Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... group research project. Membership in this group research project remains open, and Network Centric... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC...
2003-01-01
OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-18
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, Office of the Assistant Secretary for Networks & Information Integration/Department...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-01
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC...&D Institute, Gdynia, POLAND; Solera Networks, Lindon, UT; and Dataline, LLC, McLean, VA, have...
Network Centric Operations: Background and Oversight Issues for Congress
2007-03-15
6 Overconfidence about the Effectiveness of NCO . . . . . . . . . . . . . . . . . 7 Reduced Effectiveness for Urban Counter-Insurgency...now question the effectiveness of Network Centric Operations, and its relevance to different types of conflict, including close urban combat. Others...expectations. They wonder if the DOD model for network centric operations may underestimate an enemy’s ability to deceive high technology sensors, or block the
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, Mangin, Inc., Arroyo Grande, CA; NorthStar Group, LLC, Washington, DC; and...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, Mosaic ATM, Leesburg, VA; NorthStar Group, LLC, Washington, DC; Luciad, Leuven...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... venture. No other changes have been made in either the membership or planned activity of the group...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act'') Network Centric Operations Industry Consortium, Inc. has filed... venture. No other changes have been made in either the membership or planned activity of the group...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... been made in either the membership or planned activity of the group research project. Membership in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... changes have been made in either the membership or planned activity of the group research project...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-02
... Production Act of 1993--Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... made in either the membership or planned activity of the group research project. Membership in this...
76 FR 63659 - Antitrust Division
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... Production Act of 1993; Network Centric Operations Industry Consortium, Inc. Notice is hereby given that, on..., 15 U.S.C. 4301 et seq. (``the Act''), Network Centric Operations Industry Consortium, Inc. (``NCOIC... circumstances. Specifically, The Open Group, San Francisco, CA, has been added as a party to this venture. Also...
2004-06-01
Mark Adkins Director of Research Ph.D Human Communication adkins@arizona.edu Dr. John Kruse Director of Programming Ph.D Management Information Systems...Theory • Network Centric Warfare • Technology Adoption – Technology Adoption Model – Technology Transition Model • Human Communication – Social Context
2005-09-01
This research explores the need for a high throughput, high speed network for use in a network centric wartime environment and how commercial...Automated Digital Network System (ADNS). This research explores the need for a high-throughput, high-speed network for use in a network centric ...1 C. DEPARTMENT OF DEFENSE (DOD) DESIRED END STATE ..............2 1. DOD Transformation to Network Centric Warfare (NCW) Operations
Information Age Transformation: Getting to a 21st Century Military (revised)
2002-06-01
strategy for transformation is built around experimentation with network- centric concepts designed to leverage the power of Information Age technologies and...Edward A. Smith: From Network- Centric to Effects-Based Operations. 7 CHAPTER 2 Background and Purpose DoD is fully committed to taking advantage...Network Centric Warfare3 (NCW) translates these broad vision statements into a way ahead. NCW is a set of warfighting concepts4 designed to create and
Theory, Design, and Algorithms for Optimal Control of wireless Networks
2010-06-09
The implementation of network-centric warfare technologies is an abiding, critical interest of Air Force Science and Technology efforts for the Warfighter. Wireless communications, strategic signaling are areas of critical Air Force Mission need. Autonomous networks of multiple, heterogeneous Throughput enhancement and robust connectivity in communications and sensor networks are critical factors in net-centric USAF operations. This research directly supports the Air Force vision of information dominance and the development of anywhere, anytime operational readiness.
Military clouds: utilization of cloud computing systems at the battlefield
NASA Astrophysics Data System (ADS)
Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai
2012-05-01
Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.
2003-11-01
Command Historian , and the personnel from the Center for Army Lessons Learned (CALL) for their assistance in gaining access to the many documents that...after the Network Centric Warfare Case Study operations. The Center for Army Lessons Learned (CALL), the V Corps Command Historian , and other... Historian , Dr. Charles Kirkpatrick, in Heidelberg, Germany, assisted in this effort. Nu- merous documents were collected, both unclassified and classified
Information Product Quality in Network Centric Operations
2005-05-01
Signori et al.’ s NCOCF .......................................................................................................1 Figure 2...NCW Conceptual Framework Figure 1. Signori et al.’ s NCOCF 1 perspective, having led to what is currently known as the Network Centric Operations...following equation: T QS δ≥∆ , where is the change in entropy, is the change in heat energy and T is some constant S ∆ Qδ 7 temperature. Whenever heat
2013-07-01
Systems Engineering Approach and Metrics for Evaluating Network-Centric Operations for U.S. Army Battle Command by Jock O. Grynovicki and...Battle Command Jock O. Grynovicki and Teresa A. Branscome Human Research and Engineering Directorate, ARL...NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Jock O. Grynovicki and Teresa A. Branscome 5d. PROJECT NUMBER 622716H70 5e. TASK NUMBER
NASA Astrophysics Data System (ADS)
Stack, J. R.; Guthrie, R. S.; Cramer, M. A.
2009-05-01
The purpose of this paper is to outline the requisite technologies and enabling capabilities for network-centric sensor data analysis within the mine warfare community. The focus includes both automated processing and the traditional humancentric post-mission analysis (PMA) of tactical and environmental sensor data. This is motivated by first examining the high-level network-centric guidance and noting the breakdown in the process of distilling actionable requirements from this guidance. Examples are provided that illustrate the intuitive and substantial capability improvement resulting from processing sensor data jointly in a network-centric fashion. Several candidate technologies are introduced including the ability to fully process multi-sensor data given only partial overlap in sensor coverage and the ability to incorporate target identification information in stride. Finally the critical enabling capabilities are outlined including open architecture, open business, and a concept of operations. This ability to process multi-sensor data in a network-centric fashion is a core enabler of the Navy's vision and will become a necessity with the increasing number of manned and unmanned sensor systems and the requirement for their simultaneous use.
NASA Astrophysics Data System (ADS)
Büker, Engin
2015-05-01
The defence technologies which have been developing and changing rapidly, today make it difficult to be able to foresee the next environment and spectrum of warfare. When said change and development is looked in specific to the naval operations, it can be said that the possible battlefield and scenarios to be developed in the near and middle terms (5-20 years) are more clarified with compare to other force components. Network Centric Naval Warfare Concept that was developed for the floating, diving and flying fleet platforms which serves away from its own mainland for miles, will keep its significance in the future. Accordingly, Network Centric Intelligence structure completely integrating with the command and control systems will have relatively more importance. This study will firstly try to figure out the transition from the traditional intelligence cycle that is still used in conventional war to Network Centric Intelligence Production Process. In the last part, the use of this new approach on the base of UAV that is alternative to satellite based command control and data transfer systems in the joint operations in narrow seas will be examined, a model suggestion for the use of operative and strategic UAVs which are assured within the scope of the NATO AGS2 for this aim will be brought.
The Mobile Internet -The Next Big Thing. Electrons & Photons: You Need Both! (BRIEFING CHARTS)
2007-03-05
Links Network Centric Warfighting Comms Wired & Wireless Links 20th Century 21th Century The Military Comms Problem Network Centric Operationst t i ti...Small Unit Operations TEL Underwater Vehicles & Towed Arrays RC-135V Rivet Joint Tier II+ UAV Global Hawk E-2C Hawkeye Networked Manned and Unmanned...RF Front-End Solutions ● >20 DARPA/MTO RF Programs across the spectrum - RF & Mixed Signal Electronics - Analog & Digital Photonics Enables Network
5G: rethink mobile communications for 2020+.
Chih-Lin, I; Han, Shuangfeng; Xu, Zhikun; Sun, Qi; Pan, Zhengang
2016-03-06
The 5G network is anticipated to meet the challenging requirements of mobile traffic in the 2020s, which are characterized by super high data rate, low latency, high mobility, high energy efficiency and high traffic density. This paper provides an overview of China Mobile's 5G vision and potential solutions. Three key characteristics of 5G are analysed, i.e. super fast, soft and green. The main 5G R&D themes are further elaborated, which include five fundamental rethinkings of the traditional design methodologies. The 5G network design considerations are also discussed, with cloud radio access network, ultra-dense network, software defined network and network function virtualization examined as key potential solutions towards a green and soft 5G network. The paradigm shift to user-centric network operation from the traditional cell-centric operation is also investigated, where the decoupled downlink and uplink, control and data, and adaptive multiple connections provide sufficient means to achieve a user-centric 5G network with 'no more cells'. The software defined air interface is investigated under a uniform framework and can adaptively adapt the parameters to well satisfy various requirements in different 5G scenarios. © 2016 The Author(s).
NASA Technical Reports Server (NTRS)
Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric
2005-01-01
This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.
NASA Astrophysics Data System (ADS)
Lv, Mingshan
2015-10-01
The passive and photoelectrical jamming to anti-ship missile in the condition of network centric warship formation is an important research issue of fleet EW operation. An approach jamming method of shipborne surface-type infrared decoy countering the infrared image guided anti-ship missile is put forward. By analyzing the countering process the jamming effectiveness evaluation model is constructed. By simulation the method is proved t reasonable and effective. This method breaks through the traditional restrict that the passive and photoelectricity jamming measure can only be used in the end self-defence and provides a new method for network centric worship formation to support each other.
Technologies for network-centric C4ISR
NASA Astrophysics Data System (ADS)
Dunkelberger, Kirk A.
2003-07-01
Three technologies form the heart of any network-centric command, control, communication, intelligence, surveillance, and reconnaissance (C4ISR) system: distributed processing, reconfigurable networking, and distributed resource management. Distributed processing, enabled by automated federation, mobile code, intelligent process allocation, dynamic multiprocessing groups, check pointing, and other capabilities creates a virtual peer-to-peer computing network across the force. Reconfigurable networking, consisting of content-based information exchange, dynamic ad-hoc routing, information operations (perception management) and other component technologies forms the interconnect fabric for fault tolerant inter processor and node communication. Distributed resource management, which provides the means for distributed cooperative sensor management, foe sensor utilization, opportunistic collection, symbiotic inductive/deductive reasoning and other applications provides the canonical algorithms for network-centric enterprises and warfare. This paper introduces these three core technologies and briefly discusses a sampling of their component technologies and their individual contributions to network-centric enterprises and warfare. Based on the implied requirements, two new algorithms are defined and characterized which provide critical building blocks for network centricity: distributed asynchronous auctioning and predictive dynamic source routing. The first provides a reliable, efficient, effective approach for near-optimal assignment problems; the algorithm has been demonstrated to be a viable implementation for ad-hoc command and control, object/sensor pairing, and weapon/target assignment. The second is founded on traditional dynamic source routing (from mobile ad-hoc networking), but leverages the results of ad-hoc command and control (from the contributed auctioning algorithm) into significant increases in connection reliability through forward prediction. Emphasis is placed on the advantages gained from the closed-loop interaction of the multiple technologies in the network-centric application environment.
Modeling socio-cultural processes in network-centric environments
NASA Astrophysics Data System (ADS)
Santos, Eunice E.; Santos, Eugene, Jr.; Korah, John; George, Riya; Gu, Qi; Kim, Keumjoo; Li, Deqing; Russell, Jacob; Subramanian, Suresh
2012-05-01
The major focus in the field of modeling & simulation for network centric environments has been on the physical layer while making simplifications for the human-in-the-loop. However, the human element has a big impact on the capabilities of network centric systems. Taking into account the socio-behavioral aspects of processes such as team building, group decision-making, etc. are critical to realistically modeling and analyzing system performance. Modeling socio-cultural processes is a challenge because of the complexity of the networks, dynamism in the physical and social layers, feedback loops and uncertainty in the modeling data. We propose an overarching framework to represent, model and analyze various socio-cultural processes within network centric environments. The key innovation in our methodology is to simultaneously model the dynamism in both the physical and social layers while providing functional mappings between them. We represent socio-cultural information such as friendships, professional relationships and temperament by leveraging the Culturally Infused Social Network (CISN) framework. The notion of intent is used to relate the underlying socio-cultural factors to observed behavior. We will model intent using Bayesian Knowledge Bases (BKBs), a probabilistic reasoning network, which can represent incomplete and uncertain socio-cultural information. We will leverage previous work on a network performance modeling framework called Network-Centric Operations Performance and Prediction (N-COPP) to incorporate dynamism in various aspects of the physical layer such as node mobility, transmission parameters, etc. We validate our framework by simulating a suitable scenario, incorporating relevant factors and providing analyses of the results.
Wireless Tactical Networks in Support of Undersea Research
2001-04-01
of 802.11 is to provide a radio capable of transmitting voice, video, and data standard set of operational rules so that WLAN products between its...networking in support of the network-centric [TFB-99] Trangeled A., Franchi P., Berni A., Data warfare concept, in which operational advantage is
Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform
2011-01-01
has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can
2005-03-24
1 :45PM- 3 :30PM Panel: Establishing a Business Mission Area in the Department of...Minimum MaximumLEVEL OF INTEROPERABILITY Level 1 Level 2 Level 3 Level 4 10 COTS Native IP Network IP TCP UDP Network QoS Layer IIOP NTP SNMP Legacy...2005 Page 1 3 /27/2005 Page 2 3 /27/2005 Page 3 3 /27/2005 Page 4 3 /27/2005 Page 5 3 /27/2005 Page 6 3 /27/2005 Page 7 3 /27/2005 Page 8 3 /27/2005 Page 9 3
2005-06-01
virtualisation of distributed computing and data resources such as processing, network bandwidth, and storage capacity, to create a single system...and Simulation (M&S) will be integrated into this heterogeneous SOA. M&S functionality will be available in the form of operational M&S services. One...documents defining net centric warfare, the use of M&S functionality is a common theme. Alberts and Hayes give a good overview on net centric operations
2008-11-01
is particularly important in order to design a network that is realistically deployable. The goal of this project is the design of a theoretical ... framework to assess and predict the effectiveness and performance of networks and their loads.
Theorizing Network-Centric Activity in Education
ERIC Educational Resources Information Center
HaLevi, Andrew
2011-01-01
Networks and network-centric activity are increasingly prevalent in schools and school districts. In addition to ubiquitous social network tools like Facebook and Twitter, educational leaders deal with a wide variety of network organizational forms that include professional development, advocacy, informational networks and network-centric reforms.…
A vision of network-centric military communications
NASA Astrophysics Data System (ADS)
Conklin, Ross, Jr.; Burbank, Jack; Nichols, Robert, Jr.
2005-05-01
This paper presents a vision for a future capability-based military communications system that considers user requirements. Historically, the military has developed and fielded many specialized communications systems. While these systems solved immediate communications problems, they were not designed to operate with other systems. As information has become more important to the execution of war, the "stove-pipe" nature of the communications systems deployed by the military is no longer acceptable. Realizing this, the military has begun the transformation of communications to a network-centric communications paradigm. However, the specialized communications systems were developed in response to the widely varying environments related to military communications. These environments, and the necessity for effective communications within these environments, do not disappear under the network-centric paradigm. In fact, network-centric communications allows for one message to cross many of these environments by transiting multiple networks. The military would also like one communications approach that is capable of working well in multiple environments. This paper presents preliminary work on the creation of a framework that allows for a reconfigurable device that is capable of adapting to the physical and network environments. The framework returns to the Open Systems Interconnect (OSI) architecture with the addition of a standardized intra-layer control interface for control information exchange, a standardized data interface and a proposed device architecture based on the software radio.
2010-04-01
technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in
A Historical Study of Operational Command: A Resource for Researchers
2005-03-01
PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is
A Historical Study of Operational: A Resource for Researches
2005-03-01
PJHQ) in the United Kingdom. Control, the impact of command arrangements on the proper functioning of operational level headquarters is shown...might interact in a joint environment, identifying the different types of communication and social networks that exist, determining the influence of...introduction of information technology and its tools has spawned ideas such as Network Centric Warfare (NCW) or Network Enabled Warfare (NEW), there is
Bolia, Robert S; Nelson, W Todd
2007-05-01
The recently promulgated doctrine of network-centric warfare suggests that increases in shared situation awareness and self-synchronization will be emergent properties of densely connected military networks. What it fails to say is how these enhancements are to be measured. The present article frames the discussion as a question of how to characterize team performance, and considers such performance in the context of its hypothetical components: situation awareness, workload, and error. This examination concludes that reliable measures of these constructs are lacking for teams, even when they exist for individual operators, and that this is due to philosophical and/or methodological flaws in their conceptual development. Additional research is recommended to overcome these deficiencies, as well as consideration of novel multidisciplinary approaches that draw on methodologies employed in the social, physical, and biological sciences.
A Queueing Approach to Optimal Resource Replication in Wireless Sensor Networks
2009-04-29
network (an energy- centric approach) or to ensure the proportion of query failures does not exceed a predetermined threshold (a failure- centric ...replication strategies in wireless sensor networks. The model can be used to minimize either the total transmission rate of the network (an energy- centric ...approach) or to ensure the proportion of query failures does not exceed a predetermined threshold (a failure- centric approach). The model explicitly
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Data-centric multiobjective QoS-aware routing protocol for body sensor networks.
Razzaque, Md Abdur; Hong, Choong Seon; Lee, Sungwon
2011-01-01
In this paper, we address Quality-of-Service (QoS)-aware routing issue for Body Sensor Networks (BSNs) in delay and reliability domains. We propose a data-centric multiobjective QoS-Aware routing protocol, called DMQoS, which facilitates the system to achieve customized QoS services for each traffic category differentiated according to the generated data types. It uses modular design architecture wherein different units operate in coordination to provide multiple QoS services. Their operation exploits geographic locations and QoS performance of the neighbor nodes and implements a localized hop-by-hop routing. Moreover, the protocol ensures (almost) a homogeneous energy dissipation rate for all routing nodes in the network through a multiobjective Lexicographic Optimization-based geographic forwarding. We have performed extensive simulations of the proposed protocol, and the results show that DMQoS has significant performance improvements over several state-of-the-art approaches.
Coalition FORCEnet Implementation Analysis
2006-09-01
C2 grid, and Engagement grid. As a result, enabled Network- Centric warfare for Coalition Forces shows a significant increase in capabilities. Joint...209 14. SUBJECT TERMS FORCEnet, Coalition Forces, AUSCANNZUKUS, Network- Centric Warfare (NCW), Data Mining, EXTEND Modeling, Expeditionary...NETWORK- CENTRIC WARFARE AND FORCENET .....................................................................................................1 B
Network-Centric Warfare: Implications for Applying the Principles of War
1999-05-17
Noting the competitive advantage that a computer network system completely integrated into a firm’s structure and operations has provided to...businesses, individuals have begun to argue that adoption of this concept by the United States armed forces would produce a comparable, competitive advantage in
The Global Maritime Partnership: Networking Challenges and Opportunities
2010-06-01
The Victorians eagerly embraced the telegraph as something that was “faster and better” than waiting for newspapers to arrive via ship and... fashion . 31 While little quantitative work on network-centric operations has been done based on from-the-ground-up modeling and simulation, the United
Network Centric Operations NCO Case Study. The British Approach to Low-Intensity Operations: Part I
2007-02-12
Army’s institutional memory of jungle warfare (during WW2 ) had dissipated by 1948. Nonetheless, individuals within the Army who had experienced such...with a specially stabilised TV camera mounting. It also fitted infrared surveillance systems to its Beaver spotter planes, which helped detect
Allowing the Advantaged User in a Network Centric System to Get Through the Disadvantaged Interface
2009-09-01
ADVANTAGED USER IN A NETWORK CENTRIC SYSTEM TO GET THROUGH THE DISADVANTAGED INTERFACE by Lawrence Brandon September 2009 Thesis Advisor...Through the Disadvantaged Interface 6. AUTHOR(S) Lawrence Brandon 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval...identify those factors that cause disadvantaged interfaces within network centric systems and provides recommendations to these challenges so that
Modeling the Information Age Combat Model: An Agent-Based Simulation of Network Centric Operations
NASA Technical Reports Server (NTRS)
Deller, Sean; Rabadi, Ghaith A.; Bell, Michael I.; Bowling, Shannon R.; Tolk, Andreas
2010-01-01
The Information Age Combat Model (IACM) was introduced by Cares in 2005 to contribute to the development of an understanding of the influence of connectivity on force effectiveness that can eventually lead to quantitative prediction and guidelines for design and employment. The structure of the IACM makes it clear that the Perron-Frobenius Eigenvalue is a quantifiable metric with which to measure the organization of a networked force. The results of recent experiments presented in Deller, et aI., (2009) indicate that the value of the Perron-Frobenius Eigenvalue is a significant measurement of the performance of an Information Age combat force. This was accomplished through the innovative use of an agent-based simulation to model the IACM and represents an initial contribution towards a new generation of combat models that are net-centric instead of using the current platform-centric approach. This paper describes the intent, challenges, design, and initial results of this agent-based simulation model.
Implementing Network-Centric Operations in Joint Task Forces: Changes in Joint Doctrine
2006-06-16
the hierarchy, explaining the relationship between vertically connected components (Gibson, Ivancevich , and Donnelly 1973, 289). The flow of...John M. Ivancevich , and James H. Donnelly. 1973. Organizations: Structure, Processes, Behavior. Dallas, TX: Business Publication, Inc. Gonzales
Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking
2016-11-01
protocol designed to support groups of devices in a local region [4]. It attempts to use the wireless medium to broadcast minimal control information...1) Group Discovery: The goal of the group discovery algo- rithm is to find group nodes without globally flooding control messages. To facilitate this...Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory
2005-05-01
made. 4. Do military decision makers identify / analyze adverse consequences presently? Few do based on this research and most don’t do it effectively ...A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM...ENS/05-01 A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM
AN-CASE NET-CENTRIC modeling and simulation
NASA Astrophysics Data System (ADS)
Baskinger, Patricia J.; Chruscicki, Mary Carol; Turck, Kurt
2009-05-01
The objective of mission training exercises is to immerse the trainees into an environment that enables them to train like they would fight. The integration of modeling and simulation environments that can seamlessly leverage Live systems, and Virtual or Constructive models (LVC) as they are available offers a flexible and cost effective solution to extending the "war-gaming" environment to a realistic mission experience while evolving the development of the net-centric enterprise. From concept to full production, the impact of new capabilities on the infrastructure and concept of operations, can be assessed in the context of the enterprise, while also exposing them to the warfighter. Training is extended to tomorrow's tools, processes, and Tactics, Techniques and Procedures (TTPs). This paper addresses the challenges of a net-centric modeling and simulation environment that is capable of representing a net-centric enterprise. An overview of the Air Force Research Laboratory's (AFRL) Airborne Networking Component Architecture Simulation Environment (AN-CASE) is provide as well as a discussion on how it is being used to assess technologies for the purpose of experimenting with new infrastructure mechanisms that enhance the scalability and reliability of the distributed mission operations environment.
2009-09-01
this information supports the decison - making process as it is applied to the management of risk. 2. Operational Risk Operational risk is the threat... reasonability . However, to make a software system fault tolerant, the system needs to recognize and fix a system state condition. To detect a fault, a fault...Tracking ..........................................51 C. DECISION- MAKING PROCESS................................................................51 1. Risk
Simplifying Operational Design
2012-05-01
centuries of historical case studies, tracing the 9 evolution and development of what was then in 1997 operational theory. Naveh called his...major cases against operational design is the IDF’s application of SOD in 2006 against Hezbollah in Lebanon. While many blamed Israel’s lack of success...networked centricity.68 This is not the case . War, like ecosystems and economies, is a complex adaptive system. The interactive complexity that comprises
Military Perspectives on Cyberpower
2009-07-01
PDAs) (such as the BlackBerry ), and global satellite and cable networks (including radio and TV), the impact of cyberspace on military operations has...phones, BlackBerries , telecoms, satellite and cable-based networks, radio, and TV. While it has developed the concepts of network-centric warfare to...domain may still be “outside the Maginot Line,” or may provide a tunnel to get under the line. Assuming that the line will be breached and the
Creating SOF Networks: The Role of NATO Special Operations as a Testing Ground for SOF Integration
2011-06-01
technology and network structures on modern conflict. Vice Admiral Arthur Cebrowski, a pioneer in the concept of network centric warfare, outlined how...European populations have increased slightly over the past four decades with increased longevity , immigration, and the maturation of larger post WWII...demographers predict that European populations will steadily decrease during the next several decades as longevity and immigration will not be able to offset
Integration of robotic resources into FORCEnet
NASA Astrophysics Data System (ADS)
Nguyen, Chinh; Carroll, Daniel; Nguyen, Hoa
2006-05-01
The Networked Intelligence, Surveillance, and Reconnaissance (NISR) project integrates robotic resources into Composeable FORCEnet to control and exploit unmanned systems over extremely long distances. The foundations are built upon FORCEnet-the U.S. Navy's process to define C4ISR for net-centric operations-and the Navy Unmanned Systems Common Control Roadmap to develop technologies and standards for interoperability, data sharing, publish-and-subscribe methodology, and software reuse. The paper defines the goals and boundaries for NISR with focus on the system architecture, including the design tradeoffs necessary for unmanned systems in a net-centric model. Special attention is given to two specific scenarios demonstrating the integration of unmanned ground and water surface vehicles into the open-architecture web-based command-and-control information-management system of Composeable FORCEnet. Planned spiral development for NISR will improve collaborative control, expand robotic sensor capabilities, address multiple domains including underwater and aerial platforms, and extend distributive communications infrastructure for battlespace optimization for unmanned systems in net-centric operations.
Network-Centric Operations Support: Lessons Learned, Status, and Way-Ahead
2014-06-01
34 Information Sharing Environment (ISE) Presentation, Enterprise Architecture Conference, 2011 (http://goveaconference.com/Events/2011/Sessions/ Tuesday ...cgi-bin/GetTRDoc?AD=ADA525312) [35] Morris , Michael, et al. Widget and Mobile Technologies a Forcing Function for Acquisition Change: Paradigm Shift
Women's connectivity in extreme networks.
Manrique, Pedro; Cao, Zhenfeng; Gabriel, Andrew; Horgan, John; Gill, Paul; Qi, Hong; Restrepo, Elvira M; Johnson, Daniela; Wuchty, Stefan; Song, Chaoming; Johnson, Neil
2016-06-01
A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying system's robustness and survival. Our observations suggest new female-centric approaches that could be used to affect such networks. They also raise questions about how individual contributions in high-pressure systems are evaluated.
Advanced algorithms for distributed fusion
NASA Astrophysics Data System (ADS)
Gelfand, A.; Smith, C.; Colony, M.; Bowman, C.; Pei, R.; Huynh, T.; Brown, C.
2008-03-01
The US Military has been undergoing a radical transition from a traditional "platform-centric" force to one capable of performing in a "Network-Centric" environment. This transformation will place all of the data needed to efficiently meet tactical and strategic goals at the warfighter's fingertips. With access to this information, the challenge of fusing data from across the batttlespace into an operational picture for real-time Situational Awareness emerges. In such an environment, centralized fusion approaches will have limited application due to the constraints of real-time communications networks and computational resources. To overcome these limitations, we are developing a formalized architecture for fusion and track adjudication that allows the distribution of fusion processes over a dynamically created and managed information network. This network will support the incorporation and utilization of low level tracking information within the Army Distributed Common Ground System (DCGS-A) or Future Combat System (FCS). The framework is based on Bowman's Dual Node Network (DNN) architecture that utilizes a distributed network of interlaced fusion and track adjudication nodes to build and maintain a globally consistent picture across all assets.
Reconciling Hierarchical and Edge Organizations: 9-11 Revisited
2014-06-01
the hierarchical structure, despite claiming to be networked. Hence, our research asks whether these two archetypal forms can be reconciled with one...asks whether these two archetypal forms can be reconciled with one another. By revisiting a case study of the events of September 11th, 2001...organizational form best suited to network-centric operations. Drawing on Mintzberg’s (1979) work on organizational archetypes , five classic organizational
Data Centric Sensor Stream Reduction for Real-Time Applications in Wireless Sensor Networks
Aquino, Andre Luiz Lins; Nakamura, Eduardo Freire
2009-01-01
This work presents a data-centric strategy to meet deadlines in soft real-time applications in wireless sensor networks. This strategy considers three main aspects: (i) The design of real-time application to obtain the minimum deadlines; (ii) An analytic model to estimate the ideal sample size used by data-reduction algorithms; and (iii) Two data-centric stream-based sampling algorithms to perform data reduction whenever necessary. Simulation results show that our data-centric strategies meet deadlines without loosing data representativeness. PMID:22303145
Social Networking Analysis: One of the First Steps in Net-Centric Operations
2005-01-01
came to form part of current management thought and is transforming the ways of thinking about social relationships in management and leadership in...about social relationships and leadership in government and commercial organizations. This paper will highlight how network analysis has become...relevant to management studies, how it is transforming how we study social relationships , how it can be used to understand how actors interact (especially
If it walks like a duck: nanosensor threat assessment
NASA Astrophysics Data System (ADS)
Chachis, George C.
2003-09-01
A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.
NASA Astrophysics Data System (ADS)
Bilal, Muhammad; Asfand-e-Yar, Mockford, Steve; Khan, Wasiq; Awan, Irfan
2012-11-01
Mobile technology is among the fastest growing technologies in today's world with low cost and highly effective benefits. Most important and entertaining areas in mobile technology development and usage are location based services, user friendly networked applications and gaming applications. However, concern towards network operator service provision and improvement has been very low. The portable applications available for a range of mobile operating systems which help improve the network operator services are desirable by the mobile operators. This paper proposes a state of the art mobile application Tracesaver, which provides a great achievement over the barriers in gathering device and network related information, for network operators to improve their network service provision. Tracesaver is available for a broad range of mobile devices with different mobile operating systems and computational capabilities. The availability of Tracesaver in market has proliferated over the last year since it was published. The survey and results show that Tracesaver is being used by millions of mobile users and provides novel ways of network service improvement with its highly user friendly interface.
2008-10-01
Agents in the DEEP architecture extend and use the Java Agent Development (JADE) framework. DEEP requires a distributed multi-agent system and a...framework to help simplify the implementation of this system. JADE was chosen because it is fully implemented in Java , and supports these requirements
Women’s connectivity in extreme networks
Manrique, Pedro; Cao, Zhenfeng; Gabriel, Andrew; Horgan, John; Gill, Paul; Qi, Hong; Restrepo, Elvira M.; Johnson, Daniela; Wuchty, Stefan; Song, Chaoming; Johnson, Neil
2016-01-01
A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying system’s robustness and survival. Our observations suggest new female-centric approaches that could be used to affect such networks. They also raise questions about how individual contributions in high-pressure systems are evaluated. PMID:27386564
2004-12-01
Tan Tock Seng Hospital (TTSH) to Singapore General...critical information, the Alert Manager of other hospitals will use the event defined in the Event Manager at Tan Tock Seng Hospital to automatically...events defined at Tan Tock Seng hospital can be monitored by the Alert Manager operated at the immigration department to ensure that the
Architecting the Communication and Navigation Networks for NASA's Space Exploration Systems
NASA Technical Reports Server (NTRS)
Bhassin, Kul B.; Putt, Chuck; Hayden, Jeffrey; Tseng, Shirley; Biswas, Abi; Kennedy, Brian; Jennings, Esther H.; Miller, Ron A.; Hudiburg, John; Miller, Dave;
2007-01-01
NASA is planning a series of short and long duration human and robotic missions to explore the Moon and then Mars. A key objective of the missions is to grow, through a series of launches, a system of systems communication, navigation, and timing infrastructure at minimum cost while providing a network-centric infrastructure that maximizes the exploration capabilities and science return. There is a strong need to use architecting processes in the mission pre-formulation stage to describe the systems, interfaces, and interoperability needed to implement multiple space communication systems that are deployed over time, yet support interoperability with each deployment phase and with 20 years of legacy systems. In this paper we present a process for defining the architecture of the communications, navigation, and networks needed to support future space explorers with the best adaptable and evolable network-centric space exploration infrastructure. The process steps presented are: 1) Architecture decomposition, 2) Defining mission systems and their interfaces, 3) Developing the communication, navigation, networking architecture, and 4) Integrating systems, operational and technical views and viewpoints. We demonstrate the process through the architecture development of the communication network for upcoming NASA space exploration missions.
Applying Web-Based Tools for Research, Engineering, and Operations
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2011-01-01
Personnel in the NASA Glenn Research Center Network and Architectures branch have performed a variety of research related to space-based sensor webs, network centric operations, security and delay tolerant networking (DTN). Quality documentation and communications, real-time monitoring and information dissemination are critical in order to perform quality research while maintaining low cost and utilizing multiple remote systems. This has been accomplished using a variety of Internet technologies often operating simultaneously. This paper describes important features of various technologies and provides a number of real-world examples of how combining Internet technologies can enable a virtual team to act efficiently as one unit to perform advanced research in operational systems. Finally, real and potential abuses of power and manipulation of information and information access is addressed.
Realizing Network-Centric Warfare: The Cultural, Organizational, and Human Barriers
2008-01-01
with the fielding of advanced information technology . Discussion: The Department ofDefense (DOD) transformation to NCW has lacked adequate focus on many...range of military operations. In order to successfully employ advanced technologies in "crisis response and limited contingency operations" and "major...its adversaries. Changes in military technology , concepts, and organization have usually come in conjunction with changes to our nation’s social
IR sensors and imagers in networked operations
NASA Astrophysics Data System (ADS)
Breiter, Rainer; Cabanski, Wolfgang
2005-05-01
"Network-centric Warfare" is a common slogan describing an overall concept of networked operation of sensors, information and weapons to gain command and control superiority. Referring to IR sensors, integration and fusion of different channels like day/night or SAR images or the ability to spread image data among various users are typical requirements. Looking for concrete implementations the German Army future infantryman IdZ is an example where a group of ten soldiers build a unit with every soldier equipped with a personal digital assistant (PDA) for information display, day photo camera and a high performance thermal imager for every unit. The challenge to allow networked operation among such a unit is bringing information together and distribution over a capable network. So also AIM's thermal reconnaissance and targeting sight HuntIR which was selected for the IdZ program provides this capabilities by an optional wireless interface. Besides the global approach of Network-centric Warfare network technology can also be an interesting solution for digital image data distribution and signal processing behind the FPA replacing analog video networks or specific point to point interfaces. The resulting architecture can provide capabilities of data fusion from e.g. IR dual-band or IR multicolor sensors. AIM has participated in a German/UK collaboration program to produce a demonstrator for day/IR video distribution via Gigabit Ethernet for vehicle applications. In this study Ethernet technology was chosen for network implementation and a set of electronics was developed for capturing video data of IR and day imagers and Gigabit Ethernet video distribution. The demonstrator setup follows the requirements of current and future vehicles having a set of day and night imager cameras and a crew station with several members. Replacing the analog video path by a digital video network also makes it easy to implement embedded training by simply feeding the network with simulation data. The paper addresses the special capabilities, requirements and design considerations of IR sensors and imagers in applications like thermal weapon sights and UAVs for networked operating infantry forces.
2006-06-01
systems. Cyberspace is the electronic medium of net-centric operations, communications systems, and computers, in which horizontal integration and online...will be interoperable, more robust, responsive, and able to support faster spacecraft initialization times. This Intergrated Satellite Control... horizontally and vertically integrated information through machine-to-machine conversations enabled by a peer-based network of sensors, command
Diversifying the Department of Defense Network Enterprise with Linux
2010-03-01
Cyberspace, Cyberwar, Legacy, Inventory, Acquisition, Competitive Advantage, Coalition Communications, Ubiquitous, Strategic, Centricity, Kaizen , ISO... Kaizen , ISO, Outsource CLASSIFICATION: Unclassified Historically, the United States and its closest allies have grown increasingly reliant...control through the use of continuous improvement processes ( Kaizen )34. In choosing the Linux client operating system, the move encourages open standards
Uddin, Shahadat
2016-02-04
A patient-centric care network can be defined as a network among a group of healthcare professionals who provide treatments to common patients. Various multi-level attributes of the members of this network have substantial influence to its perceived level of performance. In order to assess the impact different multi-level attributes of patient-centric care networks on healthcare outcomes, this study first captured patient-centric care networks for 85 hospitals using health insurance claim dataset. From these networks, this study then constructed physician collaboration networks based on the concept of patient-sharing network among physicians. A multi-level regression model was then developed to explore the impact of different attributes that are organised at two levels on hospitalisation cost and hospital length of stay. For Level-1 model, the average visit per physician significantly predicted both hospitalisation cost and hospital length of stay. The number of different physicians significantly predicted only the hospitalisation cost, which has significantly been moderated by age, gender and Comorbidity score of patients. All Level-1 findings showed significance variance across physician collaboration networks having different community structure and density. These findings could be utilised as a reflective measure by healthcare decision makers. Moreover, healthcare managers could consider them in developing effective healthcare environments.
Library Resource-Sharing in the Network-Centric World.
ERIC Educational Resources Information Center
McGee, Rob
This paper discusses changes in services, technology, and organization as libraries prepare to enter the "network-centric library world." Part 1 addresses the transition from the analog era to the digital age, and the convergence of libraries and education, including opportunities for library leadership in Internet access, digital…
Intelligence Authorization Legislation: Status and Challenges
2012-09-18
foundation of shared services , mission-centric operations, and integrated mission management.”14 In addition to well known threats from terrorist groups and...centric practices to “a true Intelligence enterprise established on a collaborative foundation of shared services , mission-centric operations, and
Youm, Yoosik; Laumann, Edward O; Ferraro, Kenneth F; Waite, Linda J; Kim, Hyeon Chang; Park, Yeong-Ran; Chu, Sang Hui; Joo, Won-Tak; Lee, Jin A
2014-09-14
This paper has two objectives. Firstly, it provides an overview of the social network module, data collection procedures, and measurement of ego-centric and complete-network properties in the Korean Social Life, Health, and Aging Project (KSHAP). Secondly, it directly compares the KSHAP structure and results to the ego-centric network structure and results of the National Social Life, Health, and Aging Project (NSHAP), which conducted in-home interviews with 3,005 persons 57 to 85 years of age in the United States. The structure of the complete social network of 814 KSHAP respondents living in Township K was measured and examined at two levels of networks. Ego-centric network properties include network size, composition, volume of contact with network members, density, and bridging potential. Complete-network properties are degree centrality, closeness centrality, betweenness centrality, and brokerage role. We found that KSHAP respondents with a smaller number of social network members were more likely to be older and tended to have poorer self-rated health. Compared to the NSHAP, the KSHAP respondents maintained a smaller network size with a greater network density among their members and lower bridging potential. Further analysis of the complete network properties of KSHAP respondents revealed that more brokerage roles inside the same neighborhood (Ri) were significantly associated with better self-rated health. Socially isolated respondents identified by network components had the worst self-rated health. The findings demonstrate the importance of social network analysis for the study of older adults' health status in Korea. The study also highlights the importance of complete-network data and its ability to reveal mechanisms beyond ego-centric network data.
2014-01-01
Background This paper has two objectives. Firstly, it provides an overview of the social network module, data collection procedures, and measurement of ego-centric and complete-network properties in the Korean Social Life, Health, and Aging Project (KSHAP). Secondly, it directly compares the KSHAP structure and results to the ego-centric network structure and results of the National Social Life, Health, and Aging Project (NSHAP), which conducted in-home interviews with 3,005 persons 57 to 85 years of age in the United States. Methods The structure of the complete social network of 814 KSHAP respondents living in Township K was measured and examined at two levels of networks. Ego-centric network properties include network size, composition, volume of contact with network members, density, and bridging potential. Complete-network properties are degree centrality, closeness centrality, betweenness centrality, and brokerage role. Results We found that KSHAP respondents with a smaller number of social network members were more likely to be older and tended to have poorer self-rated health. Compared to the NSHAP, the KSHAP respondents maintained a smaller network size with a greater network density among their members and lower bridging potential. Further analysis of the complete network properties of KSHAP respondents revealed that more brokerage roles inside the same neighborhood (Ri) were significantly associated with better self-rated health. Socially isolated respondents identified by network components had the worst self-rated health. Conclusions The findings demonstrate the importance of social network analysis for the study of older adults’ health status in Korea. The study also highlights the importance of complete-network data and its ability to reveal mechanisms beyond ego-centric network data. PMID:25217892
The Device Centric Communication System for 5G Networks
NASA Astrophysics Data System (ADS)
Biswash, S. K.; Jayakody, D. N. K.
2017-01-01
The Fifth Generation Communication (5G) networks have several functional features such as: Massive Multiple Input and Multiple Output (MIMO), Device centric data and voice support, Smarter-device communications, etc. The objective for 5G networks is to gain the 1000x more throughput, 10x spectral efficiency, 100 x more energy efficiency than existing technologies. The 5G system will provide the balance between the Quality of Experience (QoE) and the Quality of Service (QoS), without compromising the user benefit. The data rate has been the key metric for wireless QoS; QoE deals with the delay and throughput. In order to realize a balance between the QoS and QoE, we propose a cellular Device centric communication methodology for the overlapping network coverage area in the 5G communication system. The multiple beacon signals mobile tower refers to an overlapping network area, and a user must be forwarded to the next location area. To resolve this issue, we suggest the user centric methodology (without Base Station interface) to handover the device in the next area, until the users finalize the communication. The proposed method will reduce the signalling cost and overheads for the communication.
Energy-Aware Topology Control Strategy for Human-Centric Wireless Sensor Networks
Meseguer, Roc; Molina, Carlos; Ochoa, Sergio F.; Santos, Rodrigo
2014-01-01
The adoption of mobile and ubiquitous solutions that involve participatory or opportunistic sensing increases every day. This situation has highlighted the relevance of optimizing the energy consumption of these solutions, because their operation depends on the devices' battery lifetimes. This article presents a study that intends to understand how the prediction of topology control messages in human-centric wireless sensor networks can be used to help reduce the energy consumption of the participating devices. In order to do that, five research questions have been defined and a study based on simulations was conducted to answer these questions. The obtained results help identify suitable mobile computing scenarios where the prediction of topology control messages can be used to save energy of the network nodes. These results also allow estimating the percentage of energy saving that can be expected, according to the features of the work scenario and the participants behavior. Designers of mobile collaborative applications that involve participatory or opportunistic sensing, can take advantage of these findings to increase the autonomy of their solutions. PMID:24514884
Capturing Commander’s Intent in User Interfaces for Network-Centric Operations
2007-02-01
in support of the commander’s intent. There are many paths of varying risk that can lead to mission success (i.e. achieving...asset’s mission or the target’s status, with results and analysis linked for ease of reference. By selecting a block of time in the future or past...manner. The WIDE temporal display was recently evaluated in an operational scenario using simulated data with a variety of TACC execution
War-Gaming Network-Centric Warfare
2001-01-01
games as well. 6 2 N A V A L W A R C O L L E G E R E V I E W War games are also classified...traditional gaming . All war games , whether they involve fighting sail R U B E L 6 3 Until a tactical network of units, each of them exercising a great degree... gaming and simulation. R U B E L 6 5 The principal requirements for achieving network-centric warfare are a network and shared awareness. By a
Video-based convolutional neural networks for activity recognition from robot-centric videos
NASA Astrophysics Data System (ADS)
Ryoo, M. S.; Matthies, Larry
2016-05-01
In this evaluation paper, we discuss convolutional neural network (CNN)-based approaches for human activity recognition. In particular, we investigate CNN architectures designed to capture temporal information in videos and their applications to the human activity recognition problem. There have been multiple previous works to use CNN-features for videos. These include CNNs using 3-D XYT convolutional filters, CNNs using pooling operations on top of per-frame image-based CNN descriptors, and recurrent neural networks to learn temporal changes in per-frame CNN descriptors. We experimentally compare some of these different representatives CNNs while using first-person human activity videos. We especially focus on videos from a robots viewpoint, captured during its operations and human-robot interactions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
Complexity Theory and Network Centric Warfare
2003-09-01
realms of the unknown. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success. CCRP...0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing...instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send
Understanding and Managing Causality of Change in Socio-Technical Systems II
2011-01-25
SUBJECT TERMS Cognition , Human Effectiveness, Information Science 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18...at large taking into account the cognitive interaction between humans and technology. 8 Hussein Abbass Professor Abbass leads the...Network Centric Operations Future Air Traffic Management Systems Cognitive Engineering including Human-Computer Integration In all of the
For Want of a Nail: An Assessment of Global Positioning System Satellite Replenishment
2004-05-26
The growing reliance on GPS has some concerned about the ability of the aviation industry to safely operate in case of a GPS failure. Langhorne ...connection will further reduce 145 Simon P . Worden and John E. Shaw, Whither Space Power? Forging...precision effects. 158 Fred P . Stein, "Observations on the Emergence of Network Centric Warfare
2006-07-01
4 Abbreviations AI Artificial Intelligence AM Artificial Memory CAD Computer Aided...memory (AM), artificial intelligence (AI), and embedded knowledge systems it is possible to expand the “effective span of competence” of...Technology J Joint J2 Joint Intelligence J3 Joint Operations NATO North Atlantic Treaty Organisation NCW Network Centric Warfare NHS National Health
Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge
2016-04-10
gateways are typically used to translate information from one network to another. The challenge with gateways is to understand what information...should be relayed from one network to another (with different message formats and technologies) and what platform should perform the gateway function such...information centric paradigm in that GCN does not specify what constitutes a group ID. Group IDs can be mapped to named data objects, content identifiers
ERIC Educational Resources Information Center
Agyapong, Parick Kwadwo
2013-01-01
Content-centric networking (CCN) has emerged as a dominant paradigm for future Internet architecture design due to its efficient support for content dissemination, which currently dominates Internet use. This dissertation shows how economic and social welfare analysis can be used to inform the design of a CCN architecture that provides network…
An Operations Concept for Integrated Model-Centric Engineering at JPL
NASA Technical Reports Server (NTRS)
Bayer, Todd J.; Cooney, Lauren A.; Delp, Christopher L.; Dutenhoffer, Chelsea A.; Gostelow, Roli D.; Ingham, Michel D.; Jenkins, J. Steven; Smith, Brian S.
2010-01-01
As JPL's missions grow more complex, the need for improved systems engineering processes is becoming clear. Of significant promise in this regard is the move toward a more integrated and model-centric approach to mission conception, design, implementation and operations. The Integrated Model-Centric Engineering (IMCE) Initiative, now underway at JPL, seeks to lay the groundwork for these improvements. This paper will report progress on three fronts: articulating JPL's need for IMCE; characterizing the enterprise into which IMCE capabilities will be deployed; and constructing an operations concept for a flight project development in an integrated model-centric environment.
Jung, Eui-Hyun; Park, Yong-Jin
2008-01-01
In recent years, a few protocol bridge research projects have been announced to enable a seamless integration of Wireless Sensor Networks (WSNs) with the TCP/IP network. These studies have ensured the transparent end-to-end communication between two network sides in the node-centric manner. Researchers expect this integration will trigger the development of various application domains. However, prior research projects have not fully explored some essential features for WSNs, especially the reusability of sensing data and the data-centric communication. To resolve these issues, we suggested a new protocol bridge system named TinyONet. In TinyONet, virtual sensors play roles as virtual counterparts of physical sensors and they dynamically group to make a functional entity, Slice. Instead of direct interaction with individual physical sensors, each sensor application uses its own WSN service provided by Slices. If a new kind of service is required in TinyONet, the corresponding function can be dynamically added at runtime. Beside the data-centric communication, it also supports the node-centric communication and the synchronous access. In order to show the effectiveness of the system, we implemented TinyONet on an embedded Linux machine and evaluated it with several experimental scenarios. PMID:27873968
2010-02-01
Combat System (MCS) or Medical Vehicle Treatment (MV- T ), A for unmanned aerial vehicles such as Class II, and G for unmanned ground vehicles the...effective co-ordination with other NATO bodies involved in R& T activities. RTO reports both to the Military Committee of NATO and to the Conference of...research is one of the more promising areas of co-operation. The total spectrum of R& T activities is covered by the following 7 bodies: • AVT Applied
2012-08-02
Contracting, Program Executive Office for Simulation, Training, and Instrumentation; the Resident Auditor, Raytheon Network Centric Systems, Defense...Router Network (SIPRNET). We appreciate the courtesies extended to the staff. Please direct questions to Mr. Tim Moore at (703) 604-9068 (DSN 664...Raytheon Network Centric System Resident Office, DCAA, should develop and implement procedures to verify that the Army does not reimburse the contractor
Toward Privacy-preserving Content Access Control for Information Centric Networking
2014-03-01
REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting
Nunes, David; Tran, Thanh-Dien; Raposo, Duarte; Pinto, André; Gomes, André; Silva, Jorge Sá
2012-01-01
As the Internet evolved, social networks (such as Facebook) have bloomed and brought together an astonishing number of users. Mashing up mobile phones and sensors with these social environments enables the creation of people-centric sensing systems which have great potential for expanding our current social networking usage. However, such systems also have many associated technical challenges, such as privacy concerns, activity detection mechanisms or intermittent connectivity, as well as limitations due to the heterogeneity of sensor nodes and networks. Considering the openness of the Web 2.0, good technical solutions for these cases consist of frameworks that expose sensing data and functionalities as common Web-Services. This paper presents our RESTful Web Service-based model for people-centric sensing frameworks, which uses sensors and mobile phones to detect users’ activities and locations, sharing this information amongst the user’s friends within a social networking site. We also present some screenshot results of our experimental prototype. PMID:22438732
Nunes, David; Tran, Thanh-Dien; Raposo, Duarte; Pinto, André; Gomes, André; Silva, Jorge Sá
2012-01-01
As the Internet evolved, social networks (such as Facebook) have bloomed and brought together an astonishing number of users. Mashing up mobile phones and sensors with these social environments enables the creation of people-centric sensing systems which have great potential for expanding our current social networking usage. However, such systems also have many associated technical challenges, such as privacy concerns, activity detection mechanisms or intermittent connectivity, as well as limitations due to the heterogeneity of sensor nodes and networks. Considering the openness of the Web 2.0, good technical solutions for these cases consist of frameworks that expose sensing data and functionalities as common Web-Services. This paper presents our RESTful Web Service-based model for people-centric sensing frameworks, which uses sensors and mobile phones to detect users' activities and locations, sharing this information amongst the user's friends within a social networking site. We also present some screenshot results of our experimental prototype.
Effects Based Operations: Applying Network Centric Warfare in Peace, Crisis, and War
2003-01-01
understanding what factors play in the cognitive process of the leadership (e.g., the survival of the organization), and then threatening those...concept. To address the “why” of the stimulus and response, we must understand something of the cognitive processes involved in observing and responding to...between the cognitive domain and the information domain. It is the problem of communicating understanding
Information Assurance for Network-Centric Naval Forces
2010-01-01
of engineers are designing , implementing, and vigorously testing malicious codes prior to releasing them, not unlike well-funded commercial software...the likelihood that threats would partially succeed and partially degrade the system. Individual components of Aegis are designed and tested with a...of operations (CONOPS) set that is designed to work well in a low-bandwidth environment must be extensively tested and exercised within that low
Massive Multiplayer Online Gaming: A Research Framework for Military Training and Education
2005-03-01
those required by a military transforming itself to operating under the concept of network centric warfare. The technologies and practice...learning. Simulations are popular in other business situations and management processes. Data files, video clips, and flowcharts might help learners...on nature of these environments is another key motivator. According to Randy Hinrich, Microsoft Research Group Research Manager for Learning
Some Impacts of Risk-Centric Certification Requirements for UAS
NASA Technical Reports Server (NTRS)
Neogi, Natasha A. (Inventor); Hayhurst, Kelly J.; Maddalon, Jeffrey M.; Verstynen, Harry A.
2016-01-01
This paper discusses results from a recent study that investigates certification requirements for an unmanned rotorcraft performing agricultural application operations. The process of determining appropriate requirements using a risk-centric approach revealed a number of challenges that could impact larger UAS standardization efforts. Fundamental challenges include selecting the correct level of abstraction for requirements to permit design flexibility, transforming human-centric operational requirements to aircraft airworthiness requirements, and assessing all hazards associated with the operation.
Network-Centric Quantum Communications
NASA Astrophysics Data System (ADS)
Hughes, Richard
2014-03-01
Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.
N-CET: Network-Centric Exploitation and Tracking
2009-10-01
DATES COVERED (From - To) October 2008 – August 2009 4 . TITLE AND SUBTITLE N-CET: NETWORK – CENTRIC EXPLOITATION AND TRACKING 5a. CONTRACT NUMBER...At the core of N-CET are information management services that decouple data producers and consumers , allowing reconfiguration to suit mission needs...Shown around the head-node are different pieces of hardware including the Sony PlayStation R©3 (PS3) nodes used for computationally demanding tasks
Data distribution service-based interoperability framework for smart grid testbed infrastructure
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
2016-03-02
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
Time-Centric Models For Designing Embedded Cyber-physical Systems
2009-10-09
Time -centric Models For Designing Embedded Cyber- physical Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou Electrical... Time -centric Models For Designing Embedded Cyber-physical Systems ∗ John C. Eidson , Edward A. Lee, Slobodan Matic, Sanjit A. Seshia, Jia Zou...implementations, such a uniform notion of time cannot be precisely realized. Time triggered networks [10] and time synchronization [9] can be used to
The Operational Impacts of the Global Network Enterprise Construct
2010-05-14
Board Task Force on Achieving Interoperability in a Net-Centric Environment, xiv. 60 Lolita Baldor, “Military Asserts Right to Return Cyber-Attacks...the commander is aware that applications such video teleconferencing and large file transfers are often not possible with subordinate units...data packets, but if there is latency along the path, services such as video or large file transfers will fail. Latency is the time delay inherent in
Mapping Network Centric Operational Architectures to C2 and Software Architectures
2007-06-01
Instead, the termite mound structure emerges as a result of the termites following very simple rules, and exchanging very simple pheromone signals...Each worker need make only fairly simple decisions.” For example, in far northern Australia, “magnetic termites ” build large termite mounds which are...oriented north-south and contain a complex ventilation system which controls temperature, humidity, and oxygen levels. But termite brains are too
Sensor Exposure, Exploitation, and Experimentation Environment (SE4)
NASA Astrophysics Data System (ADS)
Buell, D.; Duff, F.; Goding, J.; Bankston, M.; McLaughlin, T.; Six, S.; Taylor, S.; Wootton, S.
2011-09-01
As the resident space object population increases from new launches and events such as the COSMOS/IRIDIUM collision, the maintenance of high-level Space Situational Awareness (SSA) has become increasingly difficult. To maintain situational awareness of the changing environment, new systems and methods must be developed. The Sensor Exposure, Exploitation and Experimentation Environment (SE4) provides a platform to illustrate “The Art of the Possible” that shows the potential benefit of enriched sensor data collections and real-time data sharing. Through modeling and simulation, and a net-centric architecture, SE4 shows the added value of sharing data in real-time and exposing new types of sensor data. The objective of SE4 is to develop an experimentation and innovation environment for sensor data exposure, composable sensor capabilities, reuse, and exploitation that accelerates the delivery of needed Command and Control, Intelligence, Surveillance, and Reconnaissance capabilities to the warfighter. Through modeling, simulation and rapid prototyping, the art of the possible for a fully-connected, net-centric space Command and Control (C2) and sensor enterprise can be demonstrated. This paper provides results that demonstrate the potential for faster cataloging of breakup events and additional event monitoring that are possible with data available today in the Space Surveillance Network (SSN). Demonstrating the art of the possible for the enterprise will guide net-centric requirements definition and facilitate discussions with stakeholder organizations on the Concept of Operations (CONOPS), policy, and Tactics, Techniques, and Procedures (TTP) evolution necessary to take full advantage of net-centric operations. SE4 aligns with direction from Secretary Gates and the Chairman Joint Chief of Staff that emphasizes the need to get the most out of our existing systems. Continuing to utilize SE4 will enable the enterprise by demonstrating the benefits of applying innovative net-centric concepts to SSA, resulting in efficient use of sensors, agile response to space events, and improved maintenance of the Space Catalog.
Cyber-physical approach to the network-centric robotics control task
NASA Astrophysics Data System (ADS)
Muliukha, Vladimir; Ilyashenko, Alexander; Zaborovsky, Vladimir; Lukashin, Alexey
2016-10-01
Complex engineering tasks concerning control for groups of mobile robots are developed poorly. In our work for their formalization we use cyber-physical approach, which extends the range of engineering and physical methods for a design of complex technical objects by researching the informational aspects of communication and interaction between objects and with an external environment [1]. The paper analyzes network-centric methods for control of cyber-physical objects. Robots or cyber-physical objects interact with each other by transmitting information via computer networks using preemptive queueing system and randomized push-out mechanism [2],[3]. The main field of application for the results of our work is space robotics. The selection of cyber-physical systems as a special class of designed objects is due to the necessity of integrating various components responsible for computing, communications and control processes. Network-centric solutions allow using universal means for the organization of information exchange to integrate different technologies for the control system.
2003-01-01
dependencies, and conceptual independencies. Taken together, the three views provide a framework to ensure interoperability, regardless of system... products for COP users . It enables a shared situational awareness that significantly improves the ability of commanders at all levels to quickly make... Review , March-April 1998. 5 Eric K. Shinseki, General , U.S. Army. “ The Army Transformation: A Historic Opportunity,” 2001- 02 Army Green Book
2007-02-12
Imperial War Museum Sound Archive, Accession No. 16397 (6 January 1996 ) 46 Jackson, p .45 47 Nagl, p .66-7 48 Stubbs, p .71 49 Nagl, p .93 Part II 16...Coogan, The Troubles, (London: Arrow, 1996 ), p .145 Part II 61 of 246 but there really appeared to be nothing in between to provide workable...Psychological Ops Capability Since 1945’, British Army Review, December 1996 , p .5 Part II 62 of 246 weakness caused by the lack of both numbers and
Semi-Autonomous Small Unmanned Aircraft Systems for Sampling Tornadic Supercell Thunderstorms
NASA Astrophysics Data System (ADS)
Elston, Jack S.
This work describes the development of a network-centric unmanned aircraft system (UAS) for in situ sampling of supercell thunderstorms. UAS have been identified as a well-suited platform for meteorological observations given their portability, endurance, and ability to mitigate atmospheric disturbances. They represent a unique tool for performing targeted sampling in regions of a supercell thunderstorm previously unreachable through other methods. Doppler radar can provide unique measurements of the wind field in and around supercell thunderstorms. In order to exploit this capability, a planner was developed that can optimize ingress trajectories for severe storm penetration. The resulting trajectories were examined to determine the feasibility of such a mission, and to optimize ingress in terms of flight time and exposure to precipitation. A network-centric architecture was developed to handle the large amount of distributed data produced during a storm sampling mission. Creation of this architecture was performed through a bottom-up design approach which reflects and enhances the interplay between networked communication and autonomous aircraft operation. The advantages of the approach are demonstrated through several field and hardware-in-the-loop experiments containing different hardware, networking protocols, and objectives. Results are provided from field experiments involving the resulting network-centric architecture. An airmass boundary was sampled in the Collaborative Colorado Nebraska Unmanned Aircraft Experiment (CoCoNUE). Utilizing lessons learned from CoCoNUE, a new concept of operations (CONOPS) and UAS were developed to perform in situ sampling of supercell thunderstorms. Deployment during the Verification of the Origins of Rotation in Tornadoes Experiment 2 (VORTEX2) resulted in the first ever sampling of the airmass associated with the rear flank downdraft of a tornadic supercell thunderstorm by a UAS. Hardware-in-the-loop simulation capability was added to the UAS to enable further assessment of the system and CONOPS. The simulation combines a full six degree-of-freedom aircraft dynamic model with wind and precipitation data from simulations of severe convective storms. Interfaces were written to involve as much of the system's field hardware as possible, including the creation of a simulated radar product server. A variety of simulations were conducted to evaluate different aspects of the CONOPS used for the 2010 VORTEX2 field campaign.
``Just Another Distribution Channel?''
NASA Astrophysics Data System (ADS)
Lemstra, Wolter; de Leeuw, Gerd-Jan; van de Kar, Els; Brand, Paul
The telecommunications-centric business model of mobile operators is under attack due to technological convergence in the communication and content industries. This has resulted in a plethora of academic contributions on the design of new business models and service platform architectures. However, a discussion of the challenges that operators are facing in adopting these models is lacking. We assess these challenges by considering the mobile network as part of the value system of the content industry. We will argue that from the perspective of a content provider the mobile network is ‘just another’ distribution channel. Strategic options available for the mobile communication operators are to deliver an excellent distribution channel for content delivery or to move upwards in the value chain by becoming a content aggregator. To become a mobile content aggregator operators will have to develop or acquire complementary resources and capabilities. Whether this strategic option is sustainable remains open.
Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare
2004-12-01
service providers (ISP), users now have multiple access points to enter the web whether at work, at home, or even at Starbucks . Besides having...benefits, they will advertise them to their peers outside organizational lines. The Battlefield Universal Gateway Equipment (BUG-E) is an example of...engagement that eBay institutionalized. They also expect to collect their commission for each sale . The “command intent” is clearly recognized by all
Effects of a Network-Centric Multi-Modal Communication Tool on a Communication Monitoring Task
2012-03-01
replaced (Nelson, Bolia, Vidulich, & Langhorne , 2004). Communication will continue to be the central tool for Command and Control (C2) operators. However...Nelson, Bolia, Vidulich, & Langhorne , 2004). The two highest ratings for most potential technologies were data capture/replay tools and chat...analysis of variance (ANOVA). A significant main effect was found for Difficulty, F (1, 13) = 21.11, p < .05; the overall level of detections was
2006-09-01
automated agents , such as chatbots to acts as a relay between chatrooms and blogs or other systems. In particular, chatbots could be used to monitor...bandwidth connections and legacy systems. Chatbot Integration The use of connected autonomous agents that monitor chatrooms to allow users access...of Cell Phone GPS Tracking. .............84 Figure 35. Example of a Chatbot Creating a Blog Entry
2003-07-01
Centric Architecture Office ( NCAO ) should develop an RF communications/network management technology roadmap. The roadmap should serve two purposes: a...Centric Architecture Office ( NCAO ) chartered with integrating diverse DoD efforts to provide technical alternatives to the current form of radio...American people as a cornerstone of DoD’s leadership of the public trust in this area. The NCAO should be consolidated from ongoing NII, JTRS JPO and DDR
Professional social networking.
Rowley, Robert D
2014-12-01
We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.
A metabolite-centric view on flux distributions in genome-scale metabolic models
2013-01-01
Background Genome-scale metabolic models are important tools in systems biology. They permit the in-silico prediction of cellular phenotypes via mathematical optimisation procedures, most importantly flux balance analysis. Current studies on metabolic models mostly consider reaction fluxes in isolation. Based on a recently proposed metabolite-centric approach, we here describe a set of methods that enable the analysis and interpretation of flux distributions in an integrated metabolite-centric view. We demonstrate how this framework can be used for the refinement of genome-scale metabolic models. Results We applied the metabolite-centric view developed here to the most recent metabolic reconstruction of Escherichia coli. By compiling the balance sheets of a small number of currency metabolites, we were able to fully characterise the energy metabolism as predicted by the model and to identify a possibility for model refinement in NADPH metabolism. Selected branch points were examined in detail in order to demonstrate how a metabolite-centric view allows identifying functional roles of metabolites. Fructose 6-phosphate aldolase and the sedoheptulose bisphosphate bypass were identified as enzymatic reactions that can carry high fluxes in the model but are unlikely to exhibit significant activity in vivo. Performing a metabolite essentiality analysis, unconstrained import and export of iron ions could be identified as potentially problematic for the quality of model predictions. Conclusions The system-wide analysis of split ratios and branch points allows a much deeper insight into the metabolic network than reaction-centric analyses. Extending an earlier metabolite-centric approach, the methods introduced here establish an integrated metabolite-centric framework for the interpretation of flux distributions in genome-scale metabolic networks that can complement the classical reaction-centric framework. Analysing fluxes and their metabolic context simultaneously opens the door to systems biological interpretations that are not apparent from isolated reaction fluxes. Particularly powerful demonstrations of this are the analyses of the complete metabolic contexts of energy metabolism and the folate-dependent one-carbon pool presented in this work. Finally, a metabolite-centric view on flux distributions can guide the refinement of metabolic reconstructions for specific growth scenarios. PMID:23587327
2015-04-07
ships, equipped with advanced anti-ship, anti- air, and anti-submarine weapons and sensors . Whereas “near seas” defense remains the PLA Navy’s...that “destroying or capturing satellites and other sensors … will deprive an opponent of initiative on the battlefield and [make it difficult] for...aircraft are modern avionics and sensors that offer more timely situational awareness for operations in network-centric combat environments, radars
2014-04-24
other sensors … will deprive an opponent of initiative on the battlefield and [make it difficult] for them to bring their precision guided weapons...features include modern avionics and sensors that offer more timely situational awareness for operations in network-centric combat environments...JF12 hypersonic wind tunnel, reportedly the largest in the world, capable of replicating flying conditions at mach 5 to 9. This project was one of
2002-09-01
including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson...require the acquisition of unfamiliar weapons and support systems. Joint and service visions of the military after next raise serious questions that...and the U.S. Defense Industry The U.S. military is awash in visions of transformation. There is an array of joint and service visions of what has become
Virtual Mission Operations of Remote Sensors With Rapid Access To and From Space
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, Dave; Walke, Jon; Dikeman, Larry; Sage, Steven; Miller, Eric; Northam, James; Jackson, Chris; Taylor, John; Lynch, Scott;
2010-01-01
This paper describes network-centric operations, where a virtual mission operations center autonomously receives sensor triggers, and schedules space and ground assets using Internet-based technologies and service-oriented architectures. For proof-of-concept purposes, sensor triggers are received from the United States Geological Survey (USGS) to determine targets for space-based sensors. The Surrey Satellite Technology Limited (SSTL) Disaster Monitoring Constellation satellite, the United Kingdom Disaster Monitoring Constellation (UK-DMC), is used as the space-based sensor. The UK-DMC s availability is determined via machine-to-machine communications using SSTL s mission planning system. Access to/from the UK-DMC for tasking and sensor data is via SSTL s and Universal Space Network s (USN) ground assets. The availability and scheduling of USN s assets can also be performed autonomously via machine-to-machine communications. All communication, both on the ground and between ground and space, uses open Internet standards.
Agent-Based Framework for Personalized Service Provisioning in Converged IP Networks
NASA Astrophysics Data System (ADS)
Podobnik, Vedran; Matijasevic, Maja; Lovrek, Ignac; Skorin-Kapov, Lea; Desic, Sasa
In a global multi-service and multi-provider market, the Internet Service Providers will increasingly need to differentiate in the service quality they offer and base their operation on new, consumer-centric business models. In this paper, we propose an agent-based framework for the Business-to-Consumer (B2C) electronic market, comprising the Consumer Agents, Broker Agents and Content Agents, which enable Internet consumers to select a content provider in an automated manner. We also discuss how to dynamically allocate network resources to provide end-to-end Quality of Service (QoS) for a given consumer and content provider.
A review of radio channel models for body centric communications
Cotton, Simon L; D'Errico, Raffaele; Oestges, Claude
2014-01-01
The human body is an extremely challenging environment for the operation of wireless communications systems, not least because of the complex antenna-body electromagnetic interaction effects which can occur. This is further compounded by the impact of movement and the propagation characteristics of the local environment which all have an effect upon body centric communications channels. As the successful design of body area networks (BANs) and other types of body centric system is inextricably linked to a thorough understanding of these factors, the aim of this paper is to conduct a survey of the current state of the art in relation to propagation and channel models primarily for BANs but also considering other types of body centric communications. We initially discuss some of the standardization efforts performed by the Institute of Electrical and Electronics Engineers 802.15.6 task group before focusing on the two most popular types of technologies currently being considered for BANs, namely narrowband and Ultrawideband (UWB) communications. For narrowband communications the applicability of a generic path loss model is contended, before presenting some of the scenario specific models which have proven successful. The impacts of human body shadowing and small-scale fading are also presented alongside some of the most recent research into the Doppler and time dependencies of BANs. For UWB BAN communications, we again consider the path loss as well as empirical tap delay line models developed from a number of extensive channel measurement campaigns conducted by research institutions around the world. Ongoing efforts within collaborative projects such as Committee on Science and Technology Action IC1004 are also described. Finally, recent years have also seen significant developments in other areas of body centric communications such as off-body and body-to-body communications. We highlight some of the newest relevant research in these areas as well as discussing some of the advanced topics which are currently being addressed in the field of body centric communications. PMID:26430285
Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.
2010-01-01
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307
MUFFINN: cancer gene discovery via network analysis of somatic mutation data.
Cho, Ara; Shim, Jung Eun; Kim, Eiru; Supek, Fran; Lehner, Ben; Lee, Insuk
2016-06-23
A major challenge for distinguishing cancer-causing driver mutations from inconsequential passenger mutations is the long-tail of infrequently mutated genes in cancer genomes. Here, we present and evaluate a method for prioritizing cancer genes accounting not only for mutations in individual genes but also in their neighbors in functional networks, MUFFINN (MUtations For Functional Impact on Network Neighbors). This pathway-centric method shows high sensitivity compared with gene-centric analyses of mutation data. Notably, only a marginal decrease in performance is observed when using 10 % of TCGA patient samples, suggesting the method may potentiate cancer genome projects with small patient populations.
Envisioning the Handheld-Centric Classroom
ERIC Educational Resources Information Center
Norris, Cathleen; Soloway, Elliot
2004-01-01
While appropriate as an initial focus, it is time that the educational community move beyond an emphasis on 1:1 computing (each child having his/her own personal computer) to a vision of a handheld-centric classroom, where each child not only has his/her own personal, handheld computer, but also has access to networked PCs, probeware, digital…
NASA Astrophysics Data System (ADS)
Bowley, Dean K.; Gaertner, Paul S.
2003-07-01
In this paper the argument is made that the offensive fire support organisation and doctrine, born of the "indirect fire revolution" of the first world war, is the start point for distributed sensors, shooters and deciders that may be transferred to a joint force; that the culture of directive control and mission orders developed by the German Army in 1918 and then adopted by most western armies is the start point for the culture required to achieve "self synchronisation" and that the network developed for the air defence of carrier battle groups is the start point for developing a networked ground manoeuvre force. We discuss the strategic expectations of network centric warfare, a "virtual war" scenario and the inherent vulnerabilities. The current level of understanding and implementation in specific areas is analysed and lessons for general application are developed and the potential payoff identified. Three broad operational domains are investigated, networked platform versus platform warfare between states, guerrilla/counter-insurfence operations and the emerging domain of "netwars" (terror organisations and criminal gangs).
Providing the Tools for Information Sharing: Net-Centric Enterprise Services
2007-07-01
The Department of Defense (DoD) is establishing a net-centric environment that increasingly leverages shared services and Service-Oriented...transformational program that delivers a set of shared services as part of the DoD’s common infrastructure to enable networked joint force capabilities, improved interoperability, and increased information sharing across mission area services.
Secure Network-Centric Aviation Communication (SNAC)
NASA Technical Reports Server (NTRS)
Nelson, Paul H.; Muha, Mark A.; Sheehe, Charles J.
2017-01-01
The existing National Airspace System (NAS) communications capabilities are largely unsecured, are not designed for efficient use of spectrum and collectively are not capable of servicing the future needs of the NAS with the inclusion of new operators in Unmanned Aviation Systems (UAS) or On Demand Mobility (ODM). SNAC will provide a ubiquitous secure, network-based communications architecture that will provide new service capabilities and allow for the migration of current communications to SNAC over time. The necessary change in communication technologies to digital domains will allow for the adoption of security mechanisms, sharing of link technologies, large increase in spectrum utilization, new forms of resilience and redundancy and the possibly of spectrum reuse. SNAC consists of a long term open architectural approach with increasingly capable designs used to steer research and development and enable operating capabilities that run in parallel with current NAS systems.
Secure Autonomous Automated Scheduling (SAAS). Rev. 1.1
NASA Technical Reports Server (NTRS)
Walke, Jon G.; Dikeman, Larry; Sage, Stephen P.; Miller, Eric M.
2010-01-01
This report describes network-centric operations, where a virtual mission operations center autonomously receives sensor triggers, and schedules space and ground assets using Internet-based technologies and service-oriented architectures. For proof-of-concept purposes, sensor triggers are received from the United States Geological Survey (USGS) to determine targets for space-based sensors. The Surrey Satellite Technology Limited (SSTL) Disaster Monitoring Constellation satellite, the UK-DMC, is used as the space-based sensor. The UK-DMC's availability is determined via machine-to-machine communications using SSTL's mission planning system. Access to/from the UK-DMC for tasking and sensor data is via SSTL's and Universal Space Network's (USN) ground assets. The availability and scheduling of USN's assets can also be performed autonomously via machine-to-machine communications. All communication, both on the ground and between ground and space, uses open Internet standards
Addressing practical challenges in utility optimization of mobile wireless sensor networks
NASA Astrophysics Data System (ADS)
Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin
2008-04-01
This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.
Plan execution monitoring with distributed intelligent agents for battle command
NASA Astrophysics Data System (ADS)
Allen, James P.; Barry, Kevin P.; McCormick, John M.; Paul, Ross A.
2004-07-01
As military tactics evolve toward execution centric operations the ability to analyze vast amounts of mission relevant data is essential to command and control decision making. To maintain operational tempo and achieve information superiority we have developed Vigilant Advisor, a mobile agent-based distributed Plan Execution Monitoring system. It provides military commanders with continuous contingency monitoring tailored to their preferences while overcoming the network bandwidth problem often associated with traditional remote data querying. This paper presents an overview of Plan Execution Monitoring as well as a detailed view of the Vigilant Advisor system including key features and statistical analysis of resource savings provided by its mobile agent-based approach.
ERIC Educational Resources Information Center
Medini, Khaled
2018-01-01
The increase of individualised customer demands and tough competition in the manufacturing sector gave rise to more customer-centric operations management such as products and services (mass) customisation. Mass customisation (MC), which inherits the "economy of scale" from mass production (MP), aims to meet specific customer demands…
Abbas, Syed Muzahir; Ranga, Yogesh; Esselle, Karu P
2015-01-01
This paper presents electronically reconfigurable antenna options in healthcare applications. They are suitable for wireless body area network devices operating in the industrial, scientific, and medical (ISM) band at 2.45 GHz and IEEE 802.11 Wireless Local Area Network (WLAN) band at 5 GHz (5.15-5.35 GHz, 5.25-5.35 GHz). Two types of antennas are investigated: Antenna-I has a full ground plane and Antenna-II has a partial ground plane. The proposed antennas provide ISM operation in one mode while in another mode they support 5 GHz WLAN band. Their performance is assessed for body centric wireless communication using a simplified human body model. Antenna sensitivity to the gap between the antenna and the human body is investigated for both modes of each antenna. The proposed antennas exhibit a wide radiation pattern along the body surface to provide wide coverage and their small width (14 mm) makes them suitable for on-body communication in healthcare applications.
GOATS 2008 Autonomous, Adaptive Multistatic Acoustic Sensing
2008-09-30
To develop net-centric, autonomous underwater vehicle sensing concepts for littoral MCM and ASW, exploiting collaborative and environmentally...unlimited 13. SUPPLEMENTARY NOTES code 1 only 14. ABSTRACT To develop net-centric, autonomous underwater vehicle sensing concepts for littoral MCM and...of autonomous underwater vehicle networks as platforms for new sonar concepts exploring the full 3-D acoustic environment of shallow water (SW) and
2005 8th Annual Systems Engineering Conference. Volume 4, Thursday
2005-10-27
requirements, allocation , and utilization statistics Operations Decisions Acquisition Decisions Resource Management — Integrated Requirements/ Allocation ...Quality Improvement Consultants, Inc. “Automated Software Testing Increases Test Quality and Coverage Resulting in Improved Software Reliability.”, Mr...Steven Ligon, SAIC The Return of Discipline, Ms. Jacqueline Townsend, Air Force Materiel Command Track 4 - Net Centric Operations: Testing Net-Centric
Network-centric decision architecture for financial or 1/f data models
NASA Astrophysics Data System (ADS)
Jaenisch, Holger M.; Handley, James W.; Massey, Stoney; Case, Carl T.; Songy, Claude G.
2002-12-01
This paper presents a decision architecture algorithm for training neural equation based networks to make autonomous multi-goal oriented, multi-class decisions. These architectures make decisions based on their individual goals and draw from the same network centric feature set. Traditionally, these architectures are comprised of neural networks that offer marginal performance due to lack of convergence of the training set. We present an approach for autonomously extracting sample points as I/O exemplars for generation of multi-branch, multi-node decision architectures populated by adaptively derived neural equations. To test the robustness of this architecture, open source data sets in the form of financial time series were used, requiring a three-class decision space analogous to the lethal, non-lethal, and clutter discrimination problem. This algorithm and the results of its application are presented here.
Learning to Predict Consequences as a Method of Knowledge Transfer in Reinforcement Learning.
Chalmers, Eric; Contreras, Edgar Bermudez; Robertson, Brandon; Luczak, Artur; Gruber, Aaron
2017-04-17
The reinforcement learning (RL) paradigm allows agents to solve tasks through trial-and-error learning. To be capable of efficient, long-term learning, RL agents should be able to apply knowledge gained in the past to new tasks they may encounter in the future. The ability to predict actions' consequences may facilitate such knowledge transfer. We consider here domains where an RL agent has access to two kinds of information: agent-centric information with constant semantics across tasks, and environment-centric information, which is necessary to solve the task, but with semantics that differ between tasks. For example, in robot navigation, environment-centric information may include the robot's geographic location, while agent-centric information may include sensor readings of various nearby obstacles. We propose that these situations provide an opportunity for a very natural style of knowledge transfer, in which the agent learns to predict actions' environmental consequences using agent-centric information. These predictions contain important information about the affordances and dangers present in a novel environment, and can effectively transfer knowledge from agent-centric to environment-centric learning systems. Using several example problems including spatial navigation and network routing, we show that our knowledge transfer approach can allow faster and lower cost learning than existing alternatives.
Veiga, Diogo F. T.; Dutta, Bhaskar; Balaźsi, Gábor
2011-01-01
The escalating amount of genome-scale data demands a pragmatic stance from the research community. How can we utilize this deluge of information to better understand biology, cure diseases, or engage cells in bioremediation or biomaterial production for various purposes? A research pipeline moving new sequence, expression and binding data towards practical end goals seems to be necessary. While most individual researchers are not motivated by such well-articulated pragmatic end goals, the scientific community has already self-organized itself to successfully convert genomic data into fundamentally new biological knowledge and practical applications. Here we review two important steps in this workflow: network inference and network response identification, applied to transcriptional regulatory networks. Among network inference methods, we concentrate on relevance networks due to their conceptual simplicity. We classify and discuss network response identification approaches as either data-centric or network-centric. Finally, we conclude with an outlook on what is still missing from these approaches and what may be ahead on the road to biological discovery. PMID:20174676
Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks
Monares, Álvaro; Ochoa, Sergio F.; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc
2014-01-01
The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes. PMID:25157549
Manned/Unmanned Common Architecture Program (MCAP) net centric flight tests
NASA Astrophysics Data System (ADS)
Johnson, Dale
2009-04-01
Properly architected avionics systems can reduce the costs of periodic functional improvements, maintenance, and obsolescence. With this in mind, the U.S. Army Aviation Applied Technology Directorate (AATD) initiated the Manned/Unmanned Common Architecture Program (MCAP) in 2003 to develop an affordable, high-performance embedded mission processing architecture for potential application to multiple aviation platforms. MCAP analyzed Army helicopter and unmanned air vehicle (UAV) missions, identified supporting subsystems, surveyed advanced hardware and software technologies, and defined computational infrastructure technical requirements. The project selected a set of modular open systems standards and market-driven commercial-off-theshelf (COTS) electronics and software, and, developed experimental mission processors, network architectures, and software infrastructures supporting the integration of new capabilities, interoperability, and life cycle cost reductions. MCAP integrated the new mission processing architecture into an AH-64D Apache Longbow and participated in Future Combat Systems (FCS) network-centric operations field experiments in 2006 and 2007 at White Sands Missile Range (WSMR), New Mexico and at the Nevada Test and Training Range (NTTR) in 2008. The MCAP Apache also participated in PM C4ISR On-the-Move (OTM) Capstone Experiments 2007 (E07) and 2008 (E08) at Ft. Dix, NJ and conducted Mesa, Arizona local area flight tests in December 2005, February 2006, and June 2008.
Modeling IoT-based solutions using human-centric wireless sensor networks.
Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc
2014-08-25
The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.
Cyber threat model for tactical radio networks
NASA Astrophysics Data System (ADS)
Kurdziel, Michael T.
2014-05-01
The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.
Srivastava, Mani; Abdelzaher, Tarek; Szymanski, Boleslaw
2012-01-13
The first decade of the century witnessed a proliferation of devices with sensing and communication capabilities in the possession of the average individual. Examples range from camera phones and wireless global positioning system units to sensor-equipped, networked fitness devices and entertainment platforms (such as Wii). Social networking platforms emerged, such as Twitter, that allow sharing information in real time. The unprecedented deployment scale of such sensors and connectivity options ushers in an era of novel data-driven applications that rely on inputs collected by networks of humans or measured by sensors acting on their behalf. These applications will impact domains as diverse as health, transportation, energy, disaster recovery, intelligence and warfare. This paper surveys the important opportunities in human-centric sensing, identifies challenges brought about by such opportunities and describes emerging solutions to these challenges.
Hybrid scheduling mechanisms for Next-generation Passive Optical Networks based on network coding
NASA Astrophysics Data System (ADS)
Zhao, Jijun; Bai, Wei; Liu, Xin; Feng, Nan; Maier, Martin
2014-10-01
Network coding (NC) integrated into Passive Optical Networks (PONs) is regarded as a promising solution to achieve higher throughput and energy efficiency. To efficiently support multimedia traffic under this new transmission mode, novel NC-based hybrid scheduling mechanisms for Next-generation PONs (NG-PONs) including energy management, time slot management, resource allocation, and Quality-of-Service (QoS) scheduling are proposed in this paper. First, we design an energy-saving scheme that is based on Bidirectional Centric Scheduling (BCS) to reduce the energy consumption of both the Optical Line Terminal (OLT) and Optical Network Units (ONUs). Next, we propose an intra-ONU scheduling and an inter-ONU scheduling scheme, which takes NC into account to support service differentiation and QoS assurance. The presented simulation results show that BCS achieves higher energy efficiency under low traffic loads, clearly outperforming the alternative NC-based Upstream Centric Scheduling (UCS) scheme. Furthermore, BCS is shown to provide better QoS assurance.
Ge Sun; Peter Caldwell; Asko Noormets; Steven G. McNulty; Erika Cohen; al. et.
2011-01-01
We developed a waterâcentric monthly scale simulation model (WaSSIâC) by integrating empirical water and carbon flux measurements from the FLUXNET network and an existing water supply and demand accounting model (WaSSI). The WaSSIâC model was evaluated with basinâscale evapotranspiration (ET), gross ecosystem productivity (GEP), and net ecosystem exchange (NEE)...
Net Warrior D10 Technology Report: Airborne Early Warning and Control (AEW&C) and Data Link Nodes
2012-04-01
ADO ) approach to implementing Network Centric Warfare (NCW) through ‘learning by doing’. Net Warrior was conceived to address, through... frameworks are able to satisfy design needs of applications to produce stable mission and net centric systems. NW-D10 employed a SOA approach to...UNCLASSIFIED Net Warrior D10 Technology Report: Airborne Early Warning and Control (AEW&C) and Data Link Nodes Derek Dominish
Disaster management and mitigation: the telecommunications infrastructure.
Patricelli, Frédéric; Beakley, James E; Carnevale, Angelo; Tarabochia, Marcello; von Lubitz, Dag K J E
2009-03-01
Among the most typical consequences of disasters is the near or complete collapse of terrestrial telecommunications infrastructures (especially the distribution network--the 'last mile') and their concomitant unavailability to the rescuers and the higher echelons of mitigation teams. Even when such damage does not take place, the communications overload/congestion resulting from significantly elevated traffic generated by affected residents can be highly disturbing. The paper proposes innovative remedies to the telecommunications difficulties in disaster struck regions. The offered solutions are network-centric operations-cap able, and can be employed in management of disasters of any magnitude (local to national or international). Their implementation provide ground rescue teams (such as law enforcement, firemen, healthcare personnel, civilian authorities) with tactical connectivity among themselves, and, through the Next Generation Network backbone, ensure the essential bidirectional free flow of information and distribution of Actionable Knowledge among ground units, command/control centres, and civilian and military agencies participating in the rescue effort.
Timeline-Based Mission Operations Architecture: An Overview
NASA Technical Reports Server (NTRS)
Chung, Seung H.; Bindschadler, Duane L.
2012-01-01
Some of the challenges in developing a mission operations system and operating a mission can be traced back to the challenge of integrating a mission operations system from its many components and to the challenge of maintaining consistent and accountable information throughout the operations processes. An important contributing factor to both of these challenges is the file-centric nature of today's systems. In this paper, we provide an overview of these challenges and argue the need to move toward an information-centric mission operations system. We propose an information representation called Timeline as an approach to enable such a move, and we provide an overview of a Timeline-based Mission Operations System architecture.
User-Centric Secure Cross-Site Interaction Framework for Online Social Networking Services
ERIC Educational Resources Information Center
Ko, Moo Nam
2011-01-01
Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited within the same social networking site. Although users can share some content on a social networking site…
Grosser, Travis J; Venkataramani, Vijaya; Labianca, Giuseppe Joe
2017-09-01
While most social network studies of employee innovation behavior examine the focal employees' ("egos'") network structure, we employ an alter-centric perspective to study the personal characteristics of employees' network contacts-their "alters"-to better understand employee innovation. Specifically, we examine how the creative self-efficacy (CSE) and innovation behavior of employees' social network contacts affects their ability to generate and implement novel ideas. Hypotheses were tested using a sample of 144 employees in a U.S.-based product development organization. We find that the average CSE of alters in an employee's problem solving network is positively related to that employee's innovation behavior, with this relationship being mediated by these alters' average innovation behavior. The relationship between the alters' average innovation behavior and the employee's own innovation behavior is strengthened when these alters have less dense social networks. Post hoc results suggest that having network contacts with high levels of CSE also leads to an increase in ego's personal CSE 1 year later in cases where the employee's initial level of CSE was relatively low. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
2006 Net Centric Operations Conference - Facilitating Net Centric Operations and Warfare
2006-03-16
22, 2005 • White Paper, “Facilitating Shared Services in the DoD,” Feb 12, 2006 • White Paper, “ Shared Services : Performance Accountability and Risk...who demand a culture of information sharing and improved organizational effectiveness.” 12 Facilitating Shared Services : Task “What should be the...distinct programs.” 13 Facilitating Shared Services : Focus Areas • Governance and Control Policy • Common Information Standards and Technical
Stetz, Gabrielle; Verkhivker, Gennady M
2015-01-01
Hsp70 and Hsp110 chaperones play an important role in regulating cellular processes that involve protein folding and stabilization, which are essential for the integrity of signaling networks. Although many aspects of allosteric regulatory mechanisms in Hsp70 and Hsp110 chaperones have been extensively studied and significantly advanced in recent experimental studies, the atomistic picture of signal propagation and energetics of dynamics-based communication still remain unresolved. In this work, we have combined molecular dynamics simulations and protein stability analysis of the chaperone structures with the network modeling of residue interaction networks to characterize molecular determinants of allosteric mechanisms. We have shown that allosteric mechanisms of Hsp70 and Hsp110 chaperones may be primarily determined by nucleotide-induced redistribution of local conformational ensembles in the inter-domain regions and the substrate binding domain. Conformational dynamics and energetics of the peptide substrate binding with the Hsp70 structures has been analyzed using free energy calculations, revealing allosteric hotspots that control negative cooperativity between regulatory sites. The results have indicated that cooperative interactions may promote a population-shift mechanism in Hsp70, in which functional residues are organized in a broad and robust allosteric network that can link the nucleotide-binding site and the substrate-binding regions. A smaller allosteric network in Hsp110 structures may elicit an entropy-driven allostery that occurs in the absence of global structural changes. We have found that global mediating residues with high network centrality may be organized in stable local communities that are indispensable for structural stability and efficient allosteric communications. The network-centric analysis of allosteric interactions has also established that centrality of functional residues could correlate with their sensitivity to mutations across diverse chaperone functions. This study reconciles a wide spectrum of structural and functional experiments by demonstrating how integration of molecular simulations and network-centric modeling may explain thermodynamic and mechanistic aspects of allosteric regulation in chaperones.
Stetz, Gabrielle; Verkhivker, Gennady M.
2015-01-01
Hsp70 and Hsp110 chaperones play an important role in regulating cellular processes that involve protein folding and stabilization, which are essential for the integrity of signaling networks. Although many aspects of allosteric regulatory mechanisms in Hsp70 and Hsp110 chaperones have been extensively studied and significantly advanced in recent experimental studies, the atomistic picture of signal propagation and energetics of dynamics-based communication still remain unresolved. In this work, we have combined molecular dynamics simulations and protein stability analysis of the chaperone structures with the network modeling of residue interaction networks to characterize molecular determinants of allosteric mechanisms. We have shown that allosteric mechanisms of Hsp70 and Hsp110 chaperones may be primarily determined by nucleotide-induced redistribution of local conformational ensembles in the inter-domain regions and the substrate binding domain. Conformational dynamics and energetics of the peptide substrate binding with the Hsp70 structures has been analyzed using free energy calculations, revealing allosteric hotspots that control negative cooperativity between regulatory sites. The results have indicated that cooperative interactions may promote a population-shift mechanism in Hsp70, in which functional residues are organized in a broad and robust allosteric network that can link the nucleotide-binding site and the substrate-binding regions. A smaller allosteric network in Hsp110 structures may elicit an entropy-driven allostery that occurs in the absence of global structural changes. We have found that global mediating residues with high network centrality may be organized in stable local communities that are indispensable for structural stability and efficient allosteric communications. The network-centric analysis of allosteric interactions has also established that centrality of functional residues could correlate with their sensitivity to mutations across diverse chaperone functions. This study reconciles a wide spectrum of structural and functional experiments by demonstrating how integration of molecular simulations and network-centric modeling may explain thermodynamic and mechanistic aspects of allosteric regulation in chaperones. PMID:26619280
Cache Scheme Based on Pre-Fetch Operation in ICN
Duan, Jie; Wang, Xiong; Xu, Shizhong; Liu, Yuanni; Xu, Chuan; Zhao, Guofeng
2016-01-01
Many recent researches focus on ICN (Information-Centric Network), in which named content becomes the first citizen instead of end-host. In ICN, Named content can be further divided into many small sized chunks, and chunk-based communication has merits over content-based communication. The universal in-network cache is one of the fundamental infrastructures for ICN. In this work, a chunk-level cache mechanism based on pre-fetch operation is proposed. The main idea is that, routers with cache store should pre-fetch and cache the next chunks which may be accessed in the near future according to received requests and cache policy for reducing the users’ perceived latency. Two pre-fetch driven modes are present to answer when and how to pre-fetch. The LRU (Least Recently Used) is employed for the cache replacement. Simulation results show that the average user perceived latency and hops can be decreased by employed this cache mechanism based on pre-fetch operation. Furthermore, we also demonstrate that the results are influenced by many factors, such as the cache capacity, Zipf parameters and pre-fetch window size. PMID:27362478
Analyzing the Effects of Network Centric Warfare on Warfighter Empowerment
2002-06-01
5 D ORGANIZATION OF THE STUDY...16 D . THEORETICAL MODEL OF EMPOWERMENT...Technology Defined ............................................................................33 D . IMPLEMENTING IT THROUGH INTEGRATED INFORMATION
Health care applications based on mobile phone centric smart sensor network.
Quero, J M; Tarrida, C L; Santana, J J; Ermolov, V; Jantunen, I; Laine, H; Eichholz, J
2007-01-01
This paper presents the MIMOSA architecture and development platform to create Ambient Intelligence applications. MIMOSA achieves this objective by developing a personal mobile-device centric architecture and open technology platform where microsystem technology is the key enabling technology for their realization due to its low-cost, low power consumption, and small size. This paper focuses the demonstration activities carried out in the field of health care. MIMOSA project is a European level initiative involving 15 enterprises and research institutions and universities.
Managed consumerism in health care.
Robinson, James C
2005-01-01
The future of market-oriented health policy and practice lies in "managed consumerism," a blend of the patient-centric focus of consumer-driven health care and the provider-centric focus of managed competition. The optimal locus of incentives will vary among health services according to the nature of the illness, the clinical technology, and the extent of discretion in utilization. A competitive market will manifest a variety of comprehensive and limited benefit designs, broad and narrow contractual networks, and single-and multispecialty provider organizations.
2006-02-17
included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME
Random walks and diffusion on networks
NASA Astrophysics Data System (ADS)
Masuda, Naoki; Porter, Mason A.; Lambiotte, Renaud
2017-11-01
Random walks are ubiquitous in the sciences, and they are interesting from both theoretical and practical perspectives. They are one of the most fundamental types of stochastic processes; can be used to model numerous phenomena, including diffusion, interactions, and opinions among humans and animals; and can be used to extract information about important entities or dense groups of entities in a network. Random walks have been studied for many decades on both regular lattices and (especially in the last couple of decades) on networks with a variety of structures. In the present article, we survey the theory and applications of random walks on networks, restricting ourselves to simple cases of single and non-adaptive random walkers. We distinguish three main types of random walks: discrete-time random walks, node-centric continuous-time random walks, and edge-centric continuous-time random walks. We first briefly survey random walks on a line, and then we consider random walks on various types of networks. We extensively discuss applications of random walks, including ranking of nodes (e.g., PageRank), community detection, respondent-driven sampling, and opinion models such as voter models.
Transformation: growing role of sensor networks in defense applications
NASA Astrophysics Data System (ADS)
Gunzelman, Karl J.; Kwok, Kwan S.; Krotkov, Eric P.
2003-12-01
The Department of Defense (DoD) is undergoing a transformation. What began as theoretical thinking, under the notion of a Revolution in Military Affairs (RMA) is now beginning to manifest itself in a "Transformation." The overall goal of the transformation described in Joint Vision 2020 is the creation of a force that is dominant across the full spectrum of military operations. The warfighting concept that will allow us to achieve Joint Vision 2020 operational capabilities is Network Centric Warfare (NCW). NCW is no less than the embodiment of an Information Age transformation of the DoD. It involves a new way of thinking about how we accomplish our missions, how we organize and interrelate, and how we acquire, field and use the systems that support us. It will involve ways of operating that have yet to be conceived, and it will employ technologies yet to be invented. NCW has the potential to increase warfighting capabilities by orders of magnitude, and it will do so by leveraging information superiority. A major condition to success is an infostructure that is robustly networked to support information collection, sharing and collaboration; which will require increased emphasis on sensor research, development and implementation. DARPA is taking steps today to research, develop and implement those sensor capabilities. The Multi-Body Control program is a step in that direction.
Got risk? risk-centric perspective for spacecraft technology decision-making
NASA Technical Reports Server (NTRS)
Feather, Martin S.; Cornford, Steven L.; Moran, Kelly
2004-01-01
A risk-based decision-making methodology conceived and developed at JPL and NASA has been used to aid in decision making for spacecraft technology assessment, adoption, development and operation. It takes a risk-centric perspective, through which risks are used as a reasoning step to interpose between mission objectives and risk mitigation measures.
2016-01-22
basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its neighbors. If a response is...to a destination by using the set of ex- changed hello messages between users of the network. With suciently high frequency, hello messages are suc
Naval Surface Warfare Center Carderock Division, Technical Digest
2001-12-01
Survivability Systems: An Overview Fred J. Fisch 139 Modeling and Simulation of Weapons Effects on Ships Robert R. Wunderlick 143 Intelligent Networks ...communications capability of forces afloat to support emerging network -centric warfare doc- trines. Stealth, for our next generation of warships...fully-inte- grated, fully- networked electronic countermeasures system, developed in parallel and in close coordination with sister systems. An
Measuring Creative Potential: Using Social Network Analysis to Monitor a Learners' Creative Capacity
ERIC Educational Resources Information Center
Dawson, Shane; Tan, Jennifer Pei Ling; McWilliam, Erica
2011-01-01
Despite the burgeoning rhetoric from political, social and educational commentators regarding creativity and learning and teaching, there is a paucity of scalable and measurable examples of creativity-centric pedagogical practice. This paper makes an argument for the application of social network visualisations to inform and support…
Network Centric Warfare: A Realistic Defense Alternative for Smaller Nations?
2004-06-01
organic information sources. The degree to which force entities are networked will determine the quality of information that is available to various...control processes will determine the extent that information is shared, as well as the nature and quality of the interactions that occur between and...
2008-12-01
In future network-centric warfare environments, teams of autonomous vehicles will be deployed in a coorperative manner to conduct wide-area...of data back to the command station, autonomous vehicles configured with high bandwidth communication system are positioned between the command
CytoCom: a Cytoscape app to visualize, query and analyse disease comorbidity networks.
Moni, Mohammad Ali; Xu, Haoming; Liò, Pietro
2015-03-15
CytoCom is an interactive plugin for Cytoscape that can be used to search, explore, analyse and visualize human disease comorbidity network. It represents disease-disease associations in terms of bipartite graphs and provides International Classification of Diseases, Ninth Revision (ICD9)-centric and disease name centric views of disease information. It allows users to find associations between diseases based on the two measures: Relative Risk (RR) and [Formula: see text]-correlation values. In the disease network, the size of each node is based on the prevalence of that disease. CytoCom is capable of clustering disease network based on the ICD9 disease category. It provides user-friendly access that facilitates exploration of human diseases, and finds additional associated diseases by double-clicking a node in the existing network. Additional comorbid diseases are then connected to the existing network. It is able to assist users for interpretation and exploration of the human diseases by a variety of built-in functions. Moreover, CytoCom permits multi-colouring of disease nodes according to standard disease classification for expedient visualization. © The Author 2014. Published by Oxford University Press.
Multimedia-Based Integration of Cross-Layer Techniques
2014-06-01
wireless networks play a critical role in net-centric warfare, including the sharing of the time-sensitive battlefield information among military nodes for...layer protocols are key enablers in effectively deploying the military wireless network. This report discusses the design of cross-layer protocols...2 1.0 INTRODUCTION 1.1 Motivation The Air Force (AF) Wireless Networks (also denoted as military networks in this report) must be capable of
Securing the Global Airspace System Via Identity-Based Security
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2015-01-01
Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.
2007-05-08
of this transformation, the Australian Army aims to gain advantage through the concept of a ‘network- enabled’ Army. This approach is only a slight...43 NETWORK ENABLED VERSUS NETWORK CENTRIC— A DIFFERENT APPROACH ?... 45 Introduction...advantage through the concept of a ‘network- enabled’ Army. This approach is only a slight modification of that proposed in the Australian Department of
Cognitive Performance in Operational Environments
NASA Technical Reports Server (NTRS)
Russo, Michael; McGhee, James; Friedler, Edna; Thomas, Maria
2005-01-01
Optimal cognition during complex and sustained operations is a critical component for success in current and future military operations. "Cognitive Performance, Judgment, and Decision-making" (CPJD) is a newly organized U.S. Army Medical Research and Materiel Command research program focused on sustaining operational effectiveness of Future Force Warriors by developing paradigms through which militarily-relevant, higher-order cognitive performance, judgment, and decision-making can be assessed and sustained in individuals, small teams, and leaders of network-centric fighting units. CPJD evaluates the impact of stressors intrinsic to military operational environments (e.g., sleep deprivation, workload, fatigue, temperature extremes, altitude, environmental/physiological disruption) on military performance, evaluates noninvasive automated methods for monitoring and predicting cognitive performance, and investigates pharmaceutical strategies (e.g., stimulant countermeasures, hypnotics) to mitigate performance decrements. This manuscript describes the CPJD program, discusses the metrics utilized to relate militarily applied research findings to academic research, and discusses how the simulated combat capabilities of a synthetic battle laboratory may facilitate future cognitive performance research.
Multidimensional Convergence in Future 5G Networks
NASA Astrophysics Data System (ADS)
Ruffini, Marco
2017-02-01
Future 5G services are characterised by unprecedented need for high rate, ubiquitous availability, ultra-low latency and high reliability. The fragmented network view that is widespread in current networks will not stand the challenge posed by next generations of users. A new vision is required, and this paper provides an insight on how network convergence and application-centric approaches will play a leading role towards enabling the 5G vision. The paper, after expressing the view on the need for an end-to-end approach to network design, brings the reader into a journey on the expected 5G network requirements and outlines some of the work currently carried out by main standardisation bodies. It then proposes the use of the concept of network convergence for providing the overall architectural framework to bring together all the different technologies within a unifying and coherent network ecosystem. The novel interpretation of multi-dimensional convergence we introduce leads us to the exploration of aspects of node consolidation and converged network architectures, delving into details of optical-wireless integration and future convergence of optical data centre and access-metro networks. We then discuss how ownership models enabling network sharing will be instrumental in realising the 5G vision. The paper concludes with final remarks on the role SDN will play in 5G and on the need for new business models that reflect the application-centric view of the network. Finally, we provide some insight on growing research areas in 5G networking.
2007-03-01
potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global
Ma, Chuang; Xin, Mingming; Feldmann, Kenneth A.; Wang, Xiangfeng
2014-01-01
Machine learning (ML) is an intelligent data mining technique that builds a prediction model based on the learning of prior knowledge to recognize patterns in large-scale data sets. We present an ML-based methodology for transcriptome analysis via comparison of gene coexpression networks, implemented as an R package called machine learning–based differential network analysis (mlDNA) and apply this method to reanalyze a set of abiotic stress expression data in Arabidopsis thaliana. The mlDNA first used a ML-based filtering process to remove nonexpressed, constitutively expressed, or non-stress-responsive “noninformative” genes prior to network construction, through learning the patterns of 32 expression characteristics of known stress-related genes. The retained “informative” genes were subsequently analyzed by ML-based network comparison to predict candidate stress-related genes showing expression and network differences between control and stress networks, based on 33 network topological characteristics. Comparative evaluation of the network-centric and gene-centric analytic methods showed that mlDNA substantially outperformed traditional statistical testing–based differential expression analysis at identifying stress-related genes, with markedly improved prediction accuracy. To experimentally validate the mlDNA predictions, we selected 89 candidates out of the 1784 predicted salt stress–related genes with available SALK T-DNA mutagenesis lines for phenotypic screening and identified two previously unreported genes, mutants of which showed salt-sensitive phenotypes. PMID:24520154
An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks.
Hosen, A S M Sanwar; Cho, Gi Hwan
2018-05-11
Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head's role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks' information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime.
An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks
Hosen, A. S. M. Sanwar; Cho, Gi Hwan
2018-01-01
Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head’s role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks’ information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime. PMID:29751663
Human performance under two different command and control paradigms.
Walker, Guy H; Stanton, Neville A; Salmon, Paul M; Jenkins, Daniel P
2014-05-01
The paradoxical behaviour of a new command and control concept called Network Enabled Capability (NEC) provides the motivation for this paper. In it, a traditional hierarchical command and control organisation was pitted against a network centric alternative on a common task, played thirty times, by two teams. Multiple regression was used to undertake a simple form of time series analysis. It revealed that whilst the NEC condition ended up being slightly slower than its hierarchical counterpart, it was able to balance and optimise all three of the performance variables measured (task time, enemies neutralised and attrition). From this it is argued that a useful conceptual response is not to consider NEC as an end product comprised of networked computers and standard operating procedures, nor to regard the human system interaction as inherently stable, but rather to view it as a set of initial conditions from which the most adaptable component of all can be harnessed: the human. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Jackson, Matthew A; Bonder, Marc Jan; Kuncheva, Zhana; Zierer, Jonas; Fu, Jingyuan; Kurilshikov, Alexander; Wijmenga, Cisca; Zhernakova, Alexandra; Bell, Jordana T; Spector, Tim D; Steves, Claire J
2018-01-01
Microbes in the gut microbiome form sub-communities based on shared niche specialisations and specific interactions between individual taxa. The inter-microbial relationships that define these communities can be inferred from the co-occurrence of taxa across multiple samples. Here, we present an approach to identify comparable communities within different gut microbiota co-occurrence networks, and demonstrate its use by comparing the gut microbiota community structures of three geographically diverse populations. We combine gut microbiota profiles from 2,764 British, 1,023 Dutch, and 639 Israeli individuals, derive co-occurrence networks between their operational taxonomic units, and detect comparable communities within them. Comparing populations we find that community structure is significantly more similar between datasets than expected by chance. Mapping communities across the datasets, we also show that communities can have similar associations to host phenotypes in different populations. This study shows that the community structure within the gut microbiota is stable across populations, and describes a novel approach that facilitates comparative community-centric microbiome analyses.
Scheduling from the perspective of the application
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berman, F.; Wolski, R.
1996-12-31
Metacomputing is the aggregation of distributed and high-performance resources on coordinated networks. With careful scheduling, resource-intensive applications can be implemented efficiently on metacomputing systems at the sizes of interest to developers and users. In this paper we focus on the problem of scheduling applications on metacomputing systems. We introduce the concept of application-centric scheduling in which everything about the system is evaluated in terms of its impact on the application. Application-centric scheduling is used by virtually all metacomputer programmers to achieve performance on metacomputing systems. We describe two successful metacomputing applications to illustrate this approach, and describe AppLeS scheduling agentsmore » which generalize the application-centric scheduling approach. Finally, we show preliminary results which compare AppLeS-derived schedules with conventional strip and blocked schedules for a two-dimensional Jacobi code.« less
Update - Concept of Operations for Integrated Model-Centric Engineering at JPL
NASA Technical Reports Server (NTRS)
Bayer, Todd J.; Bennett, Matthew; Delp, Christopher L.; Dvorak, Daniel; Jenkins, Steven J.; Mandutianu, Sanda
2011-01-01
The increasingly ambitious requirements levied on JPL's space science missions, and the development pace of such missions, challenge our current engineering practices. All the engineering disciplines face this growth in complexity to some degree, but the challenges are greatest in systems engineering where numerous competing interests must be reconciled and where complex system level interactions must be identified and managed. Undesired system-level interactions are increasingly a major risk factor that cannot be reliably exposed by testing, and natural-language single-viewpoint specifications areinadequate to capture and expose system level interactions and characteristics. Systems engineering practices must improve to meet these challenges, and the most promising approach today is the movement toward a more integrated and model-centric approach to mission conception, design, implementation and operations. This approach elevates engineering models to a principal role in systems engineering, gradually replacing traditional document centric engineering practices.
Avoiding the Achilles heel of network-centric enterprises
NASA Astrophysics Data System (ADS)
McVey, Michelle; Dryer, Jay E.; Randall, Lance
2003-08-01
Corporate, government and military bodies focus significant resources to develop sophisticated and capable information-based systems. The concept of people and resources connected by a robust network capable of extremely high rates of information exchange is very attractive because it allows smaller groups to coordinate together and focus effects from geographically diverse locations. However, there is also a hidden danger that comes with such advanced technology. For example, in the case of the U.S. Military, clearly United States holds a technological advantage over our adversaries and that this advantage is still expanding. This technology gap has resulted in the emergence of potent asymmetrical warfare. All too often in science fiction movies, we see a small group of humans defeat a technologically superior alien race by striking at a hidden weakness that renders all of their advanced weapons as useless, as a result of pervasive connectivity and interdependence. The analogy holds for any large network-centric enterprise, corporate or governmental. This paper focuses on specific technologies and methods that preempt this Achilles Heal scenario.
2002-04-22
NUMBER Air Force Research Laboratory 525 Brooks Road, Rome NY 13441 11. SUPPLEMENTARY NOTES 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for...entire NOSC crew Air Force Enterprise Defense Moving from Data-Centric to Mission-Centric Operations 16 Summary • The AFRL /IF program includes all...William E.; Simpson, Lt. Col Richard 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Air Force
Dual-Band Dual-Mode Button Antenna for On-Body and Off-Body Communications.
Zhang, Xiu Yin; Wong, Hang; Mo, Te; Cao, Yun Fei
2017-08-01
A dual-band dual-mode button antenna for body centric communications is presented. At the lower band, a spiral inverted-F antenna is designed with omnidirectional radiation pattern for on-body communication. At the upper band, the high-order mode of the inverted-F antenna is utilized together with a metal reflector to realize broadside radiation for off-body communication. For demonstration, a prototype is implemented. The measured peak gains on the phantom at the lower and upper bands are -0.6 and 4.3 dBi, respectively. The antenna operating on the phantom has measured efficiencies of 46.3% at the lower band and 69.3% at the upper band. The issue of specific absorption rate (SAR) is studied. The maximum transmitted power under the SAR regulation of 1.6 W/kg is found to be 26.4 dB·m, which is high enough for body centric communications. In addition, the transmission performance between two proposed antennas mounted on the body is investigated by measuring the transmission loss. With an overall miniaturized size, the robust button antenna could be integrated in clothes and be a potential candidate for wireless body area network applications.
Towards an Operations Strategy for the Infusion of Product-Centric Services into Manufacturing
NASA Astrophysics Data System (ADS)
Baines, Tim S.; Lightfoot, Howard W.
The work in this chapter is concerned with product-centric servitization. This is where a portfolio of services are formed and integrated to support product availability and use. Such servitization can be a valuable source of revenue for a manufacturer, yet little attention has been given to the configuration of the wider operations strategy that needs to be in place to deliver integrated products and services successfully. Therefore, the purpose of this chapter is to put forward a generic set of characteristics for such operations. Our intention is that these characteristics will be valuable to practitioners contemplating sophisticated forms of servitization, as they suggest the likely and significant changes that will be needed to the operations strategy of a conventional manufacturing organisation.
ERIC Educational Resources Information Center
van der Rijt, Janine; Van den Bossche, Piet; Segers, Mien S. R.
2013-01-01
Purpose: The purpose of this study is to investigate whether the position of employees in the organizational hierarchy is important in explaining their feedback seeking behaviour. Design/methodology/approach: This study takes a social network perspective by using an ego-centric network survey to investigate employees' feedback seeking behaviour…
AllAboard: Visual Exploration of Cellphone Mobility Data to Optimise Public Transport.
Di Lorenzo, G; Sbodio, M; Calabrese, F; Berlingerio, M; Pinelli, F; Nair, R
2016-02-01
The deep penetration of mobile phones offers cities the ability to opportunistically monitor citizens' mobility and use data-driven insights to better plan and manage services. With large scale data on mobility patterns, operators can move away from the costly, mostly survey based, transportation planning processes, to a more data-centric view, that places the instrumented user at the center of development. In this framework, using mobile phone data to perform transit analysis and optimization represents a new frontier with significant societal impact, especially in developing countries. In this paper we present AllAboard, an intelligent tool that analyses cellphone data to help city authorities in visually exploring urban mobility and optimizing public transport. This is performed within a self contained tool, as opposed to the current solutions which rely on a combination of several distinct tools for analysis, reporting, optimisation and planning. An interactive user interface allows transit operators to visually explore the travel demand in both space and time, correlate it with the transit network, and evaluate the quality of service that a transit network provides to the citizens at very fine grain. Operators can visually test scenarios for transit network improvements, and compare the expected impact on the travellers' experience. The system has been tested using real telecommunication data for the city of Abidjan, Ivory Coast, and evaluated from a data mining, optimisation and user prospective.
NASA Astrophysics Data System (ADS)
Panulla, Brian J.; More, Loretta D.; Shumaker, Wade R.; Jones, Michael D.; Hooper, Robert; Vernon, Jeffrey M.; Aungst, Stanley G.
2009-05-01
Rapid improvements in communications infrastructure and sophistication of commercial hand-held devices provide a major new source of information for assessing extreme situations such as environmental crises. In particular, ad hoc collections of humans can act as "soft sensors" to augment data collected by traditional sensors in a net-centric environment (in effect, "crowd-sourcing" observational data). A need exists to understand how to task such soft sensors, characterize their performance and fuse the data with traditional data sources. In order to quantitatively study such situations, as well as study distributed decision-making, we have developed an Extreme Events Laboratory (EEL) at The Pennsylvania State University. This facility provides a network-centric, collaborative situation assessment and decision-making capability by supporting experiments involving human observers, distributed decision making and cognition, and crisis management. The EEL spans the information chain from energy detection via sensors, human observations, signal and image processing, pattern recognition, statistical estimation, multi-sensor data fusion, visualization and analytics, and modeling and simulation. The EEL command center combines COTS and custom collaboration tools in innovative ways, providing capabilities such as geo-spatial visualization and dynamic mash-ups of multiple data sources. This paper describes the EEL and several on-going human-in-the-loop experiments aimed at understanding the new collective observation and analysis landscape.
FORCEnet Net Centric Architecture - A Standards View
2006-06-01
SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM DATA INTERCHANGE/INTEGRATION DATA MANAGEMENT APPLICATION...R V I C E P L A T F O R M S E R V I C E F R A M E W O R K USER-FACING SERVICES SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM...E F R A M E W O R K USER-FACING SERVICES SHARED SERVICES NETWORKING/COMMUNICATIONS STORAGE COMPUTING PLATFORM DATA INTERCHANGE/INTEGRATION
2009-09-01
problems, to better model the problem solving of computer systems. This research brought about the intertwining of AI and cognitive psychology . Much of...where symbol sequences are sequential intelligent states of the network, and must be classified as normal, abnormal , or unknown. These symbols...is associated with abnormal behavior; and abcbc is associated with unknown behavior, as it fits no known behavior. Predicted outcomes from
Synchronous wearable wireless body sensor network composed of autonomous textile nodes.
Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik
2014-10-09
A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system.
Synchronous Wearable Wireless Body Sensor Network Composed of Autonomous Textile Nodes
Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik
2014-01-01
A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system. PMID:25302808
Reducing Structural Weight and Increasing Protection in Simple Structures Subjected to Blast Loads
2014-08-12
centric vehicle structures that make the operation of the vehicle both comfortable and safe for the soldiers. Furthermore, a lighter weight vehicle...supporting forces. Therefore, a key design challenge is to develop lightweight occupant-centric vehicle structures that can provide high levels of...protection against explosive threats. In this paper, concepts for using materials, damping and other mechanisms to design structures with unique dynamic
Cognitive Coordination on the Network Centric Battlefield
2009-03-06
access in spoken language comprehension: Evaluating a linking hypothesis between fixations and linguistic processing. Journal of Psycholinguistic ...Research, Vol 29, 557-580 56 Trueswell, J. & Tanenhaus, M (eds.) (2004). World-situated language use: Psycholinguistic , linguistic, and computational
Hybrid Network Architectures for the Next Generation NAS
NASA Technical Reports Server (NTRS)
Madubata, Christian
2003-01-01
To meet the needs of the 21st Century NAS, an integrated, network-centric infrastructure is essential that is characterized by secure, high bandwidth, digital communication systems that support precision navigation capable of reducing position errors for all aircraft to within a few meters. This system will also require precision surveillance systems capable of accurately locating all aircraft, and automatically detecting any deviations from an approved path within seconds and be able to deliver high resolution weather forecasts - critical to create 4- dimensional (space and time) profiles for up to 6 hours for all atmospheric conditions affecting aviation, including wake vortices. The 21st Century NAS will be characterized by highly accurate digital data bases depicting terrain, obstacle, and airport information no matter what visibility conditions exist. This research task will be to perform a high-level requirements analysis of the applications, information and services required by the next generation National Airspace System. The investigation and analysis is expected to lead to the development and design of several national network-centric communications architectures that would be capable of supporting the Next Generation NAS.
Using Target Network Modelling to Increase Battlespace Agility
2013-06-01
Moffat, James. (2003) Complexity Theory and Network Centric Warfare. Washington DC: CCRP Moore, David T.. Sensemaking : A Structure for an Intelligence...Ted Hopf’s “Promise of Constructivism in International Relations Theory ” presented in International Security in 1998; and Adler 1998. 5 Look to...of warfighting within a doctrinal framework. Based on 10 years of research12 informed by social theory , experimentation, NATO doctrinal studies and
A Dialectic for Network Centric Warfare
2005-06-01
scientific realism through Salmon (1966), Popper (1934) and Kuhn (1962) to the epistemological anarchism of Feyerabend (1975). In this paper, we use an...Factors Society. Feyerabend , P. (1975), Against Method, Verso, London. Fischer, K., Muller, J.P. and Pischel, M. (1996). Cooperative
Single, Integrated, Service-Centric Model of Military Health System Governance
and effectiveness of operational medical support. According to the Joint Concept for Health Services (JCHS), the need for integrated medical support...that keeps pace with the operational agility and organizational flexibility requirements to support globally integrated operations is clear. This
Learning To Live with Complexity.
ERIC Educational Resources Information Center
Dosa, Marta
Neither the design of information systems and networks nor the delivery of library services can claim true user centricity without an understanding of the multifaceted psychological environment of users and potential users. The complexity of the political process, social problems, challenges to scientific inquiry, entrepreneurship, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
...; and Software Engineering Institute/CMU, Pittsburgh, PA, have withdrawn as parties to this venture. No... Section 6(b) of the Act on October 18, 2012 (77 FR 64128). Patricia A. Brink, Director of Civil...
2005-03-01
to obtain a protocol customized to the needs of a specific setting, under control of an automated theorem proving system that can guarantee...new “compositional” method for protocol design and implementation, in which small microprotocols are combined to obtain a protocol customized to the...and Network Centric Enterprise (NCES) visions. This final report documents a wide range of contributions and technology transitions, including: A
Security Considerations For Network-Centric Weapon Systems
2009-09-01
who exploits some weakness in these protective measures and impersonates a trusted network member can gain the ability to reprogram the victim node to...permitting the attacker to conduct a small-scale reprogramming and insert malicious code such as viruses or worms (McClure, Scambray, and Kurtz 2005, 218...people requesting this information because of the subconscious assumption that everything will end well because it has in the past. Defense
The Program Management Challenges of Web 2.0
2010-06-01
identifying and keeping abreast of the newly emerging technologies; their fast pace of evolution or modification, changing domain focus areas, their varied...definitive experts. No one knows what the future holds for network-centric materiel development . We are in the early stages of the Information Age and...led to the development and evolution of online Web-based communities and services such as auction houses, knowledge portals, social networking sites
Value-Based Caching in Information-Centric Wireless Body Area Networks
Al-Turjman, Fadi M.; Imran, Muhammad; Vasilakos, Athanasios V.
2017-01-01
We propose a resilient cache replacement approach based on a Value of sensed Information (VoI) policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation) and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs). These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures). These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures. PMID:28106817
IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)
NASA Technical Reports Server (NTRS)
Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James
2008-01-01
This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.
BMDS/SSA Integrated Sensing Demonstration (BISD)
NASA Astrophysics Data System (ADS)
Turner, T.; Springford, K.; Grimaldi, L.
2011-09-01
This demonstration is intended to provide a near-term prototype, leave-behind capability for integrating Ballistic Missile Defense System (BMDS) ground sensors for use in the Space Situational Awareness (SSA) mission. Closed-loop tasking and cueing capability will be implemented, and a demonstration of net-centric space data dissemination using the BMDS sensors will be undertaken using various SSA mission threads. The demonstration is designed to highlight the implications of modifying software and/or hardware at the BMDS command and control node so that cost, risk, and schedule for an operational implementation can be fully understood. Additionally, this demonstration is intended to assess the impacts to both mission areas as a multi-mission, non-traditional sensor capability is integrated into the SSA mission. A successful demonstration will have many leave-behind capabilities and first-of-its-kind achievements to include: a) an extensible SSA operational prototype configuration for BMDS X-Band radars such as AN/TPY-2 and Sea-Based X-Band (SBX) b) a prototype SSA tasking and cueing capability between the Joint Functional Component Command for Space (JFCC Space) Joint Space Operations Center (JSpOC) and the Command, Control, Battle Management, and Communications (C2BMC) Experimental Laboratory (X-Lab), extensible to the Combatant Commands (COCOMS), and out to BMDS sensors c) a capability for a twoway, net-centric, interface for JSpOC space operations, to include translation from net-centric communications to legacy systems and d) processing of BMDS X-Band Radar tracks in the Space Defense Operations Center (SPADOC).
Rizvi, Sanam Shahla; Chung, Tae-Sun
2010-01-01
Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS). This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Chase Qishi; Zhu, Michelle Mengxia
The advent of large-scale collaborative scientific applications has demonstrated the potential for broad scientific communities to pool globally distributed resources to produce unprecedented data acquisition, movement, and analysis. System resources including supercomputers, data repositories, computing facilities, network infrastructures, storage systems, and display devices have been increasingly deployed at national laboratories and academic institutes. These resources are typically shared by large communities of users over Internet or dedicated networks and hence exhibit an inherent dynamic nature in their availability, accessibility, capacity, and stability. Scientific applications using either experimental facilities or computation-based simulations with various physical, chemical, climatic, and biological models featuremore » diverse scientific workflows as simple as linear pipelines or as complex as a directed acyclic graphs, which must be executed and supported over wide-area networks with massively distributed resources. Application users oftentimes need to manually configure their computing tasks over networks in an ad hoc manner, hence significantly limiting the productivity of scientists and constraining the utilization of resources. The success of these large-scale distributed applications requires a highly adaptive and massively scalable workflow platform that provides automated and optimized computing and networking services. This project is to design and develop a generic Scientific Workflow Automation and Management Platform (SWAMP), which contains a web-based user interface specially tailored for a target application, a set of user libraries, and several easy-to-use computing and networking toolkits for application scientists to conveniently assemble, execute, monitor, and control complex computing workflows in heterogeneous high-performance network environments. SWAMP will enable the automation and management of the entire process of scientific workflows with the convenience of a few mouse clicks while hiding the implementation and technical details from end users. Particularly, we will consider two types of applications with distinct performance requirements: data-centric and service-centric applications. For data-centric applications, the main workflow task involves large-volume data generation, catalog, storage, and movement typically from supercomputers or experimental facilities to a team of geographically distributed users; while for service-centric applications, the main focus of workflow is on data archiving, preprocessing, filtering, synthesis, visualization, and other application-specific analysis. We will conduct a comprehensive comparison of existing workflow systems and choose the best suited one with open-source code, a flexible system structure, and a large user base as the starting point for our development. Based on the chosen system, we will develop and integrate new components including a black box design of computing modules, performance monitoring and prediction, and workflow optimization and reconfiguration, which are missing from existing workflow systems. A modular design for separating specification, execution, and monitoring aspects will be adopted to establish a common generic infrastructure suited for a wide spectrum of science applications. We will further design and develop efficient workflow mapping and scheduling algorithms to optimize the workflow performance in terms of minimum end-to-end delay, maximum frame rate, and highest reliability. We will develop and demonstrate the SWAMP system in a local environment, the grid network, and the 100Gpbs Advanced Network Initiative (ANI) testbed. The demonstration will target scientific applications in climate modeling and high energy physics and the functions to be demonstrated include workflow deployment, execution, steering, and reconfiguration. Throughout the project period, we will work closely with the science communities in the fields of climate modeling and high energy physics including Spallation Neutron Source (SNS) and Large Hadron Collider (LHC) projects to mature the system for production use.« less
Autonomous Vehicles and the Net-Centric Battlespace
2000-04-01
Autonomous vehicles are playing increasing roles in the air/land/sea network of today’s battlespace. As the Navy’s lead laboratory for command...including remote sensor platforms, communication relays, and work platforms. As these capabilities are developed autonomous vehicles will become an
A novel framework for command and control of networked sensor systems
NASA Astrophysics Data System (ADS)
Chen, Genshe; Tian, Zhi; Shen, Dan; Blasch, Erik; Pham, Khanh
2007-04-01
In this paper, we have proposed a highly innovative advanced command and control framework for sensor networks used for future Integrated Fire Control (IFC). The primary goal is to enable and enhance target detection, validation, and mitigation for future military operations by graphical game theory and advanced knowledge information fusion infrastructures. The problem is approached by representing distributed sensor and weapon systems as generic warfare resources which must be optimized in order to achieve the operational benefits afforded by enabling a system of systems. This paper addresses the importance of achieving a Network Centric Warfare (NCW) foundation of information superiority-shared, accurate, and timely situational awareness upon which advanced automated management aids for IFC can be built. The approach uses the Data Fusion Information Group (DFIG) Fusion hierarchy of Level 0 through Level 4 to fuse the input data into assessments for the enemy target system threats in a battlespace to which military force is being applied. Compact graph models are employed across all levels of the fusion hierarchy to accomplish integrative data fusion and information flow control, as well as cross-layer sensor management. The functional block at each fusion level will have a set of innovative algorithms that not only exploit the corresponding graph model in a computationally efficient manner, but also permit combined functional experiments across levels by virtue of the unifying graphical model approach.
NPS Collaborative Technology Testbed for ONR CKM Program
2005-01-11
or have access to the MIT E-Wall hosted by the TOC. The combination of E-Wall and agents lend themselves to the dynamic gathering and display of...display, intuitive icons or menus that is easy to activate and customize , and automatically seeks and connects to other like services/networks/agents...integration creates network- centric memory mechanism for developing shared understanding of SA events Data Base Integration of Sensor-DM Agents and
A Virtual Reality Exposure Therapy Application for Iraq War Post Traumatic Stress Disorder
2006-01-01
denial of social problems. Prior to the availability of VR therapy applications, the existing standard of care for PTSD was imaginal exposure...The application is built on ICT’s FlatWorld Simulation Control Architecture (FSCA) [13]. The FSCA enables a network -centric system of client displays...client-side interaction despite potential network delays. FCSA scripting is based on the Lua programming language [14] and provides facilities for real
A Crowdsensing Based Analytical Framework for Perceptional Degradation of OTT Web Browsing.
Li, Ke; Wang, Hai; Xu, Xiaolong; Du, Yu; Liu, Yuansheng; Ahmad, M Omair
2018-05-15
Service perception analysis is crucial for understanding both user experiences and network quality as well as for maintaining and optimizing of mobile networks. Given the rapid development of mobile Internet and over-the-top (OTT) services, the conventional network-centric mode of network operation and maintenance is no longer effective. Therefore, developing an approach to evaluate and optimizing users' service perceptions has become increasingly important. Meanwhile, the development of a new sensing paradigm, mobile crowdsensing (MCS), makes it possible to evaluate and analyze the user's OTT service perception from end-user's point of view other than from the network side. In this paper, the key factors that impact users' end-to-end OTT web browsing service perception are analyzed by monitoring crowdsourced user perceptions. The intrinsic relationships among the key factors and the interactions between key quality indicators (KQI) are evaluated from several perspectives. Moreover, an analytical framework of perceptional degradation and a detailed algorithm are proposed whose goal is to identify the major factors that impact the perceptional degradation of web browsing service as well as their significance of contribution. Finally, a case study is presented to show the effectiveness of the proposed method using a dataset crowdsensed from a large number of smartphone users in a real mobile network. The proposed analytical framework forms a valuable solution for mobile network maintenance and optimization and can help improve web browsing service perception and network quality.
Model-centric distribution automation: Capacity, reliability, and efficiency
Onen, Ahmet; Jung, Jaesung; Dilek, Murat; ...
2016-02-26
A series of analyses along with field validations that evaluate efficiency, reliability, and capacity improvements of model-centric distribution automation are presented. With model-centric distribution automation, the same model is used from design to real-time control calculations. A 14-feeder system with 7 substations is considered. The analyses involve hourly time-varying loads and annual load growth factors. Phase balancing and capacitor redesign modifications are used to better prepare the system for distribution automation, where the designs are performed considering time-varying loads. Coordinated control of load tap changing transformers, line regulators, and switched capacitor banks is considered. In evaluating distribution automation versus traditionalmore » system design and operation, quasi-steady-state power flow analysis is used. In evaluating distribution automation performance for substation transformer failures, reconfiguration for restoration analysis is performed. In evaluating distribution automation for storm conditions, Monte Carlo simulations coupled with reconfiguration for restoration calculations are used. As a result, the evaluations demonstrate that model-centric distribution automation has positive effects on system efficiency, capacity, and reliability.« less
Model-centric distribution automation: Capacity, reliability, and efficiency
DOE Office of Scientific and Technical Information (OSTI.GOV)
Onen, Ahmet; Jung, Jaesung; Dilek, Murat
A series of analyses along with field validations that evaluate efficiency, reliability, and capacity improvements of model-centric distribution automation are presented. With model-centric distribution automation, the same model is used from design to real-time control calculations. A 14-feeder system with 7 substations is considered. The analyses involve hourly time-varying loads and annual load growth factors. Phase balancing and capacitor redesign modifications are used to better prepare the system for distribution automation, where the designs are performed considering time-varying loads. Coordinated control of load tap changing transformers, line regulators, and switched capacitor banks is considered. In evaluating distribution automation versus traditionalmore » system design and operation, quasi-steady-state power flow analysis is used. In evaluating distribution automation performance for substation transformer failures, reconfiguration for restoration analysis is performed. In evaluating distribution automation for storm conditions, Monte Carlo simulations coupled with reconfiguration for restoration calculations are used. As a result, the evaluations demonstrate that model-centric distribution automation has positive effects on system efficiency, capacity, and reliability.« less
Network Centric Warfare and Joint Force 2020
2014-05-15
enabled moving map programs, unified communications, and every other bell and whistle a smart phone or tablet provides a user. The early adopters who...create conditions where the adversary is frozen out of all options at all levels and is reduced to a condition of decision paralysis , cognitive
2009-12-01
type of information available through DISA search tools: Centralized Search, Federated Search , and Enterprise Search (Defense Information Systems... Federated Search , and Enterprise 41 Search services. Likewise, EFD and GCDS support COIs in discovering information by making information
User Centric Policy Management
ERIC Educational Resources Information Center
Cheek, Gorrell P.
2013-01-01
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…
2015-11-11
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
2015-09-07
reliable data message delivery. The basic mechanism of link-based routing schemes is the broadcasting of a control message (called a “ hello ”) to all of its...short- est path route to a destination by using the set of ex- changed hello messages between users of the network. With sufficiently high frequency... hello messages are suc- cessfully exchanged across a high error link, and since this link is of longer distance, it gets used to build a shortest path
Kar, Siddhartha P; Tyrer, Jonathan P; Li, Qiyuan; Lawrenson, Kate; Aben, Katja K H; Anton-Culver, Hoda; Antonenkova, Natalia; Chenevix-Trench, Georgia; Baker, Helen; Bandera, Elisa V; Bean, Yukie T; Beckmann, Matthias W; Berchuck, Andrew; Bisogna, Maria; Bjørge, Line; Bogdanova, Natalia; Brinton, Louise; Brooks-Wilson, Angela; Butzow, Ralf; Campbell, Ian; Carty, Karen; Chang-Claude, Jenny; Chen, Yian Ann; Chen, Zhihua; Cook, Linda S; Cramer, Daniel; Cunningham, Julie M; Cybulski, Cezary; Dansonka-Mieszkowska, Agnieszka; Dennis, Joe; Dicks, Ed; Doherty, Jennifer A; Dörk, Thilo; du Bois, Andreas; Dürst, Matthias; Eccles, Diana; Easton, Douglas F; Edwards, Robert P; Ekici, Arif B; Fasching, Peter A; Fridley, Brooke L; Gao, Yu-Tang; Gentry-Maharaj, Aleksandra; Giles, Graham G; Glasspool, Rosalind; Goode, Ellen L; Goodman, Marc T; Grownwald, Jacek; Harrington, Patricia; Harter, Philipp; Hein, Alexander; Heitz, Florian; Hildebrandt, Michelle A T; Hillemanns, Peter; Hogdall, Estrid; Hogdall, Claus K; Hosono, Satoyo; Iversen, Edwin S; Jakubowska, Anna; Paul, James; Jensen, Allan; Ji, Bu-Tian; Karlan, Beth Y; Kjaer, Susanne K; Kelemen, Linda E; Kellar, Melissa; Kelley, Joseph; Kiemeney, Lambertus A; Krakstad, Camilla; Kupryjanczyk, Jolanta; Lambrechts, Diether; Lambrechts, Sandrina; Le, Nhu D; Lee, Alice W; Lele, Shashi; Leminen, Arto; Lester, Jenny; Levine, Douglas A; Liang, Dong; Lissowska, Jolanta; Lu, Karen; Lubinski, Jan; Lundvall, Lene; Massuger, Leon; Matsuo, Keitaro; McGuire, Valerie; McLaughlin, John R; McNeish, Iain A; Menon, Usha; Modugno, Francesmary; Moysich, Kirsten B; Narod, Steven A; Nedergaard, Lotte; Ness, Roberta B; Nevanlinna, Heli; Odunsi, Kunle; Olson, Sara H; Orlow, Irene; Orsulic, Sandra; Weber, Rachel Palmieri; Pearce, Celeste Leigh; Pejovic, Tanja; Pelttari, Liisa M; Permuth-Wey, Jennifer; Phelan, Catherine M; Pike, Malcolm C; Poole, Elizabeth M; Ramus, Susan J; Risch, Harvey A; Rosen, Barry; Rossing, Mary Anne; Rothstein, Joseph H; Rudolph, Anja; Runnebaum, Ingo B; Rzepecka, Iwona K; Salvesen, Helga B; Schildkraut, Joellen M; Schwaab, Ira; Shu, Xiao-Ou; Shvetsov, Yurii B; Siddiqui, Nadeem; Sieh, Weiva; Song, Honglin; Southey, Melissa C; Sucheston-Campbell, Lara E; Tangen, Ingvild L; Teo, Soo-Hwang; Terry, Kathryn L; Thompson, Pamela J; Timorek, Agnieszka; Tsai, Ya-Yu; Tworoger, Shelley S; van Altena, Anne M; Van Nieuwenhuysen, Els; Vergote, Ignace; Vierkant, Robert A; Wang-Gohrke, Shan; Walsh, Christine; Wentzensen, Nicolas; Whittemore, Alice S; Wicklund, Kristine G; Wilkens, Lynne R; Woo, Yin-Ling; Wu, Xifeng; Wu, Anna; Yang, Hannah; Zheng, Wei; Ziogas, Argyrios; Sellers, Thomas A; Monteiro, Alvaro N A; Freedman, Matthew L; Gayther, Simon A; Pharoah, Paul D P
2015-10-01
Genome-wide association studies (GWAS) have so far reported 12 loci associated with serous epithelial ovarian cancer (EOC) risk. We hypothesized that some of these loci function through nearby transcription factor (TF) genes and that putative target genes of these TFs as identified by coexpression may also be enriched for additional EOC risk associations. We selected TF genes within 1 Mb of the top signal at the 12 genome-wide significant risk loci. Mutual information, a form of correlation, was used to build networks of genes strongly coexpressed with each selected TF gene in the unified microarray dataset of 489 serous EOC tumors from The Cancer Genome Atlas. Genes represented in this dataset were subsequently ranked using a gene-level test based on results for germline SNPs from a serous EOC GWAS meta-analysis (2,196 cases/4,396 controls). Gene set enrichment analysis identified six networks centered on TF genes (HOXB2, HOXB5, HOXB6, HOXB7 at 17q21.32 and HOXD1, HOXD3 at 2q31) that were significantly enriched for genes from the risk-associated end of the ranked list (P < 0.05 and FDR < 0.05). These results were replicated (P < 0.05) using an independent association study (7,035 cases/21,693 controls). Genes underlying enrichment in the six networks were pooled into a combined network. We identified a HOX-centric network associated with serous EOC risk containing several genes with known or emerging roles in serous EOC development. Network analysis integrating large, context-specific datasets has the potential to offer mechanistic insights into cancer susceptibility and prioritize genes for experimental characterization. ©2015 American Association for Cancer Research.
Kar, Siddhartha P.; Tyrer, Jonathan P.; Li, Qiyuan; Lawrenson, Kate; Aben, Katja K.H.; Anton-Culver, Hoda; Antonenkova, Natalia; Chenevix-Trench, Georgia; Baker, Helen; Bandera, Elisa V.; Bean, Yukie T.; Beckmann, Matthias W.; Berchuck, Andrew; Bisogna, Maria; Bjørge, Line; Bogdanova, Natalia; Brinton, Louise; Brooks-Wilson, Angela; Butzow, Ralf; Campbell, Ian; Carty, Karen; Chang-Claude, Jenny; Chen, Yian Ann; Chen, Zhihua; Cook, Linda S.; Cramer, Daniel; Cunningham, Julie M.; Cybulski, Cezary; Dansonka-Mieszkowska, Agnieszka; Dennis, Joe; Dicks, Ed; Doherty, Jennifer A.; Dörk, Thilo; du Bois, Andreas; Dürst, Matthias; Eccles, Diana; Easton, Douglas F.; Edwards, Robert P.; Ekici, Arif B.; Fasching, Peter A.; Fridley, Brooke L.; Gao, Yu-Tang; Gentry-Maharaj, Aleksandra; Giles, Graham G.; Glasspool, Rosalind; Goode, Ellen L.; Goodman, Marc T.; Grownwald, Jacek; Harrington, Patricia; Harter, Philipp; Hein, Alexander; Heitz, Florian; Hildebrandt, Michelle A.T.; Hillemanns, Peter; Hogdall, Estrid; Hogdall, Claus K.; Hosono, Satoyo; Iversen, Edwin S.; Jakubowska, Anna; Paul, James; Jensen, Allan; Ji, Bu-Tian; Karlan, Beth Y; Kjaer, Susanne K.; Kelemen, Linda E.; Kellar, Melissa; Kelley, Joseph; Kiemeney, Lambertus A.; Krakstad, Camilla; Kupryjanczyk, Jolanta; Lambrechts, Diether; Lambrechts, Sandrina; Le, Nhu D.; Lee, Alice W.; Lele, Shashi; Leminen, Arto; Lester, Jenny; Levine, Douglas A.; Liang, Dong; Lissowska, Jolanta; Lu, Karen; Lubinski, Jan; Lundvall, Lene; Massuger, Leon; Matsuo, Keitaro; McGuire, Valerie; McLaughlin, John R.; McNeish, Iain A.; Menon, Usha; Modugno, Francesmary; Moysich, Kirsten B.; Narod, Steven A.; Nedergaard, Lotte; Ness, Roberta B.; Nevanlinna, Heli; Odunsi, Kunle; Olson, Sara H.; Orlow, Irene; Orsulic, Sandra; Weber, Rachel Palmieri; Pearce, Celeste Leigh; Pejovic, Tanja; Pelttari, Liisa M.; Permuth-Wey, Jennifer; Phelan, Catherine M.; Pike, Malcolm C.; Poole, Elizabeth M.; Ramus, Susan J.; Risch, Harvey A.; Rosen, Barry; Rossing, Mary Anne; Rothstein, Joseph H.; Rudolph, Anja; Runnebaum, Ingo B.; Rzepecka, Iwona K.; Salvesen, Helga B.; Schildkraut, Joellen M.; Schwaab, Ira; Shu, Xiao-Ou; Shvetsov, Yurii B; Siddiqui, Nadeem; Sieh, Weiva; Song, Honglin; Southey, Melissa C.; Sucheston-Campbell, Lara E.; Tangen, Ingvild L.; Teo, Soo-Hwang; Terry, Kathryn L.; Thompson, Pamela J; Timorek, Agnieszka; Tsai, Ya-Yu; Tworoger, Shelley S.; van Altena, Anne M.; Van Nieuwenhuysen, Els; Vergote, Ignace; Vierkant, Robert A.; Wang-Gohrke, Shan; Walsh, Christine; Wentzensen, Nicolas; Whittemore, Alice S.; Wicklund, Kristine G.; Wilkens, Lynne R.; Woo, Yin-Ling; Wu, Xifeng; Wu, Anna; Yang, Hannah; Zheng, Wei; Ziogas, Argyrios; Sellers, Thomas A.; Monteiro, Alvaro N. A.; Freedman, Matthew L.; Gayther, Simon A.; Pharoah, Paul D. P.
2015-01-01
Background Genome-wide association studies (GWAS) have so far reported 12 loci associated with serous epithelial ovarian cancer (EOC) risk. We hypothesized that some of these loci function through nearby transcription factor (TF) genes and that putative target genes of these TFs as identified by co-expression may also be enriched for additional EOC risk associations. Methods We selected TF genes within 1 Mb of the top signal at the 12 genome-wide significant risk loci. Mutual information, a form of correlation, was used to build networks of genes strongly co-expressed with each selected TF gene in the unified microarray data set of 489 serous EOC tumors from The Cancer Genome Atlas. Genes represented in this data set were subsequently ranked using a gene-level test based on results for germline SNPs from a serous EOC GWAS meta-analysis (2,196 cases/4,396 controls). Results Gene set enrichment analysis identified six networks centered on TF genes (HOXB2, HOXB5, HOXB6, HOXB7 at 17q21.32 and HOXD1, HOXD3 at 2q31) that were significantly enriched for genes from the risk-associated end of the ranked list (P<0.05 and FDR<0.05). These results were replicated (P<0.05) using an independent association study (7,035 cases/21,693 controls). Genes underlying enrichment in the six networks were pooled into a combined network. Conclusion We identified a HOX-centric network associated with serous EOC risk containing several genes with known or emerging roles in serous EOC development. Impact Network analysis integrating large, context-specific data sets has the potential to offer mechanistic insights into cancer susceptibility and prioritize genes for experimental characterization. PMID:26209509
2003-04-07
network-centric warfare, however, emboldened by the booming economy, displayed irrational exuberance in connection with the degree of certainty that...education. In addition to creating an imbalance of forces and impeding joint integration, the irrational faith in certainty threatens to waste
Network-Centric Data Mining for Medical Applications
ERIC Educational Resources Information Center
Davis, Darcy A.
2012-01-01
Faced with unsustainable costs and enormous amounts of under-utilized data, health care needs more efficient practices, research, and tools to harness the benefits of data. These methods create a feedback loop where computational tools guide and facilitate research, leading to improved biological knowledge and clinical standards, which will in…
2006-04-01
and Scalability, (2) Sensors and Platforms, (3) Distributed Computing and Processing , (4) Information Management, (5) Fusion and Resource Management...use of the deployed system. 3.3 Distributed Computing and Processing Session The Distributed Computing and Processing Session consisted of three
Experiments with the Combat CAS: Unifying Net-Enabled Teams
2009-06-01
1998. “ Network Centric Warfare: Its Origin and Future.” Proceedings. Volume 124/1/1, 139. Annapolis, MD: U.S. Naval Institute. Chomsky , Noam ...linguistic models, see Chomsky 1962). Discourse models make explicit the structure not of sentences but of situations as we perceive or imagine them
Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration
2007-03-01
commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them
2007-02-01
realizations of success. For example, Alberts , Garstka, & Stein (1999) identify three domains of research necessary for NCW to become plausibly effective...internal cognitive and affective states, as well as behavioral task processes ( Bandura , 1986). Without an understanding of the present
2006-03-01
Defense, Editor. 2001. 12. Defense, D.o., Department of Defense Architecture Framework Deskbook. 2004, Department of Defense. 13. Denzin , N. and...Y. Lincoln , Handbook of Qualitative Research. 2000, California: Sage. 14. Flick, U., An Introduction to Qualitative research: Theory, method and
2003-12-01
www.zdnet.com.au/printfriendly?AT=2000034884-20269647], Accessed May 2003. 223 world to include a tremendous variety of wireless and other mobile devices and...communicate with networks.227 With the growing popularity of an assortment of personal wireless devices such as cell phones , PDAs, and others...of service, often over wireless media and via mobile means. Further, such applications and services are becoming more and critical to the
Depression, Smoking, and Ego-Centric Social Network Characteristics in Ohio Appalachian Women.
Lam, Jeffrey; Lu, Bo; Doogan, Nate; Thomson, Tiffany; Ferketich, Amy; Paskett, Electra D; Wewers, Mary Ellen
2017-01-01
Depression is a serious, costly, and debilitating disorder that is understudied in rural women. Studies show that depression is associated with low social integration and support, but few studies investigate the relationship between depression and social network characteristics. This study examined the associations among women from three Ohio Appalachian counties enrolled in a health study, which aimed to collect information for a future social network smoking cessation intervention. An address-based sampling method was used to randomly select and recruit 404 women. A cross-sectional survey and interview were used to collect information about demographic, psychosocial, behavioral factors, and ego-centric social network characteristics, which are variables derived from an individual (ego) and her first degree contacts (alters). The CES-D scale assessed depressive symptoms. A multivariable logistic regression analysis described the association between these factors and participants with depression (defined as CES-D≥16). Higher network density, or greater number of relationships among alters divided by the total amount of alters, reduced the risk for depression (OR = 0.84, 95% confidence interval [CI] 0.73-0.95). Additionally, women with a high percentage of smoking alters were at greater risk for depression (OR = 1.19, 95% CI 1.02-1.39). Other factors associated with risk for depression included perceived stress score (OR = 1.34, 95% CI 1.24-1.45), loneliness score (OR = 1.37, 95% CI 1.05-1.80), and days with poor physical health (OR = 1.06, 95% CI 1.02-1.11). Findings suggest that psychosocial factors and social networks should be considered when addressing depression in clinical practice.
NASA Astrophysics Data System (ADS)
Griffiths, John D.
2015-12-01
The modern understanding of the brain as a large, complex network of interacting elements is a natural consequence of the Neuron Doctrine [1,2] that has been bolstered in recent years by the tools and concepts of connectomics. In this abstracted, network-centric view, the essence of neural and cognitive function derives from the flows between network elements of activity and information - or, more generally, causal influence. The appropriate characterization of causality in neural systems, therefore, is a question at the very heart of systems neuroscience.
Distributed network management in the flat structured mobile communities
NASA Astrophysics Data System (ADS)
Balandina, Elena
2005-10-01
Delivering proper management into the flat structured mobile communities is crucial for improving users experience and increase applications diversity in mobile networks. The available P2P applications do application-centric management, but it cannot replace network-wide management, especially when a number of different applications are used simultaneously in the network. The network-wide management is the key element required for a smooth transition from standalone P2P applications to the self-organizing mobile communities that maintain various services with quality and security guaranties. The classical centralized network management solutions are not applicable in the flat structured mobile communities due to the decentralized nature and high mobility of the underlying networks. Also the basic network management tasks have to be revised taking into account specialties of the flat structured mobile communities. The network performance management becomes more dependent on the current nodes' context, which also requires extension of the configuration management functionality. The fault management has to take into account high mobility of the network nodes. The performance and accounting managements are mainly targeted in maintain an efficient and fair access to the resources within the community, however they also allow unbalanced resource use of the nodes that explicitly permit it, e.g. as a voluntary donation to the community or due to the profession (commercial) reasons. The security management must implement the new trust models, which are based on the community feedback, professional authorization, and a mix of both. For fulfilling these and another specialties of the flat structured mobile communities, a new network management solution is demanded. The paper presents a distributed network management solution for flat structured mobile communities. Also the paper points out possible network management roles for the different parties (e.g. operators, service providing hubs/super nodes, etc.) involved in a service providing chain.
Enabling information management systems in tactical network environments
NASA Astrophysics Data System (ADS)
Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher
2009-05-01
Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... circumstances. Specifically, Wakelight Technologies, Inc., Honolulu, HI; LinQuest Corporation, Los Angeles, CA; and Computer Sciences Corporation, Rockville, MD, have withdrawn as parties to this venture. In... activity of the group research project. Membership in this group research project remains open, and NCOIC...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... offer their customers an increasing array of ``smartphones'' and data-centric devices, such as tablets... basis to provide service to their customers? 38. Additionally, the proposal would allow providers to... customers with comparable levels of service within that county? 40. Second, will consumers find this metric...
Regimes of Performance: Practices of the Normalised Self in the Neoliberal University
ERIC Educational Resources Information Center
Morrissey, John
2015-01-01
Universities today inescapably find themselves part of nationally and globally competitive networks that appear firmly inflected by neoliberal concerns of rankings, benchmarking and productivity. This, of course, has in turn led to progressively anticipated and regulated forms of academic subjectivity that many fear are overly econo-centric in…
Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare
2007-04-01
Cebrowski and Mr. John Garstka are generally credited with introducing the concept and origins of NCW.8 They described the military’s evolution from...www.sdrforum.org/pages/aboutTheForum/faqs.asp Adams, James. The Next World War. New York, NY: Simon & Schuster, 1998. Alberts, David S., John J. Garstka, and...Joint Tactical Radio System – Reloaded.” CHIPS, July-September 2006: 6-9. Arquilla, John , and David Ronfeldt. In Athena’s Camp. Santa Monica, CA
Aeronautical Situational Awareness - Airport Surface
NASA Technical Reports Server (NTRS)
Linetsky, Vladimir M.; Ivancic, William D.; Vaden, Karl R.
2017-01-01
This paper advocates for a specific design approach, based on simple principals, yet addresses challenges faced by the system engineers when designing complex data and information infrastructure. The document provides guidance for breaking out various work elements in the overall network architecture design, so that communication systems are conceived and effectively realized regardless of their location, size and local specifics. Although targeted at the Global Airspace System (GAS) and National Airspace System (NAS), this framework can be applied to any network-centric architecture.
Introduction and comparison of next-generation mobile wireless technologies
NASA Astrophysics Data System (ADS)
Zaidi, Syed R.; Hussain, Shahab; Ali, M. A.; Sana, Ajaz; Saddawi, Samir; Carranza, Aparicio
2010-01-01
Mobile networks and services have gone further than voice-only communication services and are rapidly developing towards data-centric services. Emerging mobile data services are expected to see the same explosive growth in demand that Internet and wireless voice services have seen in recent years. To support such a rapid increase in traffic, active users, and advanced multimedia services implied by this growth rate along with the diverse quality of service (QoS) and rate requirements set by these services, mobile operator need to rapidly transition to a simple and cost-effective, flat, all IP-network. This has accelerated the development and deployment of new wireless broadband access technologies including fourth-generation (4G) mobile WiMAX and cellular Long-Term Evolution (LTE). Mobile WiMAX and LTE are two different (but not necessarily competing) technologies that will eventually be used to achieve data speeds of up to 100 Mbps. Speeds that are fast enough to potentially replace wired broadband connections with wireless. This paper introduces both of these next generation technologies and then compares them in the end.
Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid
2017-01-13
Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.
Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid
2017-01-01
Tracking people’s behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people’s access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people’s access behaviors can be correctly tracked within a one-second delay. PMID:28098772
Airborne net-centric multi-INT sensor control, display, fusion, and exploitation systems
NASA Astrophysics Data System (ADS)
Linne von Berg, Dale C.; Lee, John N.; Kruer, Melvin R.; Duncan, Michael D.; Olchowski, Fred M.; Allman, Eric; Howard, Grant
2004-08-01
The NRL Optical Sciences Division has initiated a multi-year effort to develop and demonstrate an airborne net-centric suite of multi-intelligence (multi-INT) sensors and exploitation systems for real-time target detection and targeting product dissemination. The goal of this Net-centric Multi-Intelligence Fusion Targeting Initiative (NCMIFTI) is to develop an airborne real-time intelligence gathering and targeting system that can be used to detect concealed, camouflaged, and mobile targets. The multi-INT sensor suite will include high-resolution visible/infrared (EO/IR) dual-band cameras, hyperspectral imaging (HSI) sensors in the visible-to-near infrared, short-wave and long-wave infrared (VNIR/SWIR/LWIR) bands, Synthetic Aperture Radar (SAR), electronics intelligence sensors (ELINT), and off-board networked sensors. Other sensors are also being considered for inclusion in the suite to address unique target detection needs. Integrating a suite of multi-INT sensors on a single platform should optimize real-time fusion of the on-board sensor streams, thereby improving the detection probability and reducing the false alarms that occur in reconnaissance systems that use single-sensor types on separate platforms, or that use independent target detection algorithms on multiple sensors. In addition to the integration and fusion of the multi-INT sensors, the effort is establishing an open-systems net-centric architecture that will provide a modular "plug and play" capability for additional sensors and system components and provide distributed connectivity to multiple sites for remote system control and exploitation.
Value Co-creation and Co-innovation: Linking Networked Organisations and Customer Communities
NASA Astrophysics Data System (ADS)
Romero, David; Molina, Arturo
Strategic networks such as Collaborative Networked Organisations (CNOs) and Virtual Customer Communities (VCCs) show a high potential as drivers of value co-creation and collaborative innovation in today’s Networking Era. Both look at the network structures as a source of jointly value creation and open innovation through access to new skills, knowledge, markets and technologies by sharing risk and integrating complementary competencies. This collaborative endeavour has proven to be able to enhance the adaptability and flexibility of CNOs and VCCs value creating systems in order to react in response to external drivers such as collaborative (business) opportunities. This paper presents a reference framework for creating interface networks, also known as ‘experience-centric networks’, as enablers for linking networked organisations and customer communities in order to support the establishment of user-driven and collaborative innovation networks.
Perceptual tools for quality-aware video networks
NASA Astrophysics Data System (ADS)
Bovik, A. C.
2014-01-01
Monitoring and controlling the quality of the viewing experience of videos transmitted over increasingly congested networks (especially wireless networks) is a pressing problem owing to rapid advances in video-centric mobile communication and display devices that are straining the capacity of the network infrastructure. New developments in automatic perceptual video quality models offer tools that have the potential to be used to perceptually optimize wireless video, leading to more efficient video data delivery and better received quality. In this talk I will review key perceptual principles that are, or could be used to create effective video quality prediction models, and leading quality prediction models that utilize these principles. The goal is to be able to monitor and perceptually optimize video networks by making them "quality-aware."
Depression, Smoking, and Ego-Centric Social Network Characteristics in Ohio Appalachian Women
Lam, Jeffrey; Lu, Bo; Doogan, Nate; Thomson, Tiffany; Ferketich, Amy; Paskett, Electra D.; Wewers, Mary Ellen
2017-01-01
Depression is a serious, costly, and debilitating disorder that is understudied in rural women. Studies show that depression is associated with low social integration and support, but few studies investigate the relationship between depression and social network characteristics. This study examined the associations among women from three Ohio Appalachian counties enrolled in a health study, which aimed to collect information for a future social network smoking cessation intervention. An address-based sampling method was used to randomly select and recruit 404 women. A cross-sectional survey and interview were used to collect information about demographic, psychosocial, behavioral factors, and ego-centric social network characteristics, which are variables derived from an individual (ego) and her first degree contacts (alters). The CES-D scale assessed depressive symptoms. A multivariable logistic regression analysis described the association between these factors and participants with depression (defined as CES-D≥16). Higher network density, or greater number of relationships among alters divided by the total amount of alters, reduced the risk for depression (OR = 0.84, 95% confidence interval [CI] 0.73–0.95). Additionally, women with a high percentage of smoking alters were at greater risk for depression (OR = 1.19, 95% CI 1.02–1.39). Other factors associated with risk for depression included perceived stress score (OR = 1.34, 95% CI 1.24–1.45), loneliness score (OR = 1.37, 95% CI 1.05–1.80), and days with poor physical health (OR = 1.06, 95% CI 1.02–1.11). Findings suggest that psychosocial factors and social networks should be considered when addressing depression in clinical practice. PMID:29081878
Moskvin, Oleg V; Bolotin, Dmitry; Wang, Andrew; Ivanov, Pavel S; Gomelsky, Mark
2011-02-01
We present Rhodobase, a web-based meta-analytical tool for analysis of transcriptional regulation in a model anoxygenic photosynthetic bacterium, Rhodobacter sphaeroides. The gene association meta-analysis is based on the pooled data from 100 of R. sphaeroides whole-genome DNA microarrays. Gene-centric regulatory networks were visualized using the StarNet approach (Jupiter, D.C., VanBuren, V., 2008. A visual data mining tool that facilitates reconstruction of transcription regulatory networks. PLoS ONE 3, e1717) with several modifications. We developed a means to identify and visualize operons and superoperons. We designed a framework for the cross-genome search for transcription factor binding sites that takes into account high GC-content and oligonucleotide usage profile characteristic of the R. sphaeroides genome. To facilitate reconstruction of directional relationships between co-regulated genes, we screened upstream sequences (-400 to +20bp from start codons) of all genes for putative binding sites of bacterial transcription factors using a self-optimizing search method developed here. To test performance of the meta-analysis tools and transcription factor site predictions, we reconstructed selected nodes of the R. sphaeroides transcription factor-centric regulatory matrix. The test revealed regulatory relationships that correlate well with the experimentally derived data. The database of transcriptional profile correlations, the network visualization engine and the optimized search engine for transcription factor binding sites analysis are available at http://rhodobase.org. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Making freight-centric communities more livable.
DOT National Transportation Integrated Search
2016-12-01
Communities that attract or retain industrial viability are considered less livable, but reducing, limiting, or mitigating freight operations direct, measurable economic impacts. Thus, the focus of this research was to further the understanding of li...
Optimal SSN Tasking to Enhance Real-time Space Situational Awareness
NASA Astrophysics Data System (ADS)
Ferreira, J., III; Hussein, I.; Gerber, J.; Sivilli, R.
2016-09-01
Space Situational Awareness (SSA) is currently constrained by an overwhelming number of resident space objects (RSOs) that need to be tracked and the amount of data these observations produce. The Joint Centralized Autonomous Tasking System (JCATS) is an autonomous, net-centric tool that approaches these SSA concerns from an agile, information-based stance. Finite set statistics and stochastic optimization are used to maintain an RSO catalog and develop sensor tasking schedules based on operator configured, state information-gain metrics to determine observation priorities. This improves the efficiency of sensors to target objects as awareness changes and new information is needed, not at predefined frequencies solely. A net-centric, service-oriented architecture (SOA) allows for JCATS integration into existing SSA systems. Testing has shown operationally-relevant performance improvements and scalability across multiple types of scenarios and against current sensor tasking tools.
ERIC Educational Resources Information Center
Baird, Derek E.; Fisher, Mercedes
2006-01-01
Raised in the "always on" world of interactive media, the Internet, and digital messaging technologies, today's student has different expectations and learning styles than previous generations. This net-centric generation values their ability to use the Web to create a self-paced, customized, on-demand learning path that includes multiple forms of…
Network Centric Warfare and the Changing Role of the Signal Corps
2004-03-19
Internet; accessed 8 November 2003, A1-A2. 26 Steven R. Covey, 7 Habits of Highly Effective People , (New York, NY: Simon and Schuster, 1989), 98. 27...Methods, ed. Douglas V. Johnson “n.p.”, 2000. Covey, Steven R. 7 Habits of Highly Effective People . New York, NY: Simon and Schuster, 1989. French
Ensuring Agile Power to the Edge Approach in Cyberspace
2011-06-01
University, , 2. Musical Director, The Nagaokakyo Chamber Ensemble, Kyoto, Japan Former Professor, Roosevelt University Chicago College of...Performing Arts The Music Conservatory 3. Professor Emeritus, Department of Electrical Engineering & Computer Science University of California...of musical ensemble without conductor. Second, we discuss to evaluate the feasibility on the Network Centric Warfare / Power to the Edge approach
Performance Learning Roadmap A Network-Centric Approach for Engaged Learners
2005-01-01
Insurance Corporation Target Corporation Unilever Corporation United Nations Development Programme University of Wisconsin (UWSA)–Madison U.S. Coast Guard...performance support services, including consulting, coaching, mentoring, rapid 14 deployment training, targeted training, analysis , facilitation, and team...services include consulting, coaching, mentoring, rapid deployment training, targeted train- ing, analysis , facilitation, and team collaboration support
Net-Centric Sustainment and Operational Reach on the Modern Battlefield
2012-05-17
Halliday, Marc L. Robbins , and Kenneth J. Girardini. "Sustainment of Army Forces in Operation Iraqi Freedom: Battlefield Logistics and Effects on Operations... Robbins , Kenneth J. Girardini, Rick Eden, John M. Halliday, and Jeffrey Angers. "Operation Iraqi Freedom: Major Findings and Recommendations...Timothy P. Williams, Tony R. Sherrill, Amy R. McGrath, Morris G. Hayes, Antoniette C. McGrady, and John M. Sheckler. "Logistics Command and Control
Next Generation Space Surveillance System-of-Systems
NASA Astrophysics Data System (ADS)
McShane, B.
2014-09-01
International economic and military dependence on space assets is pervasive and ever-growing in an environment that is now congested, contested, and competitive. There are a number of natural and man-made risks that need to be monitored and characterized to protect and preserve the space environment and the assets within it. Unfortunately, today's space surveillance network (SSN) has gaps in coverage, is not resilient, and has a growing number of objects that get lost. Risks can be efficiently and effectively mitigated, gaps closed, resiliency improved, and performance increased within a next generation space surveillance network implemented as a system-of-systems with modern information architectures and analytic techniques. This also includes consideration for the newest SSN sensors (e.g. Space Fence) which are born Net-Centric out-of-the-box and able to seamlessly interface with the JSpOC Mission System, global information grid, and future unanticipated users. Significant opportunity exists to integrate legacy, traditional, and non-traditional sensors into a larger space system-of-systems (including command and control centers) for multiple clients through low cost sustainment, modification, and modernization efforts. Clients include operations centers (e.g. JSpOC, USSTRATCOM, CANSPOC), Intelligence centers (e.g. NASIC), space surveillance sensor sites (e.g. AMOS, GEODSS), international governments (e.g. Germany, UK), space agencies (e.g. NASA), and academic institutions. Each has differing priorities, networks, data needs, timeliness, security, accuracy requirements and formats. Enabling processes and technologies include: Standardized and type accredited methods for secure connections to multiple networks, machine-to-machine interfaces for near real-time data sharing and tip-and-queue activities, common data models for analytical processing across multiple radar and optical sensor types, an efficient way to automatically translate between differing client and sensor formats, data warehouse of time based space events, secure collaboration tools for international coalition space operations, shared concept-of-operations, tactics, techniques, and procedures.
Don't Say That to ME: Opposition to Targeting in Weight-Centric Intervention Messages.
Robinson, Becky; Coveleski, Samantha
2018-02-01
Obesity is a global health issue. Despite well-intentioned efforts by public institutions, traditional health promotion techniques often lead to offending those most in need of weight loss. For example, when Bryn Mawr College targeted overweight students to offer a free fitness and nutrition program, it was met with accusations of fat-shaming, indicating that weight-centric messages operate in a more complex sociocultural system than many public health concerns. To better understand reactions to weight-centric health messages, college-aged women evaluated the Bryn Mawr College e-mail. Using an embedded mixed-methods design, analysis revealed that reactions followed four positive themes, six negative themes, and one neutral theme. Statistical tests indicated that health literacy, feminist identification, body dissatisfaction, and body size discrepancy influenced evaluations of message offensiveness and effectiveness. Contrary to the recommendations of traditional behavior change research, these results indicate that audience segmentation and message tailoring may not be effective for promoting weight loss.
NASA Astrophysics Data System (ADS)
Medini, Khaled
2018-01-01
The increase of individualised customer demands and tough competition in the manufacturing sector gave rise to more customer-centric operations management such as products and services (mass) customisation. Mass customisation (MC), which inherits the 'economy of scale' from mass production (MP), aims to meet specific customer demands with near MP efficiency. Such an overarching concept has multiple impacts on operations management. This requires highly qualified and multi-skilled engineers who are well prepared for managing MC. Therefore, this concept should be properly addressed by engineering education curricula which needs to keep up with the emerging business trends. This paper introduces a novel course about MC and variety in operations management which recalls several Experiential Learning (EL) practices consistently with the principle of an active learning. The paper aims to analyse to which extent EL can improve the efficiency of the teaching methods and the retention rate in the context of operations management. The proposed course is given to engineering students whose' perceptions are collected using semi-structured questionnaires and analysed quantitatively and qualitatively. The paper highlights the relevance (i) of teaching MC, and (ii) of active learning in engineering education, through the specific application in the domain of MC.
Use of Context in Video Processing
NASA Astrophysics Data System (ADS)
Wu, Chen; Aghajan, Hamid
Interpreting an event or a scene based on visual data often requires additional contextual information. Contextual information may be obtained from different sources. In this chapter, we discuss two broad categories of contextual sources: environmental context and user-centric context. Environmental context refers to information derived from domain knowledge or from concurrently sensed effects in the area of operation. User-centric context refers to information obtained and accumulated from the user. Both types of context can include static or dynamic contextual elements. Examples from a smart home environment are presented to illustrate how different types of contextual data can be applied to aid the decision-making process.
An alpha-numeric code for representing N-linked glycan structures in secreted glycoproteins.
Yusufi, Faraaz Noor Khan; Park, Wonjun; Lee, May May; Lee, Dong-Yup
2009-01-01
Advances in high-throughput techniques have led to the creation of increasing amounts of glycome data. The storage and analysis of this data would benefit greatly from a compact notation for describing glycan structures that can be easily stored and interpreted by computers. Towards this end, we propose a fixed-length alpha-numeric code for representing N-linked glycan structures commonly found in secreted glycoproteins from mammalian cell cultures. This code, GlycoDigit, employs a pre-assigned alpha-numeric index to represent the monosaccharides attached in different branches to the core glycan structure. The present branch-centric representation allows us to visualize the structure while the numerical nature of the code makes it machine readable. In addition, a difference operator can be defined to quantitatively differentiate between glycan structures for further analysis. The usefulness and applicability of GlycoDigit were demonstrated by constructing and visualizing an N-linked glycosylation network.
Intelligent Network-Centric Sensors Development Program
2012-07-31
Image sensor Configuration: ; Cone 360 degree LWIR PFx Sensor: •■. Image sensor . Configuration: Image MWIR Configuration; Cone 360 degree... LWIR PFx Sensor: Video Configuration: Cone 360 degree SW1R, 2. Reasoning Process to Match Sensor Systems to Algorithms The ontological...effects of coherent imaging because of aberrations. Another reason is the specular nature of active imaging. Both contribute to the nonuniformity
Army Science Board 2001 AD HOC Study Knowledge Management
2001-11-01
dissemination, Army, Army culture, information dominance , knowledge dominance, information sharing, situational awareness, network-centric, infosphere...proposed effort and the emerging Army ICT for Information Dominance are all excellent foundation efforts for KM and Information Assurance. The panel’s...level is critical to survivability and lethality. – Unreliable information will quickly reverse the advantages of “ Information Dominance ” essential to
Location-Based Critical Infrastructure Interdependency (LBCII)
2010-04-01
Effective disaster management reduces devastation and cost . This section describes the processes of disaster management, including the elements of CEM...it has reasonable probability, based on the tectonic geology and the history of the region. The case highlights the usability of network- centric...of earthquake risk assessment in Cartago, Costa Rica . International Institute for Geo-Information Science and Earth Observation (ITC): Enschede
Agile Integration of Complex Systems
2010-04-28
intervention in using SOA can be reduced Page 5 SOA in DoD DoD has mandated that all systems support the Network - Centric Environment and SOA is fundamental to...it and dropping it on an orchestrate icon (slide 22) Di i lifi d d d i l Page 13 scovery s mp e an ma e v sua SOAF Messaging Service Transport
Smart Collaborative Caching for Information-Centric IoT in Fog Computing.
Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke
2017-11-01
The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.
Smart Collaborative Caching for Information-Centric IoT in Fog Computing
Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke
2017-01-01
The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219
Display integration for ground combat vehicles
NASA Astrophysics Data System (ADS)
Busse, David J.
1998-09-01
The United States Army's requirement to employ high resolution target acquisition sensors and information warfare to increase its dominance over enemy forces has led to the need to integrate advanced display devices into ground combat vehicle crew stations. The Army's force structure require the integration of advanced displays on both existing and emerging ground combat vehicle systems. The fielding of second generation target acquisition sensors, color digital terrain maps and high volume digital command and control information networks on these platforms define display performance requirements. The greatest challenge facing the system integrator is the development and integration of advanced displays that meet operational, vehicle and human computer interface performance requirements for the ground combat vehicle fleet. The subject of this paper is to address those challenges: operational and vehicle performance, non-soldier centric crew station configurations, display performance limitations related to human computer interfaces and vehicle physical environments, display technology limitations and the Department of Defense (DOD) acquisition reform initiatives. How the ground combat vehicle Program Manager and system integrator are addressing these challenges are discussed through the integration of displays on fielded, current and future close combat vehicle applications.
An Analysis of the Effects of Net-Centric Operations Using Multi-Agent Adaptive Behavior
ERIC Educational Resources Information Center
Calderon-Meza, Guillermo
2011-01-01
The National Airspace System (NAS) is a resource managed in the public good. Equity in NAS access, and use for private, commercial and government purposes is coordinated by regulations and made possible by procedures, and technology. Researchers have documented scenarios in which the introduction of new concepts-of-operations and technologies has…
Deep Packet/Flow Analysis using GPUs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gong, Qian; Wu, Wenji; DeMar, Phil
Deep packet inspection (DPI) faces severe performance challenges in high-speed networks (40/100 GE) as it requires a large amount of raw computing power and high I/O throughputs. Recently, researchers have tentatively used GPUs to address the above issues and boost the performance of DPI. Typically, DPI applications involve highly complex operations in both per-packet and per-flow data level, often in real-time. The parallel architecture of GPUs fits exceptionally well for per-packet network traffic processing. However, for stateful network protocols such as TCP, their data stream need to be reconstructed in a per-flow level to deliver a consistent content analysis. Sincemore » the flow-centric operations are naturally antiparallel and often require large memory space for buffering out-of-sequence packets, they can be problematic for GPUs, whose memory is normally limited to several gigabytes. In this work, we present a highly efficient GPU-based deep packet/flow analysis framework. The proposed design includes a purely GPU-implemented flow tracking and TCP stream reassembly. Instead of buffering and waiting for TCP packets to become in sequence, our framework process the packets in batch and uses a deterministic finite automaton (DFA) with prefix-/suffix- tree method to detect patterns across out-of-sequence packets that happen to be located in different batches. In conclusion, evaluation shows that our code can reassemble and forward tens of millions of packets per second and conduct a stateful signature-based deep packet inspection at 55 Gbit/s using an NVIDIA K40 GPU.« less
Vanwonterghem, Inka; Jensen, Paul D; Rabaey, Korneel; Tyson, Gene W
2016-09-01
Our understanding of the complex interconnected processes performed by microbial communities is hindered by our inability to culture the vast majority of microorganisms. Metagenomics provides a way to bypass this cultivation bottleneck and recent advances in this field now allow us to recover a growing number of genomes representing previously uncultured populations from increasingly complex environments. In this study, a temporal genome-centric metagenomic analysis was performed of lab-scale anaerobic digesters that host complex microbial communities fulfilling a series of interlinked metabolic processes to enable the conversion of cellulose to methane. In total, 101 population genomes that were moderate to near-complete were recovered based primarily on differential coverage binning. These populations span 19 phyla, represent mostly novel species and expand the genomic coverage of several rare phyla. Classification into functional guilds based on their metabolic potential revealed metabolic networks with a high level of functional redundancy as well as niche specialization, and allowed us to identify potential roles such as hydrolytic specialists for several rare, uncultured populations. Genome-centric analyses of complex microbial communities across diverse environments provide the key to understanding the phylogenetic and metabolic diversity of these interactive communities. © 2016 Society for Applied Microbiology and John Wiley & Sons Ltd.
Chen, Ziyi; Quan, Lijun; Huang, Anfei; Zhao, Qiang; Yuan, Yao; Yuan, Xuye; Shen, Qin; Shang, Jingzhe; Ben, Yinyin; Qin, F Xiao-Feng; Wu, Aiping
2018-01-01
The RNA sequencing approach has been broadly used to provide gene-, pathway-, and network-centric analyses for various cell and tissue samples. However, thus far, rich cellular information carried in tissue samples has not been thoroughly characterized from RNA-Seq data. Therefore, it would expand our horizons to better understand the biological processes of the body by incorporating a cell-centric view of tissue transcriptome. Here, a computational model named seq-ImmuCC was developed to infer the relative proportions of 10 major immune cells in mouse tissues from RNA-Seq data. The performance of seq-ImmuCC was evaluated among multiple computational algorithms, transcriptional platforms, and simulated and experimental datasets. The test results showed its stable performance and superb consistency with experimental observations under different conditions. With seq-ImmuCC, we generated the comprehensive landscape of immune cell compositions in 27 normal mouse tissues and extracted the distinct signatures of immune cell proportion among various tissue types. Furthermore, we quantitatively characterized and compared 18 different types of mouse tumor tissues of distinct cell origins with their immune cell compositions, which provided a comprehensive and informative measurement for the immune microenvironment inside tumor tissues. The online server of seq-ImmuCC are freely available at http://wap-lab.org:3200/immune/.
An Introduction to Social Network Data Analytics
NASA Astrophysics Data System (ADS)
Aggarwal, Charu C.
The advent of online social networks has been one of the most exciting events in this decade. Many popular online social networks such as Twitter, LinkedIn, and Facebook have become increasingly popular. In addition, a number of multimedia networks such as Flickr have also seen an increasing level of popularity in recent years. Many such social networks are extremely rich in content, and they typically contain a tremendous amount of content and linkage data which can be leveraged for analysis. The linkage data is essentially the graph structure of the social network and the communications between entities; whereas the content data contains the text, images and other multimedia data in the network. The richness of this network provides unprecedented opportunities for data analytics in the context of social networks. This book provides a data-centric view of online social networks; a topic which has been missing from much of the literature. This chapter provides an overview of the key topics in this field, and their coverage in this book.
Wang, Haonan; Bangerter, Neal K; Park, Daniel J; Adluru, Ganesh; Kholmovski, Eugene G; Xu, Jian; DiBella, Edward
2015-10-01
Highly undersampled three-dimensional (3D) saturation-recovery sequences are affected by k-space trajectory since the magnetization does not reach steady state during the acquisition and the slab excitation profile yields different flip angles in different slices. This study compares centric and reverse-centric 3D cardiac perfusion imaging. An undersampled (98 phase encodes) 3D ECG-gated saturation-recovery sequence that alternates centric and reverse-centric acquisitions each time frame was used to image phantoms and in vivo subjects. Flip angle variation across the slices was measured, and contrast with each trajectory was analyzed via Bloch simulation. Significant variations in flip angle were observed across slices, leading to larger signal variation across slices for the centric acquisition. In simulation, severe transient artifacts were observed when using the centric trajectory with higher flip angles, placing practical limits on the maximum flip angle used. The reverse-centric trajectory provided less contrast, but was more robust to flip angle variations. Both of the k-space trajectories can provide reasonable image quality. The centric trajectory can have higher CNR, but is more sensitive to flip angle variation. The reverse-centric trajectory is more robust to flip angle variation. © 2014 Wiley Periodicals, Inc.
Peering Strategic Game Models for Interdependent ISPs in Content Centric Internet
Guan, Jianfeng; Xu, Changqiao; Su, Wei; Zhang, Hongke
2013-01-01
Emergent content-oriented networks prompt Internet service providers (ISPs) to evolve and take major responsibility for content delivery. Numerous content items and varying content popularities motivate interdependence between peering ISPs to elaborate their content caching and sharing strategies. In this paper, we propose the concept of peering for content exchange between interdependent ISPs in content centric Internet to minimize content delivery cost by a proper peering strategy. We model four peering strategic games to formulate four types of peering relationships between ISPs who are characterized by varying degrees of cooperative willingness from egoism to altruism and interconnected as profit-individuals or profit-coalition. Simulation results show the price of anarchy (PoA) and communication cost in the four games to validate that ISPs should decide their peering strategies by balancing intradomain content demand and interdomain peering relations for an optimal cost of content delivery. PMID:24381517
Peering strategic game models for interdependent ISPs in content centric Internet.
Zhao, Jia; Guan, Jianfeng; Xu, Changqiao; Su, Wei; Zhang, Hongke
2013-01-01
Emergent content-oriented networks prompt Internet service providers (ISPs) to evolve and take major responsibility for content delivery. Numerous content items and varying content popularities motivate interdependence between peering ISPs to elaborate their content caching and sharing strategies. In this paper, we propose the concept of peering for content exchange between interdependent ISPs in content centric Internet to minimize content delivery cost by a proper peering strategy. We model four peering strategic games to formulate four types of peering relationships between ISPs who are characterized by varying degrees of cooperative willingness from egoism to altruism and interconnected as profit-individuals or profit-coalition. Simulation results show the price of anarchy (PoA) and communication cost in the four games to validate that ISPs should decide their peering strategies by balancing intradomain content demand and interdomain peering relations for an optimal cost of content delivery.
2004-11-01
military effectiveness, history provides us the answer: In “ Megatrends ”, John Naisbitt, writes about technology itself without knowing that a...Control Simulations; viii. Urban Planning; ix. Urban Combat; x. Chemical Biological Radiological, and Nuclear (CBRN) Evaluations; xi. Military...Capability Management. DRDC Ottawa TM 2004-221 83 References 1. Naisbitt, J. Megatrends . Warner Books, 290 pages, 1982. 2
Next-Generation Undersea Warfare and Undersea Distributed Networked Systems
2007-01-31
Probability of false alarm R5 Redeployment, refueling, repositioning, replacement, and recovery ROE Rules of engagement RSTA Reconnaissance, surveillance...and decision aids) at a given point, considering mission, tasks, rules of engagement (ROE), objectives, and other appropriate factors. " Manning within...trajectories are important and must occur concurrently; they must, however, be governed by different rule sets.21 II Mission Capability Centric .•UDNS
Naval War College Review. Volume 65, Number 2, Spring 2012
2012-01-01
warfare doctrine that scarcely exists in today’s American military. Finally, as part of our long-standing effort to understand capabilities and...long before network-centric warfare became a central feature of joint doctrine , the Navy established a program called “Copernicus” to assimilate...exchange data if the right technology, doctrine , tactics, techniques, and procedures were in place. The importance of coalition partners effectively
Network Centric Warfare, Command, and the Nature of War
2009-05-21
technologies. This future is a possibility arising from the current trend of developments in information and communication technologies. These...technologies are developing at such a rate that it is difficult for organizations to adapt quickly enough to exploit the advantages of emerging new...revolution. In fact, some contemporary military theorists argue that developments in information technologies are the catalyst for a new military
A Network Centric Warfare (NCW) Compliance Process for Australian Defence
2006-08-01
discovery and access by a wide range of authorised Defence users. The information could be used to simplify future NCW Compliance Assessments by re-using...Security standards 1. General Security Services - General Table 5.1 2. General Security services - Authentication Table 5.2 3. General Security...Personnel Positions in an authorised establishment must be filled by individuals who satisfy the necessary individual readiness requirements
The Defense Science Board Task Force on Tactical Battlefield Communications
1999-12-01
impact of the system is clearly under appreciated. It could be the foundation for a common- user , QoS, Internet and could integrate legacy systems...into a common- user framework as is occurring in the private sector. Unfortunately, the networking aspects of the system are being lost; the focus...system-centric framework to a common- user , internetwork framework . Recommendation V—Information Security
Evaluation of Organisational Interoperabiity in a Network Centric Warfare Environment
2004-09-01
understanding developed. Command and Coordination examines issues related to command structure, command and leadership styles . Ethos covers socio...harmonisation of command arrangements and the accommodation of differences in command and leadership styles . 3.2.4 Ethos Future warfare will... leadership styles . • changes to give less emphasis to hierarchy and command and more to coordination. Any reference to a single chain of command has been
Sensemaking Training Requirements for the Adaptive Battlestaff
2007-06-01
for the Adaptive Battlestaff Topic: Cognitive and Social Issues Celestine A. Ntuen1& Dennis Leedom2 1Army Center for Human-Centric Command...intelligent analysts. We need a new training strategy, paradigms, and methods for this purpose. The sensemaking trainability factors o must be identified...juxtapositions of social forces—a complex of network of information systems with people, technology, and domains of adversaries (tasks) that have been
ERIC Educational Resources Information Center
Weber Guisan, Saskia; Voit, Janine; Lengauer, Sonja; Proinger, Eva; Duvekot, Ruud; Aagaard, Kirsten
2014-01-01
The present publication is one of the outcomes of the OBSERVAL-NET project (follow-up of the OBSERVAL project). The main aim of OBSERVAL-NET was to set up a stakeholder-centric network of organisations supporting the validation of non-formal and informal learning in Europe based on the formation of national working groups in the 8 participating…
ERIC Educational Resources Information Center
Weber Guisan, Saskia; Voit, Janine; Lengauer, Sonja; Proinger, Eva; Duvekot, Ruud; Aagaard, Kirsten
2014-01-01
The present publication is one of the outcomes of the OBSERVAL-NET project (followup of the OBSERVAL project). The main aim of OBSERVAL-NET was to set up a stakeholder centric network of organisations supporting the validation of non-formal and informal learning in Europe based on the formation of national working groups in the 8 participating…
Service Quality Assessment for NASA's Deep Space Network: No Longer a Luxury
NASA Technical Reports Server (NTRS)
Barkley, Erik; Wolgast, Paul; Zendejas, Silvino
2010-01-01
When NASA's Deep Space Network (DSN) was established almost a half century ago, the concept of computer-based service delivery was impractical or infeasible due to the state of information technology As a result, the interface the DSN exposes to its customers tends to be equipment-centric, lacking a clear demarcation between the DSN and the mission operation systems (MOS) of its customers. As the number of customers has continued to increase, the need to improve efficiency and minimize costs has grown. This growth has been the impetus for a DSN transformation from an equipment-forrent provider to a provider of standard services. Service orientation naturally leads to requirements for service management, including proactive measurement of service quality and service levels as well as the efficiency of internal processes and the performance of service provisioning systems. DSN System Engineering has surveyed industry offerings to determine if commercial successes in decision support and Business Intelligence (BI) solutions can be applied to the DSN. A pilot project was initiated, and subsequently executed to determine the feasibility of repurposing a commercial Business Intelligence platform for engineering analysis in conjunction with the platform's intended business reporting and analysis functions.
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Biswas, Subhodip; Kundu, Souvik; Das, Swagatam
2014-10-01
In real life, we often need to find multiple optimally sustainable solutions of an optimization problem. Evolutionary multimodal optimization algorithms can be very helpful in such cases. They detect and maintain multiple optimal solutions during the run by incorporating specialized niching operations in their actual framework. Differential evolution (DE) is a powerful evolutionary algorithm (EA) well-known for its ability and efficiency as a single peak global optimizer for continuous spaces. This article suggests a niching scheme integrated with DE for achieving a stable and efficient niching behavior by combining the newly proposed parent-centric mutation operator with synchronous crowding replacement rule. The proposed approach is designed by considering the difficulties associated with the problem dependent niching parameters (like niche radius) and does not make use of such control parameter. The mutation operator helps to maintain the population diversity at an optimum level by using well-defined local neighborhoods. Based on a comparative study involving 13 well-known state-of-the-art niching EAs tested on an extensive collection of benchmarks, we observe a consistent statistical superiority enjoyed by our proposed niching algorithm.
Flood Monitoring using X-band Dual-polarization Radar Network
NASA Astrophysics Data System (ADS)
Chandrasekar, V.; Wang, Y.; Maki, M.; Nakane, K.
2009-09-01
A dense weather radar network is an emerging concept advanced by the Center for Collaborative Adaptive Sensing of the Atmosphere (CASA). Using multiple radars observing over a common will create different data outcomes depending on the characteristics of the radar units employed and the network topology. To define this a general framework is developed to describe the radar network space, and formulations are obtained that can be used for weather radar network characterization. Current weather radar surveillance networks are based upon conventional sensing paradigm of widely-separated, standalone sensing systems using long range radars that operate at wavelengths in 5-10 cm range. Such configuration has limited capability to observe close to the surface of the earth because of the earth's curvature but also has poorer resolution at far ranges. The dense network radar system, observes and measures weather phenomenon such as rainfall and severe weather close to the ground at higher spatial and temporal resolution compared to the current paradigm. In addition the dense network paradigm also is easily adaptable to complex terrain. Flooding is one of the most common natural hazards in the world. Especially, excessive development decreases the response time of urban watersheds and complex terrain to rainfall and increases the chance of localized flooding events over a small spatial domain. Successful monitoring of urban floods requires high spatiotemporal resolution, accurate precipitation estimation because of the rapid flood response as well as the complex hydrologic and hydraulic characteristics in an urban environment. This paper reviews various aspects in radar rainfall mapping in urban coverage using dense X-band dual-polarization radar networks. By reducing the maximum range and operating at X-band, one can ensure good azimuthal resolution with a small-size antenna and keep the radar beam closer to the ground. The networked topology helps to achieve satisfactory sensitivity and fast temporal update across the coverage. Strong clutter is expected from buildings in the neighborhood which act as perfect reflectors. The reduction in radar size enables flexible deployment, such as rooftop installation, with small infrastructure requirement, which is critical in a metropolitan region. Dual-polarization based technologies can be implemented for real-time mitigation of rain attenuations and accurate estimation of rainfall. The NSF Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere (CASA) is developing the technologies and the systems for network centric weather observation. The Differential propagation phase (Kdp) has higher sensitivity at X-band compared to S and C band. It is attractive to use Kdp to derive Quantitative Precipitation Estimation (QPE) because it is immune to rain attenuation, calibration biases, partial beam blockage, and hail contamination. Despite the advantage of Kdp for radar QPE, the estimation of Kdp itself is a challenge as the range derivative of the differential propagation phase profiles. An adaptive Kdp algorithm was implemented in the CASA IP1 testbed that substantially reduces the fluctuation in light rain and the bias at heavy rain. The Kdp estimation also benefits from the higher resolution in the IP1 radar network. The performance of the IP1 QPE product was evaluated for all major rain events against the USDA Agriculture Research Service's gauge network (MicroNet) in the Little Washita watershed, which comprises 20 weather stations in the center of the test bed. The cross-comparison with gauge measurements shows excellent agreement for the storm events during the Spring Experiments of 2007 and 2008. The hourly rainfall estimates compared to the gauge measurements have a very small bias of few percent and a normalized standard error of 21%. The IP1 testbed was designed with overlapping coverage among its radar nodes. The study area is covered by multiple radars and the aspect of network composition is also evaluated. The independence of Kdp on the radar calibration enables flexibility in combining the collocated Kdp estimates from all the radar nodes. Radar QPE can be improved from the composite Kdp field from the radar with lowest beam height and nearest slant range, or from the radar with the best Kdp estimates. More importantly, the data availability is greatly enhanced by the overlapped topology in cases of heavy rainfall, demonstrating the operational strength of the network centric radar system. The National Research Institute for Earth Science and Disaster Prevention (NIED), Japan, is in the process of establishing an X-band radar network (X-Net) in Metropolitan Tokyo area. Colorado State University and NIED have formed a partnership to initiate a joint program for urban flood monitoring using X-band dual-polarization radar network. This paper will also present some preliminary plans for this program.
Fyn-Dependent Gene Networks in Acute Ethanol Sensitivity
Farris, Sean P.; Miles, Michael F.
2013-01-01
Studies in humans and animal models document that acute behavioral responses to ethanol are predisposing factor for the risk of long-term drinking behavior. Prior microarray data from our laboratory document strain- and brain region-specific variation in gene expression profile responses to acute ethanol that may be underlying regulators of ethanol behavioral phenotypes. The non-receptor tyrosine kinase Fyn has previously been mechanistically implicated in the sedative-hypnotic response to acute ethanol. To further understand how Fyn may modulate ethanol behaviors, we used whole-genome expression profiling. We characterized basal and acute ethanol-evoked (3 g/kg) gene expression patterns in nucleus accumbens (NAC), prefrontal cortex (PFC), and ventral midbrain (VMB) of control and Fyn knockout mice. Bioinformatics analysis identified a set of Fyn-related gene networks differently regulated by acute ethanol across the three brain regions. In particular, our analysis suggested a coordinate basal decrease in myelin-associated gene expression within NAC and PFC as an underlying factor in sensitivity of Fyn null animals to ethanol sedation. An in silico analysis across the BXD recombinant inbred (RI) strains of mice identified a significant correlation between Fyn expression and a previously published ethanol loss-of-righting-reflex (LORR) phenotype. By combining PFC gene expression correlates to Fyn and LORR across multiple genomic datasets, we identified robust Fyn-centric gene networks related to LORR. Our results thus suggest that multiple system-wide changes exist within specific brain regions of Fyn knockout mice, and that distinct Fyn-dependent expression networks within PFC may be important determinates of the LORR due to acute ethanol. These results add to the interpretation of acute ethanol behavioral sensitivity in Fyn kinase null animals, and identify Fyn-centric gene networks influencing variance in ethanol LORR. Such networks may also inform future design of pharmacotherapies for the treatment and prevention of alcohol use disorders. PMID:24312422
Paladin Integrated Management (PIM)
2015-12-01
Strategy and Net- Centric Services Strategy, and the principles and rules identified in the DoD lEA, excepting tactical and non-IP communications 3...with Net-Centric Data Strategy and Net- Centric Services Strategy, and the principles and rules identified in the DoD lEA, excepting tactical and...effective information exchanges 2) Compliant with Net-Centric Data Strategy and Net-Centric Services Strategy, and the principles and rules
Net-Centric Sensors and Data Sources (N-CSDS) GEODSS Sidecar
NASA Astrophysics Data System (ADS)
Richmond, D.
2012-09-01
Vast amounts of Space Situational Sensor data is collected each day on closed, legacy systems. Massachusetts Institute of Technology Lincoln Laboratory (MIT/LL) developed a Net-Centric approach to expose this data under the Extended Space Sensors Architecture (ESSA) Advanced Concept Technology Demonstration (ACTD). The Net-Centric Sensors and Data Sources (N-CSDS) Ground-based Electro Optical Deep Space Surveillance (GEODSS) Sidecar is the next generation that moves the ESSA ACTD engineering tools to an operational baseline. The N-CSDS GEODSS sidecar high level architecture will be presented, highlighting the features that supports deployment at multiple diverse sensor sites. Other key items that will be covered include: 1) The Web Browser interface to perform searches of historical data 2) The capabilities of the deployed Web Services and example service request/responses 3) Example data and potential user applications will be highlighted 4) Specifics regarding the process to gain access to the N-CSDS GEODSS sensor data in near real time 5) Current status and future deployment plans (Including plans for deployment to the Maui GEODSS Site)
Meeker, Daniella; Jiang, Xiaoqian; Matheny, Michael E; Farcas, Claudiu; D'Arcy, Michel; Pearlman, Laura; Nookala, Lavanya; Day, Michele E; Kim, Katherine K; Kim, Hyeoneui; Boxwala, Aziz; El-Kareh, Robert; Kuo, Grace M; Resnic, Frederic S; Kesselman, Carl; Ohno-Machado, Lucila
2015-11-01
Centralized and federated models for sharing data in research networks currently exist. To build multivariate data analysis for centralized networks, transfer of patient-level data to a central computation resource is necessary. The authors implemented distributed multivariate models for federated networks in which patient-level data is kept at each site and data exchange policies are managed in a study-centric manner. The objective was to implement infrastructure that supports the functionality of some existing research networks (e.g., cohort discovery, workflow management, and estimation of multivariate analytic models on centralized data) while adding additional important new features, such as algorithms for distributed iterative multivariate models, a graphical interface for multivariate model specification, synchronous and asynchronous response to network queries, investigator-initiated studies, and study-based control of staff, protocols, and data sharing policies. Based on the requirements gathered from statisticians, administrators, and investigators from multiple institutions, the authors developed infrastructure and tools to support multisite comparative effectiveness studies using web services for multivariate statistical estimation in the SCANNER federated network. The authors implemented massively parallel (map-reduce) computation methods and a new policy management system to enable each study initiated by network participants to define the ways in which data may be processed, managed, queried, and shared. The authors illustrated the use of these systems among institutions with highly different policies and operating under different state laws. Federated research networks need not limit distributed query functionality to count queries, cohort discovery, or independently estimated analytic models. Multivariate analyses can be efficiently and securely conducted without patient-level data transport, allowing institutions with strict local data storage requirements to participate in sophisticated analyses based on federated research networks. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association.
Training Community Modeling and Simulation Business Plan: 2009 Edition
2010-04-01
strategic information assurance 33 33 Provide crisis action procedures training 34 34 Provide the IC SOF-specific training at the operational level... information and products • Collaborative analysis processes • Dissemination of information throughout a command and to subordinates by redundant means...centric M&S capabilities will improve training for information warfare, assist with training for homeland defense operations, crisis -management plan- ning
Command and Control Common Semantic Core Required to Enable Net-centric Operations
2008-05-20
automated processing capability. A former US Marine Corps component C4 director during Operation Iraqi Freedom identified the problems of 1) uncertainty...interoperability improvements to warfighter community processes, thanks to ubiquitous automated processing , are likely high and somewhat easier to quantify. A...synchronized with the actions of other partners / warfare communities. This requires high- quality information, rapid sharing and automated processing – which
Participatory Design Methods for C2 Systems (Proceedings/Presentation)
2006-01-01
Cognitive Task Analysis (CTA) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES Janet E. Miller...systems to support cognitive work such as is accomplished in a network-centric -environment. Cognitive task analysis (CTA) methods are used to...of cognitive task analysis methodologies exist (Schraagen et al., 2000). However, many of these methods are skeptically viewed by a domain’s
A Recommended Framework for the Network-Centric Acquisition Process
2009-09-01
ISO /IEC 12207 , Systems and Software Engineering-Software Life-Cycle Processes ANSI/EIA 632, Processes for Engineering a System. There are...engineering [46]. Some of the process models presented in the DAG are: ISO /IEC 15288, Systems and Software Engineering-System Life-Cycle Processes...e.g., ISO , IA, Security, etc.). Vetting developers helps ensure that they are using industry best industry practices and maximize the IA compliance
Contrasting Views of Complexity and Their Implications For Network-Centric Infrastructures
2010-07-04
problem) can be undecidable. While two gravitationally interacting bodies yield simple orbits, Poincare showed that the motion of even three...statistical me- chanics are valid only when the [billiard] balls are distributed, in their positions and motions , in a helter-skelter, i.e., a disorga- nized...Rube Goldberg, whose famous cartoons depict “ comically involved complicated invention[s], laboriously contrived to perform a simple operation” [68
A Taxonomy of Network Centric Warfare Architectures
2008-01-01
mound structure emerges as a result of the termites following very simple rules, and exchanging very simple pheromone signals (Solé & Goodwin 2000...only fairly simple decisions.” For example, in far northern Australia, “magnetic termites ” build large termite mounds which are oriented north-south...and contain a complex ventilation system which controls temperature, humidity, and oxygen levels. But termite brains are too small to store a plan
Research on Information Sharing Method for Future C2 in Network Centric Environment
2011-06-01
subscription (or search) request. Then, some of the information service nodes for future C2 deal with these users’ requests, locate, federated search the... federated search server is responsible for resolving the search requests sending out from the users, and executing the federated search . The information... federated search server, information filtering model, or information subscription matching algorithm (such as users subscribe the target information at two
Evaluating the Claims of Network Centric Warfare
2005-12-01
judgments (see Bar- Tal , Raviv , & Spitzer, 1999). However, not everyone’s reactions to stressors are the same. A 12-month team performance study...45-58. Bar- Tal , Y. Raviv , A., & Spitzer, A. (1999). The need and ability to achieve cognitive structuring: Individual differences that moderate...definiteness, and regularity” (Bar- Tal , 1994, p. 45). Stress is one of the human responses to uncertainty. Stress can be initiated by a distinct event
An Air Force Strategic Vision for 2020-2030
2011-01-01
General Corley about the Future of Air Power,” Second Line of Defense, August 2010, http:// www.sldinfo.com/? p =11608. 14. Dahm, Report on Technology...Publication Series, 2001); Alberts, J. J. Garstka, and F. P . Stein, Network Centric Warfare: Develop- ing and Leveraging Information Superiority (Washington...2005), 217–30. 38. See Jennifer D. P . Moroney et al., International Cooperation with Partner Air Forces (Washington: Rand Publishing, 2009), 9
The SmartOR: a distributed sensor network to improve operating room efficiency.
Huang, Albert Y; Joerger, Guillaume; Fikfak, Vid; Salmon, Remi; Dunkin, Brian J; Bass, Barbara L; Garbey, Marc
2017-09-01
Despite the significant expense of OR time, best practice achieves only 70% efficiency. Compounding this problem is a lack of real-time data. Most current OR utilization programs require manual data entry. Automated systems require installation and maintenance of expensive tracking hardware throughout the institution. This study developed an inexpensive, automated OR utilization system and analyzed data from multiple operating rooms. OR activity was deconstructed into four room states. A sensor network was then developed to automatically capture these states using only three sensors, a local wireless network, and a data capture computer. Two systems were then installed into two ORs, recordings captured 24/7. The SmartOR recorded the following events: any room activity, patient entry/exit time, anesthesia time, laparoscopy time, room turnover time, and time of preoperative patient identification by the surgeon. From November 2014 to December 2015, data on 1003 cases were collected. The mean turnover time was 36 min, and 38% of cases met the institutional goal of ≤30 min. Data analysis also identified outlier cases (>1 SD from mean) in the domains of time from patient entry into the OR to intubation (11% of cases) and time from extubation to patient exiting the OR (11% of cases). Time from surgeon identification of patient to scheduled procedure start time was 11 min (institution bylaws require 20 min before scheduled start time), yet OR teams required 22 min on average to bring a patient into the room after surgeon identification. The SmartOR automatically and reliably captures data on OR room state and, in real time, identifies outlier cases that may be examined closer to improve efficiency. As no manual entry is required, the data are indisputable and allow OR teams to maintain a patient-centric focus.
System approach to distributed sensor management
NASA Astrophysics Data System (ADS)
Mayott, Gregory; Miller, Gordon; Harrell, John; Hepp, Jared; Self, Mid
2010-04-01
Since 2003, the US Army's RDECOM CERDEC Night Vision Electronic Sensor Directorate (NVESD) has been developing a distributed Sensor Management System (SMS) that utilizes a framework which demonstrates application layer, net-centric sensor management. The core principles of the design support distributed and dynamic discovery of sensing devices and processes through a multi-layered implementation. This results in a sensor management layer that acts as a System with defined interfaces for which the characteristics, parameters, and behaviors can be described. Within the framework, the definition of a protocol is required to establish the rules for how distributed sensors should operate. The protocol defines the behaviors, capabilities, and message structures needed to operate within the functional design boundaries. The protocol definition addresses the requirements for a device (sensors or processes) to dynamically join or leave a sensor network, dynamically describe device control and data capabilities, and allow dynamic addressing of publish and subscribe functionality. The message structure is a multi-tiered definition that identifies standard, extended, and payload representations that are specifically designed to accommodate the need for standard representations of common functions, while supporting the need for feature-based functions that are typically vendor specific. The dynamic qualities of the protocol enable a User GUI application the flexibility of mapping widget-level controls to each device based on reported capabilities in real-time. The SMS approach is designed to accommodate scalability and flexibility within a defined architecture. The distributed sensor management framework and its application to a tactical sensor network will be described in this paper.
Menon, Sumytra; Kars, Marijke; Malhotra, Chetna; Campbell, Alastair V; van Delden, J J M
2018-05-15
Advance care planning has been shown to improve end-of-life care but it was developed in the USA and most research has been conducted in western communities. We aimed to study the attitudes and perceptions of patients with life-limiting illnesses, informal caregivers, doctors, nurses and medical social workers regarding advance care planning in a multi-cultural family-centric community. We conducted an explorative qualitative study, using focus groups and individual in-depth interviews. We used purposive sampling techniques to recruit 61 adults (15 doctors, 13 nurses, 5 medical social workers, 15 patients and 13 caregivers) from multiple healthcare settings across the country. The participants are genuinely anxious about the implementation of advance care planning. They had positive and negative expectations of advance care planning. Many were confused about the legal framework for healthcare decision-making and expected advance care planning to be of limited value because family members, rather than the patient, were usually the key decision-makers. A nuanced approach to advance care planning which considers the family network is required in multi-cultural family centric communities. Policies should be reconciled to create a more consistent message that respects patients, the family, and is legally coherent. Further research could focus on adaptations of advance care planning to promote its acceptance in such communities. Copyright © 2018. Published by Elsevier Inc.
A Comparison of Synoptic Classification Methods for Application to Wind Power Prediction
NASA Astrophysics Data System (ADS)
Fowler, P.; Basu, S.
2008-12-01
Wind energy is a highly variable resource. To make it competitive with other sources of energy for integration on the power grid, at the very least, a day-ahead forecast of power output must be available. In many grid operations worldwide, next-day power output is scheduled in 30 minute intervals and grid management routinely occurs at real time. Maintenance and repairs require costly time to complete and must be scheduled along with normal operations. Revenue is dependent on the reliability of the entire system. In other words, there is financial and managerial benefit to short-term prediction of wind power. One approach to short-term forecasting is to combine a data centric method such as an artificial neural network with a physically based approach like numerical weather prediction (NWP). The key is in associating high-dimensional NWP model output with the most appropriately trained neural network. Because neural networks perform the best in the situations they are designed for, one can hypothesize that if one can identify similar recurring states in historical weather data, this data can be used to train multiple custom designed neural networks to be used when called upon by numerical prediction. Identifying similar recurring states may offer insight to how a neural network forecast can be improved, but amassing the knowledge and utilizing it efficiently in the time required for power prediction would be difficult for a human to master, thus showing the advantage of classification. Classification methods are important tools for short-term forecasting because they can be unsupervised, objective, and computationally quick. They primarily involve categorizing data sets in to dominant weather classes, but there are numerous ways to define a class and a great variety in interpretation of the results. In the present study a collection of classification methods are used on a sampling of atmospheric variables from the North American Regional Reanalysis data set. The results will be discussed in relation to their use for short-term wind power forecasting by neural networks.
High Assurance Human-Centric Decision Systems
2013-05-01
of the human operator who is multitasking in this situation. 38 Crandall, Cummings, and Mitchell [7], [8] have introduced “fan-out” models to estimate...planning in multitasking contexts. In the future, we will study extensions of our cog- nitive model. Currently, the cognitive model is focused solely
An integrated eVoucher mechanism for flexible loads in real-time retail electricity market
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Tao; Pourbabak, Hajir; Liang, Zheming
This study proposes an innovative economic and engineering coupled framework to encourage typical flexible loads or load aggregators, such as parking lots with high penetration of electric vehicles, to participate directly in the real-time retail electricity market based on an integrated eVoucher program. The integrated eVoucher program entails demand side management, either in the positive or negative direction, following a popular customer-centric design principle. It provides the extra economic benefit to end-users and reduces the risk associated with the wholesale electricity market for electric distribution companies (EDCs), meanwhile improving the potential resilience of the distribution networks with consideration for frequencymore » deviations. When implemented, the eVoucher program allows typical flexible loads, such as electric vehicle parking lots, to adjust their demand and consumption behavior according to financial incentives from an EDC. A distribution system operator (DSO) works as a third party to hasten negotiations between such parking lots and EDCs, as well as the price clearing process. Eventually, both electricity retailers and power system operators will benefit from the active participation of the flexible loads and energy customers.« less
An integrated eVoucher mechanism for flexible loads in real-time retail electricity market
Chen, Tao; Pourbabak, Hajir; Liang, Zheming; ...
2017-01-26
This study proposes an innovative economic and engineering coupled framework to encourage typical flexible loads or load aggregators, such as parking lots with high penetration of electric vehicles, to participate directly in the real-time retail electricity market based on an integrated eVoucher program. The integrated eVoucher program entails demand side management, either in the positive or negative direction, following a popular customer-centric design principle. It provides the extra economic benefit to end-users and reduces the risk associated with the wholesale electricity market for electric distribution companies (EDCs), meanwhile improving the potential resilience of the distribution networks with consideration for frequencymore » deviations. When implemented, the eVoucher program allows typical flexible loads, such as electric vehicle parking lots, to adjust their demand and consumption behavior according to financial incentives from an EDC. A distribution system operator (DSO) works as a third party to hasten negotiations between such parking lots and EDCs, as well as the price clearing process. Eventually, both electricity retailers and power system operators will benefit from the active participation of the flexible loads and energy customers.« less
Analysis of quasi-periodic pore-network structure of centric marine diatom frustules
NASA Astrophysics Data System (ADS)
Cohoon, Gregory A.; Alvarez, Christine E.; Meyers, Keith; Deheyn, Dimitri D.; Hildebrand, Mark; Kieu, Khanh; Norwood, Robert A.
2015-03-01
Diatoms are a common type of phytoplankton characterized by their silica exoskeleton known as a frustule. The diatom frustule is composed of two valves and a series of connecting girdle bands. Each diatom species has a unique frustule shape and valves in particular species display an intricate pattern of pores resembling a photonic crystal structure. We used several numerical techniques to analyze the periodic and quasi-periodic valve pore-network structure in diatoms of the Coscinodiscophyceae order. We quantitatively identify defect locations and pore spacing in the valve and use this information to better understand the optical and biological properties of the diatom.
2004-06-01
remote databases, has seen little vendor acceptance. Each database ( Oracle , DB2, MySQL , etc.) has its own client- server protocol. Therefore each...existing standards – SQL , X.500/LDAP, FTP, etc. • View information dissemination as selective replication – State-oriented vs . message-oriented...allowing the 8 application to start. The resource management system would serve as a broker to the resources, making sure that resources are not
Final Report: Computer-aided Human Centric Cyber Situation Awareness
2016-03-20
logs, OS audit trails, vulnerability reports, and packet dumps ), weeding out the false positives, grouping the related indicators so that different...short time duration of each visual stimulus in an fMRI study, we have designed “network security analysis cards ” that require the subject to...determine whether alerts in the cards indicate malicious events. Two types of visual displays of alerts (i.e., tabular display and node-link display) are
Towards a Semiotic Information Position Framework for Network Centric Warfare
2011-06-01
study of anything which stands for something else [10]. Swiss linguist Ferdinand de Saussure and American logician and philosopher Charles Sanders Peirce...are considered as the founders of semiotics [10]. As a linguist, Saussure was interested in the relationships between words (or signs) and he argued...to Eco, Saussure “did not define the signified any too clearly, leaving it half way between a mental image, a concept and a psychological reality
Covariance and Uncertainty Realism in Space Surveillance and Tracking
2016-06-27
control infrastructure , there are also further complications in the implementation of centralized scheduling of some of the SSN sensors due to their...this data however. 5.8.3 Long-Term Long-term developments of JSpOC processing, net-centric interfaces and sensor backends will provide the...with particle filters for mobile sensor network control. In Proceedings of the 45th IEEE Conference on Decision and Control, pages 1019–1024, December
Integrated Air and Missile Defense (IAMD)
2015-12-01
equal to or greater than the effectiveness levels of fielded TBM and CM/ABT defense systems. Common Command and Control The Army IAMD SoS common C2...externally developed sensors and shooters to provide an effective IAMD capability. The IAMD program will allow transformation to a network-centric system of...systems capability, also referred to as "Plug and Fight", that integrates all Air and Missile Defense (AMD) sensors, weapons, and mission control
Network Centric Communications for Expeditionary or Carrier Strike Groups
2011-12-01
known as Modulating Retroreflector (MRR) mode. In this configuration, a source laser transmits a beam to an optical receiver which receives the...be adapted for use at sea and found that interference was a key issue. SPAWAR Systems Center Pacific has spent over a decade trying to address this...ad-hoc wireless technology non-proprietary and radio agnostic. One of the issues with wireless technologies used at sea is the issue of ― beam
Kai Hu, Ying; Abdelrehem, Ahmed; Yang, Chi; Cai, Xie Yi; Xie, Qian Yang; Sah, Manoj Kumar
2017-01-01
Disc repositioning is a common procedure for patients with anterior disc displacement (ADD). The purpose of this retrospective record-based study was to evaluate changes in the widths of joint spaces and condylar position changes in patients with unilateral ADD following arthroscopic disc repositioning, with the healthy sides as self-control, using magnetic resonance images (MRI).Widths of anterior, superior, and posterior joint spaces (AS, SS, and PS) were measured. The condylar position was described as anterior, centric or posterior, expressed as . Paired-t test and Chi-square test were used to analyze the data. Fifty-four records conformed to the inclusion criteria (mean age of 21.02 years). Widths of SS and PS increased significantly after surgery (P < 0.001) on the operative sides, while joint spaces of healthy sides and AS of operative sides had no significant changes. Dominant location of condyles of operative sides changed from a posterior position to an anterior position, while healthy sides were mostly centric condylar position no matter preoperatively or postoperatively. Therefore, the results of this study indicate that unilateral arthroscopic disc repositioning significantly increases the posterior and superior spaces of the affected joints, without affecting spaces of the healthy sides. PMID:28361905
Aligning vocabulary for interoperability of ISR assets using authoritative sources
NASA Astrophysics Data System (ADS)
Hookway, Steve; Patten, Terry; Gorman, Joe
2017-05-01
The growing arsenal of network-centric sensor platforms shows great potential to enhance situational awareness capabilities. Non-traditional sensors collect a diverse range of data that can provide a more accurate and comprehensive common operational picture when combined with conventional intelligence, surveillance, and reconnaissance (ISR) products. One of the integration challenges is mediating differences in terminology that different data providers use to describe the data they have extracted. A data consumer should be able to reference information using the vocabulary that they are familiar with and rely on the framework to handle the mediation; for example, it should be up to the framework to identify that two different terms are synonyms for the same concept. In this paper we present an approach for automatically performing this alignment using authoritative sources such as Wikipedia (a stand-in for the Intellipedia wiki), and present experimental results that demonstrate that this approach is able to align a large number of concepts between different terminologies.
Performance Analysis of a NASA Integrated Network Array
NASA Technical Reports Server (NTRS)
Nessel, James A.
2012-01-01
The Space Communications and Navigation (SCaN) Program is planning to integrate its individual networks into a unified network which will function as a single entity to provide services to user missions. This integrated network architecture is expected to provide SCaN customers with the capabilities to seamlessly use any of the available SCaN assets to support their missions to efficiently meet the collective needs of Agency missions. One potential optimal application of these assets, based on this envisioned architecture, is that of arraying across existing networks to significantly enhance data rates and/or link availabilities. As such, this document provides an analysis of the transmit and receive performance of a proposed SCaN inter-network antenna array. From the study, it is determined that a fully integrated internetwork array does not provide any significant advantage over an intra-network array, one in which the assets of an individual network are arrayed for enhanced performance. Therefore, it is the recommendation of this study that NASA proceed with an arraying concept, with a fundamental focus on a network-centric arraying.
Complex networks as a unified framework for descriptive analysis and predictive modeling in climate
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steinhaeuser, Karsten J K; Chawla, Nitesh; Ganguly, Auroop R
The analysis of climate data has relied heavily on hypothesis-driven statistical methods, while projections of future climate are based primarily on physics-based computational models. However, in recent years a wealth of new datasets has become available. Therefore, we take a more data-centric approach and propose a unified framework for studying climate, with an aim towards characterizing observed phenomena as well as discovering new knowledge in the climate domain. Specifically, we posit that complex networks are well-suited for both descriptive analysis and predictive modeling tasks. We show that the structural properties of climate networks have useful interpretation within the domain. Further,more » we extract clusters from these networks and demonstrate their predictive power as climate indices. Our experimental results establish that the network clusters are statistically significantly better predictors than clusters derived using a more traditional clustering approach. Using complex networks as data representation thus enables the unique opportunity for descriptive and predictive modeling to inform each other.« less
NASA Astrophysics Data System (ADS)
Serbu, Sabina; Rivière, Étienne; Felber, Pascal
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.
A Unified Data-Driven Approach for Programming In Situ Analysis and Visualization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aiken, Alex
The placement and movement of data is becoming the key limiting factor on both performance and energy efficiency of high performance computations. As systems generate more data, it is becoming increasingly difficult to actually move that data elsewhere for post-processing, as the rate of improvements in supporting I/O infrastructure is not keeping pace. Together, these trends are creating a shift in how we think about exascale computations, from a viewpoint that focuses on FLOPS to one that focuses on data and data-centric operations as fundamental to the reasoning about, and optimization of, scientific workflows on extreme-scale architectures. The overarching goalmore » of our effort was the study of a unified data-driven approach for programming applications and in situ analysis and visualization. Our work was to understand the interplay between data-centric programming model requirements at extreme-scale and the overall impact of those requirements on the design, capabilities, flexibility, and implementation details for both applications and the supporting in situ infrastructure. In this context, we made many improvements to the Legion programming system (one of the leading data-centric models today) and demonstrated in situ analyses on real application codes using these improvements.« less
How to operate a nuclear pore complex by Kap-centric control
Lim, Roderick Y H; Huang, Binlu; Kapinos, Larisa E
2015-01-01
Nuclear pore complexes (NPCs) mediate molecular transport between the nucleus and cytoplasm in eukaryotic cells. Tethered within each NPC lie numerous intrinsically disordered proteins known as FG nucleoporins (FG Nups) that are central to this process. Over two decades of investigation has converged on a view that a barrier mechanism consisting of FG Nups rejects non-specific macromolecules while promoting the speed and selectivity of karyopherin (Kaps) receptors (and their cargoes). Yet, the number of NPCs in the cell is exceedingly small compared to the number of Kaps, so that in fact there is a high likelihood the pores are always populated by Kaps. Here, we contemplate a view where Kaps actively participate in regulating the selectivity and speed of transport through NPCs. This so-called “Kap-centric” control of the NPC accounts for Kaps as essential barrier reinforcements that play a prerequisite role in facilitating fast transport kinetics. Importantly, Kap-centric control reconciles both mechanistic and kinetic requirements of the NPC, and in so doing potentially resolves incoherent aspects of FG-centric models. On this basis, we surmise that Kaps prime the NPC for nucleocytoplasmic transport by fine-tuning the NPC microenvironment according to the functional needs of the cell. PMID:26338152
2007-04-01
and/or time de-confliction to insure safe separation of component forces. For example, in the Vietnam era, Air Force units were employed in the Hanoi...systems and people to exploit it. For example, Accenture (Accenture.com), a $15 billion global management consulting and technology services company ...information managers (called knowledge managers) to functional specialties, such as oil, gas, insurance , and pharmaceuticals. Information managers collect
The Changing Nature of Geostrategy 19002000: The Evolution of a New Paradigm
2015-12-01
Geopolitics: Theory and History 1 The Era of Imperialistic Hegemony, 1890–1914 5 Geopolitical Thought in the United States, 1890–1945 13 German Geopolitics...Theoretical and Practical Aspects in American Military Thought 85 Third-Wave Theory : The Information Age 85 Influence of the Civil Sector 87 Wars in...the Third-Wave Age 88 From Theory to Practice: Network-Centric Warfare 89 Department of Defense Guidelines: 2006 QDR 99 Epilogue 103 Abbreviations
2016-09-01
information revolution in military affairs. A country can exploit the revolution by demonstrating proficiency in networked sensors, informationalized C2...eliminates a force’s ability to efficiently use information in the application of force. Removing any IRMA capability from an informationalized ...the way that wars are fought and won. Exploiting the revolution’s core principles enables a net-centric, informationalized force to outmaneuver and
2009-03-27
to learning and collaborative working • Developing more immersive learning where learning is promoted through experiencing the style of thinking of... Student Talk in Promoting Quality Learning in Science Classroom”, MS. Morrison, P., Barlow, M., Bethel, G. and Clothier, S. (2005), “Proficient Soldier...on student perceptions of learning effectiveness. 1 Computer self-efficacy: “The learner’s perception of their ability to carry out a series of
2014-06-01
information superiority in Network- centric warfare .34 A brief discussion of the implementation of battlespace awareness is given. The method 3 Figure 2...developing the model used for this study. Lanchester Equations,39 System Dynamics models,40–42 Discrete Event Simulation, and Agent-based models (ABMs) were...popularity in the military modeling community in recent years due to their ability to effectively capture complex interactions in warfare scenarios with many
The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors
2011-09-01
weighted probability 75th pctl weighted probability 13. Carman. K. G. and Kooreman, P, “ Flu Shots, Mammogram, and the Perception of Probabilities,” 2010...sharing capabilities until users can tes- tify to the benefi ts. This creates a chicken and egg situa- tion, because the consumers of information fi...Bibliography 563 Campen, Alan D. Look Closely at Network-Centric Warfare. Signal, January 2004. Carman, Katherine G., and Peter Kooreman, Peter. Flu Shots
NASA Astrophysics Data System (ADS)
Leuchter, S.; Reinert, F.; Müller, W.
2014-06-01
Procurement and design of system architectures capable of network centric operations demand for an assessment scheme in order to compare different alternative realizations. In this contribution an assessment method for system architectures targeted at the C4ISR domain is presented. The method addresses the integration capability of software systems from a complex and distributed software system perspective focusing communication, interfaces and software. The aim is to evaluate the capability to integrate a system or its functions within a system-of-systems network. This method uses approaches from software architecture quality assessment and applies them on the system architecture level. It features a specific goal tree of several dimensions that are relevant for enterprise integration. These dimensions have to be weighed against each other and totalized using methods from the normative decision theory in order to reflect the intention of the particular enterprise integration effort. The indicators and measurements for many of the considered quality features rely on a model based view on systems, networks, and the enterprise. That means it is applicable to System-of-System specifications based on enterprise architectural frameworks relying on defined meta-models or domain ontologies for defining views and viewpoints. In the defense context we use the NATO Architecture Framework (NAF) to ground respective system models. The proposed assessment method allows evaluating and comparing competing system designs regarding their future integration potential. It is a contribution to the system-of-systems engineering methodology.
ERIC Educational Resources Information Center
Downing, David L.
2009-01-01
This study describes and implements a necessary preliminary strategic planning procedure, the Internal Environmental Scanning (IES), and discusses its relevance to strategic planning and university-sponsored lifelong learning program model selection. Employing a qualitative research methodology, a proposed lifelong learning-centric IES process…
Koziol, Leonard F; Budding, Deborah Ely; Chidekel, Dana
2010-12-01
Current cortico-centric models of cognition lack a cohesive neuroanatomic framework that sufficiently considers overlapping levels of function, from "pathological" through "normal" to "gifted" or exceptional ability. While most cognitive theories presume an evolutionary context, few actively consider the process of adaptation, including concepts of neurodevelopment. Further, the frequent co-occurrence of "gifted" and "pathological" function is difficult to explain from a cortico-centric point of view. This comprehensive review paper proposes a framework that includes the brain's vertical organization and considers "giftedness" from an evolutionary and neurodevelopmental vantage point. We begin by discussing the current cortico-centric model of cognition and its relationship to intelligence. We then review an integrated, dual-tiered model of cognition that better explains the process of adaptation by simultaneously allowing for both stimulus-based processing and higher-order cognitive control. We consider the role of the basal ganglia within this model, particularly in relation to reward circuitry and instrumental learning. We review the important role of white matter tracts in relation to speed of adaptation and development of behavioral mastery. We examine the cerebellum's critical role in behavioral refinement and in cognitive and behavioral automation, particularly in relation to expertise and giftedness. We conclude this integrated model of brain function by considering the savant syndrome, which we believe is best understood within the context of a dual-tiered model of cognition that allows for automaticity in adaptation as well as higher-order executive control.
Davenport, Paul B; Carter, Kimberly F; Echternach, Jeffrey M; Tuck, Christopher R
2018-02-01
High-reliability organizations (HROs) demonstrate unique and consistent characteristics, including operational sensitivity and control, situational awareness, hyperacute use of technology and data, and actionable process transformation. System complexity and reliance on information-based processes challenge healthcare organizations to replicate HRO processes. This article describes a healthcare organization's 3-year journey to achieve key HRO features to deliver high-quality, patient-centric care via an operations center powered by the principles of high-reliability data and software to impact patient throughput and flow.
The Collins Center Update. Volume 3, Issue 4, July-September 2001
2001-09-01
Centric Oper a tions, Assured Access, Speed of Effects , and In for ma tion/Knowl edge Advan tage—in a Small-Scale Contin gency set in 2011. The game...design also incor po rated the U.S. Air Force concept for Effects -Based Oper a tions (EBO), JFCOM’s concept for Rapid Deci sive Oper a tions (RDO...the “ effects based” planning process, the game illu mi nated poten tially signif i cant insights re gard ing “limited” war, rules of engage ment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Okhravi, Hamed; Sheldon, Frederick T.; Haines, Joshua
Data diodes provide protection of critical cyber assets by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to understand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we study data diodes, their functionalities and limitations. We then propose two critical infrastructure systems that can benefit from the additional protection offered by data diodes: process control networks and net-centric cyber decision support systems. We review the security requirements of these systems, describe the architectures,more » and study the trade-offs. Finally, the architectures are evaluated against different attack patterns.« less
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
A computational framework for modeling targets as complex adaptive systems
NASA Astrophysics Data System (ADS)
Santos, Eugene; Santos, Eunice E.; Korah, John; Murugappan, Vairavan; Subramanian, Suresh
2017-05-01
Modeling large military targets is a challenge as they can be complex systems encompassing myriad combinations of human, technological, and social elements that interact, leading to complex behaviors. Moreover, such targets have multiple components and structures, extending across multiple spatial and temporal scales, and are in a state of change, either in response to events in the environment or changes within the system. Complex adaptive system (CAS) theory can help in capturing the dynamism, interactions, and more importantly various emergent behaviors, displayed by the targets. However, a key stumbling block is incorporating information from various intelligence, surveillance and reconnaissance (ISR) sources, while dealing with the inherent uncertainty, incompleteness and time criticality of real world information. To overcome these challenges, we present a probabilistic reasoning network based framework called complex adaptive Bayesian Knowledge Base (caBKB). caBKB is a rigorous, overarching and axiomatic framework that models two key processes, namely information aggregation and information composition. While information aggregation deals with the union, merger and concatenation of information and takes into account issues such as source reliability and information inconsistencies, information composition focuses on combining information components where such components may have well defined operations. Since caBKBs can explicitly model the relationships between information pieces at various scales, it provides unique capabilities such as the ability to de-aggregate and de-compose information for detailed analysis. Using a scenario from the Network Centric Operations (NCO) domain, we will describe how our framework can be used for modeling targets with a focus on methodologies for quantifying NCO performance metrics.
Quantifying the Relationships among Drug Classes
Hert, Jérôme; Keiser, Michael J.; Irwin, John J.; Oprea, Tudor I.; Shoichet, Brian K.
2009-01-01
The similarity of drug targets is typically measured using sequence or structural information. Here, we consider chemo-centric approaches that measure target similarity on the basis of their ligands, asking how chemoinformatics similarities differ from those derived bioinformatically, how stable the ligand networks are to changes in chemoinformatics metrics, and which network is the most reliable for prediction of pharmacology. We calculated the similarities between hundreds of drug targets and their ligands and mapped the relationship between them in a formal network. Bioinformatics networks were based on the BLAST similarity between sequences, while chemoinformatics networks were based on the ligand-set similarities calculated with either the Similarity Ensemble Approach (SEA) or a method derived from Bayesian statistics. By multiple criteria, bioinformatics and chemoinformatics networks differed substantially, and only occasionally did a high sequence similarity correspond to a high ligand-set similarity. In contrast, the chemoinformatics networks were stable to the method used to calculate the ligand-set similarities and to the chemical representation of the ligands. Also, the chemoinformatics networks were more natural and more organized, by network theory, than their bioinformatics counterparts: ligand-based networks were found to be small-world and broad-scale. PMID:18335977
Mobile Robotics Activities in DOE Laboratories
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ron Lujan; Jerry Harbour; John T. Feddema
This paper will briefly outline major activities in Department of Energy (DOE) Laboratories focused on mobile platforms, both Unmanned Ground Vehicles (UGV’s) as well as Unmanned Air Vehicles (UAV’s). The activities will be discussed in the context of the science and technology construct used by the DOE Technology Roadmap for Robotics and Intelligent Machines (RIM)1 published in 1998; namely, Perception, Reasoning, Action, and Integration. The activities to be discussed span from research and development to deployment in field operations. The activities support customers in other agencies. The discussion of "perception" will include hyperspectral sensors, complex patterns discrimination, multisensor fusion andmore » advances in LADAR technologies, including real-world perception. "Reasoning" activities to be covered include cooperative controls, distributed systems, ad-hoc networks, platform-centric intelligence, and adaptable communications. The paper will discuss "action" activities such as advanced mobility and various air and ground platforms. In the RIM construct, "integration" includes the Human-Machine Integration. Accordingly the paper will discuss adjustable autonomy and the collaboration of operator(s) with distributed UGV’s and UAV’s. Integration also refers to the applications of these technologies into systems to perform operations such as perimeter surveillance, large-area monitoring and reconnaissance. Unique facilities and test beds for advanced mobile systems will be described. Given that this paper is an overview, rather than delve into specific detail in these activities, other more exhaustive references and sources will be cited extensively.« less
NASA Astrophysics Data System (ADS)
Boyes, G. A.; Ellul, C.; Irwin, D.
2017-10-01
The use of 3D information models within collaborative working environments and the practice of Building Information Modelling (BIM) are becoming more commonplace within infrastructure projects. Currently used predominantly during the design and construction phase, the use of BIM is capable in theory of providing the information at handover that will satisfy the Asset Information Requirements (AIRs) of the future Infrastructure Manager (IM). One particular challenge is establishing a link between existing construction-centric information and the asset-centric information needed for future operations. Crossrail, a project to build a new high-frequency railway underneath London, is handling many such challenges as they prepare to handover their digital information to the future operator, in particular the need to provide a two-way link between a federated 3D CAD model and an object-relational Asset Information Management System (AIMS). This paper focusses on the potential for improved Asset Management (AM) by integrating BIM and GIS systems and practices, and makes a preliminary report on how 3D spatial queries can be used to establish a two-way relational link between two information systems (3D geometry and asset lists), as well as the challenges being overcome to transform the data to be suitable for AM.
The Battle Command Sustainment Support System: The Army’s Command and Control System for Logistics
2009-05-21
threaten the Austrian forward element near Ulm. 3 Later in the 19 th century, railroads played a key role in the U.S. Civil War. Gauge disparities on...and accuracy of those reports played an integral role in the decisions the commander chose to make. The Army began making a concerted effort to...40 Dave Cammons, John Tisserand, Duane Williams, Alan Seise and Dough Lindsay, ―Network Centric Warfare Case Study: U.S. V Corps
Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015
2005-05-26
Today, that cohesion of the coalition for the Global War on Terrorism (GWOT) is again what we need most in order to succeed. But even if the...prolonged war , this was to a great extend achieved by the ability to integrate large numbers of volunteers. Two hundred years and some Revolutions in...to the domain where we intend to win wars (information domain). Even though this does not mean the elimination of industrial type processes, it
2011-09-01
unique data requirements. For an excellent primer on the CBDN process see Keller and Plaga [2010]. This report shows an example of a database, in...data [Buhrman, Plaga , Cheng, Mosher, 2001]. 2.1.2.2 Web application development All technologies are based upon and run on top of the .NET...builds). Better manikin design leads to better assessment of personnel equipment under acceleration [such as helmet systems, see Plaga and Boehmer
Developing Effective Human Supervisory Control for Air and Missile Defense Systems
2006-02-01
human expertise, and (8) resist the temptation to place C2 emphasis on the “ gizmo ” (C2 technology) rather than on the person using the gizmo . A...followed by “surprise” and recriminations when these expectations are not met. 8. Resist placing C2 emphasis on the “ gizmo ” (the technology) rather than on...the person using the gizmo . Wallace (2005, p. 2) cautions that “the network-centric concept introduces a dangerous temptation to shift
2008-06-01
project is not an isolated OSSD project. Instead, the NetBeans IDE which is the focus of development activities in the NetBeans.org project community...facilitate or constrain the intended usage of the NetBeans IDE. Figure 1 provides a rendering of some of the more visible OSSD projects that...as BioBeans and RefactorIT communities build tools on top of or extending the NetBeans platform or IDE. How do these organizations interact with
Invocation oriented architecture for agile code and agile data
NASA Astrophysics Data System (ADS)
Verma, Dinesh; Chan, Kevin; Leung, Kin; Gkelias, Athanasios
2017-05-01
In order to address the unique requirements of sensor information fusion in a tactical coalition environment, we are proposing a new architecture - one based on the concept of invocations. An invocation is a combination of a software code and a piece of data, both managed using techniques from Information Centric networking. This paper will discuss limitations of current approaches, present the architecture for an invocation oriented architecture, illustrate how it works with an example scenario, and provide reasons for its suitability in a coalition environment.
2008-03-01
early warning AIM Air-intercept missile AJCN Adaptive, joint, C4ISR node AOR Area of responsibility ARM Anti-radiation missile ATARS Advanced...Tactical Airborne Reconnaissance System ( ATARS ) on F-16 and F/A-18 aircraft, and satellites. Manned platforms were adapted to multiple mission scenarios... Psychological Ops X Tern/Leaflet Dispensing, 2004 All Weather/ Night Strike X DASH/Vietnam, 1960s Predator/Afghanistan/Iraq, 2001 36
Space Fence Ground-Based Radar System Increment 1 (Space Fence Inc 1)
2015-12-01
Net - Centric Data Strategy and Net-Centric Services Strategy, and the principles and rules identified in the DoD IEA, excepting tactical and...Centric Data Strategy and Net- Centric Services Strategy, and the principles and rules identified in the DoD IEA, excepting tactical and non-IP...Strategy, and the principles and rules identified in the DoD IEA, excepting tactical and non-IP communi- cations. Compliant with TBD Space Fence must
Le, Jimmy T.; Viswanathan, Shilpa; Tarver, Michelle E.; Eydelman, Malvina; Li, Tianjing
2017-01-01
IMPORTANCE Minimally invasive glaucoma surgical (MIGS) devices are one option for lowering intraocular pressure in patients with glaucoma. OBJECTIVE To examine how often existing clinical studies of MIGS devices registered on ClinicalTrials.gov measure patient-centric outcomes that patients value directly. DESIGN, SETTING, AND PARTICIPANTS We searched ClinicalTrials.gov, a registry of publicly and privately supported clinical studies, on February 20, 2015, for records of MIGS device studies involving patients with glaucoma. Two investigators independently abstracted study design and outcome details from eligible records. We classified outcomes as patient-centric or not patient-centric using a prespecified definition. MAIN OUTCOMES AND MEASURES Proportion of patient-centric and nonpatient-centric outcomes registered on ClinicalTrials.gov. RESULTS We identified 51 eligible studies specifying 127 outcomes. Reduction in intraocular pressure was the most frequent outcome specified (78/127; 61%) and a primary outcome in 41 studies. Patient-centric outcomes—such as adverse events (n = 19; 15%), topical medication use (n = 16; 13%), visual acuity (n = 4; 3%), and health-related quality of life (n = 1; 1%)—were less frequently specified (n = 40; 32%) and a primary outcome in only 12 studies. CONCLUSION AND RELEVANCE Patient-centric outcomes that provide insight into the relative desirability and acceptability of the benefits and risks of MIGS devices are not well represented in current clinical studies. PMID:27389667
GoFFish: A Sub-Graph Centric Framework for Large-Scale Graph Analytics1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simmhan, Yogesh; Kumbhare, Alok; Wickramaarachchi, Charith
2014-08-25
Large scale graph processing is a major research area for Big Data exploration. Vertex centric programming models like Pregel are gaining traction due to their simple abstraction that allows for scalable execution on distributed systems naturally. However, there are limitations to this approach which cause vertex centric algorithms to under-perform due to poor compute to communication overhead ratio and slow convergence of iterative superstep. In this paper we introduce GoFFish a scalable sub-graph centric framework co-designed with a distributed persistent graph storage for large scale graph analytics on commodity clusters. We introduce a sub-graph centric programming abstraction that combines themore » scalability of a vertex centric approach with the flexibility of shared memory sub-graph computation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation.« less
Tse, Amanda; Verkhivker, Gennady M.
2016-01-01
The recent studies have revealed that most BRAF inhibitors can paradoxically induce kinase activation by promoting dimerization and enzyme transactivation. Despite rapidly growing number of structural and functional studies about the BRAF dimer complexes, the molecular basis of paradoxical activation phenomenon is poorly understood and remains largely hypothetical. In this work, we have explored the relationships between inhibitor binding, protein dynamics and allosteric signaling in the BRAF dimers using a network-centric approach. Using this theoretical framework, we have combined molecular dynamics simulations with coevolutionary analysis and modeling of the residue interaction networks to determine molecular determinants of paradoxical activation. We have investigated functional effects produced by paradox inducer inhibitors PLX4720, Dabrafenib, Vemurafenib and a paradox breaker inhibitor PLX7904. Functional dynamics and binding free energy analyses of the BRAF dimer complexes have suggested that negative cooperativity effect and dimer-promoting potential of the inhibitors could be important drivers of paradoxical activation. We have introduced a protein structure network model in which coevolutionary residue dependencies and dynamic maps of residue correlations are integrated in the construction and analysis of the residue interaction networks. The results have shown that coevolutionary residues in the BRAF structures could assemble into independent structural modules and form a global interaction network that may promote dimerization. We have also found that BRAF inhibitors could modulate centrality and communication propensities of global mediating centers in the residue interaction networks. By simulating allosteric communication pathways in the BRAF structures, we have determined that paradox inducer and breaker inhibitors may activate specific signaling routes that correlate with the extent of paradoxical activation. While paradox inducer inhibitors may facilitate a rapid and efficient communication via an optimal single pathway, the paradox breaker may induce a broader ensemble of suboptimal and less efficient communication routes. The central finding of our study is that paradox breaker PLX7904 could mimic structural, dynamic and network features of the inactive BRAF-WT monomer that may be required for evading paradoxical activation. The results of this study rationalize the existing structure-functional experiments by offering a network-centric rationale of the paradoxical activation phenomenon. We argue that BRAF inhibitors that amplify dynamic features of the inactive BRAF-WT monomer and intervene with the allosteric interaction networks may serve as effective paradox breakers in cellular environment. PMID:27861609
Differentiated optical services: a quality of optical service model for WDM networks
NASA Astrophysics Data System (ADS)
Ndousse, Thomas D.; Golmie, Nada
1999-08-01
This paper addresses the issues of guaranteed and scalable end-to-end QoS in Metropolitan DWDM networks serving as transit networks for IP access networks. DWDM offering few wavelengths have in the past been deployed in backbone networks to upgrade point-to-point transmission where sharing is based on coarse granularity. This type of DWDM backbone networks, offering few lightpaths, provides no support for QoS services traversing the network. As DWDM networks with larger numbers of wavelengths penetrate the data-centric Metro environment, specific IP service requirements such as priority restoration, scalability, dynamic provisioning of capacity and routes, and support for coarse-grain QoS capabilities will have to be addressed in the optical domain in order to support end-to-end Service- Level Agreements. In this paper, we focus on the support of QoS in the optical domain in order to achieve end-to-end QoS over a DWDM network. We propose a QoS service model in the optical domain called Differentiated Optical Services (DOS). Service classification in DOS is based on a set of optical parameters that captures the quality and reliability of the optical lightpath.
Rice, Eric
2010-01-01
To examine the impact of condom-using peers in the social networks of homeless young people, differences in behaviors were assessed based on the social location of ties (home-based vs. street-based) and how those ties are maintained (face-to-face vs. via social networking technology). "Ego-centric" social network data were collected from 103 currently sexually active homeless young people aged 16-26 years in Los Angeles, California. Associations between condom use and the condom-using behaviors of social network influences were assessed using standard logistic regression. About 52% of respondents had a street-based peer who was a condom user. Having such a peer was associated with a 70% reduction in the odds of having unprotected sex at last intercourse. About 22% of respondents had a condom-using, home-based peer with whom they communicated only via social networking technology. Having such a peer was associated with a 90% reduction in risky sexual behavior and a 3.5 times increase in safer sex behavior. The study revealed several implications for new human immunodeficiency virus-prevention interventions that mobilize these networks and social networking technologies.
Performer-centric Interface Design.
ERIC Educational Resources Information Center
McGraw, Karen L.
1995-01-01
Describes performer-centric interface design and explains a model-based approach for conducting performer-centric analysis and design. Highlights include design methodology, including cognitive task analysis; creating task scenarios; creating the presentation model; creating storyboards; proof of concept screens; object models and icons;…
NASA Astrophysics Data System (ADS)
Reuter, Markus; van Schaik, Antoinette
In this paper the link between process metallurgy, classical minerals processing, product centric recycling and urban/landfill mining is discussed. The depth that has to be achieved in urban mining and recycling must glean from the wealth of theoretical knowledge and insight that have been developed in the past in minerals and metallurgical processing. This background learns that recycling demands a product centric approach, which considers simultaneously the multi-material interactions in man-made complex `minerals'. Fast innovation in recycling and urban mining can be achieved by further evolving from this well developed basis, evolving the techniques and tools that have been developed over the years. This basis has already been used for many years to design, operate and control industrial plants for metal production. This has been the basis for Design for Recycling rules for End-of-Life products. Using, among others, the UNEP Metal Recycling report as a basis (authors are respectively Lead and Main authors of report), it is demonstrated that a common theoretical basis as developed in metallurgy and minerals processing can help much to level the playing field between primary processing, secondary processing, recycling, and urban/landfill mining and product design hence enhancing resource efficiency. Thus various scales of detail link product design with metallurgical process design and its fundamentals.
French, Ilisha M; Hamilton, Lisa Dawn
2018-01-02
Pornography availability has increased in recent years, and while there is plenty of speculation about its effects, empirical investigation about how porn influences our lives has yielded mixed results. Additionally, few studies have addressed the effects of specific pornography characteristics. Past research has shown that male-centric pornography can be related to negative outcomes, while female-centric pornography is related to more positive outcomes, particularly in women. The present survey study examined the relationship between pornography characteristics (male- and female-centric) and the self-reported attitudes and sexual experiences of men and women. Participants in the full sample were 195 men and 310 women who completed an online questionnaire. Although effect sizes were small, women who reported viewing pornography with more female-centric features also reported more positive effects of pornography on sex life and perceptions of the other gender. While men were more likely than women to report negative effects relating to pornography use on these same measures, there were very few reported negative effects of pornography overall. These findings demonstrate a small association between the use of female-centric pornography and more positive outcomes, particularly for women.
Of What Benefit and to Whom? Linking Australian Humanities Research with Its "End Users"
ERIC Educational Resources Information Center
Pitman, Tim; Berman, Judith E.
2009-01-01
There is increasing pressure for university researchers to secure "end-user" support for their research projects. Yet the ways in which this imperative affects humanities researchers, operating in a science-centric funding environment, have not yet been fully explored. This paper presents the findings of an empirical study into the…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-05
... Administering a Title IV-E Program AGENCY: Children's Bureau, ACYF, ACF, HHS. ACTION: Notice of Tribal Consultation. SUMMARY: Title IV-E rules provide Federal Financial Participation (FFP) through a beneficial cost...-centric rules have on their ability to build and operate information systems that will support their title...
NASA Astrophysics Data System (ADS)
Moralis-Pegios, M.; Terzenidis, N.; Vagionas, C.; Pitris, S.; Chatzianagnostou, E.; Brimont, A.; Zanzi, A.; Sanchis, P.; Marti, J.; Kraft, J.; Rochracher, K.; Dorrestein, S.; Bogdan, M.; Tekin, T.; Syrivelis, D.; Tassiulas, L.; Miliou, A.; Pleros, N.; Vyrsokinos, K.
2017-02-01
Programmable switching nodes supporting Software-Defined Networking (SDN) over optical interconnecting technologies arise as a key enabling technology for future disaggregated Data Center (DC) environments. The SDNenabling roadmap of intra-DC optical solutions is already a reality for rack-to-rack interconnects, with recent research reporting on interesting applications of programmable silicon photonic switching fabrics addressing board-to-board and even on-board applications. In this perspective, simplified information addressing schemes like Bloom filter (BF)-based labels emerge as a highly promising solution for ensuring rapid switch reconfiguration, following quickly the changes enforced in network size, network topology or even in content location. The benefits of BF-based forwarding have been so far successfully demonstrated in the Information-Centric Network (ICN) paradigm, while theoretical studies have also revealed the energy consumption and speed advantages when applied in DCs. In this paper we present for the first time a programmable 4x4 Silicon Photonic switch that supports SDN through the use of BF-labeled router ports. Our scheme significantly simplifies packet forwarding as it negates the need for large forwarding tables, allowing for its remote control through modifications in the assigned BF labels. We demonstrate 1x4 switch operation controlling the Si-Pho switch by a Stratix V FPGA module, which is responsible for processing the packet ID and correlating its destination with the appropriate BF-labeled outgoing port. DAC- and amplifier-less control of the carrier-injection Si-Pho switches is demonstrated, revealing successful switching of 10Gb/s data packets with BF-based forwarding information changes taking place at a time-scale that equals the duration of four consecutive packets.
A Skyline Plugin for Pathway-Centric Data Browsing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degan, Michael G.; Ryadinskiy, Lillian; Fujimoto, Grant M.
For targeted proteomics to be broadly adopted in biological laboratories as a routine experimental protocol, wet-bench biologists must be able to approach SRM assay design in the same way they approach biological experimental design. Most often, biological hypotheses are envisioned in a set of protein interactions, networks and pathways. We present a plugin for the popular Skyline tool that presents public mass spectrometry data in a pathway-centric view to assist users in browsing available data and determining how to design quantitative experiments. Selected proteins and their underlying mass spectra are imported to Skyline for further assay design (transition selection). Themore » same plugin can be used for hypothesis-drive DIA data analysis, again utilizing the pathway view to help narrow down the set of proteins which will be investigated. The plugin is backed by the PNNL Biodiversity Library, a corpus of 3 million peptides from >100 organisms, and the draft human proteome. Users can upload personal data to the plugin to use the pathway navigation prior to importing their own data into Skyline.« less
A Skyline Plugin for Pathway-Centric Data Browsing
NASA Astrophysics Data System (ADS)
Degan, Michael G.; Ryadinskiy, Lillian; Fujimoto, Grant M.; Wilkins, Christopher S.; Lichti, Cheryl F.; Payne, Samuel H.
2016-11-01
For targeted proteomics to be broadly adopted in biological laboratories as a routine experimental protocol, wet-bench biologists must be able to approach selected reaction monitoring (SRM) and parallel reaction monitoring (PRM) assay design in the same way they approach biological experimental design. Most often, biological hypotheses are envisioned in a set of protein interactions, networks, and pathways. We present a plugin for the popular Skyline tool that presents public mass spectrometry data in a pathway-centric view to assist users in browsing available data and determining how to design quantitative experiments. Selected proteins and their underlying mass spectra are imported to Skyline for further assay design (transition selection). The same plugin can be used for hypothesis-driven data-independent acquisition (DIA) data analysis, again utilizing the pathway view to help narrow down the set of proteins that will be investigated. The plugin is backed by the Pacific Northwest National Laboratory (PNNL) Biodiversity Library, a corpus of 3 million peptides from >100 organisms, and the draft human proteome. Users can upload personal data to the plugin to use the pathway navigation prior to importing their own data into Skyline.
Distributed Efficient Similarity Search Mechanism in Wireless Sensor Networks
Ahmed, Khandakar; Gregory, Mark A.
2015-01-01
The Wireless Sensor Network similarity search problem has received considerable research attention due to sensor hardware imprecision and environmental parameter variations. Most of the state-of-the-art distributed data centric storage (DCS) schemes lack optimization for similarity queries of events. In this paper, a DCS scheme with metric based similarity searching (DCSMSS) is proposed. DCSMSS takes motivation from vector distance index, called iDistance, in order to transform the issue of similarity searching into the problem of an interval search in one dimension. In addition, a sector based distance routing algorithm is used to efficiently route messages. Extensive simulation results reveal that DCSMSS is highly efficient and significantly outperforms previous approaches in processing similarity search queries. PMID:25751081
Research on public logistics centers of Zhenzhou city based on GIS
NASA Astrophysics Data System (ADS)
Zeng, Yuhuai; Chen, Shuisen; Tian, Zhihui; Miao, Quansheng
2008-10-01
The regional public logistics center (PLC) is the intermedium that transports goods or commodity from producer to wholesaler, retailer and end consumer through whole supply chains. According to the Central Place Theory, the PLC should be multi-centric and of more kinds of graded degrees. From the road network planning discipline, an unique index---Importance Degree, is presented to measure the capacity of a PLC. The Importance Degree selects three township criteria: total population, gross industry product and budget income as weights to calculate the weighted vectors by principle component analysis method. Finally, through the clustering analysis, we can get the graded degrees of PLCs. It proves that that this research method is very effective for the road network planning of Zhengzhou City.
Distributed nuclear medicine applications using World Wide Web and Java technology.
Knoll, P; Höll, K; Mirzaei, S; Koriska, K; Köhn, H
2000-01-01
At present, medical applications applying World Wide Web (WWW) technology are mainly used to view static images and to retrieve some information. The Java platform is a relative new way of computing, especially designed for network computing and distributed applications which enables interactive connection between user and information via the WWW. The Java 2 Software Development Kit (SDK) including Java2D API, Java Remote Method Invocation (RMI) technology, Object Serialization and the Java Advanced Imaging (JAI) extension was used to achieve a robust, platform independent and network centric solution. Medical image processing software based on this technology is presented and adequate performance capability of Java is demonstrated by an iterative reconstruction algorithm for single photon emission computerized tomography (SPECT).
Zheng, Chang; Li, Xuelian; Qian, Biyun; Feng, Nannan; Gao, Sumeng; Zhao, Yuxia; Zhou, Baosen
2018-01-01
The leading cause of death for cancer is lung cancer, of which the majority subtype is non-small cell lung cancer (NSCLC). Recent studies have shown long non-coding RNAs are transcribed and contribute to cancer. Previous study has shown that a few single nucleotide polymorphisms (SNPs) in myocardial infarction associated transcript (MIAT) were associated with some diseases or function as competing endogenous RNA (ceRNA) in some cancer. We performed bioinformatic methods for analyzing RNA-seq and miRNA-seq data of NSCLC from The Cancer Genome Atlas database. 1352 NSCLC patients and 1320 cancer-free controls for genotyping, and dual luciferase reporter assay, real-time PCR are performed in A549 and H1975 lung cancer cell lines. Results are analyzed by SPSS v16.0. In the present study, we focus on the role of over-expression MIAT in NSCLC. We confirmed that rs1061451 T>C (allele odds ratio = 0.22; P < 0.01) was associated with NSCLC. Furthermore, we constructed MIAT-centric ceRNA network, and three mRNAs ( MYO1B , SGK1 and WNT9A ) was identified as targets by MIAT via miR-133a-5p. C-containing genotypes of MIAT rs1061451 were protective factor of NSCLC, and MIAT, which may act as ceRNA via miR-133a-5p, modulated MYO1B , SGK1 and WNT9A expression level.
Zheng, Chang; Li, Xuelian; Qian, Biyun; Feng, Nannan; Gao, Sumeng; Zhao, Yuxia; Zhou, Baosen
2018-01-01
Background The leading cause of death for cancer is lung cancer, of which the majority subtype is non-small cell lung cancer (NSCLC). Recent studies have shown long non-coding RNAs are transcribed and contribute to cancer. Previous study has shown that a few single nucleotide polymorphisms (SNPs) in myocardial infarction associated transcript (MIAT) were associated with some diseases or function as competing endogenous RNA (ceRNA) in some cancer. Patients and methods We performed bioinformatic methods for analyzing RNA-seq and miRNA-seq data of NSCLC from The Cancer Genome Atlas database. 1352 NSCLC patients and 1320 cancer-free controls for genotyping, and dual luciferase reporter assay, real-time PCR are performed in A549 and H1975 lung cancer cell lines. Results are analyzed by SPSS v16.0. Results In the present study, we focus on the role of over-expression MIAT in NSCLC. We confirmed that rs1061451 T>C (allele odds ratio = 0.22; P < 0.01) was associated with NSCLC. Furthermore, we constructed MIAT-centric ceRNA network, and three mRNAs (MYO1B, SGK1 and WNT9A) was identified as targets by MIAT via miR-133a-5p. Conclusion C-containing genotypes of MIAT rs1061451 were protective factor of NSCLC, and MIAT, which may act as ceRNA via miR-133a-5p, modulated MYO1B, SGK1 and WNT9A expression level. PMID:29795987
Cytogenetic analyses of four solid tumours in dogs.
Mayr, B; Reifinger, M; Weissenböck, H; Schleger, W; Eisenmenger, E
1994-07-01
Four solid tumours (one haemangiopericytoma, one haemangioendothelioma, one spindle-cell sarcoma and one mammary carcinoma) in dogs were analysed cytogenetically. In the haemangiopericytoma, an additional small chromosomal segment was present. Very complex changes including centric fusions and symmetric meta-centrics 1, 6, 10 and 12 were conspicuous in the highly unbalanced karyotype of the haemangioendothelioma. Complex changes, particularly many centric fusions and a tandem translocation 4/14, were features of the spindle-cell sarcoma. One centric fusion and a symmetric metacentric 13 were present in the mammary carcinoma.
A Cross-Layer User Centric Vertical Handover Decision Approach Based on MIH Local Triggers
NASA Astrophysics Data System (ADS)
Rehan, Maaz; Yousaf, Muhammad; Qayyum, Amir; Malik, Shahzad
Vertical handover decision algorithm that is based on user preferences and coupled with Media Independent Handover (MIH) local triggers have not been explored much in the literature. We have developed a comprehensive cross-layer solution, called Vertical Handover Decision (VHOD) approach, which consists of three parts viz. mechanism for collecting and storing user preferences, Vertical Handover Decision (VHOD) algorithm and the MIH Function (MIHF). MIHF triggers the VHOD algorithm which operates on user preferences to issue handover commands to mobility management protocol. VHOD algorithm is an MIH User and therefore needs to subscribe events and configure thresholds for receiving triggers from MIHF. In this regard, we have performed experiments in WLAN to suggest thresholds for Link Going Down trigger. We have also critically evaluated the handover decision process, proposed Just-in-time interface activation technique, compared our proposed approach with prominent user centric approaches and analyzed our approach from different aspects.
Reliable Adaptive Video Streaming Driven by Perceptual Semantics for Situational Awareness
Pimentel-Niño, M. A.; Saxena, Paresh; Vazquez-Castro, M. A.
2015-01-01
A novel cross-layer optimized video adaptation driven by perceptual semantics is presented. The design target is streamed live video to enhance situational awareness in challenging communications conditions. Conventional solutions for recreational applications are inadequate and novel quality of experience (QoE) framework is proposed which allows fully controlled adaptation and enables perceptual semantic feedback. The framework relies on temporal/spatial abstraction for video applications serving beyond recreational purposes. An underlying cross-layer optimization technique takes into account feedback on network congestion (time) and erasures (space) to best distribute available (scarce) bandwidth. Systematic random linear network coding (SRNC) adds reliability while preserving perceptual semantics. Objective metrics of the perceptual features in QoE show homogeneous high performance when using the proposed scheme. Finally, the proposed scheme is in line with content-aware trends, by complying with information-centric-networking philosophy and architecture. PMID:26247057
NASA Technical Reports Server (NTRS)
Torres-Pomales, Wilfredo
2014-01-01
A system is safety-critical if its failure can endanger human life or cause significant damage to property or the environment. State-of-the-art computer systems on commercial aircraft are highly complex, software-intensive, functionally integrated, and network-centric systems of systems. Ensuring that such systems are safe and comply with existing safety regulations is costly and time-consuming as the level of rigor in the development process, especially the validation and verification activities, is determined by considerations of system complexity and safety criticality. A significant degree of care and deep insight into the operational principles of these systems is required to ensure adequate coverage of all design implications relevant to system safety. Model-based development methodologies, methods, tools, and techniques facilitate collaboration and enable the use of common design artifacts among groups dealing with different aspects of the development of a system. This paper examines the application of model-based development to complex and safety-critical aircraft computer systems. Benefits and detriments are identified and an overall assessment of the approach is given.
Many-core graph analytics using accelerated sparse linear algebra routines
NASA Astrophysics Data System (ADS)
Kozacik, Stephen; Paolini, Aaron L.; Fox, Paul; Kelmelis, Eric
2016-05-01
Graph analytics is a key component in identifying emerging trends and threats in many real-world applications. Largescale graph analytics frameworks provide a convenient and highly-scalable platform for developing algorithms to analyze large datasets. Although conceptually scalable, these techniques exhibit poor performance on modern computational hardware. Another model of graph computation has emerged that promises improved performance and scalability by using abstract linear algebra operations as the basis for graph analysis as laid out by the GraphBLAS standard. By using sparse linear algebra as the basis, existing highly efficient algorithms can be adapted to perform computations on the graph. This approach, however, is often less intuitive to graph analytics experts, who are accustomed to vertex-centric APIs such as Giraph, GraphX, and Tinkerpop. We are developing an implementation of the high-level operations supported by these APIs in terms of linear algebra operations. This implementation is be backed by many-core implementations of the fundamental GraphBLAS operations required, and offers the advantages of both the intuitive programming model of a vertex-centric API and the performance of a sparse linear algebra implementation. This technology can reduce the number of nodes required, as well as the run-time for a graph analysis problem, enabling customers to perform more complex analysis with less hardware at lower cost. All of this can be accomplished without the requirement for the customer to make any changes to their analytics code, thanks to the compatibility with existing graph APIs.
2009-09-01
Peruvian Navy Peru X X X X VADM Andrzej Karweta Commander-in-Chief, Polish Navy Poland X X ADM Fernando Jose Ribeiro de Melo Gomes...Chief of Naval Staff, Portuguese Navy Portugal X X X X X VADM J. Mudimu Chief, South African Navy South Africa X X X X X ADM Manuel Rebollo
2013-12-01
Economy Trials, Vertical Takeoff Unmanned Aerial Vehicle Dynamic Interface Testing, Advanced Stabilized Glide Scope Indicators Testing, Surface Warfare...to include 1) DISR mandated GIG IT standards and profiles identified in the TV-1, 2) DISR The system must fully support execution of all...requirements for Net- Centric military operations to include 1) DISR mandated GIG IT standards and profiles identified in the TV-1, 2
20th Annual Systems Engineering Conference. Volume 1, Monday-Tuesday
2017-10-26
Environment will follow Mr. Thompson’s presentation with a presentation focusing on how ESOH Risk Management is an integral part of the RIO Management...office successes and failures in implementing the DoDI 5000.02 acquisition ESOH policy. HUMAN SYSTEMS INTEGRATION (HSI) Track Chair: Matthew...practices, process improvements, applications and approaches to program integration . INTEROPERABILITY/NET - CENTRIC OPERATIONS Track Chairs
Anthro-Centric Multisensory Interfaces for Sensory Augmentation of Telesurgery
2011-06-01
compares favorably to standing astride an operating table using laparoscopic instruments, the most favorable ergonomics would facilitate free movement...either through direct contact with the tissues or indirect contact via rigid laparoscopic instruments), opportunities now exist to utilize other...tele-surgical methods. Laparoscopic instruments were initially developed as extended versions of their counterparts used in open procedures (e.g
Control range: a controllability-based index for node significance in directed networks
NASA Astrophysics Data System (ADS)
Wang, Bingbo; Gao, Lin; Gao, Yong
2012-04-01
While a large number of methods for module detection have been developed for undirected networks, it is difficult to adapt them to handle directed networks due to the lack of consensus criteria for measuring the node significance in a directed network. In this paper, we propose a novel structural index, the control range, motivated by recent studies on the structural controllability of large-scale directed networks. The control range of a node quantifies the size of the subnetwork that the node can effectively control. A related index, called the control range similarity, is also introduced to measure the structural similarity between two nodes. When applying the index of control range to several real-world and synthetic directed networks, it is observed that the control range of the nodes is mainly influenced by the network's degree distribution and that nodes with a low degree may have a high control range. We use the index of control range similarity to detect and analyze functional modules in glossary networks and the enzyme-centric network of homo sapiens. Our results, as compared with other approaches to module detection such as modularity optimization algorithm, dynamic algorithm and clique percolation method, indicate that the proposed indices are effective and practical in depicting structural and modular characteristics of sparse directed networks.
Experiences with lab-centric instruction
NASA Astrophysics Data System (ADS)
Titterton, Nathaniel; Lewis, Colleen M.; Clancy, Michael J.
2010-06-01
Lab-centric instruction emphasizes supervised, hands-on activities by substituting lab for lecture time. It combines a multitude of pedagogical techniques into the format of an extended, structured closed lab. We discuss the range of benefits for students, including increased staff interaction, frequent and varied self-assessments, integrated collaborative activities, and a systematic sequence of activities that gradually increases in difficulty. Instructors also benefit from a deeper window into student progress and understanding. We follow with discussion of our experiences in courses at U.C. Berkeley, and using data from some of these investigate the effects of lab-centric instruction on student learning, procrastination, and course pacing. We observe that the lab-centric format helped students on exams but hurt them on extended programming assignments, counter to our hypothesis. Additionally, we see no difference in self-ratings of procrastination and limited differences in ratings of course pace. We do find evidence that the students who choose to attend lab-centric courses are different in several important ways from students who choose to attend the same course in a non-lab-centric format.
Distribution-centric 3-parameter thermodynamic models of partition gas chromatography.
Blumberg, Leonid M
2017-03-31
If both parameters (the entropy, ΔS, and the enthalpy, ΔH) of the classic van't Hoff model of dependence of distribution coefficients (K) of analytes on temperature (T) are treated as the temperature-independent constants then the accuracy of the model is known to be insufficient for the needed accuracy of retention time prediction. A more accurate 3-parameter Clarke-Glew model offers a way to treat ΔS and ΔH as functions, ΔS(T) and ΔH(T), of T. A known T-centric construction of these functions is based on relating them to the reference values (ΔS ref and ΔH ref ) corresponding to a predetermined reference temperature (T ref ). Choosing a single T ref for all analytes in a complex sample or in a large database might lead to practically irrelevant values of ΔS ref and ΔH ref for those analytes that have too small or too large retention factors at T ref . Breaking all analytes in several subsets each with its own T ref leads to discontinuities in the analyte parameters. These problems are avoided in the K-centric modeling where ΔS(T) and ΔS(T) and other analyte parameters are described in relation to their values corresponding to a predetermined reference distribution coefficient (K Ref ) - the same for all analytes. In this report, the mathematics of the K-centric modeling are described and the properties of several types of K-centric parameters are discussed. It has been shown that the earlier introduced characteristic parameters of the analyte-column interaction (the characteristic temperature, T char , and the characteristic thermal constant, θ char ) are a special chromatographically convenient case of the K-centric parameters. Transformations of T-centric parameters into K-centric ones and vice-versa as well as the transformations of one set of K-centric parameters into another set and vice-versa are described. Copyright © 2017 Elsevier B.V. All rights reserved.
Nindl, Bradley C
2015-11-01
The physiological differences, particularly of upper-body strength and power, between women and men, and the rigors of combat-centric occupational demands would seem to place women at a significant disadvantage, as the U.S. military opens up previously closed combat-arms military occupational specialties (MOSs) to women. This inherent disadvantage can be significantly mitigated by implementing effective and comprehensive physical training (PT) regimens for women targeting those fitness components most critical for those tasks considered most essential for solider warfighting duties (i.e., strength and power). Regrettably, the military historical and legacy overemphasis on aerobic fitness and on "field expediency" as the major criteria for implementing training have limited the extent to which the military has fully operationalized state-of-the-science PT policies. This continued legacy approach could be problematic regarding fully enhancing women's abilities to perform physically demanding combat-centric occupations and could place the successful integration of women into ground combat MOSs at significant risk. Seminal studies from the literature indicate that (a) a minimum of 6 months of periodized combined resistance/endurance training preparedness is recommended for untrained women considering entering combat-arms MOS training; (b) any comprehensive PT program should incorporate and emphasize progressive load carriage training; (c) a greater emphasis on upper body on strength/power development in military women is needed; (d) heavy resistance training in the range of 3-8 repetition maximum sets should be incorporated into training programs to target type II motor units and muscle fibers (those fibers that produce the most force and have the greatest capacity to hypertrophy); (e) low-volume, high-intensity interval training should be considered as a time-efficient training method to improve aerobic fitness while protecting against lower-body musculoskeletal injuries; (f) flexible nonlinear periodized programs should be considered to best accommodate the unpredictability and operational functional needs of the military training environment; and (g) serious consideration should be given to revamping the manner in which the military conducts physical readiness training, with a departure from "field expediency" as the major criteria for determining PT policies. With an increased emphasis on the human dimension of soldiering and concerted strategic, operational, and tactical efforts to maximize individual physical readiness and performance, the science of training physiology exists to leverage and better physically prepare women as they enter more combat-centric occupations.
Weapon system simulation in flight (WaSiF)
NASA Astrophysics Data System (ADS)
Bartoldus, Klaus H.
2005-05-01
The research and technology demonstration program was co-funded by the Ministries of Defence of five European countries under the framework of the "EUropean Cooperation for the Long term in Defence" (EUCLID) MoU to include Germany, Italy, The Netherlands, Portugal and Turkey with considerable financial contribution from the industrial entities. EADS Military Aircraft Munich has led a team of seven industries and research centers, including Aermacchi of Italy, DutchSpace and NLR of The Netherlands, OGMA and INETI of Portugal and Marmara Research Center of Turkey. The purpose of the project was the design, realization and demonstration of an embedded real time simulation system allowing the combat training of operational aircrew in a virtual air defence scenario and threat environment against computer generated forces in the air and on the ground while flying on a real aircraft. The simulated scenario is focused on air-to-air beyond visual range engagements of fighter aircraft. WaSiF represents one of the first demonstrations of an advanced embedded real time training system onboard a fighter/training aircraft. The system is integrated onboard the MB339CX aircraft. The overall flight test activity covered a wide variety of test conditions for a total of 21 test flights; the operational airborne time of the WaSiF amounted to nearly 18 hours. The demonstration and evaluation were quite positive; the five-nation aircrew was very fond of their first encounter with the virtual world in the military flight training. A common view and approach towards Network Centric Warfare is but emerging. WaSiF in a future networked configuration holds lots of promise to serve the needs of Integrated Air Defence: Common training in a virtual environment.
Ziels, Ryan M; Sousa, Diana Z; Stensel, H David; Beck, David A C
2018-01-01
Fats, oils and greases (FOG) are energy-dense wastes that can be added to anaerobic digesters to substantially increase biomethane recovery via their conversion through long-chain fatty acids (LCFAs). However, a better understanding of the ecophysiology of syntrophic LCFA-degrading microbial communities in anaerobic digesters is needed to develop operating strategies that mitigate inhibitory LCFA accumulation from FOG. In this research, DNA stable isotope probing (SIP) was coupled with metagenomic sequencing for a genome-centric comparison of oleate (C18:1)-degrading populations in two anaerobic codigesters operated with either a pulse feeding or continuous-feeding strategy. The pulse-fed codigester microcosms converted oleate into methane at over 20% higher rates than the continuous-fed codigester microcosms. Differential coverage binning was demonstrated for the first time to recover population genome bins (GBs) from DNA-SIP metagenomes. About 70% of the 13C-enriched GBs were taxonomically assigned to the Syntrophomonas genus, thus substantiating the importance of Syntrophomonas species to LCFA degradation in anaerobic digesters. Phylogenetic comparisons of 13C-enriched GBs showed that phylogenetically distinct Syntrophomonas GBs were unique to each codigester. Overall, these results suggest that syntrophic populations in anaerobic digesters can have different adaptive capacities, and that selection for divergent populations may be achieved by adjusting reactor operating conditions to maximize biomethane recovery. PMID:28895946
Caching Joint Shortcut Routing to Improve Quality of Service for Information-Centric Networking.
Huang, Baixiang; Liu, Anfeng; Zhang, Chengyuan; Xiong, Naixue; Zeng, Zhiwen; Cai, Zhiping
2018-05-29
Hundreds of thousands of ubiquitous sensing (US) devices have provided an enormous number of data for Information-Centric Networking (ICN), which is an emerging network architecture that has the potential to solve a great variety of issues faced by the traditional network. A Caching Joint Shortcut Routing (CJSR) scheme is proposed in this paper to improve the Quality of service (QoS) for ICN. The CJSR scheme mainly has two innovations which are different from other in-network caching schemes: (1) Two routing shortcuts are set up to reduce the length of routing paths. Because of some inconvenient transmission processes, the routing paths of previous schemes are prolonged, and users can only request data from Data Centers (DCs) until the data have been uploaded from Data Producers (DPs) to DCs. Hence, the first kind of shortcut is built from DPs to users directly. This shortcut could release the burden of whole network and reduce delay. Moreover, in the second shortcut routing method, a Content Router (CR) which could yield shorter length of uploading routing path from DPs to DCs is chosen, and then data packets are uploaded through this chosen CR. In this method, the uploading path shares some segments with the pre-caching path, thus the overall length of routing paths is reduced. (2) The second innovation of the CJSR scheme is that a cooperative pre-caching mechanism is proposed so that QoS could have a further increase. Besides being used in downloading routing, the pre-caching mechanism can also be used when data packets are uploaded towards DCs. Combining uploading and downloading pre-caching, the cooperative pre-caching mechanism exhibits high performance in different situations. Furthermore, to address the scarcity of storage size, an algorithm that could make use of storage from idle CRs is proposed. After comparing the proposed scheme with five existing schemes via simulations, experiments results reveal that the CJSR scheme could reduce the total number of processed interest packets by 54.8%, enhance the cache hits of each CR and reduce the number of total hop counts by 51.6% and cut down the length of routing path for users to obtain their interested data by 28.6⁻85.7% compared with the traditional NDN scheme. Moreover, the length of uploading routing path could be decreased by 8.3⁻33.3%.
Distributed Architecture for the Object-Oriented Method for Interoperability
2003-03-01
Collaborative Environment. ......................121 Figure V-2. Distributed OOMI And The Collaboration Centric Paradigm. .....................123 Figure V...of systems are formed into a system federation to resolve differences in modeling. An OOMI Integrated Development Environment (OOMI IDE) lends ...space for the creation of possible distributed systems is partitioned into User Centric systems, Processing/Storage Centric systems, Implementation
Leveraging standards to support patient-centric interdisciplinary plans of care.
Dykes, Patricia C; DaDamio, Rebecca R; Goldsmith, Denise; Kim, Hyeon-eui; Ohashi, Kumiko; Saba, Virginia K
2011-01-01
As health care systems and providers move towards meaningful use of electronic health records, the once distant vision of collaborative patient-centric, interdisciplinary plans of care, generated and updated across organizations and levels of care, may soon become a reality. Effective care planning is included in the proposed Stages 2-3 Meaningful Use quality measures. To facilitate interoperability, standardization of plan of care messaging, content, information and terminology models are needed. This degree of standardization requires local and national coordination. The purpose of this paper is to review some existing standards that may be leveraged to support development of interdisciplinary patient-centric plans of care. Standards are then applied to a use case to demonstrate one method for achieving patient-centric and interoperable interdisciplinary plan of care documentation. Our pilot work suggests that existing standards provide a foundation for adoption and implementation of patient-centric plans of care that are consistent with federal requirements.
Medical Situational Awareness in Theater Advanced Concept Technology Demonstration Project Proposal
2004-06-01
making it an impossible task to sort, understand , and generate actionable knowledge within operational timeframes. Medical Situational Awareness in...need for greater medical situation awareness in theater and for greater integration of theater medical information into the net-centric rapid...There is a need for greater Medical Situation Awareness in theater and for greater integration of theater medical information into the ForceNet
Value-informed space systems design and acquisition
NASA Astrophysics Data System (ADS)
Brathwaite, Joy
Investments in space systems are substantial, indivisible, and irreversible, characteristics that make them high-risk, especially when coupled with an uncertain demand environment. Traditional approaches to system design and acquisition, derived from a performance- or cost-centric mindset, incorporate little information about the spacecraft in relation to its environment and its value to its stakeholders. These traditional approaches, while appropriate in stable environments, are ill-suited for the current, distinctly uncertain, and rapidly changing technical and economic conditions; as such, they have to be revisited and adapted to the present context. This thesis proposes that in uncertain environments, decision-making with respect to space system design and acquisition should be value-based, or at a minimum value-informed. This research advances the value-centric paradigm by providing the theoretical basis, foundational frameworks, and supporting analytical tools for value assessment of priced and unpriced space systems. For priced systems, stochastic models of the market environment and financial models of stakeholder preferences are developed and integrated with a spacecraft-sizing tool to assess the system's net present value. The analytical framework is applied to a case study of a communications satellite, with market, financial, and technical data obtained from the satellite operator, Intelsat. The case study investigates the implications of the value-centric versus the cost-centric design and acquisition choices. Results identify the ways in which value-optimal spacecraft design choices are contingent on both technical and market conditions, and that larger spacecraft for example, which reap economies of scale benefits, as reflected by their decreasing cost-per-transponder, are not always the best (most valuable) choices. Market conditions and technical constraints for which convergence occurs between design choices under a cost-centric and a value-centric approach are identified and discussed. In addition, an innovative approach for characterizing value uncertainty through partial moments, a technique used in finance, is adapted to an engineering context and applied to priced space systems. Partial moments disaggregate uncertainty into upside potential and downside risk, and as such, they provide the decision-maker with additional insights for value-uncertainty management in design and acquisition. For unpriced space systems, this research first posits that their value derives from, and can be assessed through, the value of information they provide. To this effect, a Bayesian framework is created to assess system value in which the system is viewed as an information provider and the stakeholder an information recipient. Information has value to stakeholders as it changes their rational beliefs enabling them to yield higher expected pay-offs. Based on this marginal increase in expected pay-offs, a new metric, Value-of-Design (VoD), is introduced to quantify the unpriced system’s value. The Bayesian framework is applied to the case of an Earth Science satellite that provides hurricane information to oil rig operators using nested Monte Carlo modeling and simulation. Probability models of stakeholders’ beliefs, and economic models of pay-offs are developed and integrated with a spacecraft payload generation tool. The case study investigates the information value generated by each payload, with results pointing to clusters of payload instruments that yielded higher information value, and minimum information thresholds below which it is difficult to justify the acquisition of the system. In addition, an analytical decision tool, probabilistic Pareto fronts, is developed in the Cost-VoD trade space to provide the decision-maker with additional insights into the coupling of a system's probable value generation and its associated cost risk.
Terzenidis, Nikos; Moralis-Pegios, Miltiadis; Mourgias-Alexandris, George; Vyrsokinos, Konstantinos; Pleros, Nikos
2018-04-02
Departing from traditional server-centric data center architectures towards disaggregated systems that can offer increased resource utilization at reduced cost and energy envelopes, the use of high-port switching with highly stringent latency and bandwidth requirements becomes a necessity. We present an optical switch architecture exploiting a hybrid broadcast-and-select/wavelength routing scheme with small-scale optical feedforward buffering. The architecture is experimentally demonstrated at 10Gb/s, reporting error-free performance with a power penalty of <2.5dB. Moreover, network simulations for a 256-node system, revealed low-latency values of only 605nsec, at throughput values reaching 80% when employing 2-packet-size optical buffers, while multi-rack network performance was also investigated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dougan, A D; Trombino, D; Dunlop, W
The Naval Postgraduate School has been conducting Tactical Network Topology (TNT) Maritime Interdiction Operations (MIO) experiments with Lawrence Livermore National Laboratory (LLNL) since early in 2005. In this work, we are investigating cutting edge technology to evaluate use of networks, advanced sensors and collaborative technology for globally-supported maritime interdiction operations. Some examples of our research include communications in harsh environments, between moving ships at sea; small boat drive-by radiation detection; network-centric collaboration with global partners; situational awareness; prototype sensors & biometric instruments. Since 2006, we have studied the concept of using a small vessel with fixed radiation sensors to domore » initial searches for illicit radioactive materials. In our work, we continue to evaluate concepts of operation for small boat monitoring. For example, in San Francisco Bay we established a simulated choke point using two RHIBs. Each RHIB had a large sodium iodide radiation sensor on board, mounted on the side nearest to the passing potential target boats. Once detections were made, notification over the network prompted a chase RHIB also equipped with a radiation sensor to further investigate the potential target. We have also used an unmanned surface vessel (USV) carrying a radiation sensor to perform the initial discovery. The USV was controlled remotely and to drive by boats in different configurations. The potential target vessels were arranged in a line, as a choke point and randomly spaced in the water. Search plans were problematic when weather, waves and drift complicated the ability to stay in one place. A further challenge is to both detect and identify the radioactive materials during the drive-by. Our radiation detection system, ARAM, Adaptable Radiation Area Monitor, is able to detect, alarm and quickly identify plausible radionuclides in real time. We have performed a number of experiments to better understand parameters of vessel speed, time, shielding, and distance in this complex three-dimensional space. At the NMIOTC in September 2009, we employed a dual detector portal followed by a chase. In this event, the challenge was to maintain communications after a lapse. When the chase went past the line-of sight reach of the Tactical Operational Center's (TOC) antenna, with interference from a fortress island in Suda Bay, Wave Relay extended the network for continued observation. Sodium iodide radiation detectors were mounted on two Hellenic Navy SEAL fast boats. After making the detection one of the portal boats maintained line-of sight while the other pursued the target vessel. Network access via Wave Relay antennas was maintained until the conclusion of the chase scenario. Progress has been made in the detection of radioactive materials in the maritime environment. The progression of the TNT MIO experiments has demonstrated the potential of the hardware to solve the problems encountered in this physically challenging environment. There continue to be interesting opportunities for research and development. These experiments provide a variety of platforms and motivated participants to perform real-world testing as solutions are made available.« less
Research on a Banknote Printing Wastewater Monitoring System based on Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Li, B. B.; Yuan, Z. F.
2006-10-01
In this paper, a banknote printing wastewater monitoring system based on WSN is presented in line with the system demands and actual condition of the worksite for a banknote printing factory. In Physical Layer, the network node is a nRF9e5-centric embedded instrument, which can realize the multi-function such as data collecting, status monitoring, wireless data transmission and so on. Limited by the computing capability, memory capability, communicating energy and others factors, it is impossible for the node to get every detail information of the network, so the communication protocol on WSN couldn't be very complicated. The competitive-based MACA (Multiple Access with Collision Avoidance) Protocol is introduced in MAC, which can decide the communication process and working mode of the nodes, avoid the collision of data transmission, hidden and exposed station problem of nodes. On networks layer, the routing protocol in charge of the transmitting path of the data, the networks topology structure is arranged based on address assignation. Accompanied with some redundant nodes, the network performances stabile and expandable. The wastewater monitoring system is a tentative practice of WSN theory in engineering. Now, the system has passed test and proved efficiently.
ERIC Educational Resources Information Center
Davis, Dennis S.; Vehabovic, Nermin
2018-01-01
The authors offer guidance on recognizing and resisting test-centric instruction in reading comprehension. They posit that five practices indicate a test-centric view of comprehension: when the tested content is privileged, when the test becomes the text, when annotation requirements replace strategic thinking, when test items frame how students…
The California Integrated Seismic Network
NASA Astrophysics Data System (ADS)
Hellweg, M.; Given, D.; Hauksson, E.; Neuhauser, D.; Oppenheimer, D.; Shakal, A.
2007-05-01
The mission of the California Integrated Seismic Network (CISN) is to operate a reliable, modern system to monitor earthquakes throughout the state; to generate and distribute information in real-time for emergency response, for the benefit of public safety, and for loss mitigation; and to collect and archive data for seismological and earthquake engineering research. To meet these needs, the CISN operates data processing and archiving centers, as well as more than 3000 seismic stations. Furthermore, the CISN is actively developing and enhancing its infrastructure, including its automated processing and archival systems. The CISN integrates seismic and strong motion networks operated by the University of California Berkeley (UCB), the California Institute of Technology (Caltech), and the United States Geological Survey (USGS) offices in Menlo Park and Pasadena, as well as the USGS National Strong Motion Program (NSMP), and the California Geological Survey (CGS). The CISN operates two earthquake management centers (the NCEMC and SCEMC) where statewide, real-time earthquake monitoring takes place, and an engineering data center (EDC) for processing strong motion data and making it available in near real-time to the engineering community. These centers employ redundant hardware to minimize disruptions to the earthquake detection and processing systems. At the same time, dual feeds of data from a subset of broadband and strong motion stations are telemetered in real- time directly to both the NCEMC and the SCEMC to ensure the availability of statewide data in the event of a catastrophic failure at one of these two centers. The CISN uses a backbone T1 ring (with automatic backup over the internet) to interconnect the centers and the California Office of Emergency Services. The T1 ring enables real-time exchange of selected waveforms, derived ground motion data, phase arrivals, earthquake parameters, and ShakeMaps. With the goal of operating similar and redundant statewide earthquake processing systems at both real-time EMCs, the CISN is currently adopting and enhancing the database-centric, earthquake processing and analysis software originally developed for the Caltech/USGS Pasadena TriNet project. Earthquake data and waveforms are made available to researchers and to the public in near real-time through the CISN's Northern and Southern California Eathquake Data Centers (NCEDC and SCEDC) and through the USGS Earthquake Notification System (ENS). The CISN partners have developed procedures to automatically exchange strong motion data, both waveforms and peak parameters, for use in ShakeMap and in the rapid engineering reports which are available near real-time through the strong motion EDC.
NASA Astrophysics Data System (ADS)
Liang, Y.; Gallaher, D. W.; Grant, G.; Lv, Q.
2011-12-01
Change over time, is the central driver of climate change detection. The goal is to diagnose the underlying causes, and make projections into the future. In an effort to optimize this process we have developed the Data Rod model, an object-oriented approach that provides the ability to query grid cell changes and their relationships to neighboring grid cells through time. The time series data is organized in time-centric structures called "data rods." A single data rod can be pictured as the multi-spectral data history at one grid cell: a vertical column of data through time. This resolves the long-standing problem of managing time-series data and opens new possibilities for temporal data analysis. This structure enables rapid time- centric analysis at any grid cell across multiple sensors and satellite platforms. Collections of data rods can be spatially and temporally filtered, statistically analyzed, and aggregated for use with pattern matching algorithms. Likewise, individual image pixels can be extracted to generate multi-spectral imagery at any spatial and temporal location. The Data Rods project has created a series of prototype databases to store and analyze massive datasets containing multi-modality remote sensing data. Using object-oriented technology, this method overcomes the operational limitations of traditional relational databases. To demonstrate the speed and efficiency of time-centric analysis using the Data Rods model, we have developed a sea ice detection algorithm. This application determines the concentration of sea ice in a small spatial region across a long temporal window. If performed using traditional analytical techniques, this task would typically require extensive data downloads and spatial filtering. Using Data Rods databases, the exact spatio-temporal data set is immediately available No extraneous data is downloaded, and all selected data querying occurs transparently on the server side. Moreover, fundamental statistical calculations such as running averages are easily implemented against the time-centric columns of data.
NASA Astrophysics Data System (ADS)
Pratt, P.
2012-12-01
Ocean color bands on VIIRS span the visible spectrum and include two NIR bands. There are sixteen detectors per band and two HAM (Half-angle mirror) sides giving a total of thirty two independent systems. For each scan, thirty two hundred pixels are collected and each has a fixed specific optical path and a dynamic position relative to the earth geoid. For a given calibration target where scene variation is minimized, sensor characteristics can be observed. This gives insight into the performance and calibration of the instrument from a sensor-centric perspective. Calibration of the blue bands is especially challenging since there are few blue targets on land. An ocean region called the South Pacific Gyre (SPG) was chosen for its known stability and large area to serve as a calibration target for this investigation. Thousands of pixels from every granule that views the SPG are collected daily through an automated system and tabulated along with the detector, HAM and scan position. These are then collated and organized in a sensor-centric set of tables. The data are then analyzed by slicing by each variable and then plotted in a number of ways over time. Trends in the data show that the VIIRS sensor is largely behaving as expected according to heritage data and also reveals weaknesses where additional characterization of the sensor is possible. This work by Northrop Grumman NPP CalVal Team is supporting the VIIRS on-orbit calibration and validation teams for the sensor and ocean color as well as providing scientists interested in performing ground truth with results that show which detectors and scan angles are the most reliable over time. This novel approach offers a comprehensive sensor-centric on-orbit characterization of the VIIRS instrument on the NASA Suomi NPP mission.
Yue, Xiao; Wang, Huiju; Jin, Dawei; Li, Mingqiang; Jiang, Wei
2016-10-01
Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data is one essential step to make healthcare system smarter and improve the quality of healthcare service. Healthcare data, one personal asset of patient, should be owned and controlled by patient, instead of being scattered in different healthcare systems, which prevents data sharing and puts patient privacy at risks. Blockchain is demonstrated in the financial field that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we proposed an App (called Healthcare Data Gateway (HGD)) architecture based on blockchain to enable patient to own, control and share their own data easily and securely without violating privacy, which provides a new potential way to improve the intelligence of healthcare systems while keeping patient data private. Our proposed purpose-centric access model ensures patient own and control their healthcare data; simple unified Indicator-Centric Schema (ICS) makes it possible to organize all kinds of personal healthcare data practically and easily. We also point out that MPC (Secure Multi-Party Computing) is one promising solution to enable untrusted third-party to conduct computation over patient data without violating privacy.
Human-machine interaction to disambiguate entities in unstructured text and structured datasets
NASA Astrophysics Data System (ADS)
Ward, Kevin; Davenport, Jack
2017-05-01
Creating entity network graphs is a manual, time consuming process for an intelligence analyst. Beyond the traditional big data problems of information overload, individuals are often referred to by multiple names and shifting titles as they advance in their organizations over time which quickly makes simple string or phonetic alignment methods for entities insufficient. Conversely, automated methods for relationship extraction and entity disambiguation typically produce questionable results with no way for users to vet results, correct mistakes or influence the algorithm's future results. We present an entity disambiguation tool, DRADIS, which aims to bridge the gap between human-centric and machinecentric methods. DRADIS automatically extracts entities from multi-source datasets and models them as a complex set of attributes and relationships. Entities are disambiguated across the corpus using a hierarchical model executed in Spark allowing it to scale to operational sized data. Resolution results are presented to the analyst complete with sourcing information for each mention and relationship allowing analysts to quickly vet the correctness of results as well as correct mistakes. Corrected results are used by the system to refine the underlying model allowing analysts to optimize the general model to better deal with their operational data. Providing analysts with the ability to validate and correct the model to produce a system they can trust enables them to better focus their time on producing higher quality analysis products.
Ontology for customer centric digital services and analytics
NASA Astrophysics Data System (ADS)
Keat, Ng Wai; Shahrir, Mohammad Shazri
2017-11-01
In computer science research, ontologies are commonly utilised to create a unified abstract across many rich and different fields. In this paper, we apply the concept to the customer centric domain of digital services analytics and present an analytics solution ontology. The essence is based from traditional Entity Relationship Diagram (ERD), which then was abstracted out to cover wider areas on customer centric digital services. The ontology we developed covers both static aspects (customer identifiers) and dynamic aspects (customer's temporal interactions). The structure of the customer scape is modeled with classes that represent different types of customer touch points, ranging from digital and digital-stamps which represent physical analogies. The dynamic aspects of customer centric digital service are modeled with a set of classes, with the importance is represented in different associations involving establishment and termination of the target interaction. The realized ontology can be used in development of frameworks for customer centric applications, and for specification of common data format used by cooperating digital service applications.
Kang, Hong; Chao, Yonglie; Yi, Xinzhu
2003-12-01
Standards for determining mandibular position, especially the centric relation (CR), are in controversy because of anatomical, neurophysiological factors and research methods or instrument. The purpose of this study was to reevaluate the reproducibility of centric relation of the patients with severe dental attrition for oral rehabilitation. Reproducibility of the centric relation of 6 patients with severe occlusal attrition was investigated by using D5A Denar fully adjustable articulator and the Pantronic recording system. 1. In supine position, anterior-posterior(AP) displacement of centric relation (CR) was 0.14 mm and superior-inferior(SI) displacements of CR were between 0.11 mm-0.12 mm. 2. In upright position, anterior-posterior displacement of CR was 0.35 mm and superior-inferior changes of CR were between 0.13 mm-0.20 mm. The CR is the most stable and reproducible position of mandibule in normal stomatological system and is useful as a reference position in occlusal treatment and functional rehabilitation.
Overview of Human-Centric Space Situational Awareness (SSA) Science and Technology (S&T)
NASA Astrophysics Data System (ADS)
Ianni, J.; Aleva, D.; Ellis, S.
2012-09-01
A number of organizations, within the government, industry, and academia, are researching ways to help humans understand and react to events in space. The problem is both helped and complicated by the fact that there are numerous data sources that need to be planned (i.e., tasked), collected, processed, analyzed, and disseminated. A large part of the research is in support of the Joint Space Operational Center (JSpOC), National Air and Space Intelligence Center (NASIC), and similar organizations. Much recent research has been specifically targeting the JSpOC Mission System (JMS) which has provided a unifying software architecture. This paper will first outline areas of science and technology (S&T) related to human-centric space situational awareness (SSA) and space command and control (C2) including: 1. Object visualization - especially data fused from disparate sources. Also satellite catalog visualizations that convey the physical relationships between space objects. 2. Data visualization - improve data trend analysis as in visual analytics and interactive visualization; e.g., satellite anomaly trends over time, space weather visualization, dynamic visualizations 3. Workflow support - human-computer interfaces that encapsulate multiple computer services (i.e., algorithms, programs, applications) into a 4. Command and control - e.g., tools that support course of action (COA) development and selection, tasking for satellites and sensors, etc. 5. Collaboration - improve individuals or teams ability to work with others; e.g., video teleconferencing, shared virtual spaces, file sharing, virtual white-boards, chat, and knowledge search. 6. Hardware/facilities - e.g., optimal layouts for operations centers, ergonomic workstations, immersive displays, interaction technologies, and mobile computing. Secondly we will provide a survey of organizations working these areas and suggest where more attention may be needed. Although no detailed master plan exists for human-centric SSA and C2, we see little redundancy among the groups supporting SSA human factors at this point.
Unfinished Business: The Sons of Iraq and Political Reconciliation
2010-03-25
out in the National Strategy for Victory in Iraq. 3 of sectarian cleansing in Baghdad, population centric tactics by CF, and increased... cleansed neighborhoods of one sect or the other as the two sides vied for power. Shia families in Sunni dominated areas packed up as many belongings...and Selected Neighborhoods18 8 The Shia controlled government reinforced JAM’s ethnic cleansing operations through a denial of essential
2011-03-15
IPSA ) Division will document the most likely scenario for NextGen 2025 given their analysis to-date. This will include OIs, risks, research, and...Office (CAO), and the Net-Centric Operations Division (NCOD) will review the assumptions and concur with this set as appropriate. IPSA will also...capabilities that can be achieved with additional emphasis on research, risk, and policy issues. SII, CAO, and NCOD will confer with IPSA on the
Model-Driven Test Generation of Distributed Systems
NASA Technical Reports Server (NTRS)
Easwaran, Arvind; Hall, Brendan; Schweiker, Kevin
2012-01-01
This report describes a novel test generation technique for distributed systems. Utilizing formal models and formal verification tools, spe cifically the Symbolic Analysis Laboratory (SAL) tool-suite from SRI, we present techniques to generate concurrent test vectors for distrib uted systems. These are initially explored within an informal test validation context and later extended to achieve full MC/DC coverage of the TTEthernet protocol operating within a system-centric context.
2016-04-01
oxygenation and ventilation Goal Adequate oxygenation and/or ventilation Goal Skin grafting Objective Surgical operation (implicit goal = achieve...Abdominal Pressures, [TTE/IVC measurement] Assure effective Ventilation & Sedation (Standard ICU) EtCO2, A-Line, ±CVP 4E Compatible Decrease...commands) Participatory (expresses self) minimize oxygen demand maximize perfusion protect grafts patient ventilator
Transforming System Engineering through Model-Centric Engineering
2015-01-31
story that is being applied and evolved on Jupiter Europa Orbiter (JEO) project [75], and we summarize some aspects of it here, because it goes beyond...JEO Jupiter Europa Orbiter project at NASA/JPL JSF Joint Strike Fighter JPL Jet Propulsion Laboratory of NASA Linux An operating system created by...Adaptation of Flight-Critical Systems, Digital Avionics Systems Conference, 2009. [75] Rasumussen, R., R. Shishko, Jupiter Europa Orbiter Architecture
NCBI GEO: archive for high-throughput functional genomic data.
Barrett, Tanya; Troup, Dennis B; Wilhite, Stephen E; Ledoux, Pierre; Rudnev, Dmitry; Evangelista, Carlos; Kim, Irene F; Soboleva, Alexandra; Tomashevsky, Maxim; Marshall, Kimberly A; Phillippy, Katherine H; Sherman, Patti M; Muertter, Rolf N; Edgar, Ron
2009-01-01
The Gene Expression Omnibus (GEO) at the National Center for Biotechnology Information (NCBI) is the largest public repository for high-throughput gene expression data. Additionally, GEO hosts other categories of high-throughput functional genomic data, including those that examine genome copy number variations, chromatin structure, methylation status and transcription factor binding. These data are generated by the research community using high-throughput technologies like microarrays and, more recently, next-generation sequencing. The database has a flexible infrastructure that can capture fully annotated raw and processed data, enabling compliance with major community-derived scientific reporting standards such as 'Minimum Information About a Microarray Experiment' (MIAME). In addition to serving as a centralized data storage hub, GEO offers many tools and features that allow users to effectively explore, analyze and download expression data from both gene-centric and experiment-centric perspectives. This article summarizes the GEO repository structure, content and operating procedures, as well as recently introduced data mining features. GEO is freely accessible at http://www.ncbi.nlm.nih.gov/geo/.
An investigative analysis of information assurance issues associated with the GIG's P&P architecture
NASA Astrophysics Data System (ADS)
Farroha, B. S.; Cole, R. G.; Farroha, D. L.; DeSimone, A.
2007-04-01
The Global Information Grid (GIG) is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the Internet. The GIG is expected to facilitate DoD's transformation by allowing warfighters, policy makers and support personnel to engage in rapid decision making. The roadmap is designed to take advantage of converged services of voice, data, video, and imagery over common data links. The vision is to have commanders identify threats more effectively, make informed decisions, and respond with greater precision and lethality. The information advantage gained through the GIG and network-centric warfare (NCW) allows a warfighting force to achieve dramatically improved information positions, in the form of common operational pictures that provide the basis for shared situational awareness and knowledge, and a resulting increase in combat power. The GIG Precedence and Preemption (P&P) requirements stem from the need to utilize scarce resources at critical times in the most effective way in support of national security, the intelligence community and the war-fighter. Information Assurance (IA) enables all information and data to be available end-to-end to support any mission without delay in accordance to the sensitivity of the task. Together, P&P and IA ensure data availability integrity, authentication, confidentiality, and non-repudiation. This study addresses and analyzes the QoS and P & P requirements and architecture for the GIG. Threat scenarios are presented and used to evaluate the reference architectures. The goal of the study is to assess the Information Assurance concerns associated with implementing Precedence and Preemption within the GIG and to guarantee an acceptable minimum level of security and protection for DoD networks.
NASA Astrophysics Data System (ADS)
Irving, D. H.; Rasheed, M.; Hillman, C.; O'Doherty, N.
2012-12-01
Oilfield management is moving to a more operational footing with near-realtime seismic and sensor monitoring governing drilling, fluid injection and hydrocarbon extraction workflows within safety, productivity and profitability constraints. To date, the geoscientific analytical architectures employed are configured for large volumes of data, computational power or analytical latency and compromises in system design must be made to achieve all three aspects. These challenges are encapsulated by the phrase 'Big Data' which has been employed for over a decade in the IT industry to describe the challenges presented by data sets that are too large, volatile and diverse for existing computational architectures and paradigms. We present a data-centric architecture developed to support a geoscientific and geotechnical workflow whereby: ●scientific insight is continuously applied to fresh data ●insights and derived information are incorporated into engineering and operational decisions ●data governance and provenance are routine within a broader data management framework Strategic decision support systems in large infrastructure projects such as oilfields are typically relational data environments; data modelling is pervasive across analytical functions. However, subsurface data and models are typically non-relational (i.e. file-based) in the form of large volumes of seismic imaging data or rapid streams of sensor feeds and are analysed and interpreted using niche applications. The key architectural challenge is to move data and insight from a non-relational to a relational, or structured, data environment for faster and more integrated analytics. We describe how a blend of MapReduce and relational database technologies can be applied in geoscientific decision support, and the strengths and weaknesses of each in such an analytical ecosystem. In addition we discuss hybrid technologies that use aspects of both and translational technologies for moving data and analytics across these platforms. Moving to a data-centric architecture requires data management methodologies to be overhauled by default and we show how end-to-end data provenancing and dependency management is implicit in such an environment and how it benefits system administration as well as the user community. Whilst the architectural experiences are drawn from the oil industry, we believe that they are more broadly applicable in academic and government settings where large volumes of data are added to incrementally and require revisiting with low analytical latency and we suggest application to earthquake monitoring and remote sensing networks.
Sosa, Sebastian
2016-01-01
A society is a complex system composed of individuals that can be characterized by their own attributes that influence their behaviors. In this study, a specific analytical protocol based on social network analysis was adopted to investigate the influence of four attributes (gender, age, matriline, and hierarchical rank) on affiliative (allogrooming) and agonistic networks in a non-human primate species, Macaca sylvanus, at the park La Forêt des Singes in France. The results show significant differences with respect to the position (i.e., centric, peripheral) and role (i.e., implication in the network cohesiveness) of an individual within a social network and hence interactional patterns. Females are more central, more active, and have a denser ego network in the affiliative social network tan males; thus, they contribute in a greater way to the cohesive structure of the network. High-ranking individuals are likely to receive fewer agonistic behaviors than low-ranking individuals, and high-ranking females receive more allogrooming. I also observe homophily for affiliative interactions regarding all attributes and homophily for agonistic interactions regarding gender and age. Revealing the positions, the roles, and the interactional behavioral patterns of individuals can help understand the mechanisms that shape the overall structure of a social network. PMID:27148137
Sosa, Sebastian
2016-01-01
A society is a complex system composed of individuals that can be characterized by their own attributes that influence their behaviors. In this study, a specific analytical protocol based on social network analysis was adopted to investigate the influence of four attributes (gender, age, matriline, and hierarchical rank) on affiliative (allogrooming) and agonistic networks in a non-human primate species, Macaca sylvanus, at the park La Forêt des Singes in France. The results show significant differences with respect to the position (i.e., centric, peripheral) and role (i.e., implication in the network cohesiveness) of an individual within a social network and hence interactional patterns. Females are more central, more active, and have a denser ego network in the affiliative social network tan males; thus, they contribute in a greater way to the cohesive structure of the network. High-ranking individuals are likely to receive fewer agonistic behaviors than low-ranking individuals, and high-ranking females receive more allogrooming. I also observe homophily for affiliative interactions regarding all attributes and homophily for agonistic interactions regarding gender and age. Revealing the positions, the roles, and the interactional behavioral patterns of individuals can help understand the mechanisms that shape the overall structure of a social network.
Analysis of the enzyme network involved in cattle milk production using graph theory.
Ghorbani, Sholeh; Tahmoorespur, Mojtaba; Masoudi Nejad, Ali; Nasiri, Mohammad; Asgari, Yazdan
2015-06-01
Understanding cattle metabolism and its relationship with milk products is important in bovine breeding. A systemic view could lead to consequences that will result in a better understanding of existing concepts. Topological indices and quantitative characterizations mostly result from the application of graph theory on biological data. In the present work, the enzyme network involved in cattle milk production was reconstructed and analyzed based on available bovine genome information using several public datasets (NCBI, Uniprot, KEGG, and Brenda). The reconstructed network consisted of 3605 reactions named by KEGG compound numbers and 646 enzymes that catalyzed the corresponding reactions. The characteristics of the directed and undirected network were analyzed using Graph Theory. The mean path length was calculated to be4.39 and 5.41 for directed and undirected networks, respectively. The top 11 hub enzymes whose abnormality could harm bovine health and reduce milk production were determined. Therefore, the aim of constructing the enzyme centric network was twofold; first to find out whether such network followed the same properties of other biological networks, and second, to find the key enzymes. The results of the present study can improve our understanding of milk production in cattle. Also, analysis of the enzyme network can help improve the modeling and simulation of biological systems and help design desired phenotypes to increase milk production quality or quantity.
Network biology discovers pathogen contact points in host protein-protein interactomes.
Ahmed, Hadia; Howton, T C; Sun, Yali; Weinberger, Natascha; Belkhadir, Youssef; Mukhtar, M Shahid
2018-06-13
In all organisms, major biological processes are controlled by complex protein-protein interactions networks (interactomes), yet their structural complexity presents major analytical challenges. Here, we integrate a compendium of over 4300 phenotypes with Arabidopsis interactome (AI-1 MAIN ). We show that nodes with high connectivity and betweenness are enriched and depleted in conditional and essential phenotypes, respectively. Such nodes are located in the innermost layers of AI-1 MAIN and are preferential targets of pathogen effectors. We extend these network-centric analyses to Cell Surface Interactome (CSI LRR ) and predict its 35 most influential nodes. To determine their biological relevance, we show that these proteins physically interact with pathogen effectors and modulate plant immunity. Overall, our findings contrast with centrality-lethality rule, discover fast information spreading nodes, and highlight the structural properties of pathogen targets in two different interactomes. Finally, this theoretical framework could possibly be applicable to other inter-species interactomes to reveal pathogen contact points.
Fenn, Daniel J; Porter, Mason A; McDonald, Mark; Williams, Stacy; Johnson, Neil F; Jones, Nick S
2009-09-01
We study the cluster dynamics of multichannel (multivariate) time series by representing their correlations as time-dependent networks and investigating the evolution of network communities. We employ a node-centric approach that allows us to track the effects of the community evolution on the functional roles of individual nodes without having to track entire communities. As an example, we consider a foreign exchange market network in which each node represents an exchange rate and each edge represents a time-dependent correlation between the rates. We study the period 2005-2008, which includes the recent credit and liquidity crisis. Using community detection, we find that exchange rates that are strongly attached to their community are persistently grouped with the same set of rates, whereas exchange rates that are important for the transfer of information tend to be positioned on the edges of communities. Our analysis successfully uncovers major trading changes that occurred in the market during the credit crisis.
NASA Astrophysics Data System (ADS)
Fenn, Daniel J.; Porter, Mason A.; McDonald, Mark; Williams, Stacy; Johnson, Neil F.; Jones, Nick S.
2009-09-01
We study the cluster dynamics of multichannel (multivariate) time series by representing their correlations as time-dependent networks and investigating the evolution of network communities. We employ a node-centric approach that allows us to track the effects of the community evolution on the functional roles of individual nodes without having to track entire communities. As an example, we consider a foreign exchange market network in which each node represents an exchange rate and each edge represents a time-dependent correlation between the rates. We study the period 2005-2008, which includes the recent credit and liquidity crisis. Using community detection, we find that exchange rates that are strongly attached to their community are persistently grouped with the same set of rates, whereas exchange rates that are important for the transfer of information tend to be positioned on the edges of communities. Our analysis successfully uncovers major trading changes that occurred in the market during the credit crisis.
Transforming from a Service-Centric to a Joint Recruiting Environment
2011-03-09
Manpower Policy, (Lawrence, Kansas, University Press of Kansas, 1989), 170. 9 Rostker, I Want You!, 52. 10 Milton Friedman (Why not a Volunteer Army...partial fulfillment of the requirements of the Master of Strategic Studies Degree. The views expressed in this student academic research paper are those...centric with a narrow vision. Why does DoD recruit with a service-centric mindset? Why does DoD have separate headquarters to command and control
Wearable computer technology for dismounted applications
NASA Astrophysics Data System (ADS)
Daniels, Reginald
2010-04-01
Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.
Information display: the weak link for NCW
NASA Astrophysics Data System (ADS)
Gilger, Mike
2006-05-01
The Global Information Grid (GIG) enables the dissemination of real-time data from any sensor/source as well as the distribution of that data immediately to recipients across the globe, resulting in better, faster, and more accurate decisions, reduced operational risk, and a more competitive war-fighting advantage. As a major component of Network Centric Warfare (NCW), the GIG seeks to provide the integrated information infrastructure necessary to connect the robust data streams from ConstellationNet, FORCENet, and LandWarNet to allow Joint Forces to move beyond Situational Awareness and into Situational Understanding. NCW will provide the Joint Forces a common situational understanding, a common operating picture, and any and all information necessary for rapid decision-making. However, with the exception of the 1994 introduction of the Military Standard 2525 "Common Warfighting Symbology," there has been no notable improvement in our ability to display information for accurate and rapid understanding. In fact, one of the notable problems associated with NCW is how to process the massive amount of newly integrated data being thrown at the warfighter: a significant human-machine interface challenge. The solution; a graphical language called GIFIC (Graphical Interface for Information Cognition) that can display thousands of data points simultaneously. Coupled with the new generation COP displays, GIFIC provides for the tremendous amounts of information-display required for effective NCW battlespace awareness requirements, offering instant insight into joint operations, tactical situations, and targeting necessities. GIFIC provides the next level of information-display necessary for a successful NCW, resulting in agile, high-performance, and highly competitive warfighters.
An information gathering system for medical image inspection
NASA Astrophysics Data System (ADS)
Lee, Young-Jin; Bajcsy, Peter
2005-04-01
We present an information gathering system for medical image inspection that consists of software tools for capturing computer-centric and human-centric information. Computer-centric information includes (1) static annotations, such as (a) image drawings enclosing any selected area, a set of areas with similar colors, a set of salient points, and (b) textual descriptions associated with either image drawings or links between pairs of image drawings, and (2) dynamic (or temporal) information, such as mouse movements, zoom level changes, image panning and frame selections from an image stack. Human-centric information is represented by video and audio signals that are acquired by computer-mounted cameras and microphones. The short-term goal of the presented system is to facilitate learning of medical novices from medical experts, while the long-term goal is to data mine all information about image inspection for assisting in making diagnoses. In this work, we built basic software functionality for gathering computer-centric and human-centric information of the aforementioned variables. Next, we developed the information playback capabilities of all gathered information for educational purposes. Finally, we prototyped text-based and image template-based search engines to retrieve information from recorded annotations, for example, (a) find all annotations containing the word "blood vessels", or (b) search for similar areas to a selected image area. The information gathering system for medical image inspection reported here has been tested with images from the Histology Atlas database.
Defining Patient Centric Pharmaceutical Drug Product Design.
Stegemann, Sven; Ternik, Robert L; Onder, Graziano; Khan, Mansoor A; van Riet-Nales, Diana A
2016-09-01
The term "patient centered," "patient centric," or "patient centricity" is increasingly used in the scientific literature in a wide variety of contexts. Generally, patient centric medicines are recognized as an essential contributor to healthy aging and the overall patient's quality of life and life expectancy. Besides the selection of the appropriate type of drug substance and strength for a particular indication in a particular patient, due attention must be paid that the pharmaceutical drug product design is also adequately addressing the particular patient's needs, i.e., assuring adequate patient adherence and the anticipate drug safety and effectiveness. Relevant pharmaceutical design aspects may e.g., involve the selection of the route of administration, the tablet size and shape, the ease of opening the package, the ability to read the user instruction, or the ability to follow the recommended (in-use) storage conditions. Currently, a harmonized definition on patient centric drug development/design has not yet been established. To stimulate scientific research and discussions and the consistent interpretation of test results, it is essential that such a definition is established. We have developed a first draft definition through various rounds of discussions within an interdisciplinary AAPS focus group of experts. This publication summarizes the outcomes and is intended to stimulate further discussions with all stakeholders towards a common definition of patient centric pharmaceutical drug product design that is useable across all disciplines involved.
Qualitative analysis of the elliptical centric technique and the TRICKS technique
NASA Astrophysics Data System (ADS)
Dong, Kyung-Rae; Goo, Eun-Hoe; Lee, Jae-Seung; Chung, Woon-Kwan
2013-02-01
This study evaluated the usefulness of time resolved imaging of contrast kinetics (TRICKS) magnetic resonance angiography (MRA) and elliptical centric MRA according to the type of cerebral disease. From February 2010 to January 2012, elliptical centric MRA and TRICKS MRA images were acquired from 50 normal individuals and 50 patients with cerebral diseases by using 3.0-Tesla magnetic resonance imaging (MRI) equipment. The images were analyzed qualitatively by examining areas such as the presence or absence of artifacts on the images, the distinctness of boundaries of blood vessels, accurate representation of the lesions, and the subtraction level. In addition, the sensitivity, specificity, positive prediction rate, negative prediction rate and accuracy were assessed by comparing the diagnostic efficacy of the two techniques. The results revealed TRICKS MRA to have superior image quality to elliptical centric MRA. Regarding each disease, TRICKS MRA showed higher diagnostic efficacy for artery venous malformation (AVM) and middle cerebral artery (MCA) bypass patients whereas elliptical centric MRA was more suitable for patients with brain tumors, cerebral infarction, cerebral stenosis or sinus mass.
2007-04-01
industrial and commercial companies have been very successful at developing this type of organization and management structure, beginning with a... companies like large management consulting firms depends on being extremely proficient at this kind of knowledge and information management. The...technology services company , recognizes that their information base and experience is their most valued corporate asset and they treat it as such. They
2016-04-05
Unlimited http://www.sei.cmu.edu CMU/SEI-2016-TR-004 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A...Approved for Public Release; Distribution is Unlimited Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported...by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software
ECHO Services: Foundational Middleware for a Science Cyberinfrastructure
NASA Technical Reports Server (NTRS)
Burnett, Michael
2005-01-01
This viewgraph presentation describes ECHO, an interoperability middleware solution. It uses open, XML-based APIs, and supports net-centric architectures and solutions. ECHO has a set of interoperable registries for both data (metadata) and services, and provides user accounts and a common infrastructure for the registries. It is built upon a layered architecture with extensible infrastructure for supporting community unique protocols. It has been operational since November, 2002 and it available as open source.
Being or Becoming: Toward an Open-System, Process-Centric Model of Personality.
Giordano, Peter J
2015-12-01
Mainstream personality psychology in the West neglects the investigation of intra-individual process and variation, because it favors a Being over a Becoming ontology. A Being ontology privileges a structural (e.g., traits or selves) conception of personality. Structure-centric models in turn suggest nomothetic research strategies and the investigation of individual and group differences. This article argues for an open-system, process-centric understanding of personality anchored in an ontology of Becoming. A classical Confucian model of personality is offered as an example of a process-centric approach for investigating and appreciating within-person personality process and variation. Both quantitative and qualitative idiographic strategies can be used as methods of scientific inquiry, particularly the exploration of the Confucian exemplar of psychological health and well-being.
A radio-aware routing algorithm for reliable directed diffusion in lossy wireless sensor networks.
Kim, Yong-Pyo; Jung, Euihyun; Park, Yong-Jin
2009-01-01
In Wireless Sensor Networks (WSNs), transmission errors occur frequently due to node failure, battery discharge, contention or interference by objects. Although Directed Diffusion has been considered as a prominent data-centric routing algorithm, it has some weaknesses due to unexpected network errors. In order to address these problems, we proposed a radio-aware routing algorithm to improve the reliability of Directed Diffusion in lossy WSNs. The proposed algorithm is aware of the network status based on the radio information from MAC and PHY layers using a cross-layer design. The cross-layer design can be used to get detailed information about current status of wireless network such as a link quality or transmission errors of communication links. The radio information indicating variant network conditions and link quality was used to determine an alternative route that provides reliable data transmission under lossy WSNs. According to the simulation result, the radio-aware reliable routing algorithm showed better performance in both grid and random topologies with various error rates. The proposed solution suggested the possibility of providing a reliable transmission method for QoS requests in lossy WSNs based on the radio-awareness. The energy and mobility issues will be addressed in the future work.
Autonomous Byte Stream Randomizer
NASA Technical Reports Server (NTRS)
Paloulian, George K.; Woo, Simon S.; Chow, Edward T.
2013-01-01
Net-centric networking environments are often faced with limited resources and must utilize bandwidth as efficiently as possible. In networking environments that span wide areas, the data transmission has to be efficient without any redundant or exuberant metadata. The Autonomous Byte Stream Randomizer software provides an extra level of security on top of existing data encryption methods. Randomizing the data s byte stream adds an extra layer to existing data protection methods, thus making it harder for an attacker to decrypt protected data. Based on a generated crypto-graphically secure random seed, a random sequence of numbers is used to intelligently and efficiently swap the organization of bytes in data using the unbiased and memory-efficient in-place Fisher-Yates shuffle method. Swapping bytes and reorganizing the crucial structure of the byte data renders the data file unreadable and leaves the data in a deconstructed state. This deconstruction adds an extra level of security requiring the byte stream to be reconstructed with the random seed in order to be readable. Once the data byte stream has been randomized, the software enables the data to be distributed to N nodes in an environment. Each piece of the data in randomized and distributed form is a separate entity unreadable on its own right, but when combined with all N pieces, is able to be reconstructed back to one. Reconstruction requires possession of the key used for randomizing the bytes, leading to the generation of the same cryptographically secure random sequence of numbers used to randomize the data. This software is a cornerstone capability possessing the ability to generate the same cryptographically secure sequence on different machines and time intervals, thus allowing this software to be used more heavily in net-centric environments where data transfer bandwidth is limited.
Burroughs, A. Maxwell; Zhang, Dapeng; Schäffer, Daniel E.; Iyer, Lakshminarayan M.; Aravind, L.
2015-01-01
Cyclic di- and linear oligo-nucleotide signals activate defenses against invasive nucleic acids in animal immunity; however, their evolutionary antecedents are poorly understood. Using comparative genomics, sequence and structure analysis, we uncovered a vast network of systems defined by conserved prokaryotic gene-neighborhoods, which encode enzymes generating such nucleotides or alternatively processing them to yield potential signaling molecules. The nucleotide-generating enzymes include several clades of the DNA-polymerase β-like superfamily (including Vibrio cholerae DncV), a minimal version of the CRISPR polymerase and DisA-like cyclic-di-AMP synthetases. Nucleotide-binding/processing domains include TIR domains and members of a superfamily prototyped by Smf/DprA proteins and base (cytokinin)-releasing LOG enzymes. They are combined in conserved gene-neighborhoods with genes for a plethora of protein superfamilies, which we predict to function as nucleotide-sensors and effectors targeting nucleic acids, proteins or membranes (pore-forming agents). These systems are sometimes combined with other biological conflict-systems such as restriction-modification and CRISPR/Cas. Interestingly, several are coupled in mutually exclusive neighborhoods with either a prokaryotic ubiquitin-system or a HORMA domain-PCH2-like AAA+ ATPase dyad. The latter are potential precursors of equivalent proteins in eukaryotic chromosome dynamics. Further, components from these nucleotide-centric systems have been utilized in several other systems including a novel diversity-generating system with a reverse transcriptase. We also found the Smf/DprA/LOG domain from these systems to be recruited as a predicted nucleotide-binding domain in eukaryotic TRPM channels. These findings point to evolutionary and mechanistic links, which bring together CRISPR/Cas, animal interferon-induced immunity, and several other systems that combine nucleic-acid-sensing and nucleotide-dependent signaling. PMID:26590262
Context-aware event detection smartphone application for first responders
NASA Astrophysics Data System (ADS)
Boddhu, Sanjay K.; Dave, Rakesh P.; McCartney, Matt; West, James A.; Williams, Robert L.
2013-05-01
The rise of social networking platforms like Twitter, Facebook, etc…, have provided seamless sharing of information (as chat, video and other media) among its user community on a global scale. Further, the proliferation of the smartphones and their connectivity networks has powered the ordinary individuals to share and acquire information regarding the events happening in his/her immediate vicinity in a real-time fashion. This human-centric sensed data being generated in "human-as-sensor" approach is tremendously valuable as it delivered mostly with apt annotations and ground truth that would be missing in traditional machine-centric sensors, besides high redundancy factor (same data thru multiple users). Further, when appropriately employed this real-time data can support in detecting localized events like fire, accidents, shooting, etc…, as they unfold and pin-point individuals being affected by those events. This spatiotemporal information, when made available for first responders in the event vicinity (or approaching it) can greatly assist them to make effective decisions to protect property and life in a timely fashion. In this vein, under SATE and YATE programs, the research team at AFRL Tec^Edge Discovery labs had demonstrated the feasibility of developing Smartphone applications, that can provide a augmented reality view of the appropriate detected events in a given geographical location (localized) and also provide an event search capability over a large geographic extent. In its current state, the application thru its backend connectivity utilizes a data (Text & Image) processing framework, which deals with data challenges like; identifying and aggregating important events, analyzing and correlating the events temporally and spatially and building a search enabled event database. Further, the smartphone application with its backend data processing workflow has been successfully field tested with live user generated feeds.
Deriving Differential Equations from Process Algebra Models in Reagent-Centric Style
NASA Astrophysics Data System (ADS)
Hillston, Jane; Duguid, Adam
The reagent-centric style of modeling allows stochastic process algebra models of biochemical signaling pathways to be developed in an intuitive way. Furthermore, once constructed, the models are amenable to analysis by a number of different mathematical approaches including both stochastic simulation and coupled ordinary differential equations. In this chapter, we give a tutorial introduction to the reagent-centric style, in PEPA and Bio-PEPA, and the way in which such models can be used to generate systems of ordinary differential equations.
Development of Gene Centric Modeling for Nutrient Cycling
opportunity to participate in the development of a gene-centric model to help predict potential changes in the biogeochemistry of aquatic ecosystems that may arise from anthropogenic stressors and management decisions
Revisiting the Robustness of PET-Based Textural Features in the Context of Multi-Centric Trials.
Bailly, Clément; Bodet-Milin, Caroline; Couespel, Solène; Necib, Hatem; Kraeber-Bodéré, Françoise; Ansquer, Catherine; Carlier, Thomas
2016-01-01
This study aimed to investigate the variability of textural features (TF) as a function of acquisition and reconstruction parameters within the context of multi-centric trials. The robustness of 15 selected TFs were studied as a function of the number of iterations, the post-filtering level, input data noise, the reconstruction algorithm and the matrix size. A combination of several reconstruction and acquisition settings was devised to mimic multi-centric conditions. We retrospectively studied data from 26 patients enrolled in a diagnostic study that aimed to evaluate the performance of PET/CT 68Ga-DOTANOC in gastro-entero-pancreatic neuroendocrine tumors. Forty-one tumors were extracted and served as the database. The coefficient of variation (COV) or the absolute deviation (for the noise study) was derived and compared statistically with SUVmax and SUVmean results. The majority of investigated TFs can be used in a multi-centric context when each parameter is considered individually. The impact of voxel size and noise in the input data were predominant as only 4 TFs presented a high/intermediate robustness against SUV-based metrics (Entropy, Homogeneity, RP and ZP). When combining several reconstruction settings to mimic multi-centric conditions, most of the investigated TFs were robust enough against SUVmax except Correlation, Contrast, LGRE, LGZE and LZLGE. Considering previously published results on either reproducibility or sensitivity against delineation approach and our findings, it is feasible to consider Homogeneity, Entropy, Dissimilarity, HGRE, HGZE and ZP as relevant for being used in multi-centric trials.
Climate Data Analytics Workflow Management
NASA Astrophysics Data System (ADS)
Zhang, J.; Lee, S.; Pan, L.; Mattmann, C. A.; Lee, T. J.
2016-12-01
In this project we aim to pave a novel path to create a sustainable building block toward Earth science big data analytics and knowledge sharing. Closely studying how Earth scientists conduct data analytics research in their daily work, we have developed a provenance model to record their activities, and to develop a technology to automatically generate workflows for scientists from the provenance. On top of it, we have built the prototype of a data-centric provenance repository, and establish a PDSW (People, Data, Service, Workflow) knowledge network to support workflow recommendation. To ensure the scalability and performance of the expected recommendation system, we have leveraged the Apache OODT system technology. The community-approved, metrics-based performance evaluation web-service will allow a user to select a metric from the list of several community-approved metrics and to evaluate model performance using the metric as well as the reference dataset. This service will facilitate the use of reference datasets that are generated in support of the model-data intercomparison projects such as Obs4MIPs and Ana4MIPs. The data-centric repository infrastructure will allow us to catch richer provenance to further facilitate knowledge sharing and scientific collaboration in the Earth science community. This project is part of Apache incubator CMDA project.
Benchmarking health IT among OECD countries: better data for better policy
Adler-Milstein, Julia; Ronchi, Elettra; Cohen, Genna R; Winn, Laura A Pannella; Jha, Ashish K
2014-01-01
Objective To develop benchmark measures of health information and communication technology (ICT) use to facilitate cross-country comparisons and learning. Materials and methods The effort is led by the Organisation for Economic Co-operation and Development (OECD). Approaches to definition and measurement within four ICT domains were compared across seven OECD countries in order to identify functionalities in each domain. These informed a set of functionality-based benchmark measures, which were refined in collaboration with representatives from more than 20 OECD and non-OECD countries. We report on progress to date and remaining work to enable countries to begin to collect benchmark data. Results The four benchmarking domains include provider-centric electronic record, patient-centric electronic record, health information exchange, and tele-health. There was broad agreement on functionalities in the provider-centric electronic record domain (eg, entry of core patient data, decision support), and less agreement in the other three domains in which country representatives worked to select benchmark functionalities. Discussion Many countries are working to implement ICTs to improve healthcare system performance. Although many countries are looking to others as potential models, the lack of consistent terminology and approach has made cross-national comparisons and learning difficult. Conclusions As countries develop and implement strategies to increase the use of ICTs to promote health goals, there is a historic opportunity to enable cross-country learning. To facilitate this learning and reduce the chances that individual countries flounder, a common understanding of health ICT adoption and use is needed. The OECD-led benchmarking process is a crucial step towards achieving this. PMID:23721983
Benchmarking health IT among OECD countries: better data for better policy.
Adler-Milstein, Julia; Ronchi, Elettra; Cohen, Genna R; Winn, Laura A Pannella; Jha, Ashish K
2014-01-01
To develop benchmark measures of health information and communication technology (ICT) use to facilitate cross-country comparisons and learning. The effort is led by the Organisation for Economic Co-operation and Development (OECD). Approaches to definition and measurement within four ICT domains were compared across seven OECD countries in order to identify functionalities in each domain. These informed a set of functionality-based benchmark measures, which were refined in collaboration with representatives from more than 20 OECD and non-OECD countries. We report on progress to date and remaining work to enable countries to begin to collect benchmark data. The four benchmarking domains include provider-centric electronic record, patient-centric electronic record, health information exchange, and tele-health. There was broad agreement on functionalities in the provider-centric electronic record domain (eg, entry of core patient data, decision support), and less agreement in the other three domains in which country representatives worked to select benchmark functionalities. Many countries are working to implement ICTs to improve healthcare system performance. Although many countries are looking to others as potential models, the lack of consistent terminology and approach has made cross-national comparisons and learning difficult. As countries develop and implement strategies to increase the use of ICTs to promote health goals, there is a historic opportunity to enable cross-country learning. To facilitate this learning and reduce the chances that individual countries flounder, a common understanding of health ICT adoption and use is needed. The OECD-led benchmarking process is a crucial step towards achieving this.
Neuroprotective Drug for Nerve Trauma Revealed Using Artificial Intelligence.
Romeo-Guitart, David; Forés, Joaquim; Herrando-Grabulosa, Mireia; Valls, Raquel; Leiva-Rodríguez, Tatiana; Galea, Elena; González-Pérez, Francisco; Navarro, Xavier; Petegnief, Valerie; Bosch, Assumpció; Coma, Mireia; Mas, José Manuel; Casas, Caty
2018-01-30
Here we used a systems biology approach and artificial intelligence to identify a neuroprotective agent for the treatment of peripheral nerve root avulsion. Based on accumulated knowledge of the neurodegenerative and neuroprotective processes that occur in motoneurons after root avulsion, we built up protein networks and converted them into mathematical models. Unbiased proteomic data from our preclinical models were used for machine learning algorithms and for restrictions to be imposed on mathematical solutions. Solutions allowed us to identify combinations of repurposed drugs as potential neuroprotective agents and we validated them in our preclinical models. The best one, NeuroHeal, neuroprotected motoneurons, exerted anti-inflammatory properties and promoted functional locomotor recovery. NeuroHeal endorsed the activation of Sirtuin 1, which was essential for its neuroprotective effect. These results support the value of network-centric approaches for drug discovery and demonstrate the efficacy of NeuroHeal as adjuvant treatment with surgical repair for nervous system trauma.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine
High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less
Virocell Metabolism: Metabolic Innovations During Host-Virus Interactions in the Ocean.
Rosenwasser, Shilo; Ziv, Carmit; Creveld, Shiri Graff van; Vardi, Assaf
2016-10-01
Marine viruses are considered to be major ecological, evolutionary, and biogeochemical drivers of the marine environment, responsible for nutrient recycling and determining species composition. Viruses can re-shape their host's metabolic network during infection, generating the virocell-a unique metabolic state that supports their specific requirement. Here we discuss the concept of 'virocell metabolism' and its formation by rewiring of host-encoded metabolic networks, or by introducing virus-encoded auxiliary metabolic genes which provide the virocell with novel metabolic capabilities. The ecological role of marine viruses is commonly assessed by their relative abundance and phylogenetic diversity, lacking the ability to assess the dynamics of active viral infection. The new ability to define a unique metabolic state of the virocell will expand the current virion-centric approaches in order to quantify the impact of marine viruses on microbial food webs. Copyright © 2016. Published by Elsevier Ltd.
Department of Defense Command and Control Implementation Plan, Version 1.0
2009-10-01
needs • Be maintained by the C2 Capability Portfolio Manager ( CPM ) and updated every 2 years to address emerging C2 operational concepts, changing and...including sources managed by the C2 CPM as well as other CPMs (e.g., Net- Centric, Battlespace Awareness, and Logistics). C2 platforms and facilities with...incremental delivery of improved capabilities over time. Implementation planning is a C2 CPM -facilitated activity that involves identifying and
2015-12-01
DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) Piracy in the Gulf of Guinea regularly exceeded that of the Gulf of Aden between 2000 and 2007. But...flow of goods is the flow of services, which in today’s computer-centric world travels electronically in digital bits and bytes through fiber optic...piracy prosecutions, among others. Second order costs include fisheries, food security and food price inflation, tourism , and environmental pollution
Operation of the Defense Acquisition System
2008-12-08
United States Code (l) DoD Directive 8320.02, “Data Sharing in a Net-Centric Department of Defense,” December 2, 2004 (m) DoD Instruction 5200.39...2004 (t) ISO 15418-1999- “EAN/ UCC Application Identifiers and Fact Data Identifiers and Maintenance” (u) ISO 15434-1999 – “Transfer Syntax for High...Acquisition Knowledge Sharing System7 (y) Section 644 of title 15, United States Code, “Procurement strategies; contract bundling” (z) Public Law 101-576
Architecture for Cognitive Networking within NASA's Future Space Communications Infrastructure
NASA Technical Reports Server (NTRS)
Clark, Gilbert; Eddy, Wesley M.; Johnson, Sandra K.; Barnes, James; Brooks, David
2016-01-01
Future space mission concepts and designs pose many networking challenges for command, telemetry, and science data applications with diverse end-to-end data delivery needs. For future end-to-end architecture designs, a key challenge is meeting expected application quality of service requirements for multiple simultaneous mission data flows with options to use diverse onboard local data buses, commercial ground networks, and multiple satellite relay constellations in LEO, GEO, MEO, or even deep space relay links. Effectively utilizing a complex network topology requires orchestration and direction that spans the many discrete, individually addressable computer systems, which cause them to act in concert to achieve the overall network goals. The system must be intelligent enough to not only function under nominal conditions, but also adapt to unexpected situations, and reorganize or adapt to perform roles not originally intended for the system or explicitly programmed. This paper describes an architecture enabling the development and deployment of cognitive networking capabilities into the envisioned future NASA space communications infrastructure. We begin by discussing the need for increased automation, including inter-system discovery and collaboration. This discussion frames the requirements for an architecture supporting cognitive networking for future missions and relays, including both existing endpoint-based networking models and emerging information-centric models. From this basis, we discuss progress on a proof-of-concept implementation of this architecture, and results of implementation and initial testing of a cognitive networking on-orbit application on the SCaN Testbed attached to the International Space Station.
Architecture for Cognitive Networking within NASAs Future Space Communications Infrastructure
NASA Technical Reports Server (NTRS)
Clark, Gilbert J., III; Eddy, Wesley M.; Johnson, Sandra K.; Barnes, James; Brooks, David
2016-01-01
Future space mission concepts and designs pose many networking challenges for command, telemetry, and science data applications with diverse end-to-end data delivery needs. For future end-to-end architecture designs, a key challenge is meeting expected application quality of service requirements for multiple simultaneous mission data flows with options to use diverse onboard local data buses, commercial ground networks, and multiple satellite relay constellations in LEO, MEO, GEO, or even deep space relay links. Effectively utilizing a complex network topology requires orchestration and direction that spans the many discrete, individually addressable computer systems, which cause them to act in concert to achieve the overall network goals. The system must be intelligent enough to not only function under nominal conditions, but also adapt to unexpected situations, and reorganize or adapt to perform roles not originally intended for the system or explicitly programmed. This paper describes architecture features of cognitive networking within the future NASA space communications infrastructure, and interacting with the legacy systems and infrastructure in the meantime. The paper begins by discussing the need for increased automation, including inter-system collaboration. This discussion motivates the features of an architecture including cognitive networking for future missions and relays, interoperating with both existing endpoint-based networking models and emerging information-centric models. From this basis, we discuss progress on a proof-of-concept implementation of this architecture as a cognitive networking on-orbit application on the SCaN Testbed attached to the International Space Station.
The study of grinding patterns and factors influencing the grinding areas during sleep bruxism.
Tao, Jianxiang; Liu, Weicai; Wu, Junhua; Zhang, Xuying; Zhang, Yongting
2015-10-01
The purpose of this study is to investigate the grinding patterns and discuss the factors influencing the position relationship between intercuspal position (ICP) and grinding area during sleep bruxism. Lateral condylar inclination, inclination of lateral incisal path and freedom in long centric of thirty subjects were measured. The grinding patterns during sleep bruxism were recorded with a bruxism recording device, BruxChecker. The position relationship between ICP and the grinding area was examined. Spearman's rank correlation coefficient was used for correlation analysis between grinding area and free factors (grinding patterns, freedom in long centric and discrepancy between lateral condylar inclination and inclination of lateral incisal path). All 12 subjects with 0mm-freedom in long centric exhibited that ICP of both sides located within the grinding areas. 4 subjects showed that ICP of both sides located outside the grinding areas. There is a significant correlation between 0mm-freedom in long centric and ICP within the grinding areas (p <0.01). Freedom in long centric has a significant effect on position relationship between intercuspal position and the grinding area. Copyright © 2015 Elsevier Ltd. All rights reserved.
Architecture-Centric Development in Globally Distributed Projects
NASA Astrophysics Data System (ADS)
Sauer, Joachim
In this chapter architecture-centric development is proposed as a means to strengthen the cohesion of distributed teams and to tackle challenges due to geographical and temporal distances and the clash of different cultures. A shared software architecture serves as blueprint for all activities in the development process and ties them together. Architecture-centric development thus provides a plan for task allocation, facilitates the cooperation of globally distributed developers, and enables continuous integration reaching across distributed teams. Advice is also provided for software architects who work with distributed teams in an agile manner.
A cloud-based X73 ubiquitous mobile healthcare system: design and implementation.
Ji, Zhanlin; Ganchev, Ivan; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji
2014-01-01
Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed "big data" processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems.
Cummings, M L
2004-12-01
In the recent development of a human-in-the-loop simulation test bed designed to examine human performance issues for supervisory control of the Navy's new Tactical Tomahawk missile, measurements of operator situation awareness (SA) and workload through secondary tasking were taken through an embedded instant messaging program. Instant message interfaces (otherwise known as "chat"), already a means of communication between Navy ships, allow researchers to query users in real-time in a natural, ecologic setting, and thus provide more realistic and unobtrusive measurements. However, in the course of this testing, results revealed that some subjects fixated on the real-time instant messaging secondary task instead of the primary task of missile control, leading to the overall degradation of mission performance as well as a loss of SA. While this research effort was the first to quantify command and control performance degradation as a result of instant messaging, the military has recognized that in its network centric warfare quest, instant messaging is a critical informal communication tool, but has associated problems. Recently, a military spokesman said that managing chat in current military operations was sometimes a "nightmare," because military personnel have difficulty in handling large amounts of information through chat, and then synthesizing knowledge from this information. This research highlights the need for further investigation of the role of instant messaging interfaces both on task performance and situation awareness, and how the associated problems could be ameliorated through adaptive display design.
A domain-centric solution to functional genomics via dcGO Predictor
2013-01-01
Background Computational/manual annotations of protein functions are one of the first routes to making sense of a newly sequenced genome. Protein domain predictions form an essential part of this annotation process. This is due to the natural modularity of proteins with domains as structural, evolutionary and functional units. Sometimes two, three, or more adjacent domains (called supra-domains) are the operational unit responsible for a function, e.g. via a binding site at the interface. These supra-domains have contributed to functional diversification in higher organisms. Traditionally functional ontologies have been applied to individual proteins, rather than families of related domains and supra-domains. We expect, however, to some extent functional signals can be carried by protein domains and supra-domains, and consequently used in function prediction and functional genomics. Results Here we present a domain-centric Gene Ontology (dcGO) perspective. We generalize a framework for automatically inferring ontological terms associated with domains and supra-domains from full-length sequence annotations. This general framework has been applied specifically to primary protein-level annotations from UniProtKB-GOA, generating GO term associations with SCOP domains and supra-domains. The resulting 'dcGO Predictor', can be used to provide functional annotation to protein sequences. The functional annotation of sequences in the Critical Assessment of Function Annotation (CAFA) has been used as a valuable opportunity to validate our method and to be assessed by the community. The functional annotation of all completely sequenced genomes has demonstrated the potential for domain-centric GO enrichment analysis to yield functional insights into newly sequenced or yet-to-be-annotated genomes. This generalized framework we have presented has also been applied to other domain classifications such as InterPro and Pfam, and other ontologies such as mammalian phenotype and disease ontology. The dcGO and its predictor are available at http://supfam.org/SUPERFAMILY/dcGO including an enrichment analysis tool. Conclusions As functional units, domains offer a unique perspective on function prediction regardless of whether proteins are multi-domain or single-domain. The 'dcGO Predictor' holds great promise for contributing to a domain-centric functional understanding of genomes in the next generation sequencing era. PMID:23514627
Zhang, Guolin; Scarborough, Hannah; Kim, Jihye; Rozhok, Andrii I.; Chen, Y. Ann; Zhang, Xiaohui; Song, Lanxi; Bai, Yun; Fang, Bin; Liu, Richard Z.; Koomen, John; Tan, Aik Choon; Degregori, James; Haura, Eric B.
2017-01-01
Patients with lung cancers harboring anaplastic lymphoma kinase (ALK) gene fusions benefit from treatment with ALK kinase inhibitors but acquired resistance inevitably arises. A better understanding of proximal ALK signaling mechanisms may identify sensitizers to ALK inhibitors that disrupt the balance between pro-survival and pro-apoptotic effector signals. Using affinity purification coupled with mass spectrometry in an ALK fusion lung cancer cell line (H3122), we generated an ALK signaling network and investigated signaling activity using tyrosine phosphoproteomics. We identified a network of 464 proteins composed of subnetworks with differential response to ALK inhibitors. A small hairpin RNA screen targeting 407 proteins in this network revealed 64 and 9 proteins whose loss sensitized cells to crizotinib and alectinib, respectively. Among these, knocking down fibroblast growth factor receptor substrate 2 (FRS2) or coiled-coil and C2 domain-containing protein 1A (CC2D1A, both scaffolding proteins, sensitized multiple ALK fusion cell lines to the ALK inhibitors crizotinib and alectinib. Collectively, our data provides a resource that enhances our understanding of signaling and drug resistance networks consequent to ALK fusions, and identifies potential targets to improve the efficacy of ALK inhibitors in patients. PMID:27811184
Geometrical study of phyllotactic patterns by Bernoulli spiral lattices.
Sushida, Takamichi; Yamagishi, Yoshikazu
2017-06-01
Geometrical studies of phyllotactic patterns deal with the centric or cylindrical models produced by ideal lattices. van Iterson (Mathematische und mikroskopisch - anatomische Studien über Blattstellungen nebst Betrachtungen über den Schalenbau der Miliolinen, Verlag von Gustav Fischer, Jena, 1907) suggested a centric model representing ideal phyllotactic patterns as disk packings of Bernoulli spiral lattices and presented a phase diagram now called Van Iterson's diagram explaining the bifurcation processes of their combinatorial structures. Geometrical properties on disk packings were shown by Rothen & Koch (J. Phys France, 50(13), 1603-1621, 1989). In contrast, as another centric model, we organized a mathematical framework of Voronoi tilings of Bernoulli spiral lattices and showed mathematically that the phase diagram of a Voronoi tiling is graph-theoretically dual to Van Iterson's diagram. This paper gives a review of two centric models for disk packings and Voronoi tilings of Bernoulli spiral lattices. © 2017 Japanese Society of Developmental Biologists.
Real-time shipboard displays for science operation and planning on CGC Healy
NASA Astrophysics Data System (ADS)
Roberts, S.; Chayes, D.; Arko, R.
2007-12-01
To facilitate effective science planning and decision making, we have developed a real-time geospatial browser and other displays widely used by many if not all members of USCGC Healy's science cruises and some officers and crew since 2004. In order to enable a 'zero-configuration' experience to the end user with nearly any modern browser, on any platform, anywhere on the ship with wired (or wireless) network access, we chose a Web-based/server-centric approach that provides a very low barrier to access in an environment where we have many participants constantly coming and going, often with their own computers. The principle interface for planning and operational decision making is a georeferenced, Web-based user interface built on the MapServer Web GIS platform developed at the University of Minnesota (http://mapserver.gis.umn.edu/), using the PostGIS spatial database extensions (http://postgis.refractions.net/) to enable live database connectivity. Data available include current ship position and orientation, historical ship tracks and data, seafloor bathymetry, station locations, RADARSAT, and subbottom profiles among others. In addition to the user interfaces that are part of individual instrumentation (such as the sonars and navigation systems), custom interfaces have been developed to centralize data with high update rates such as sea surface temperature, vessel attitude, position, etc. Underlying data acquisition and storage is provided by the Lamont Data System (LDS) and the NOAA SCS system. All data are stored on RAIDed disk systems and shared across a switched network with a gigabit fiber backbone. The real-time displays access data in a number of ways including real-time UDP datagrams from LDS, accessing files on disk, and querying a PostgreSQL relational backend. This work is supported by grants from the U.S. National Science Foundation, Office of Polar Programs, Arctic Science section.
Addressing security issues related to virtual institute distributed activities
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2008-03-01
One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.
Cognitive components of a mathematical processing network in 9-year-old children.
Szűcs, Dénes; Devine, Amy; Soltesz, Fruzsina; Nobes, Alison; Gabriel, Florence
2014-07-01
We determined how various cognitive abilities, including several measures of a proposed domain-specific number sense, relate to mathematical competence in nearly 100 9-year-old children with normal reading skill. Results are consistent with an extended number processing network and suggest that important processing nodes of this network are phonological processing, verbal knowledge, visuo-spatial short-term and working memory, spatial ability and general executive functioning. The model was highly specific to predicting arithmetic performance. There were no strong relations between mathematical achievement and verbal short-term and working memory, sustained attention, response inhibition, finger knowledge and symbolic number comparison performance. Non-verbal intelligence measures were also non-significant predictors when added to our model. Number sense variables were non-significant predictors in the model and they were also non-significant predictors when entered into regression analysis with only a single visuo-spatial WM measure. Number sense variables were predicted by sustained attention. Results support a network theory of mathematical competence in primary school children and falsify the importance of a proposed modular 'number sense'. We suggest an 'executive memory function centric' model of mathematical processing. Mapping a complex processing network requires that studies consider the complex predictor space of mathematics rather than just focusing on a single or a few explanatory factors.
NASA Astrophysics Data System (ADS)
Sun, Ge; Caldwell, Peter; Noormets, Asko; McNulty, Steven G.; Cohen, Erika; Moore Myers, Jennifer; Domec, Jean-Christophe; Treasure, Emrys; Mu, Qiaozhen; Xiao, Jingfeng; John, Ranjeet; Chen, Jiquan
2011-09-01
We developed a water-centric monthly scale simulation model (WaSSI-C) by integrating empirical water and carbon flux measurements from the FLUXNET network and an existing water supply and demand accounting model (WaSSI). The WaSSI-C model was evaluated with basin-scale evapotranspiration (ET), gross ecosystem productivity (GEP), and net ecosystem exchange (NEE) estimates by multiple independent methods across 2103 eight-digit Hydrologic Unit Code watersheds in the conterminous United States from 2001 to 2006. Our results indicate that WaSSI-C captured the spatial and temporal variability and the effects of large droughts on key ecosystem fluxes. Our modeled mean (±standard deviation in space) ET (556 ± 228 mm yr-1) compared well to Moderate Resolution Imaging Spectroradiometer (MODIS) based (527 ± 251 mm yr-1) and watershed water balance based ET (571 ± 242 mm yr-1). Our mean annual GEP estimates (1362 ± 688 g C m-2 yr-1) compared well (R2 = 0.83) to estimates (1194 ± 649 g C m-2 yr-1) by eddy flux-based EC-MOD model, but both methods led significantly higher (25-30%) values than the standard MODIS product (904 ± 467 g C m-2 yr-1). Among the 18 water resource regions, the southeast ranked the highest in terms of its water yield and carbon sequestration capacity. When all ecosystems were considered, the mean NEE (-353 ± 298 g C m-2 yr-1) predicted by this study was 60% higher than EC-MOD's estimate (-220 ± 225 g C m-2 yr-1) in absolute magnitude, suggesting overall high uncertainty in quantifying NEE at a large scale. Our water-centric model offers a new tool for examining the trade-offs between regional water and carbon resources under a changing environment.
Post, Andrew; Oeur, Anna; Walsh, Evan; Hoshizaki, Blaine; Gilchrist, Michael D
2014-01-01
American football reports high incidences of head injuries, in particular, concussion. Research has described concussion as primarily a rotation dominant injury affecting the diffuse areas of brain tissue. Current standards do not measure how helmets manage rotational acceleration or how acceleration loading curves influence brain deformation from an impact and thus are missing important information in terms of how concussions occur. The purpose of this study was to investigate a proposed three-dimensional impact protocol for use in evaluating football helmets. The dynamic responses resulting from centric and non-centric impact conditions were examined to ascertain the influence they have on brain deformations in different functional regions of the brain that are linked to concussive symptoms. A centric and non-centric protocol was used to impact an American football helmet; the resulting dynamic response data was used in conjunction with a three-dimensional finite element analysis of the human brain to calculate brain tissue deformation. The direction of impact created unique loading conditions, resulting in peaks in different regions of the brain associated with concussive symptoms. The linear and rotational accelerations were not predictive of the brain deformation metrics used in this study. In conclusion, the test protocol used in this study revealed that impact conditions influences the region of loading in functional regions of brain tissue that are associated with the symptoms of concussion. The protocol also demonstrated that using brain deformation metrics may be more appropriate when evaluating risk of concussion than using dynamic response data alone.
Revisiting the Robustness of PET-Based Textural Features in the Context of Multi-Centric Trials
Bailly, Clément; Bodet-Milin, Caroline; Couespel, Solène; Necib, Hatem; Kraeber-Bodéré, Françoise; Ansquer, Catherine; Carlier, Thomas
2016-01-01
Purpose This study aimed to investigate the variability of textural features (TF) as a function of acquisition and reconstruction parameters within the context of multi-centric trials. Methods The robustness of 15 selected TFs were studied as a function of the number of iterations, the post-filtering level, input data noise, the reconstruction algorithm and the matrix size. A combination of several reconstruction and acquisition settings was devised to mimic multi-centric conditions. We retrospectively studied data from 26 patients enrolled in a diagnostic study that aimed to evaluate the performance of PET/CT 68Ga-DOTANOC in gastro-entero-pancreatic neuroendocrine tumors. Forty-one tumors were extracted and served as the database. The coefficient of variation (COV) or the absolute deviation (for the noise study) was derived and compared statistically with SUVmax and SUVmean results. Results The majority of investigated TFs can be used in a multi-centric context when each parameter is considered individually. The impact of voxel size and noise in the input data were predominant as only 4 TFs presented a high/intermediate robustness against SUV-based metrics (Entropy, Homogeneity, RP and ZP). When combining several reconstruction settings to mimic multi-centric conditions, most of the investigated TFs were robust enough against SUVmax except Correlation, Contrast, LGRE, LGZE and LZLGE. Conclusion Considering previously published results on either reproducibility or sensitivity against delineation approach and our findings, it is feasible to consider Homogeneity, Entropy, Dissimilarity, HGRE, HGZE and ZP as relevant for being used in multi-centric trials. PMID:27467882
Distributed Telescope Networks in the Era of Network-Centric Astronomy
NASA Astrophysics Data System (ADS)
Solomos, N. H.
2010-07-01
In parallel with the world-wide demand for pushing our observational limits (increasingly larger telescope collecting power (ELTs) on the ground, most advanced technology satellites in space), we nowadays realize rapid rising of interest for the construction and deployment of a technologically advanced meta-network or Heterogeneous Telescope Network (hereafter HTN). The HTN is a Network of networks of telescopes and each node of it, consists of an inhomogeneous ensemble of different telescopes, sharing one common feature: the incorporation of a high degree of automation. The rationale behind this new tool, is that crucial astrophysical problems could be tackled very soon from the world-wide spread variety of well equipped autonomous telescopes working as a single instrument. In the full version of this paper, the research potential and future prospects of worldwide networked telescopic systems, is reviewed in the framework of current progress in Astrophysics. It is concluded that the research horizons of HTNs are very broad and the associated technology is currently in a maturity level that permits deployment. An extended interoperability-establishment initiative, involving telescopes of both hemispheres, based on accepted standards, appears a matter of priority. Observatories with infrastructure -of any size-, maintaining computerized telescope facilities, could respond to the challenge, devote part of their resources to the HTN and, in return, receive the rewards of shared resources, observing flexibility, optimized observing performance and the very high observing efficiency of a telescopic meta-network in facilitating competitive front line research.
Sagittal endplate morphology of the lower lumbar spine.
Lakshmanan, Palaniappan; Purushothaman, Balaji; Dvorak, Vlasta; Schratt, Walter; Thambiraj, Sathya; Boszczyk, Maximilian
2012-05-01
The sagittal profile of lumbar endplates is discrepant from current simplified disc replacement and fusion device design. Endplate concavity is symmetrical in the coronal plane but shows considerable variability in the sagittal plane, which may lead to implant-endplate mismatch. The aim of this investigation is to provide further analysis of the sagittal endplate morphology of the mid to lower lumbar spine study (L3–S1), thereby identifying the presence of common endplate shape patterns across these levels and providing morphological reference values complementing the findings of previous studies. Observational study. A total of 174 magnetic resonance imaging (MRI) scans of the adult lumbar spine from the digital archive of our centre, which met the inclusion criteria, were studied. Superior (SEP) and inferior (IEP) endplate shape was divided into flat (no concavity), oblong (homogeneous concavity) and ex-centric (inhomogeneous concavity). The concavity depth (ECD) and location of concavity apex (ECA) relative to endplate diameter of the vertebrae L3–S1 were determined. Flat endplates were only predominant at the sacrum SEP (84.5%). The L5 SEP was flat in 24.7% and all other endplates in less than 10%. The majority of endplates were concave with a clear trend of endplate shape becoming more ex-centric from L3 IEP (56.9% oblong vs. 37.4% ex-centric) to L5 IEP (4% oblong vs. 94.3% ex-centric). Ex-centric ECA were always found in the posterior half of the lumbar endplates. Both the oblong and ex-centric ECD was 2-3 mm on average with the IEP of a motion segment regularly possessing the greater depth. A sex- or age-related difference could not be found. The majority of lumbar endplates are concave, while the majority of sacral endplates are flat. An oblong and an ex-centric endplate shape can be distinguished, whereby the latter is more common at the lower lumbar levels. The apex of the concavity of ex-centric discs is located in the posterior half of the endplate and the concavity of the inferior endplate is deeper than that of the superior endplate. Based on the above, the current TDR and ALIF implant design does not sufficiently match the morphology of lumbar endplates in the sagittal plane.
Neo-Darwinism, the Modern Synthesis and selfish genes: are they of use in physiology?
Noble, Denis
2011-01-01
This article argues that the gene-centric interpretations of evolution, and more particularly the selfish gene expression of those interpretations, form barriers to the integration of physiological science with evolutionary theory. A gene-centred approach analyses the relationships between genotypes and phenotypes in terms of differences (change the genotype and observe changes in phenotype). We now know that, most frequently, this does not correctly reveal the relationships because of extensive buffering by robust networks of interactions. By contrast, understanding biological function through physiological analysis requires an integrative approach in which the activity of the proteins and RNAs formed from each DNA template is analysed in networks of interactions. These networks also include components that are not specified by nuclear DNA. Inheritance is not through DNA sequences alone. The selfish gene idea is not useful in the physiological sciences, since selfishness cannot be defined as an intrinsic property of nucleotide sequences independently of gene frequency, i.e. the ‘success’ in the gene pool that is supposed to be attributable to the ‘selfish’ property. It is not a physiologically testable hypothesis. PMID:21135048
Neo-Darwinism, the modern synthesis and selfish genes: are they of use in physiology?
Noble, Denis
2011-03-01
This article argues that the gene-centric interpretations of evolution, and more particularly the selfish gene expression of those interpretations, form barriers to the integration of physiological science with evolutionary theory. A gene-centred approach analyses the relationships between genotypes and phenotypes in terms of differences (change the genotype and observe changes in phenotype). We now know that, most frequently, this does not correctly reveal the relationships because of extensive buffering by robust networks of interactions. By contrast, understanding biological function through physiological analysis requires an integrative approach in which the activity of the proteins and RNAs formed from each DNA template is analysed in networks of interactions. These networks also include components that are not specified by nuclear DNA. Inheritance is not through DNA sequences alone. The selfish gene idea is not useful in the physiological sciences, since selfishness cannot be defined as an intrinsic property of nucleotide sequences independently of gene frequency, i.e. the 'success' in the gene pool that is supposed to be attributable to the 'selfish' property. It is not a physiologically testable hypothesis.
Device Centric Throughput and QoS Optimization for IoTsin a Smart Building Using CRN-Techniques
Aslam, Saleem; Hasan, Najam Ul; Shahid, Adnan; Jang, Ju Wook; Lee, Kyung-Geun
2016-01-01
The Internet of Things (IoT) has gained an incredible importance in the communication and networking industry due to its innovative solutions and advantages in diverse domains. The IoT’ network is a network of smart physical objects: devices, vehicles, buildings, etc. The IoT has a number of applications ranging from smart home, smart surveillance to smart healthcare systems. Since IoT consists of various heterogeneous devices that exhibit different traffic patterns and expect different quality of service (QoS) in terms of data rate, bit error rate and the stability index of the channel, therefore, in this paper, we formulated an optimization problem to assign channels to heterogeneous IoT devices within a smart building for the provisioning of their desired QoS. To solve this problem, a novel particle swarm optimization-based algorithm is proposed. Then, exhaustive simulations are carried out to evaluate the performance of the proposed algorithm. Simulation results demonstrate the supremacy of our proposed algorithm over the existing ones in terms of throughput, bit error rate and the stability index of the channel. PMID:27782057
Understanding interfirm relationships in business ecosystems with interactive visualization.
Basole, Rahul C; Clear, Trustin; Hu, Mengdie; Mehrotra, Harshit; Stasko, John
2013-12-01
Business ecosystems are characterized by large, complex, and global networks of firms, often from many different market segments, all collaborating, partnering, and competing to create and deliver new products and services. Given the rapidly increasing scale, complexity, and rate of change of business ecosystems, as well as economic and competitive pressures, analysts are faced with the formidable task of quickly understanding the fundamental characteristics of these interfirm networks. Existing tools, however, are predominantly query- or list-centric with limited interactive, exploratory capabilities. Guided by a field study of corporate analysts, we have designed and implemented dotlink360, an interactive visualization system that provides capabilities to gain systemic insight into the compositional, temporal, and connective characteristics of business ecosystems. dotlink360 consists of novel, multiple connected views enabling the analyst to explore, discover, and understand interfirm networks for a focal firm, specific market segments or countries, and the entire business ecosystem. System evaluation by a small group of prototypical users shows supporting evidence of the benefits of our approach. This design study contributes to the relatively unexplored, but promising area of exploratory information visualization in market research and business strategy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ripeanu, Matei; Al-Kiswany, Samer; Iamnitchi, Adriana
2009-03-01
The avalanche of data from scientific instruments and the ensuing interest from geographically distributed users to analyze and interpret it accentuates the need for efficient data dissemination. A suitable data distribution scheme will find the delicate balance between conflicting requirements of minimizing transfer times, minimizing the impact on the network, and uniformly distributing load among participants. We identify several data distribution techniques, some successfully employed by today's peer-to-peer networks: staging, data partitioning, orthogonal bandwidth exploitation, and combinations of the above. We use simulations to explore the performance of these techniques in contexts similar to those used by today's data-centric scientificmore » collaborations and derive several recommendations for efficient data dissemination. Our experimental results show that the peer-to-peer solutions that offer load balancing and good fault tolerance properties and have embedded participation incentives lead to unjustified costs in today's scientific data collaborations deployed on over-provisioned network cores. However, as user communities grow and these deployments scale, peer-to-peer data delivery mechanisms will likely outperform other techniques.« less
Rethinking Human-Centered Computing: Finding the Customer and Negotiated Interactions at the Airport
NASA Technical Reports Server (NTRS)
Wales, Roxana; O'Neill, John; Mirmalek, Zara
2003-01-01
The breakdown in the air transportation system over the past several years raises an interesting question for researchers: How can we help improve the reliability of airline operations? In offering some answers to this question, we make a statement about Huuman-Centered Computing (HCC). First we offer the definition that HCC is a multi-disciplinary research and design methodology focused on supporting humans as they use technology by including cognitive and social systems, computational tools and the physical environment in the analysis of organizational systems. We suggest that a key element in understanding organizational systems is that there are external cognitive and social systems (customers) as well as internal cognitive and social systems (employees) and that they interact dynamically to impact the organization and its work. The design of human-centered intelligent systems must take this outside-inside dynamic into account. In the past, the design of intelligent systems has focused on supporting the work and improvisation requirements of employees but has often assumed that customer requirements are implicitly satisfied by employee requirements. Taking a customer-centric perspective provides a different lens for understanding this outside-inside dynamic, the work of the organization and the requirements of both customers and employees In this article we will: 1) Demonstrate how the use of ethnographic methods revealed the important outside-inside dynamic in an airline, specifically the consequential relationship between external customer requirements and perspectives and internal organizational processes and perspectives as they came together in a changing environment; 2) Describe how taking a customer centric perspective identifies places where the impact of the outside-inside dynamic is most critical and requires technology that can be adaptive; 3) Define and discuss the place of negotiated interactions in airline operations, identifying how these interactions between customers and airline employees provided new insights into design problems in the airline system; 4) Show how taking a customer-centric perspective influences the HCC design of an airline system and make recommendations for new architectures and intelligent devices that will enable airline systems to adapt flexibly to delay situations, supporting both customers and airline employees.
Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility
NASA Technical Reports Server (NTRS)
Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer
2009-01-01
Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits and difficulties that a migration to cloud-based computing philosophies has uncovered when compared to the legacy Mission Control Center architecture. The team consists of system and software engineers with extensive experience with the MCC infrastructure and software currently used to support the International Space Station (ISS) and Space Shuttle program (SSP).
2013-04-09
No matter the contingency, the GPF will benefit from an expanded culture and language program. Incidents from OIF/OEF – like the Abu Ghraib Prison...was the 2003/2004 Abu Ghraib Prison Abuse Scandal during OIF. Skills on par with being diplomatic and persuasive (indicating a need to negotiate...propagation of C3-centric attitudes in service members.15 In the case of the Abu Ghraib Scandal, basic linguistic skills may or may not have helped
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erickson, Michael Charles
Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.
2010-04-01
Maintaining Readiness, RAND Report MR-1506 (Santa Monica, CA: RAND, 2003, 58. 15 Graham, David R . Statement before the U.S. Congress Committee on...2. 19 Ibid., 4. 20 Ibid., 2. 21 Bolkcom, Christopher, CRAF, 9. 22 Graham, David R ., 3. 23 Cortez, Robert K. Statement before the U.S...Retrieved from http://www.state.gov/ r /pa/prs/ps/2009/july/126397.htm on 8 Dec 2009. 30 GlobalSecurity.org. “Man Portable Air Defense Systems (MANPADS
The challenge of civil-military relations in international peace operations.
Pugh, M
2001-12-01
The relationship between military and civilian humanitarian organisations has developed in an increasingly integrative way. Military initiatives to institutionalise the relationship, since the interventions in Somalia and the Balkans, entail a dilution of humanitarian independence as was manifested in practice in Kosovo. Further, the state-centric foundations of military intervention run counter to the potential for humanitarian organisations to foster a cosmopolitan ethos that would not only preserve humanitarian principles but also contest statist assumptions about conflict, development and power.
2005 8th Annual Systems Engineering Conference Volume 3 - Wednesday presentations
2005-10-24
phasi s on s ystem s eng ineeri ng Imple menta tion o f SE P lans Requires PEO chief engineer Conduct of technical reviews SE Policy Addendum Signed by...in a Performance Based Logistics Environment, Denise Duncan, LMI Track 5 - Best Practices & Standardization: CMMI for Services, Mr. Juan Ceva...CMMI for Services Mr. Juan Ceva, Raytheon RIS TRACK 5 Logistics Session 3C5 TRACK 4 Net Centric Operations Session 3C4 TRACK 6 Modeling & Simulation
NASA Technical Reports Server (NTRS)
Swei, Sean
2014-01-01
We propose to develop a robust guidance and control system for the ADEPT (Adaptable Deployable Entry and Placement Technology) entry vehicle. A control-centric model of ADEPT will be developed to quantify the performance of candidate guidance and control architectures for both aerocapture and precision landing missions. The evaluation will be based on recent breakthroughs in constrained controllability/reachability analysis of control systems and constrained-based energy-minimum trajectory optimization for guidance development operating in complex environments.
TAMU: A New Space Mission Operations Paradigm
NASA Technical Reports Server (NTRS)
Meshkat, Leila; Ruszkowski, James; Haensly, Jean; Pennington, Granvil A.; Hogle, Charles
2011-01-01
The Transferable, Adaptable, Modular and Upgradeable (TAMU) Flight Production Process (FPP) is a model-centric System of System (SoS) framework which cuts across multiple organizations and their associated facilities, that are, in the most general case, in geographically diverse locations, to develop the architecture and associated workflow processes for a broad range of mission operations. Further, TAMU FPP envisions the simulation, automatic execution and re-planning of orchestrated workflow processes as they become operational. This paper provides the vision for the TAMU FPP paradigm. This includes a complete, coherent technique, process and tool set that result in an infrastructure that can be used for full lifecycle design and decision making during any flight production process. A flight production process is the process of developing all products that are necessary for flight.
Activity-Centric Approach to Distributed Programming
NASA Technical Reports Server (NTRS)
Levy, Renato; Satapathy, Goutam; Lang, Jun
2004-01-01
The first phase of an effort to develop a NASA version of the Cybele software system has been completed. To give meaning to even a highly abbreviated summary of the modifications to be embodied in the NASA version, it is necessary to present the following background information on Cybele: Cybele is a proprietary software infrastructure for use by programmers in developing agent-based application programs [complex application programs that contain autonomous, interacting components (agents)]. Cybele provides support for event handling from multiple sources, multithreading, concurrency control, migration, and load balancing. A Cybele agent follows a programming paradigm, called activity-centric programming, that enables an abstraction over system-level thread mechanisms. Activity centric programming relieves application programmers of the complex tasks of thread management, concurrency control, and event management. In order to provide such functionality, activity-centric programming demands support of other layers of software. This concludes the background information. In the first phase of the present development, a new architecture for Cybele was defined. In this architecture, Cybele follows a modular service-based approach to coupling of the programming and service layers of software architecture. In a service-based approach, the functionalities supported by activity-centric programming are apportioned, according to their characteristics, among several groups called services. A well-defined interface among all such services serves as a path that facilitates the maintenance and enhancement of such services without adverse effect on the whole software framework. The activity-centric application-program interface (API) is part of a kernel. The kernel API calls the services by use of their published interface. This approach makes it possible for any application code written exclusively under the API to be portable for any configuration of Cybele.
GraphReduce: Processing Large-Scale Graphs on Accelerator-Based Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sengupta, Dipanjan; Song, Shuaiwen; Agarwal, Kapil
2015-11-15
Recent work on real-world graph analytics has sought to leverage the massive amount of parallelism offered by GPU devices, but challenges remain due to the inherent irregularity of graph algorithms and limitations in GPU-resident memory for storing large graphs. We present GraphReduce, a highly efficient and scalable GPU-based framework that operates on graphs that exceed the device’s internal memory capacity. GraphReduce adopts a combination of edge- and vertex-centric implementations of the Gather-Apply-Scatter programming model and operates on multiple asynchronous GPU streams to fully exploit the high degrees of parallelism in GPUs with efficient graph data movement between the host andmore » device.« less
Nindl, Bradley C; Jones, Bruce H; Van Arsdale, Stephanie J; Kelly, Karen; Kraemer, William J
2016-01-01
This article summarizes presentations from a 2014 United States Department of Defense (DoD) Health Affairs Women in Combat symposium addressing physiological, musculoskeletal injury, and optimized physical training considerations from the operational physical performance section. The symposium was held to provide a state-of-the-science meeting on the U.S. DoD's rescinding of the ground combat exclusion policy opening up combat-centric occupations to women. Physiological, metabolic, body composition, bone density, cardiorespiratory fitness, and thermoregulation differences between men and women were briefly reviewed. Injury epidemiological data are presented within military training and operational environments demonstrating women to be at a higher risk for musculoskeletal injuries than men. Physical training considerations for improved muscle strength and power, occupational task performance, load carriage were also reviewed. Particular focus of this article was given to translating physiological and epidemiological findings from the literature on these topics toward actionable guidance and policy recommendations for military leaders responsible for military physical training doctrine: (1) inclusion of resistance training with special emphasis on strength and power development (i.e., activation of high-threshold motor units and recruitment of type II high-force muscle fibers), upper-body strength development, and heavy load carriage, (2) moving away from "field expediency" as the major criteria for determining military physical training policy and training implementation, (3) improvement of load carriage ability with emphasis placed on specific load carriage task performance, combined with both resistance and endurance training, and (4) providing greater equipment resources, coaching assets, and increased training time dedicated to physical readiness training. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.
The multiscale backbone of the human phenotype network based on biological pathways.
Darabos, Christian; White, Marquitta J; Graham, Britney E; Leung, Derek N; Williams, Scott M; Moore, Jason H
2014-01-25
Networks are commonly used to represent and analyze large and complex systems of interacting elements. In systems biology, human disease networks show interactions between disorders sharing common genetic background. We built pathway-based human phenotype network (PHPN) of over 800 physical attributes, diseases, and behavioral traits; based on about 2,300 genes and 1,200 biological pathways. Using GWAS phenotype-to-genes associations, and pathway data from Reactome, we connect human traits based on the common patterns of human biological pathways, detecting more pleiotropic effects, and expanding previous studies from a gene-centric approach to that of shared cell-processes. The resulting network has a heavily right-skewed degree distribution, placing it in the scale-free region of the network topologies spectrum. We extract the multi-scale information backbone of the PHPN based on the local densities of the network and discarding weak connection. Using a standard community detection algorithm, we construct phenotype modules of similar traits without applying expert biological knowledge. These modules can be assimilated to the disease classes. However, we are able to classify phenotypes according to shared biology, and not arbitrary disease classes. We present examples of expected clinical connections identified by PHPN as proof of principle. We unveil a previously uncharacterized connection between phenotype modules and discuss potential mechanistic connections that are obvious only in retrospect. The PHPN shows tremendous potential to become a useful tool both in the unveiling of the diseases' common biology, and in the elaboration of diagnosis and treatments.
ERIC Educational Resources Information Center
Risner, Doug; Barr, Sherrie
2015-01-01
Preparing dance specialist teachers to successfully educate an increasingly diverse student population highlights a number of challenges within an educational policy landscape characterized by technical production, methods-centric teacher preparation, teacher-proof curriculum, and standardization. The ramifications of these policies have…
Data Centric Development Methodology
ERIC Educational Resources Information Center
Khoury, Fadi E.
2012-01-01
Data centric applications, an important effort of software development in large organizations, have been mostly adopting a software methodology, such as a waterfall or Rational Unified Process, as the framework for its development. These methodologies could work on structural, procedural, or object oriented based applications, but fails to capture…
Planning Readings: A Comparative Exploration of Basic Algorithms
ERIC Educational Resources Information Center
Piater, Justus H.
2009-01-01
Conventional introduction to computer science presents individual algorithmic paradigms in the context of specific, prototypical problems. To complement this algorithm-centric instruction, this study additionally advocates problem-centric instruction. I present an original problem drawn from students' life that is simply stated but provides rich…
Mutz, M; Boudreaux, B; Kearney, M; Stroda, K; Gaunt, S; Shiomitsu, K
2015-12-01
Canine multi-centric B-cell lymphoma shares similarities with diffuse large B-cell (Non-Hodgkin's) lymphoma (NHL) in people. In people with NHL, lymphopenia at diagnosis and first relapse and neutrophil/lymphocyte ratio (N:L) > 3.5 are negative prognostic factors for survival. The objective of this study was to determine if lymphocyte concentration at diagnosis and first relapse and N:L were prognostic for survival in dogs with newly diagnosed multi-centric lymphoma. Medical records of 77 dogs with multi-centric lymphoma treated with a CHOP-based chemotherapy protocol were retrospectively evaluated. Absolute lymphocyte concentration and N:L ratio at presentation of dogs pre-treated with steroids was not significantly different from dogs who had not received steroids. On multivariate analysis, only immunophenotype remained significant for progression-free survival (PFS), whereas no variables remained significant for ST. A prospective study of these haematologic variables is warranted to assess their true significance. © 2013 John Wiley & Sons Ltd.
Critical Success Factors of Internet Shopping: The Case of Japan
NASA Astrophysics Data System (ADS)
Atchariyachanvanich, Kanokwan; Okada, Hitoshi; Sonehara, Noboru
This paper presents the results from a study conducted on the effect of differing factors on a customer's attitude towards using Internet shopping in Japan. The research model used was an extended version of the consumers' acceptance of virtual stores model with the addition of a new factor, need specificity, and a grouping of critical success factors based on their customer-centric and website-centric viewpoints sources. It examines how differences in the individual characteristics of customers affect the actual use of Internet shopping. According to an online questionnaire filled out by 1,215 online customers used to conduct a multiple regression analysis and a structural equation modeling analysis, the participant's gender, education level, innovativeness, net-orientation, and need specificity, which are the factors for the customer-centric viewpoints, have a positive impact on the actual use of Internet shopping. The implication also shows that Japanese online customers do not worry about the quality of service of Internet shopping, a factor in the website-centric viewpoint, as significantly as offline customers do.
Sharma, G G; Sharma, T
1998-01-01
The Mus terricolor complex displays a stable homozygous arrangement of autosomal heterochromatin variations in the form of accretion of definitive autosomal short arms among three nonoverlapping populations, in concert with an expeditious evolutionary differentiation into three chromosomal species: M. terricolor I, II, and III. In contrast to the highly conservative M. musculus-like chromosomes in the coexisting sibling species, M. booduga, reshuffling and differentiation of centric heterochromatin has occurred in harmony with a revision of centric configurations, resulting in acrocentric and submetacentric autosomes. The chromosomal distribution of the prevalent vertebrate telomeric sequence (TTAGGG)n was examined by fluorescence in situ hybridization to metaphase cells of M. terricolor I, II, and III. An unusual centric organization of internal telomeric sequences was detected in all the submetacentric and acrocentric autosomes. An auxiliary role of these presumably fragile, recombinogenic telomeric sequences in the evolutionary revision of centric configurations in the terricolor complex is hypothesized.
High-speed laser communications in UAV scenarios
NASA Astrophysics Data System (ADS)
Griethe, Wolfgang; Gregory, Mark; Heine, Frank; Kämpfner, Hartmut
2011-05-01
Optical links, based on coherent homodyne detection and BPSK modulation with bidirectional data transmission of 5.6 Gbps over distances of about 5,000 km and BER of 10-8, have been sufficiently verified in space. The verification results show that this technology is suitable not only for space applications but also for applications in the troposphere. After a brief description of the Laser Communication Terminal (LCT) for space applications, the paper consequently discusses the future utilization of satellite-based optical data links for Beyond Line of Sight (BLOS) operations of High Altitude Long Endurance (HALE) Unmanned Aerial Vehicles (UAV). It is shown that the use of optical frequencies is the only logical consequence of an ever-increasing demand for bandwidth. In terms of Network Centric Warfare it is highly recommended that Unmanned Aircraft Systems (UAS) of the future should incorporate that technology which allows almost unlimited bandwidth. The advantages of optical communications especially for Intelligence, Surveillance and Reconnaissance (ISR) are underlined. Moreover, the preliminary design concept of an airborne laser communication terminal is described. Since optical bi-directional links have been tested between a LCT in space and a TESAT Optical Ground Station (OGS), preliminary analysis on tracking and BER performance and the impact of atmospheric disturbances on coherent links will be presented.
Multi-centric universal pseudonymisation for secondary use of the EHR.
Lo Iacono, Luigi
2007-01-01
This paper discusses the importance of protecting the privacy of patient data kept in an Electronic Health Record (EHR) in the case, where it leaves the control- and protection-sphere of the health care realm for secondary uses such as clinical or epidemiological research projects, health care research, assessment of treatment quality or economic assessments. The paper focuses on multi-centric studies, where various data sources are linked together using Grid technologies. It introduces a pseudonymisation system which enables a multi-centric universal pseudonymisation, meaning that a patient's identity will result in the same pseudonym, regardless of which participating study center the patient data is collected.
NASA Astrophysics Data System (ADS)
Donhefner, Daniel
The mobile market evolves from commodity voice and simple messaging services to value-added data and multimedia services. This not only implies to move from pure telecom to IT/IP- environment, but to exploit their markets with innovative and differentiated offerings to keep the churn rate low and attract new customers. Communication Service Providers (CSP) must focus increasingly on meeting individual needs and higher expectations of their subscribers. They expect service packages that can be tailored to meet the specific demands of their personal situation, preferences and lifestyle. This requires a flexible customer-centric approach instead of the legacy historical grown and diversed system architecture and organizations of CSPs.
A Cloud-Based X73 Ubiquitous Mobile Healthcare System: Design and Implementation
Ji, Zhanlin; O'Droma, Máirtín; Zhang, Xin; Zhang, Xueji
2014-01-01
Based on the user-centric paradigm for next generation networks, this paper describes a ubiquitous mobile healthcare (uHealth) system based on the ISO/IEEE 11073 personal health data (PHD) standards (X73) and cloud computing techniques. A number of design issues associated with the system implementation are outlined. The system includes a middleware on the user side, providing a plug-and-play environment for heterogeneous wireless sensors and mobile terminals utilizing different communication protocols and a distributed “big data” processing subsystem in the cloud. The design and implementation of this system are envisaged as an efficient solution for the next generation of uHealth systems. PMID:24737958
Cyberspace Security Econometrics System (CSES)
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-07-27
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variancemore » that may exist among the stakes one attaches to meeting each requirement.« less
User-Centric Multi-Criteria Information Retrieval
NASA Technical Reports Server (NTRS)
Wolfe, Shawn R.; Zhang, Yi
2009-01-01
Information retrieval models usually represent content only, and not other considerations, such as authority, cost, and recency. How could multiple criteria be utilized in information retrieval, and how would it affect the results? In our experiments, using multiple user-centric criteria always produced better results than a single criteria.
2004-09-01
sympatico.caGuy ThériaultGeneral Dynamics Canada Ltd Charlie.jamieson@lmco.comCharlie JamiesonLockheed Martin Canada D.lacroix@oerlikon.caDenis LacroixOerlikon Contraves Inc Bill.wright@oculusinfo.comBill WrightOculus
User-Centric Approach for Benchmark RDF Data Generator in Big Data Performance Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purohit, Sumit; Paulson, Patrick R.; Rodriguez, Luke R.
This research focuses on user-centric approach of building such tools and proposes a flexible, extensible, and easy to use framework to support performance analysis of Big Data systems. Finally, case studies from two different domains are presented to validate the framework.
Military Medical Decision Support for Homeland Defense During Emergency
2004-12-01
abstraction hierarchy, three levels of information requirement for designing emergency training interface are recognized. These are epistemological ...support human decision making process is considered to be decision-centric. A typical decision-centric interface is supported by at least four design ... Designing Emergency Training Interface ......................................................................................... 5 Epistemological
A Drug-Centric View of Drug Development: How Drugs Spread from Disease to Disease.
Rodriguez-Esteban, Raul
2016-04-01
Drugs are often seen as ancillary to the purpose of fighting diseases. Here an alternative view is proposed in which they occupy a spearheading role. In this view, drugs are technologies with an inherent therapeutic potential. Once created, they can spread from disease to disease independently of the drug creator's original intentions. Through the analysis of extensive literature and clinical trial records, it can be observed that successful drugs follow a life cycle in which they are studied at an increasing rate, and for the treatment of an increasing number of diseases, leading to clinical advancement. Such initial growth, following a power law on average, has a degree of momentum, but eventually decelerates, leading to stagnation and decay. A network model can describe the propagation of drugs from disease to disease in which diseases communicate with each other by receiving and sending drugs. Within this model, some diseases appear more prone to influence other diseases than be influenced, and vice versa. Diseases can also be organized into a drug-centric disease taxonomy based on the drugs that each adopts. This taxonomy reflects not only biological similarities across diseases, but also the level of differentiation of existing therapies. In sum, this study shows that drugs can become contagious technologies playing a driving role in the fight against disease. By better understanding such dynamics, pharmaceutical developers may be able to manage drug projects more effectively.
Discourse-Centric Learning Analytics: Mapping the Terrain
ERIC Educational Resources Information Center
Knight, Simon; Littleton, Karen
2015-01-01
There is an increasing interest in developing learning analytic techniques for the analysis, and support of, high-quality learning discourse. This paper maps the terrain of discourse-centric learning analytics (DCLA), outlining the distinctive contribution of DCLA and outlining a definition for the field moving forwards. It is our claim that DCLA…
Evolving from Course-Centric to Learning-Centric: Portfolios, Wikis, and Social Learning
ERIC Educational Resources Information Center
Everhart, Deborah
2006-01-01
Teaching and learning strategies for using course management systems have evolved from basic "fill in the blank" models to interactive designs that encourage multi-formatted individual contributions and collaborative forms of learning. In keeping with the participatory development of online resources, web-based courses are shifting from…
Re-Awakening the Learner: Creating Learner-Centric, Standards-Driven Schools
ERIC Educational Resources Information Center
Stoll, Copper; Giddings, Gene
2012-01-01
Transformation of public education requires the reawakening of the sleeping giant in the room: the learners. Students, teachers, and principals must develop a learner-centric, standards-driven school. "Reawakening the Learner" is a guide to creating just such an environment. Continua describe the journey of teachers, teacher leaders, and…
Beyond knowledge capture: creating useful work-centric systems
NASA Technical Reports Server (NTRS)
Cooper, L. P.; Majchrzak, A.
2001-01-01
Once you have successfully captured knowledge, the challenge then becomes one of creating an affective way to use that knowledge. Two high knowledge content systems developed at the Jet Propulsion Laboratory are presented as examples of work-centric systems, where the primary value to the user is in the content.
Policies | High-Performance Computing | NREL
Use Learn about policy governing user accountability, resource use, use by foreign nationals states. Data Security Learn about the data security policy, including data protection, data security retention policy, including project-centric and user-centric data. Shared Storage Usage Learn about a policy
A 14/28 dicentric Robertsonian translocation in a Holstein cow.
Ellsworth, S M; Paul, S R; Bunch, T D
1979-02-01
A new dicentric Robertsonian translocation is described in a Holstein cow. The translocation appears to have arisen spontaneously from the centric fusion of autosomal acro centrics 14 and 28 which resulted in a diploid chromosome number of 59. Behavioral and phenotypic anomalies of the affected cow are discussed.
A Domain Specific Modeling Approach for Coordinating User-Centric Communication Services
ERIC Educational Resources Information Center
Wu, Yali
2011-01-01
Rapid advances in electronic communication devices and technologies have resulted in a shift in the way communication applications are being developed. These new development strategies provide abstract views of the underlying communication technologies and lead to the so-called "user-centric communication applications." One user-centric…
Goal Structuring Notation in a Radiation Hardening Assurance Case for COTS-Based Spacecraft
NASA Technical Reports Server (NTRS)
Witulski, A.; Austin, R.; Evans, J.; Mahadevan, N.; Karsai, G.; Sierawski, B.; LaBel, K.; Reed, R.
2016-01-01
The attached presentation is a summary of how mission assurance is supported by model-based representations of spacecraft systems that can define sub-system functionality and interfacing, reliability parameters, as well as detailing a new paradigm for assurance, a model-centric and not document-centric process.