the known complexes. Results also demonstrate that the GSM-FC algorithm is faster and more accurate as compared to other competing algorithms. Based on the new edge weight definition, the proposed algorithm takes advantages of the greedy search procedure to separate the network into the suitable set of modules. Experimental analysis shows that the identified modules are statistically significant. The algorithm can reduce the computational time significantly while keeping high prediction accuracy.

  19. New method for enhanced efficiency in detection of gravitational waves from supernovae using coherent network of detectors

    NASA Astrophysics Data System (ADS)

    Mukherjee, S.; Salazar, L.; Mittelstaedt, J.; Valdez, O.

    2017-11-01

    Supernovae in our universe are potential sources of gravitational waves (GW) that could be detected in a network of GW detectors like LIGO and Virgo. Core-collapse supernovae are rare, but the associated gravitational radiation is likely to carry profuse information about the underlying processes driving the supernovae. Calculations based on analytic models predict GW energies within the detection range of the Advanced LIGO detectors, out to tens of Mpc for certain types of signals e.g. coalescing binary neutron stars. For supernovae however, the corresponding distances are much less. Thus, methods that can improve the sensitivity of searches for GW signals from supernovae are desirable, especially in the advanced detector era. Several methods have been proposed based on various likelihood-based regulators that work on data from a network of detectors to detect burst-like signals (as is the case for signals from supernovae) from potential GW sources. To address this problem, we have developed an analysis pipeline based on a method of noise reduction known as the harmonic regeneration noise reduction (HRNR) algorithm. To demonstrate the method, sixteen supernova waveforms from the Murphy et al. 2009 catalog have been used in presence of LIGO science data. A comparative analysis is presented to show detection statistics for a standard network analysis as commonly used in GW pipelines and the same by implementing the new method in conjunction with the network. The result shows significant improvement in detection statistics.

  20. Imbalance aware lithography hotspot detection: a deep learning approach

    NASA Astrophysics Data System (ADS)

    Yang, Haoyu; Luo, Luyang; Su, Jing; Lin, Chenxi; Yu, Bei

    2017-03-01

    With the advancement of VLSI technology nodes, light diffraction caused lithographic hotspots have become a serious problem affecting manufacture yield. Lithography hotspot detection at the post-OPC stage is imperative to check potential circuit failures when transferring designed patterns onto silicon wafers. Although conventional lithography hotspot detection methods, such as machine learning, have gained satisfactory performance, with extreme scaling of transistor feature size and more and more complicated layout patterns, conventional methodologies may suffer from performance degradation. For example, manual or ad hoc feature extraction in a machine learning framework may lose important information when predicting potential errors in ultra-large-scale integrated circuit masks. In this paper, we present a deep convolutional neural network (CNN) targeting representative feature learning in lithography hotspot detection. We carefully analyze impact and effectiveness of different CNN hyper-parameters, through which a hotspot-detection-oriented neural network model is established. Because hotspot patterns are always minorities in VLSI mask design, the training data set is highly imbalanced. In this situation, a neural network is no longer reliable, because a trained model with high classification accuracy may still suffer from high false negative results (missing hotspots), which is fatal in hotspot detection problems. To address the imbalance problem, we further apply minority upsampling and random-mirror flipping before training the network. Experimental results show that our proposed neural network model achieves highly comparable or better performance on the ICCAD 2012 contest benchmark compared to state-of-the-art hotspot detectors based on deep or representative machine leaning.

  1. Development of module for neural network identification of attacks on applications and services in multi-cloud platforms

    NASA Astrophysics Data System (ADS)

    Parfenov, D. I.; Bolodurina, I. P.

    2018-05-01

    The article presents the results of developing an approach to detecting and protecting against network attacks on the corporate infrastructure deployed on the multi-cloud platform. The proposed approach is based on the combination of two technologies: a softwareconfigurable network and virtualization of network functions. The approach for searching for anomalous traffic is to use a hybrid neural network consisting of a self-organizing Kohonen network and a multilayer perceptron. The study of the work of the prototype of the system for detecting attacks, the method of forming a learning sample, and the course of experiments are described. The study showed that using the proposed approach makes it possible to increase the effectiveness of the obfuscation of various types of attacks and at the same time does not reduce the performance of the network

  2. Network monitoring in the Tier2 site in Prague

    NASA Astrophysics Data System (ADS)

    Eliáš, Marek; Fiala, Lukáš; Horký, Jiří; Chudoba, Jiří; Kouba, Tomáš; Kundrát, Jan; Švec, Jan

    2011-12-01

    Network monitoring provides different types of view on the network traffic. It's output enables computing centre staff to make qualified decisions about changes in the organization of computing centre network and to spot possible problems. In this paper we present network monitoring framework used at Tier-2 in Prague in Institute of Physics (FZU). The framework consists of standard software and custom tools. We discuss our system for hardware failures detection using syslog logging and Nagios active checks, bandwidth monitoring of physical links and analysis of NetFlow exports from Cisco routers. We present tool for automatic detection of network layout based on SNMP. This tool also records topology changes into SVN repository. Adapted weathermap4rrd is used to visualize recorded data to get fast overview showing current bandwidth usage of links in network.

  3. Compressive Network Analysis

    PubMed Central

    Jiang, Xiaoye; Yao, Yuan; Liu, Han; Guibas, Leonidas

    2014-01-01

    Modern data acquisition routinely produces massive amounts of network data. Though many methods and models have been proposed to analyze such data, the research of network data is largely disconnected with the classical theory of statistical learning and signal processing. In this paper, we present a new framework for modeling network data, which connects two seemingly different areas: network data analysis and compressed sensing. From a nonparametric perspective, we model an observed network using a large dictionary. In particular, we consider the network clique detection problem and show connections between our formulation with a new algebraic tool, namely Randon basis pursuit in homogeneous spaces. Such a connection allows us to identify rigorous recovery conditions for clique detection problems. Though this paper is mainly conceptual, we also develop practical approximation algorithms for solving empirical problems and demonstrate their usefulness on real-world datasets. PMID:25620806

  4. Salience network engagement with the detection of morally laden information

    PubMed Central

    Gurvit, Hakan; Spreng, R. Nathan

    2017-01-01

    Abstract Moral cognition is associated with activation of the default network, regions implicated in mentalizing about one’s own actions or the intentions of others. Yet little is known about the initial detection of moral information. We examined the neural correlates of moral processing during a narrative completion task, which included an implicit moral salience manipulation. During fMRI scanning, participants read a brief vignette and selected the most semantically congruent sentence from two options to complete the narrative. The options were immoral, moral or neutral statements. RT was fastest for the selection of neutral statements and slowest for immoral statements. Neuroimaging analyses revealed that responses involving morally laden content engaged default and executive control network brain regions including medial and rostral prefrontal cortex, and core regions of the salience network, including anterior insula and dorsal anterior cingulate. Immoral vs moral conditions additionally engaged the salience network. These results implicate the salience network in the detection of moral information, which may modulate downstream default and frontal control network interactions in the service of complex moral reasoning and decision-making processes. These findings suggest that moral cognition involves both bottom-up and top-down attentional processes, mediated by discrete large-scale brain networks and their interactions. PMID:28338944

  5. Exploring the topological sources of robustness against invasion in biological and technological networks.

    PubMed

    Alcalde Cuesta, Fernando; González Sequeiros, Pablo; Lozano Rojo, Álvaro

    2016-02-10

    For a network, the accomplishment of its functions despite perturbations is called robustness. Although this property has been extensively studied, in most cases, the network is modified by removing nodes. In our approach, it is no longer perturbed by site percolation, but evolves after site invasion. The process transforming resident/healthy nodes into invader/mutant/diseased nodes is described by the Moran model. We explore the sources of robustness (or its counterpart, the propensity to spread favourable innovations) of the US high-voltage power grid network, the Internet2 academic network, and the C. elegans connectome. We compare them to three modular and non-modular benchmark networks, and samples of one thousand random networks with the same degree distribution. It is found that, contrary to what happens with networks of small order, fixation probability and robustness are poorly correlated with most of standard statistics, but they depend strongly on the degree distribution. While community detection techniques are able to detect the existence of a central core in Internet2, they are not effective in detecting hierarchical structures whose topological complexity arises from the repetition of a few rules. Box counting dimension and Rent's rule are applied to show a subtle trade-off between topological and wiring complexity.

  6. Power allocation for target detection in radar networks based on low probability of intercept: A cooperative game theoretical strategy

    NASA Astrophysics Data System (ADS)

    Shi, Chenguang; Salous, Sana; Wang, Fei; Zhou, Jianjiang

    2017-08-01

    Distributed radar network systems have been shown to have many unique features. Due to their advantage of signal and spatial diversities, radar networks are attractive for target detection. In practice, the netted radars in radar networks are supposed to maximize their transmit power to achieve better detection performance, which may be in contradiction with low probability of intercept (LPI). Therefore, this paper investigates the problem of adaptive power allocation for radar networks in a cooperative game-theoretic framework such that the LPI performance can be improved. Taking into consideration both the transmit power constraints and the minimum signal to interference plus noise ratio (SINR) requirement of each radar, a cooperative Nash bargaining power allocation game based on LPI is formulated, whose objective is to minimize the total transmit power by optimizing the power allocation in radar networks. First, a novel SINR-based network utility function is defined and utilized as a metric to evaluate power allocation. Then, with the well-designed network utility function, the existence and uniqueness of the Nash bargaining solution are proved analytically. Finally, an iterative Nash bargaining algorithm is developed that converges quickly to a Pareto optimal equilibrium for the cooperative game. Numerical simulations and theoretic analysis are provided to evaluate the effectiveness of the proposed algorithm.

  7. Exploring the topological sources of robustness against invasion in biological and technological networks

    PubMed Central

    Alcalde Cuesta, Fernando; González Sequeiros, Pablo; Lozano Rojo, Álvaro

    2016-01-01

    For a network, the accomplishment of its functions despite perturbations is called robustness. Although this property has been extensively studied, in most cases, the network is modified by removing nodes. In our approach, it is no longer perturbed by site percolation, but evolves after site invasion. The process transforming resident/healthy nodes into invader/mutant/diseased nodes is described by the Moran model. We explore the sources of robustness (or its counterpart, the propensity to spread favourable innovations) of the US high-voltage power grid network, the Internet2 academic network, and the C. elegans connectome. We compare them to three modular and non-modular benchmark networks, and samples of one thousand random networks with the same degree distribution. It is found that, contrary to what happens with networks of small order, fixation probability and robustness are poorly correlated with most of standard statistics, but they depend strongly on the degree distribution. While community detection techniques are able to detect the existence of a central core in Internet2, they are not effective in detecting hierarchical structures whose topological complexity arises from the repetition of a few rules. Box counting dimension and Rent’s rule are applied to show a subtle trade-off between topological and wiring complexity. PMID:26861189

  8. Aquatic invasive species early detection in the Great Lakes: Lessons concerning strategy

    EPA Science Inventory

    Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...

  9. Contamination Event Detection with Multivariate Time-Series Data in Agricultural Water Monitoring †

    PubMed Central

    Mao, Yingchi; Qi, Hai; Ping, Ping; Li, Xiaofang

    2017-01-01

    Time series data of multiple water quality parameters are obtained from the water sensor networks deployed in the agricultural water supply network. The accurate and efficient detection and warning of contamination events to prevent pollution from spreading is one of the most important issues when pollution occurs. In order to comprehensively reduce the event detection deviation, a spatial–temporal-based event detection approach with multivariate time-series data for water quality monitoring (M-STED) was proposed. The M-STED approach includes three parts. The first part is that M-STED adopts a Rule K algorithm to select backbone nodes as the nodes in the CDS, and forward the sensed data of multiple water parameters. The second part is to determine the state of each backbone node with back propagation neural network models and the sequential Bayesian analysis in the current timestamp. The third part is to establish a spatial model with Bayesian networks to estimate the state of the backbones in the next timestamp and trace the “outlier” node to its neighborhoods to detect a contamination event. The experimental results indicate that the average detection rate is more than 80% with M-STED and the false detection rate is lower than 9%, respectively. The M-STED approach can improve the rate of detection by about 40% and reduce the false alarm rate by about 45%, compared with the event detection with a single water parameter algorithm, S-STED. Moreover, the proposed M-STED can exhibit better performance in terms of detection delay and scalability. PMID:29207535

  10. Investigation of a Neural Network Implementation of a TCP Packet Anomaly Detection System

    DTIC Science & Technology

    2004-05-01

    reconnatre les nouvelles variantes d’attaque. Les réseaux de neurones artificiels (ANN) ont les capacités d’apprendre à partir de schémas et de...Computational Intelligence Techniques in Intrusion Detection Systems. In IASTED International Conference on Neural Networks and Computational Intelligence , pp...Neural Network Training: Overfitting May be Harder than Expected. In Proceedings of the Fourteenth National Conference on Artificial Intelligence , AAAI-97

  11. EDRN Standard Operating Procedures (SOP) — EDRN Public Portal

    Cancer.gov

    The NCI’s Early Detection Research Network is developing a number of standard operating procedures for assays, methods, and protocols for collection and processing of biological samples, and other reference materials to assist investigators to conduct experiments in a consistent, reliable manner. These SOPs are established by the investigators of the Early Detection Research Network to maintain constancy throughout the Network. These SOPs represent neither a consensus, nor are the recommendations of NCI.

  12. Autoblocker: a system for detecting and blocking of network scanning based on analysis of netflow data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bobyshev, A.; Lamore, D.; Demar, P.

    2004-12-01

    In a large campus network, such at Fermilab, with tens of thousands of nodes, scanning initiated from either outside of or within the campus network raises security concerns. This scanning may have very serious impact on network performance, and even disrupt normal operation of many services. In this paper we introduce a system for detecting and automatic blocking excessive traffic of different kinds of scanning, DoS attacks, virus infected computers. The system, called AutoBlocker, is a distributed computing system based on quasi-real time analysis of network flow data collected from the border router and core switches. AutoBlocker also has anmore » interface to accept alerts from IDS systems (e.g. BRO, SNORT) that are based on other technologies. The system has multiple configurable alert levels for the detection of anomalous behavior and configurable trigger criteria for automated blocking of scans at the core or border routers. It has been in use at Fermilab for about 2 years, and has become a very valuable tool to curtail scan activity within the Fermilab campus network.« less

  13. A Learning System for Discriminating Variants of Malicious Network Traffic

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Symons, Christopher T; Gillen, Rob

    Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacksmore » and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.« less

  14. Fault detection of Tennessee Eastman process based on topological features and SVM

    NASA Astrophysics Data System (ADS)

    Zhao, Huiyang; Hu, Yanzhu; Ai, Xinbo; Hu, Yu; Meng, Zhen

    2018-03-01

    Fault detection in industrial process is a popular research topic. Although the distributed control system(DCS) has been introduced to monitor the state of industrial process, it still cannot satisfy all the requirements for fault detection of all the industrial systems. In this paper, we proposed a novel method based on topological features and support vector machine(SVM), for fault detection of industrial process. The proposed method takes global information of measured variables into account by complex network model and predicts whether a system has generated some faults or not by SVM. The proposed method can be divided into four steps, i.e. network construction, network analysis, model training and model testing respectively. Finally, we apply the model to Tennessee Eastman process(TEP). The results show that this method works well and can be a useful supplement for fault detection of industrial process.

  15. Region Based CNN for Foreign Object Debris Detection on Airfield Pavement

    PubMed Central

    Cao, Xiaoguang; Wang, Peng; Meng, Cai; Gong, Guoping; Liu, Miaoming; Qi, Jun

    2018-01-01

    In this paper, a novel algorithm based on convolutional neural network (CNN) is proposed to detect foreign object debris (FOD) based on optical imaging sensors. It contains two modules, the improved region proposal network (RPN) and spatial transformer network (STN) based CNN classifier. In the improved RPN, some extra select rules are designed and deployed to generate high quality candidates with fewer numbers. Moreover, the efficiency of CNN detector is significantly improved by introducing STN layer. Compared to faster R-CNN and single shot multiBox detector (SSD), the proposed algorithm achieves better result for FOD detection on airfield pavement in the experiment. PMID:29494524

  16. Driver drowsiness detection using ANN image processing

    NASA Astrophysics Data System (ADS)

    Vesselenyi, T.; Moca, S.; Rus, A.; Mitran, T.; Tătaru, B.

    2017-10-01

    The paper presents a study regarding the possibility to develop a drowsiness detection system for car drivers based on three types of methods: EEG and EOG signal processing and driver image analysis. In previous works the authors have described the researches on the first two methods. In this paper the authors have studied the possibility to detect the drowsy or alert state of the driver based on the images taken during driving and by analyzing the state of the driver’s eyes: opened, half-opened and closed. For this purpose two kinds of artificial neural networks were employed: a 1 hidden layer network and an autoencoder network.

  17. Salient regions detection using convolutional neural networks and color volume

    NASA Astrophysics Data System (ADS)

    Liu, Guang-Hai; Hou, Yingkun

    2018-03-01

    Convolutional neural network is an important technique in machine learning, pattern recognition and image processing. In order to reduce the computational burden and extend the classical LeNet-5 model to the field of saliency detection, we propose a simple and novel computing model based on LeNet-5 network. In the proposed model, hue, saturation and intensity are utilized to extract depth cues, and then we integrate depth cues and color volume to saliency detection following the basic structure of the feature integration theory. Experimental results show that the proposed computing model outperforms some existing state-of-the-art methods on MSRA1000 and ECSSD datasets.

  18. Region Based CNN for Foreign Object Debris Detection on Airfield Pavement.

    PubMed

    Cao, Xiaoguang; Wang, Peng; Meng, Cai; Bai, Xiangzhi; Gong, Guoping; Liu, Miaoming; Qi, Jun

    2018-03-01

    In this paper, a novel algorithm based on convolutional neural network (CNN) is proposed to detect foreign object debris (FOD) based on optical imaging sensors. It contains two modules, the improved region proposal network (RPN) and spatial transformer network (STN) based CNN classifier. In the improved RPN, some extra select rules are designed and deployed to generate high quality candidates with fewer numbers. Moreover, the efficiency of CNN detector is significantly improved by introducing STN layer. Compared to faster R-CNN and single shot multiBox detector (SSD), the proposed algorithm achieves better result for FOD detection on airfield pavement in the experiment.

  19. PROPER: global protein interaction network alignment through percolation matching.

    PubMed

    Kazemi, Ehsan; Hassani, Hamed; Grossglauser, Matthias; Pezeshgi Modarres, Hassan

    2016-12-12

    The alignment of protein-protein interaction (PPI) networks enables us to uncover the relationships between different species, which leads to a deeper understanding of biological systems. Network alignment can be used to transfer biological knowledge between species. Although different PPI-network alignment algorithms were introduced during the last decade, developing an accurate and scalable algorithm that can find alignments with high biological and structural similarities among PPI networks is still challenging. In this paper, we introduce a new global network alignment algorithm for PPI networks called PROPER. Compared to other global network alignment methods, our algorithm shows higher accuracy and speed over real PPI datasets and synthetic networks. We show that the PROPER algorithm can detect large portions of conserved biological pathways between species. Also, using a simple parsimonious evolutionary model, we explain why PROPER performs well based on several different comparison criteria. We highlight that PROPER has high potential in further applications such as detecting biological pathways, finding protein complexes and PPI prediction. The PROPER algorithm is available at http://proper.epfl.ch .

  20. An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2016-03-17

    In wireless sensor networks (WSNs), certain areas of the monitoring region may have coverage holes and serious coverage overlapping due to the random deployment of sensors. The failure of electronic components, software bugs and destructive agents could lead to the random death of the nodes. Sensors may be dead due to exhaustion of battery power, which may cause the network to be uncovered and disconnected. Based on the deployment nature of the nodes in remote or hostile environments, such as a battlefield or desert, it is impossible to recharge or replace the battery. However, the data gathered by the sensors are highly essential for the analysis, and therefore, the collaborative detection of coverage holes has strategic importance in WSNs. In this paper, distributed coverage hole detection algorithms are designed, where nodes can collaborate to detect the coverage holes autonomously. The performance evaluation of our protocols suggests that our protocols outperform in terms of hole detection time, limited power consumption and control packet overhead to detect holes as compared to other similar protocols.

  1. Early detection network design and search strategy issues

    EPA Science Inventory

    We conducted a series of field and related modeling studies (2005-2012) to evaluate search strategies for Great Lakes coastal ecosystems that are at risk of invasion by non-native aquatic species. In developing a network, we should design to achieve an acceptable limit of detect...

  2. System and method for islanding detection and prevention in distributed generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhowmik, Shibashis; Mazhari, Iman; Parkhideh, Babak

    Various examples are directed to systems and methods for detecting an islanding condition at an inverter configured to couple a distributed generation system to an electrical grid network. A controller may determine a command frequency and a command frequency variation. The controller may determine that the command frequency variation indicates a potential islanding condition and send to the inverter an instruction to disconnect the distributed generation system from the electrical grid network. When the distributed generation system is disconnected from the electrical grid network, the controller may determine whether the grid network is valid.

  3. Space shuttle main engine fault detection using neural networks

    NASA Technical Reports Server (NTRS)

    Bishop, Thomas; Greenwood, Dan; Shew, Kenneth; Stevenson, Fareed

    1991-01-01

    A method for on-line Space Shuttle Main Engine (SSME) anomaly detection and fault typing using a feedback neural network is described. The method involves the computation of features representing time-variance of SSME sensor parameters, using historical test case data. The network is trained, using backpropagation, to recognize a set of fault cases. The network is then able to diagnose new fault cases correctly. An essential element of the training technique is the inclusion of randomly generated data along with the real data, in order to span the entire input space of potential non-nominal data.

  4. Comparison between genetic algorithm and self organizing map to detect botnet network traffic

    NASA Astrophysics Data System (ADS)

    Yugandhara Prabhakar, Shinde; Parganiha, Pratishtha; Madhu Viswanatham, V.; Nirmala, M.

    2017-11-01

    In Cyber Security world the botnet attacks are increasing. To detect botnet is a challenging task. Botnet is a group of computers connected in a coordinated fashion to do malicious activities. Many techniques have been developed and used to detect and prevent botnet traffic and the attacks. In this paper, a comparative study is done on Genetic Algorithm (GA) and Self Organizing Map (SOM) to detect the botnet network traffic. Both are soft computing techniques and used in this paper as data analytics system. GA is based on natural evolution process and SOM is an Artificial Neural Network type, uses unsupervised learning techniques. SOM uses neurons and classifies the data according to the neurons. Sample of KDD99 dataset is used as input to GA and SOM.

  5. Community detection in complex networks using link prediction

    NASA Astrophysics Data System (ADS)

    Cheng, Hui-Min; Ning, Yi-Zi; Yin, Zhao; Yan, Chao; Liu, Xin; Zhang, Zhong-Yuan

    2018-01-01

    Community detection and link prediction are both of great significance in network analysis, which provide very valuable insights into topological structures of the network from different perspectives. In this paper, we propose a novel community detection algorithm with inclusion of link prediction, motivated by the question whether link prediction can be devoted to improving the accuracy of community partition. For link prediction, we propose two novel indices to compute the similarity between each pair of nodes, one of which aims to add missing links, and the other tries to remove spurious edges. Extensive experiments are conducted on benchmark data sets, and the results of our proposed algorithm are compared with two classes of baselines. In conclusion, our proposed algorithm is competitive, revealing that link prediction does improve the precision of community detection.

  6. Vehicle Detection in Aerial Images Based on Region Convolutional Neural Networks and Hard Negative Example Mining.

    PubMed

    Tang, Tianyu; Zhou, Shilin; Deng, Zhipeng; Zou, Huanxin; Lei, Lin

    2017-02-10

    Detecting vehicles in aerial imagery plays an important role in a wide range of applications. The current vehicle detection methods are mostly based on sliding-window search and handcrafted or shallow-learning-based features, having limited description capability and heavy computational costs. Recently, due to the powerful feature representations, region convolutional neural networks (CNN) based detection methods have achieved state-of-the-art performance in computer vision, especially Faster R-CNN. However, directly using it for vehicle detection in aerial images has many limitations: (1) region proposal network (RPN) in Faster R-CNN has poor performance for accurately locating small-sized vehicles, due to the relatively coarse feature maps; and (2) the classifier after RPN cannot distinguish vehicles and complex backgrounds well. In this study, an improved detection method based on Faster R-CNN is proposed in order to accomplish the two challenges mentioned above. Firstly, to improve the recall, we employ a hyper region proposal network (HRPN) to extract vehicle-like targets with a combination of hierarchical feature maps. Then, we replace the classifier after RPN by a cascade of boosted classifiers to verify the candidate regions, aiming at reducing false detection by negative example mining. We evaluate our method on the Munich vehicle dataset and the collected vehicle dataset, with improvements in accuracy and robustness compared to existing methods.

  7. Detectability Thresholds and Optimal Algorithms for Community Structure in Dynamic Networks

    NASA Astrophysics Data System (ADS)

    Ghasemian, Amir; Zhang, Pan; Clauset, Aaron; Moore, Cristopher; Peel, Leto

    2016-07-01

    The detection of communities within a dynamic network is a common means for obtaining a coarse-grained view of a complex system and for investigating its underlying processes. While a number of methods have been proposed in the machine learning and physics literature, we lack a theoretical analysis of their strengths and weaknesses, or of the ultimate limits on when communities can be detected. Here, we study the fundamental limits of detecting community structure in dynamic networks. Specifically, we analyze the limits of detectability for a dynamic stochastic block model where nodes change their community memberships over time, but where edges are generated independently at each time step. Using the cavity method, we derive a precise detectability threshold as a function of the rate of change and the strength of the communities. Below this sharp threshold, we claim that no efficient algorithm can identify the communities better than chance. We then give two algorithms that are optimal in the sense that they succeed all the way down to this threshold. The first uses belief propagation, which gives asymptotically optimal accuracy, and the second is a fast spectral clustering algorithm, based on linearizing the belief propagation equations. These results extend our understanding of the limits of community detection in an important direction, and introduce new mathematical tools for similar extensions to networks with other types of auxiliary information.

  8. A Type-2 fuzzy data fusion approach for building reliable weighted protein interaction networks with application in protein complex detection.

    PubMed

    Mehranfar, Adele; Ghadiri, Nasser; Kouhsar, Morteza; Golshani, Ashkan

    2017-09-01

    Detecting the protein complexes is an important task in analyzing the protein interaction networks. Although many algorithms predict protein complexes in different ways, surveys on the interaction networks indicate that about 50% of detected interactions are false positives. Consequently, the accuracy of existing methods needs to be improved. In this paper we propose a novel algorithm to detect the protein complexes in 'noisy' protein interaction data. First, we integrate several biological data sources to determine the reliability of each interaction and determine more accurate weights for the interactions. A data fusion component is used for this step, based on the interval type-2 fuzzy voter that provides an efficient combination of the information sources. This fusion component detects the errors and diminishes their effect on the detection protein complexes. So in the first step, the reliability scores have been assigned for every interaction in the network. In the second step, we have proposed a general protein complex detection algorithm by exploiting and adopting the strong points of other algorithms and existing hypotheses regarding real complexes. Finally, the proposed method has been applied for the yeast interaction datasets for predicting the interactions. The results show that our framework has a better performance regarding precision and F-measure than the existing approaches. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Adaptive Weibull Multiplicative Model and Multilayer Perceptron Neural Networks for Dark-Spot Detection from SAR Imagery

    PubMed Central

    Taravat, Alireza; Oppelt, Natascha

    2014-01-01

    Oil spills represent a major threat to ocean ecosystems and their environmental status. Previous studies have shown that Synthetic Aperture Radar (SAR), as its recording is independent of clouds and weather, can be effectively used for the detection and classification of oil spills. Dark formation detection is the first and critical stage in oil-spill detection procedures. In this paper, a novel approach for automated dark-spot detection in SAR imagery is presented. A new approach from the combination of adaptive Weibull Multiplicative Model (WMM) and MultiLayer Perceptron (MLP) neural networks is proposed to differentiate between dark spots and the background. The results have been compared with the results of a model combining non-adaptive WMM and pulse coupled neural networks. The presented approach overcomes the non-adaptive WMM filter setting parameters by developing an adaptive WMM model which is a step ahead towards a full automatic dark spot detection. The proposed approach was tested on 60 ENVISAT and ERS2 images which contained dark spots. For the overall dataset, an average accuracy of 94.65% was obtained. Our experimental results demonstrate that the proposed approach is very robust and effective where the non-adaptive WMM & pulse coupled neural network (PCNN) model generates poor accuracies. PMID:25474376

  10. A hierarchical detection method in external communication for self-driving vehicles based on TDMA.

    PubMed

    Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.

  11. Seismic envelope-based detection and location of ground-coupled airwaves from volcanoes in Alaska

    USGS Publications Warehouse

    Fee, David; Haney, Matt; Matoza, Robin S.; Szuberla, Curt A.L.; Lyons, John; Waythomas, Christopher F.

    2016-01-01

    Volcanic explosions and other infrasonic sources frequently produce acoustic waves that are recorded by seismometers. Here we explore multiple techniques to detect, locate, and characterize ground‐coupled airwaves (GCA) on volcano seismic networks in Alaska. GCA waveforms are typically incoherent between stations, thus we use envelope‐based techniques in our analyses. For distant sources and planar waves, we use f‐k beamforming to estimate back azimuth and trace velocity parameters. For spherical waves originating within the network, we use two related time difference of arrival (TDOA) methods to detect and localize the source. We investigate a modified envelope function to enhance the signal‐to‐noise ratio and emphasize both high energies and energy contrasts within a spectrogram. We apply these methods to recent eruptions from Cleveland, Veniaminof, and Pavlof Volcanoes, Alaska. Array processing of GCA from Cleveland Volcano on 4 May 2013 produces robust detection and wave characterization. Our modified envelopes substantially improve the short‐term average/long‐term average ratios, enhancing explosion detection. We detect GCA within both the Veniaminof and Pavlof networks from the 2007 and 2013–2014 activity, indicating repeated volcanic explosions. Event clustering and forward modeling suggests that high‐resolution localization is possible for GCA on typical volcano seismic networks. These results indicate that GCA can be used to help detect, locate, characterize, and monitor volcanic eruptions, particularly in difficult‐to‐monitor regions. We have implemented these GCA detection algorithms into our operational volcano‐monitoring algorithms at the Alaska Volcano Observatory.

  12. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  13. Deep learning on temporal-spectral data for anomaly detection

    NASA Astrophysics Data System (ADS)

    Ma, King; Leung, Henry; Jalilian, Ehsan; Huang, Daniel

    2017-05-01

    Detecting anomalies is important for continuous monitoring of sensor systems. One significant challenge is to use sensor data and autonomously detect changes that cause different conditions to occur. Using deep learning methods, we are able to monitor and detect changes as a result of some disturbance in the system. We utilize deep neural networks for sequence analysis of time series. We use a multi-step method for anomaly detection. We train the network to learn spectral and temporal features from the acoustic time series. We test our method using fiber-optic acoustic data from a pipeline.

  14. Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    PubMed Central

    Song, Jae-gu; Jung, Sungmo; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo

    2010-01-01

    This research suggests a Denial of Service (DoS) detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed. PMID:22163475

  15. Network analysis to detect common strategies in Italian foreign direct investment

    NASA Astrophysics Data System (ADS)

    De Masi, G.; Giovannetti, G.; Ricchiuti, G.

    2013-03-01

    In this paper we reconstruct and discuss the network of Italian firms investing abroad, exploiting information from complex network analysis. This method, detecting the key nodes of the system (both in terms of firms and countries of destination), allows us to single out the linkages among firms without ex-ante priors. Moreover, through the examination of affiliates’ economic activity, it allows us to highlight different internationalization strategies of “leaders” in different manufacturing sectors.

  16. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks.

    PubMed

    Alauthaman, Mohammad; Aslam, Nauman; Zhang, Li; Alasem, Rafe; Hossain, M A

    2018-01-01

    In recent years, Botnets have been adopted as a popular method to carry and spread many malicious codes on the Internet. These malicious codes pave the way to execute many fraudulent activities including spam mail, distributed denial-of-service attacks and click fraud. While many Botnets are set up using centralized communication architecture, the peer-to-peer (P2P) Botnets can adopt a decentralized architecture using an overlay network for exchanging command and control data making their detection even more difficult. This work presents a method of P2P Bot detection based on an adaptive multilayer feed-forward neural network in cooperation with decision trees. A classification and regression tree is applied as a feature selection technique to select relevant features. With these features, a multilayer feed-forward neural network training model is created using a resilient back-propagation learning algorithm. A comparison of feature set selection based on the decision tree, principal component analysis and the ReliefF algorithm indicated that the neural network model with features selection based on decision tree has a better identification accuracy along with lower rates of false positives. The usefulness of the proposed approach is demonstrated by conducting experiments on real network traffic datasets. In these experiments, an average detection rate of 99.08 % with false positive rate of 0.75 % was observed.

  17. Adaptive threshold determination for efficient channel sensing in cognitive radio network using mobile sensors

    NASA Astrophysics Data System (ADS)

    Morshed, M. N.; Khatun, S.; Kamarudin, L. M.; Aljunid, S. A.; Ahmad, R. B.; Zakaria, A.; Fakir, M. M.

    2017-03-01

    Spectrum saturation problem is a major issue in wireless communication systems all over the world. Huge number of users is joining each day to the existing fixed band frequency but the bandwidth is not increasing. These requirements demand for efficient and intelligent use of spectrum. To solve this issue, the Cognitive Radio (CR) is the best choice. Spectrum sensing of a wireless heterogeneous network is a fundamental issue to detect the presence of primary users' signals in CR networks. In order to protect primary users (PUs) from harmful interference, the spectrum sensing scheme is required to perform well even in low signal-to-noise ratio (SNR) environments. Meanwhile, the sensing period is usually required to be short enough so that secondary (unlicensed) users (SUs) can fully utilize the available spectrum. CR networks can be designed to manage the radio spectrum more efficiently by utilizing the spectrum holes in primary user's licensed frequency bands. In this paper, we have proposed an adaptive threshold detection method to detect presence of PU signal using free space path loss (FSPL) model in 2.4 GHz WLAN network. The model is designed for mobile sensors embedded in smartphones. The mobile sensors acts as SU while the existing WLAN network (channels) works as PU. The theoretical results show that the desired threshold range detection of mobile sensors mainly depends on the noise floor level of the location in consideration.

  18. Distributed fault detection over sensor networks with Markovian switching topologies

    NASA Astrophysics Data System (ADS)

    Ge, Xiaohua; Han, Qing-Long

    2014-05-01

    This paper deals with the distributed fault detection for discrete-time Markov jump linear systems over sensor networks with Markovian switching topologies. The sensors are scatteredly deployed in the sensor field and the fault detectors are physically distributed via a communication network. The system dynamics changes and sensing topology variations are modeled by a discrete-time Markov chain with incomplete mode transition probabilities. Each of these sensor nodes firstly collects measurement outputs from its all underlying neighboring nodes, processes these data in accordance with the Markovian switching topologies, and then transmits the processed data to the remote fault detector node. Network-induced delays and accumulated data packet dropouts are incorporated in the data transmission between the sensor nodes and the distributed fault detector nodes through the communication network. To generate localized residual signals, mode-independent distributed fault detection filters are proposed. By means of the stochastic Lyapunov functional approach, the residual system performance analysis is carried out such that the overall residual system is stochastically stable and the error between each residual signal and the fault signal is made as small as possible. Furthermore, a sufficient condition on the existence of the mode-independent distributed fault detection filters is derived in the simultaneous presence of incomplete mode transition probabilities, Markovian switching topologies, network-induced delays, and accumulated data packed dropouts. Finally, a stirred-tank reactor system is given to show the effectiveness of the developed theoretical results.

  19. Virus Particle Detection by Convolutional Neural Network in Transmission Electron Microscopy Images.

    PubMed

    Ito, Eisuke; Sato, Takaaki; Sano, Daisuke; Utagawa, Etsuko; Kato, Tsuyoshi

    2018-06-01

    A new computational method for the detection of virus particles in transmission electron microscopy (TEM) images is presented. Our approach is to use a convolutional neural network that transforms a TEM image to a probabilistic map that indicates where virus particles exist in the image. Our proposed approach automatically and simultaneously learns both discriminative features and classifier for virus particle detection by machine learning, in contrast to existing methods that are based on handcrafted features that yield many false positives and require several postprocessing steps. The detection performance of the proposed method was assessed against a dataset of TEM images containing feline calicivirus particles and compared with several existing detection methods, and the state-of-the-art performance of the developed method for detecting virus was demonstrated. Since our method is based on supervised learning that requires both the input images and their corresponding annotations, it is basically used for detection of already-known viruses. However, the method is highly flexible, and the convolutional networks can adapt themselves to any virus particles by learning automatically from an annotated dataset.

  20. Fault detection and diagnosis using neural network approaches

    NASA Technical Reports Server (NTRS)

    Kramer, Mark A.

    1992-01-01

    Neural networks can be used to detect and identify abnormalities in real-time process data. Two basic approaches can be used, the first based on training networks using data representing both normal and abnormal modes of process behavior, and the second based on statistical characterization of the normal mode only. Given data representative of process faults, radial basis function networks can effectively identify failures. This approach is often limited by the lack of fault data, but can be facilitated by process simulation. The second approach employs elliptical and radial basis function neural networks and other models to learn the statistical distributions of process observables under normal conditions. Analytical models of failure modes can then be applied in combination with the neural network models to identify faults. Special methods can be applied to compensate for sensor failures, to produce real-time estimation of missing or failed sensors based on the correlations codified in the neural network.

Top