Sample records for network present situation

  1. Data Networking for the European Academic and Research Community: Is It Important?

    ERIC Educational Resources Information Center

    Williams, David O.; Carpenter, Brian E.

    1992-01-01

    Discussion of data networking in Europe provides background on the current situation in the United States and the Pacific region. The situation in Europe is then addressed, including the present status of national networks, disciplinary networks, and the European Internet; regulatory, political, economic, and technical barriers to progress; and…

  2. Sonification of network traffic flow for monitoring and situational awareness

    PubMed Central

    2018-01-01

    Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators’ situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen. PMID:29672543

  3. Sonification of network traffic flow for monitoring and situational awareness.

    PubMed

    Debashi, Mohamed; Vickers, Paul

    2018-01-01

    Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators' situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen.

  4. Simultaneous Visualization of Different Utility Networks for Disaster Management

    NASA Astrophysics Data System (ADS)

    Semm, S.; Becker, T.; Kolbe, T. H.

    2012-07-01

    Cartographic visualizations of crises are used to create a Common Operational Picture (COP) and enforce Situational Awareness by presenting and representing relevant information. As nearly all crises affect geospatial entities, geo-data representations have to support location-specific decision-making throughout the crises. Since, Operator's attention span and their working memory are limiting factors for the process of getting and interpreting information; the cartographic presentation has to support individuals in coordinating their activities and with handling highly dynamic situations. The Situational Awareness of operators in conjunction with a COP are key aspects of the decision making process and essential for coming to appropriate decisions. Utility networks are one of the most complex and most needed systems within a city. The visualization of utility infrastructure in crisis situations is addressed in this paper. The paper will provide a conceptual approach on how to simplify, aggregate, and visualize multiple utility networks and their components to meet the requirements of the decision-making process and to support Situational Awareness.

  5. Generalized Cartographic and Simultaneous Representation of Utility Networks for Decision-Support Systems and Crisis Management in Urban Environments

    NASA Astrophysics Data System (ADS)

    Becker, T.; König, G.

    2015-10-01

    Cartographic visualizations of crises are used to create a Common Operational Picture (COP) and enforce Situational Awareness by presenting relevant information to the involved actors. As nearly all crises affect geospatial entities, geo-data representations have to support location-specific analysis throughout the decision-making process. Meaningful cartographic presentation is needed for coordinating the activities of crisis manager in a highly dynamic situation, since operators' attention span and their spatial memories are limiting factors during the perception and interpretation process. Situational Awareness of operators in conjunction with a COP are key aspects in decision-making process and essential for making well thought-out and appropriate decisions. Considering utility networks as one of the most complex and particularly frequent required systems in urban environment, meaningful cartographic presentation of multiple utility networks with respect to disaster management do not exist. Therefore, an optimized visualization of utility infrastructure for emergency response procedures is proposed. The article will describe a conceptual approach on how to simplify, aggregate, and visualize multiple utility networks and their components to meet the requirements of the decision-making process and to support Situational Awareness.

  6. Communal Cooperation in Sensor Networks for Situation Management

    NASA Technical Reports Server (NTRS)

    Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin,Chunsheng

    2006-01-01

    Situation management is a rapidly evolving science where managed sources are processed as realtime streams of events and fused in a way that maximizes comprehension, thus enabling better decisions for action. Sensor networks provide a new technology that promises ubiquitous input and action throughout an environment, which can substantially improve information available to the process. Here we describe a NASA program that requires improvements in sensor networks and situation management. We present an approach for massively deployed sensor networks that does not rely on centralized control but is founded in lessons learned from the way biological ecosystems are organized. In this approach, fully distributed data aggregation and integration can be performed in a scalable fashion where individual motes operate based on local information, making local decisions that achieve globally-meaningful results. This exemplifies the robust, fault-tolerant infrastructure required for successful situation management systems.

  7. CyberPetri at CDX 2016: Real-time Network Situation Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.

    CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.

  8. Design of smart sensing components for volcano monitoring

    USGS Publications Warehouse

    Xu, M.; Song, W.-Z.; Huang, R.; Peng, Y.; Shirazi, B.; LaHusen, R.; Kiely, A.; Peterson, N.; Ma, A.; Anusuya-Rangappa, L.; Miceli, M.; McBride, D.

    2009-01-01

    In a volcano monitoring application, various geophysical and geochemical sensors generate continuous high-fidelity data, and there is a compelling need for real-time raw data for volcano eruption prediction research. It requires the network to support network synchronized sampling, online configurable sensing and situation awareness, which pose significant challenges on sensing component design. Ideally, the resource usages shall be driven by the environment and node situations, and the data quality is optimized under resource constraints. In this paper, we present our smart sensing component design, including hybrid time synchronization, configurable sensing, and situation awareness. Both design details and evaluation results are presented to show their efficiency. Although the presented design is for a volcano monitoring application, its design philosophy and framework can also apply to other similar applications and platforms. ?? 2009 Elsevier B.V.

  9. Build your own social network laboratory with Social Lab: a tool for research in social media.

    PubMed

    Garaizar, Pablo; Reips, Ulf-Dietrich

    2014-06-01

    Social networking has surpassed e-mail and instant messaging as the dominant form of online communication (Meeker, Devitt, & Wu, 2010). Currently, all large social networks are proprietary, making it difficult to impossible for researchers to make changes to such networks for the purpose of study design and access to user-generated data from the networks. To address this issue, the authors have developed and present Social Lab, an Internet-based free and open-source social network software system available from http://www.sociallab.es . Having full availability of navigation and communication data in Social Lab allows researchers to investigate behavior in social media on an individual and group level. Automated artificial users ("bots") are available to the researcher to simulate and stimulate social networking situations. These bots respond dynamically to situations as they unfold. The bots can easily be configured with scripts and can be used to experimentally manipulate social networking situations in Social Lab. Examples for setting up, configuring, and using Social Lab as a tool for research in social media are provided.

  10. On detection and visualization techniques for cyber security situation awareness

    NASA Astrophysics Data System (ADS)

    Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao

    2013-05-01

    Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.

  11. LingoBee and Social Media: Mobile Language Learners as Social Networkers

    ERIC Educational Resources Information Center

    Procter-Legg, Emma; Cacchione, Annamaria; Petersen, Sobah Abbas

    2012-01-01

    This paper presents language learners as social networkers and describes and discusses the types of users that can be identified by analysing the content created by them using a situated mobile language learning app, LingoBee, based on the idea of crowd sourcing. Borrowing ideas from other studies conducted on social network users, we can identify…

  12. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  13. DISCRETE EVENT SIMULATION OF OPTICAL SWITCH MATRIX PERFORMANCE IN COMPUTER NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Imam, Neena; Poole, Stephen W

    2013-01-01

    In this paper, we present application of a Discrete Event Simulator (DES) for performance modeling of optical switching devices in computer networks. Network simulators are valuable tools in situations where one cannot investigate the system directly. This situation may arise if the system under study does not exist yet or the cost of studying the system directly is prohibitive. Most available network simulators are based on the paradigm of discrete-event-based simulation. As computer networks become increasingly larger and more complex, sophisticated DES tool chains have become available for both commercial and academic research. Some well-known simulators are NS2, NS3, OPNET,more » and OMNEST. For this research, we have applied OMNEST for the purpose of simulating multi-wavelength performance of optical switch matrices in computer interconnection networks. Our results suggest that the application of DES to computer interconnection networks provides valuable insight in device performance and aids in topology and system optimization.« less

  14. Decision support systems and methods for complex networks

    DOEpatents

    Huang, Zhenyu [Richland, WA; Wong, Pak Chung [Richland, WA; Ma, Jian [Richland, WA; Mackey, Patrick S [Richland, WA; Chen, Yousu [Richland, WA; Schneider, Kevin P [Seattle, WA

    2012-02-28

    Methods and systems for automated decision support in analyzing operation data from a complex network. Embodiments of the present invention utilize these algorithms and techniques not only to characterize the past and present condition of a complex network, but also to predict future conditions to help operators anticipate deteriorating and/or problem situations. In particular, embodiments of the present invention characterize network conditions from operation data using a state estimator. Contingency scenarios can then be generated based on those network conditions. For at least a portion of all of the contingency scenarios, risk indices are determined that describe the potential impact of each of those scenarios. Contingency scenarios with risk indices are presented visually as graphical representations in the context of a visual representation of the complex network. Analysis of the historical risk indices based on the graphical representations can then provide trends that allow for prediction of future network conditions.

  15. Real-Time Visualization of Network Behaviors for Situational Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Best, Daniel M.; Bohn, Shawn J.; Love, Douglas V.

    Plentiful, complex, and dynamic data make understanding the state of an enterprise network difficult. Although visualization can help analysts understand baseline behaviors in network traffic and identify off-normal events, visual analysis systems often do not scale well to operational data volumes (in the hundreds of millions to billions of transactions per day) nor to analysis of emergent trends in real-time data. We present a system that combines multiple, complementary visualization techniques coupled with in-stream analytics, behavioral modeling of network actors, and a high-throughput processing platform called MeDICi. This system provides situational understanding of real-time network activity to help analysts takemore » proactive response steps. We have developed these techniques using requirements gathered from the government users for which the tools are being developed. By linking multiple visualization tools to a streaming analytic pipeline, and designing each tool to support a particular kind of analysis (from high-level awareness to detailed investigation), analysts can understand the behavior of a network across multiple levels of abstraction.« less

  16. Link prediction measures considering different neighbors’ effects and application in social networks

    NASA Astrophysics Data System (ADS)

    Luo, Peng; Wu, Chong; Li, Yongli

    Link prediction measures have been attracted particular attention in the field of mathematical physics. In this paper, we consider the different effects of neighbors in link prediction and focus on four different situations: only consider the individual’s own effects; consider the effects of individual, neighbors and neighbors’ neighbors; consider the effects of individual, neighbors, neighbors’ neighbors, neighbors’ neighbors’ neighbors and neighbors’ neighbors’ neighbors’ neighbors; consider the whole network participants’ effects. Then, according to the four situations, we present our link prediction models which also take the effects of social characteristics into consideration. An artificial network is adopted to illustrate the parameter estimation based on logistic regression. Furthermore, we compare our methods with the some other link prediction methods (LPMs) to examine the validity of our proposed model in online social networks. The results show the superior of our proposed link prediction methods compared with others. In the application part, our models are applied to study the social network evolution and used to recommend friends and cooperators in social networks.

  17. Implementing controlled-unitary operations over the butterfly network

    NASA Astrophysics Data System (ADS)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2014-12-01

    We introduce a multiparty quantum computation task over a network in a situation where the capacities of both the quantum and classical communication channels of the network are limited and a bottleneck occurs. Using a resource setting introduced by Hayashi [1], we present an efficient protocol for performing controlled-unitary operations between two input nodes and two output nodes over the butterfly network, one of the most fundamental networks exhibiting the bottleneck problem. This result opens the possibility of developing a theory of quantum network coding for multiparty quantum computation, whereas the conventional network coding only treats multiparty quantum communication.

  18. Implementing controlled-unitary operations over the butterfly network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.

    2014-12-04

    We introduce a multiparty quantum computation task over a network in a situation where the capacities of both the quantum and classical communication channels of the network are limited and a bottleneck occurs. Using a resource setting introduced by Hayashi [1], we present an efficient protocol for performing controlled-unitary operations between two input nodes and two output nodes over the butterfly network, one of the most fundamental networks exhibiting the bottleneck problem. This result opens the possibility of developing a theory of quantum network coding for multiparty quantum computation, whereas the conventional network coding only treats multiparty quantum communication.

  19. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    PubMed

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In addition, the information sharing network was largely imbalanced and dominated by a few key individuals so that most individuals in the network have very few email connections, but a small number of individuals have very many connections. These results highlight several major growing pains for networked organizations and military organizations in particular.

  20. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    PubMed Central

    Buchler, Norbou; Fitzhugh, Sean M.; Marusich, Laura R.; Ungvarsky, Diane M.; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In addition, the information sharing network was largely imbalanced and dominated by a few key individuals so that most individuals in the network have very few email connections, but a small number of individuals have very many connections. These results highlight several major growing pains for networked organizations and military organizations in particular. PMID:27445905

  1. Situational Awareness of Network System Roles (SANSR)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huffer, Kelly M; Reed, Joel W

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. Wemore » will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.« less

  2. [Strategic thinking of the construction of national schistosomiasis laboratory network in China].

    PubMed

    Qin, Zhi-Qiang; Xu, Jing; Feng, Ting; Zhu, Hong-Qing; Li, Shi-Zhu; Xiao, Ning; Zhou, Xiao-Nong

    2013-08-01

    A schistosomiasis laboratory network and its quality assurance system have been built and will be more and more perfect in China. This paper introduces the present situation of schistosomiasis diagnosis in China and expounds the basic ideas and the progress in the construction of schistosomiasis network platform. Furthermore, the face of schistosomiasis diagnosis network platform construction and operation of the challenge and the future work will be put forward in the latter part of this paper.

  3. A Wireless Sensor Network-Based Approach with Decision Support for Monitoring Lake Water Quality.

    PubMed

    Huang, Xiaoci; Yi, Jianjun; Chen, Shaoli; Zhu, Xiaomin

    2015-11-19

    Online monitoring and water quality analysis of lakes are urgently needed. A feasible and effective approach is to use a Wireless Sensor Network (WSN). Lake water environments, like other real world environments, present many changing and unpredictable situations. To ensure flexibility in such an environment, the WSN node has to be prepared to deal with varying situations. This paper presents a WSN self-configuration approach for lake water quality monitoring. The approach is based on the integration of a semantic framework, where a reasoner can make decisions on the configuration of WSN services. We present a WSN ontology and the relevant water quality monitoring context information, which considers its suitability in a pervasive computing environment. We also propose a rule-based reasoning engine that is used to conduct decision support through reasoning techniques and context-awareness. To evaluate the approach, we conduct usability experiments and performance benchmarks.

  4. Situating emotional experience

    PubMed Central

    Wilson-Mendenhall, Christine D.; Barrett, Lisa Feldman; Barsalou, Lawrence W.

    2013-01-01

    Psychological construction approaches to emotion suggest that emotional experience is situated and dynamic. Fear, for example, is typically studied in a physical danger context (e.g., threatening snake), but in the real world, it often occurs in social contexts, especially those involving social evaluation (e.g., public speaking). Understanding situated emotional experience is critical because adaptive responding is guided by situational context (e.g., inferring the intention of another in a social evaluation situation vs. monitoring the environment in a physical danger situation). In an fMRI study, we assessed situated emotional experience using a newly developed paradigm in which participants vividly imagine different scenarios from a first-person perspective, in this case scenarios involving either social evaluation or physical danger. We hypothesized that distributed neural patterns would underlie immersion in social evaluation and physical danger situations, with shared activity patterns across both situations in multiple sensory modalities and in circuitry involved in integrating salient sensory information, and with unique activity patterns for each situation type in coordinated large-scale networks that reflect situated responding. More specifically, we predicted that networks underlying the social inference and mentalizing involved in responding to a social threat (in regions that make up the “default mode” network) would be reliably more active during social evaluation situations. In contrast, networks underlying the visuospatial attention and action planning involved in responding to a physical threat would be reliably more active during physical danger situations. The results supported these hypotheses. In line with emerging psychological construction approaches, the findings suggest that coordinated brain networks offer a systematic way to interpret the distributed patterns that underlie the diverse situational contexts characterizing emotional life. PMID:24324420

  5. Situation Change: Stability and Change of Situation Variables between and within Persons

    PubMed Central

    Rauthmann, John F.; Sherman, Ryne A.

    2016-01-01

    When, how, and why situations flow into one another is important for understanding dynamic personality processes, but the topic of situation change has traditionally been a thorny issue in personality/social psychology. We explore conceptual and methodological issues in research on situation change: (1) What is situation change, which variables could we measure, and how can situation change be methodologically captured and analyzed (at between- and within-person levels)? (2) Which person-situation transaction mechanisms (situation management strategies) could entail stability and change of situations in daily life? (3) How do single or repeated instances of situation change impact short-, middle-, and long-term outcomes (e.g., intra- and interpersonal adjustment)? Besides laying out a research program for situation change, we present preliminary data from participants who wore mini-video cameras recording their situations so that they could be rated later in the lab. We demonstrate rater consensus on when situations change, mean-level changes of situation characteristics across situations, similarity of situation characteristics across adjacent situations, and inter-individual differences in intra-individual situation change in change networks. PMID:26779068

  6. On the Role of Situational Stressors in the Disruption of Global Neural Network Stability during Problem Solving.

    PubMed

    Liu, Mengting; Amey, Rachel C; Forbes, Chad E

    2017-12-01

    When individuals are placed in stressful situations, they are likely to exhibit deficits in cognitive capacity over and above situational demands. Despite this, individuals may still persevere and ultimately succeed in these situations. Little is known, however, about neural network properties that instantiate success or failure in both neutral and stressful situations, particularly with respect to regions integral for problem-solving processes that are necessary for optimal performance on more complex tasks. In this study, we outline how hidden Markov modeling based on multivoxel pattern analysis can be used to quantify unique brain states underlying complex network interactions that yield either successful or unsuccessful problem solving in more neutral or stressful situations. We provide evidence that brain network stability and states underlying synchronous interactions in regions integral for problem-solving processes are key predictors of whether individuals succeed or fail in stressful situations. Findings also suggested that individuals utilize discriminate neural patterns in successfully solving problems in stressful or neutral situations. Findings overall highlight how hidden Markov modeling can provide myriad possibilities for quantifying and better understanding the role of global network interactions in the problem-solving process and how the said interactions predict success or failure in different contexts.

  7. An integrated modeling approach to predict flooding on urban basin.

    PubMed

    Dey, Ashis Kumar; Kamioka, Seiji

    2007-01-01

    Correct prediction of flood extents in urban catchments has become a challenging issue. The traditional urban drainage models that consider only the sewerage-network are able to simulate the drainage system correctly until there is no overflow from the network inlet or manhole. When such overflows exist due to insufficient drainage capacity of downstream pipes or channels, it becomes difficult to reproduce the actual flood extents using these traditional one-phase simulation techniques. On the other hand, the traditional 2D models that simulate the surface flooding resulting from rainfall and/or levee break do not consider the sewerage network. As a result, the correct flooding situation is rarely addressed from those available traditional 1D and 2D models. This paper presents an integrated model that simultaneously simulates the sewerage network, river network and 2D mesh network to get correct flood extents. The model has been successfully applied into the Tenpaku basin (Nagoya, Japan), which experienced severe flooding with a maximum flood depth more than 1.5 m on September 11, 2000 when heavy rainfall, 580 mm in 28 hrs (return period > 100 yr), occurred over the catchments. Close agreements between the simulated flood depths and observed data ensure that the present integrated modeling approach is able to reproduce the urban flooding situation accurately, which rarely can be obtained through the traditional 1D and 2D modeling approaches.

  8. The Real Time Mission Monitor: A Situational Awareness Tool For Managing Experiment Assets

    NASA Technical Reports Server (NTRS)

    Blakeslee, Richard; Hall, John; Goodman, Michael; Parker, Philip; Freudinger, Larry; He, Matt

    2007-01-01

    The NASA Real Time Mission Monitor (RTMM) is a situational awareness tool that integrates satellite, airborne and surface data sets; weather information; model and forecast outputs; and vehicle state data (e.g., aircraft navigation, satellite tracks and instrument field-of-views) for field experiment management RTMM optimizes science and logistic decision-making during field experiments by presenting timely data and graphics to the users to improve real time situational awareness of the experiment's assets. The RTMM is proven in the field as it supported program managers, scientists, and aircraft personnel during the NASA African Monsoon Multidisciplinary Analyses experiment during summer 2006 in Cape Verde, Africa. The integration and delivery of this information is made possible through data acquisition systems, network communication links and network server resources built and managed by collaborators at NASA Dryden Flight Research Center (DFRC) and Marshall Space Flight Center (MSFC). RTMM is evolving towards a more flexible and dynamic combination of sensor ingest, network computing, and decision-making activities through the use of a service oriented architecture based on community standards and protocols.

  9. The NASA Real Time Mission Monitor - A Situational Awareness Tool for Conducting Tropical Cyclone Field Experiments

    NASA Technical Reports Server (NTRS)

    Goodman, Michael; Blakeslee, Richard; Hall, John; Parker, Philip; He, Yubin

    2008-01-01

    The NASA Real Time Mission Monitor (RTMM) is a situational awareness tool that integrates satellite, aircraft state information, airborne and surface instruments, and weather state data in to a single visualization package for real time field experiment management. RTMM optimizes science and logistic decision-making during field experiments by presenting timely data and graphics to the users to improve real time situational awareness of the experiment's assets. The RTMM is proven in the field as it supported program managers, scientists, and aircraft personnel during the NASA African Monsoon Multidisciplinary Analyses (investigated African easterly waves and Tropical Storm Debby and Helene) during August-September 2006 in Cape Verde, the Tropical Composition, Cloud and Climate Coupling experiment during July-August 2007 in Costa Rica, and the Hurricane Aerosonde mission into Hurricane Noel in 2-3 November 2007. The integration and delivery of this information is made possible through data acquisition systems, network communication links, and network server resources built and managed by collaborators at NASA Marshall Space Flight Center (MSFC) and Dryden Flight Research Center (DFRC). RTMM is evolving towards a more flexible and dynamic combination of sensor ingest, network computing, and decision-making activities through the use of a service oriented architecture based on community standards and protocols. Each field experiment presents unique challenges and opportunities for advancing the functionality of RTMM. A description of RTMM, the missions it has supported, and its new features that are under development will be presented.

  10. Characterizing team performance in network-centric operations: philosophical and methodological issues.

    PubMed

    Bolia, Robert S; Nelson, W Todd

    2007-05-01

    The recently promulgated doctrine of network-centric warfare suggests that increases in shared situation awareness and self-synchronization will be emergent properties of densely connected military networks. What it fails to say is how these enhancements are to be measured. The present article frames the discussion as a question of how to characterize team performance, and considers such performance in the context of its hypothetical components: situation awareness, workload, and error. This examination concludes that reliable measures of these constructs are lacking for teams, even when they exist for individual operators, and that this is due to philosophical and/or methodological flaws in their conceptual development. Additional research is recommended to overcome these deficiencies, as well as consideration of novel multidisciplinary approaches that draw on methodologies employed in the social, physical, and biological sciences.

  11. Properties of centralized cooperative sensing in cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Skokowski, Paweł; Malon, Krzysztof; Łopatka, Jerzy

    2017-04-01

    Spectrum sensing is a functionality that enables network creation in the cognitive radio technology. Spectrum sensing is use for building the situation awareness knowledge for better use of radio resources and to adjust network parameters in case of jamming, interferences from legacy systems, decreasing link quality caused e.g. by nodes positions changes. This paper presents results from performed tests to compare cooperative centralized sensing versus local sensing. All tests were performed in created simulator developed in Matlab/Simulink environment.

  12. The Evolution of Recent Research on Catalan Literature through the Production of PhD Theses: A Bibliometric and Social Network Analysis

    ERIC Educational Resources Information Center

    Ardanuy, Jordi; Urbano, Cristobal; Quintana, Lluis

    2009-01-01

    Introduction: This paper studies the situation of research on Catalan literature between 1976 and 2003 by carrying out a bibliometric and social network analysis of PhD theses defended in Spain. It has a dual aim: to present interesting results for the discipline and to demonstrate the methodological efficacy of scientometric tools in the…

  13. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    DTIC Science & Technology

    2016-06-22

    this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi...exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation... email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between

  14. Reliable Adaptive Video Streaming Driven by Perceptual Semantics for Situational Awareness

    PubMed Central

    Pimentel-Niño, M. A.; Saxena, Paresh; Vazquez-Castro, M. A.

    2015-01-01

    A novel cross-layer optimized video adaptation driven by perceptual semantics is presented. The design target is streamed live video to enhance situational awareness in challenging communications conditions. Conventional solutions for recreational applications are inadequate and novel quality of experience (QoE) framework is proposed which allows fully controlled adaptation and enables perceptual semantic feedback. The framework relies on temporal/spatial abstraction for video applications serving beyond recreational purposes. An underlying cross-layer optimization technique takes into account feedback on network congestion (time) and erasures (space) to best distribute available (scarce) bandwidth. Systematic random linear network coding (SRNC) adds reliability while preserving perceptual semantics. Objective metrics of the perceptual features in QoE show homogeneous high performance when using the proposed scheme. Finally, the proposed scheme is in line with content-aware trends, by complying with information-centric-networking philosophy and architecture. PMID:26247057

  15. Application of fuzzy neural network technologies in management of transport and logistics processes in Arctic

    NASA Astrophysics Data System (ADS)

    Levchenko, N. G.; Glushkov, S. V.; Sobolevskaya, E. Yu; Orlov, A. P.

    2018-05-01

    The method of modeling the transport and logistics process using fuzzy neural network technologies has been considered. The analysis of the implemented fuzzy neural network model of the information management system of transnational multimodal transportation of the process showed the expediency of applying this method to the management of transport and logistics processes in the Arctic and Subarctic conditions. The modular architecture of this model can be expanded by incorporating additional modules, since the working conditions in the Arctic and the subarctic themselves will present more and more realistic tasks. The architecture allows increasing the information management system, without affecting the system or the method itself. The model has a wide range of application possibilities, including: analysis of the situation and behavior of interacting elements; dynamic monitoring and diagnostics of management processes; simulation of real events and processes; prediction and prevention of critical situations.

  16. ["My first encounter with German urology (1937)". Stefan Wesolowski (1908-2009) - a source in the archives of the German Society for Urology from the oldest corresponding member and promoter of Polish-German relationships].

    PubMed

    Moll, F H; Krischel, M; Zajaczkowski, T; Rathert, P

    2010-10-01

    A source in the archives of the German Society of Urology gives us a vivid insight into the situation in Berlin during the 1930s from the perspective of a young Polish doctor, and presents the situation at one of the leading urology institutions of the time in Germany. Furthermore, we learn about the social situation in hospitals as well as the discourse and networking taking place in the scientific community at that time.

  17. Rural women and violence situation: access and accessibility limits to the healthcare network.

    PubMed

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  18. [Network Analyses in Regional Health Care Research: Example of Dermatological Care in the Metropolitan Region of Hamburg].

    PubMed

    Augustin, J; Austermann, J; Erasmi, S

    2016-10-18

    Background: One of the overall objectives of the legislator is to ensure an overall "homogeneous", and easily accessible medical care for the population. The physician-patient ratio can be used to describe the regional health care situation. But this method does not provide information concerning the availability of, for instance, the nearest doctor. Therefore, further parameters such as accessibility must be taken into consideration. For this purpose, network analyses are an appropriate method. The objective of this study is to present methodological tools to evaluate the healthcare situation in the metropolitan region of Hamburg, primarily focusing on accessibility using dermatologists as an example. Methods: Analyzing data of 20 counties, the geographical distribution of N=357 dermatologists and the physician-patient ratio were calculated. In a second step, a network analysis regarding accessibility was performed. In order to calculate accessibility, address data (physicians) were transformed into coordinates, consisting of defined places (N=303) and restrictions (e. g. speed, turn restrictions) of the network. The calculation of population-based accessibility is based on grid cells for the population density. Results: Despite adequacy of the overall medical situation, differences in the availability of the nearest dermatologists in the metropolitan region are remarkable, particularly when use of public transport is taken into consideration. In some counties, over 60% of the population require at least one hour to get to the nearest dermatologist using public transportation. In rural regions within the metropolitan area are particularly affected. Conclusion: The network analysis has shown that the choice and availability of transportation in combination with the location (rural/urban) is essential for health care access. Especially elderly people in rural areas with restricted mobility are at a disadvantage. Therefore, modern health care approaches (e. g. telemedicine) are necessary to optimize the health care situation in rural areas. Network analyses can make a valuable methodological contribution to the analysis of regional health care disparities. © Georg Thieme Verlag KG Stuttgart · New York.

  19. Reasoning and Knowledge Acquisition Framework for 5G Network Analytics

    PubMed Central

    2017-01-01

    Autonomic self-management is a key challenge for next-generation networks. This paper proposes an automated analysis framework to infer knowledge in 5G networks with the aim to understand the network status and to predict potential situations that might disrupt the network operability. The framework is based on the Endsley situational awareness model, and integrates automated capabilities for metrics discovery, pattern recognition, prediction techniques and rule-based reasoning to infer anomalous situations in the current operational context. Those situations should then be mitigated, either proactive or reactively, by a more complex decision-making process. The framework is driven by a use case methodology, where the network administrator is able to customize the knowledge inference rules and operational parameters. The proposal has also been instantiated to prove its adaptability to a real use case. To this end, a reference network traffic dataset was used to identify suspicious patterns and to predict the behavior of the monitored data volume. The preliminary results suggest a good level of accuracy on the inference of anomalous traffic volumes based on a simple configuration. PMID:29065473

  20. Reasoning and Knowledge Acquisition Framework for 5G Network Analytics.

    PubMed

    Sotelo Monge, Marco Antonio; Maestre Vidal, Jorge; García Villalba, Luis Javier

    2017-10-21

    Autonomic self-management is a key challenge for next-generation networks. This paper proposes an automated analysis framework to infer knowledge in 5G networks with the aim to understand the network status and to predict potential situations that might disrupt the network operability. The framework is based on the Endsley situational awareness model, and integrates automated capabilities for metrics discovery, pattern recognition, prediction techniques and rule-based reasoning to infer anomalous situations in the current operational context. Those situations should then be mitigated, either proactive or reactively, by a more complex decision-making process. The framework is driven by a use case methodology, where the network administrator is able to customize the knowledge inference rules and operational parameters. The proposal has also been instantiated to prove its adaptability to a real use case. To this end, a reference network traffic dataset was used to identify suspicious patterns and to predict the behavior of the monitored data volume. The preliminary results suggest a good level of accuracy on the inference of anomalous traffic volumes based on a simple configuration.

  1. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao

    2014-06-01

    Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.

  2. Detecting Analogies Unconsciously

    PubMed Central

    Reber, Thomas P.; Luechinger, Roger; Boesiger, Peter; Henke, Katharina

    2014-01-01

    Analogies may arise from the conscious detection of similarities between a present and a past situation. In this functional magnetic resonance imaging study, we tested whether young volunteers would detect analogies unconsciously between a current supraliminal (visible) and a past subliminal (invisible) situation. The subliminal encoding of the past situation precludes awareness of analogy detection in the current situation. First, participants encoded subliminal pairs of unrelated words in either one or nine encoding trials. Later, they judged the semantic fit of supraliminally presented new words that either retained a previously encoded semantic relation (“analog”) or not (“broken analog”). Words in analogs versus broken analogs were judged closer semantically, which indicates unconscious analogy detection. Hippocampal activity associated with subliminal encoding correlated with the behavioral measure of unconscious analogy detection. Analogs versus broken analogs were processed with reduced prefrontal but enhanced medial temporal activity. We conclude that analogous episodes can be detected even unconsciously drawing on the episodic memory network. PMID:24478656

  3. Network-aware scalable video monitoring system for emergency situations with operator-managed fidelity control

    NASA Astrophysics Data System (ADS)

    Al Hadhrami, Tawfik; Nightingale, James M.; Wang, Qi; Grecos, Christos

    2014-05-01

    In emergency situations, the ability to remotely monitor unfolding events using high-quality video feeds will significantly improve the incident commander's understanding of the situation and thereby aids effective decision making. This paper presents a novel, adaptive video monitoring system for emergency situations where the normal communications network infrastructure has been severely impaired or is no longer operational. The proposed scheme, operating over a rapidly deployable wireless mesh network, supports real-time video feeds between first responders, forward operating bases and primary command and control centers. Video feeds captured on portable devices carried by first responders and by static visual sensors are encoded in H.264/SVC, the scalable extension to H.264/AVC, allowing efficient, standard-based temporal, spatial, and quality scalability of the video. A three-tier video delivery system is proposed, which balances the need to avoid overuse of mesh nodes with the operational requirements of the emergency management team. In the first tier, the video feeds are delivered at a low spatial and temporal resolution employing only the base layer of the H.264/SVC video stream. Routing in this mode is designed to employ all nodes across the entire mesh network. In the second tier, whenever operational considerations require that commanders or operators focus on a particular video feed, a `fidelity control' mechanism at the monitoring station sends control messages to the routing and scheduling agents in the mesh network, which increase the quality of the received picture using SNR scalability while conserving bandwidth by maintaining a low frame rate. In this mode, routing decisions are based on reliable packet delivery with the most reliable routes being used to deliver the base and lower enhancement layers; as fidelity is increased and more scalable layers are transmitted they will be assigned to routes in descending order of reliability. The third tier of video delivery transmits a high-quality video stream including all available scalable layers using the most reliable routes through the mesh network ensuring the highest possible video quality. The proposed scheme is implemented in a proven simulator, and the performance of the proposed system is numerically evaluated through extensive simulations. We further present an in-depth analysis of the proposed solutions and potential approaches towards supporting high-quality visual communications in such a demanding context.

  4. Reactive Power Compensating System.

    DOEpatents

    Williams, Timothy J.; El-Sharkawi, Mohamed A.; Venkata, Subrahmanyam S.

    1985-01-04

    The circuit was designed for the specific application of wind-driven induction generators. It has great potential for application in any situation where a varying reactive power load is present, such as with induction motors or generators, or for transmission network compensation.

  5. Smart sensing surveillance system

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    Unattended ground sensor (UGS) networks have been widely used in remote battlefield and other tactical applications over the last few decades due to the advances of the digital signal processing. The UGS network can be applied in a variety of areas including border surveillance, special force operations, perimeter and building protection, target acquisition, situational awareness, and force protection. In this paper, a highly-distributed, fault-tolerant, and energyefficient Smart Sensing Surveillance System (S4) is presented to efficiently provide 24/7 and all weather security operation in a situation management environment. The S4 is composed of a number of distributed nodes to collect, process, and disseminate heterogeneous sensor data. Nearly all S4 nodes have passive sensors to provide rapid omnidirectional detection. In addition, Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR cameras are integrated to selected nodes to track the objects and capture associated imagery. These S4 camera-connected nodes will provide applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. In the S4, all the nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology, which can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The S4 utilizes a Service Oriented Architecture such that remote applications can interact with the S4 network and use the specific presentation methods. The S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments and near perimeters and borders. The S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE®) standards. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  6. Method and system for conserving power in a telecommunications network during emergency situations

    DOEpatents

    Conrad, Stephen H [Algodones, NM; O'Reilly, Gerard P [Manalapan, NJ

    2011-10-11

    Disclosed is a method and apparatus for conserving power in a telecommunications network during emergency situations. A permissible number list of emergency and/or priority numbers is stored in the telecommunications network. In the event of an emergency or power failure, input digits of a call to the telecommunications network are compared to the permissible number list. The call is processed in the telecommunications network and routed to its destination if the input digits match an entry in the permissible number list. The call is dropped without any further processing if the input digits do not match an entry in the permissible number list. Thus, power can be conserved in emergency situations by only allowing emergency and/or priority calls.

  7. The explosion at institute: modeling and analyzing the situation awareness factor.

    PubMed

    Naderpour, Mohsen; Lu, Jie; Zhang, Guangquan

    2014-12-01

    In 2008 a runaway chemical reaction caused an explosion at a methomyl unit in West Virginia, USA, killing two employees, injuring eight people, evacuating more than 40,000 residents adjacent to the facility, disrupting traffic on a nearby highway and causing significant business loss and interruption. Although the accident was formally investigated, the role of the situation awareness (SA) factor, i.e., a correct understanding of the situation, and appropriate models to maintain SA, remain unexplained. This paper extracts details of abnormal situations within the methomyl unit and models them into a situational network using dynamic Bayesian networks. A fuzzy logic system is used to resemble the operator's thinking when confronted with these abnormal situations. The combined situational network and fuzzy logic system make it possible for the operator to assess such situations dynamically to achieve accurate SA. The findings show that the proposed structure provides a useful graphical model that facilitates the inclusion of prior background knowledge and the updating of this knowledge when new information is available from monitoring systems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Visualization techniques for computer network defense

    NASA Astrophysics Data System (ADS)

    Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

    2011-06-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  9. NASA Langley WINN System Operational Assessment

    NASA Technical Reports Server (NTRS)

    Jonsson, Jon

    2003-01-01

    An operational assessment of the NASA Langley Weather Information Network (WINN) System is presented. The objectives of this program include: 1) Determine if near real-time weather information presented on the flight deck improves pilot situational awareness of weather; and 2) Identify pilot interface issues related to the use of WINN system during test flights. This paper is in viewgraph form.

  10. Conditions for the successful integration of Human and Organizational Factors (HOF) in the nuclear safety analysis.

    PubMed

    Tosello, Michèle; Lévêque, Françoise; Dutillieu, Stéphanie; Hernandez, Guillaume; Vautier, Jean-François

    2012-01-01

    This communication presents some elements which come from the experience feedback at CEA about the conditions for the successful integration of HOF in the nuclear safety analysis. To point out some of these conditions, one of the concepts proposed by Edgar Morin to describe the functioning of "complex" systems: the dialogical principle has been used. The idea is to look for some dialogical pairs. The elements of this kind of pair are both complementary and antagonist to one another. Three dialogical pairs are presented in this communication. The first two pairs are related to the organization of the HOF network and the last one is related to the methods which are used to analyse the working situations. The three pairs are: specialist - non-specialist actors of the network, centralized - distributed human resources in the network and microscopic - macroscopic levels of HOF methods to analyse the working situations. To continuously improve these three dialogical pairs, it is important to keep the differences which exist between the two elements of a pair and to find and maintain a balance between the two elements of the pairs.

  11. Weak signal transmission in complex networks and its application in detecting connectivity.

    PubMed

    Liang, Xiaoming; Liu, Zonghua; Li, Baowen

    2009-10-01

    We present a network model of coupled oscillators to study how a weak signal is transmitted in complex networks. Through both theoretical analysis and numerical simulations, we find that the response of other nodes to the weak signal decays exponentially with their topological distance to the signal source and the coupling strength between two neighboring nodes can be figured out by the responses. This finding can be conveniently used to detect the topology of unknown network, such as the degree distribution, clustering coefficient and community structure, etc., by repeatedly choosing different nodes as the signal source. Through four typical networks, i.e., the regular one dimensional, small world, random, and scale-free networks, we show that the features of network can be approximately given by investigating many fewer nodes than the network size, thus our approach to detect the topology of unknown network may be efficient in practical situations with large network size.

  12. Fast notification architecture for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Lee, Dong-Hahk

    2013-03-01

    In an emergency, since it is vital to transmit the message to the users immediately after analysing the data to prevent disaster, this article presents the deployment of a fast notification architecture for a wireless sensor network. The sensor nodes of the proposed architecture can monitor an emergency situation periodically and transmit the sensing data, immediately to the sink node. We decide on the grade of fire situation according to the decision rule using the sensing values of temperature, CO, smoke density and temperature increasing rate. On the other hand, to estimate the grade of air pollution, the sensing data, such as dust, formaldehyde, NO2, CO2, is applied to the given knowledge model. Since the sink node in the architecture has a ZigBee interface, it can transmit the alert messages in real time according to analysed results received from the host server to the terminals equipped with a SIM card-type ZigBee module. Also, the host server notifies the situation to the registered users who have cellular phone through short message service server of the cellular network. Thus, the proposed architecture can adapt an emergency situation dynamically compared to the conventional architecture using video processing. In the testbed, after generating air pollution and fire data, the terminal receives the message in less than 3 s. In the test results, this system can also be applied to buildings and public areas where many people gather together, to prevent unexpected disasters in urban settings.

  13. Virtual Libraries: Service Realities.

    ERIC Educational Resources Information Center

    Novak, Jan

    This paper discusses client service issues to be considered when transitioning to a virtual library situation. Themes related to the transitional nature of society in the knowledge era are presented, including: paradox and a contradictory nature; blurring of boundaries; networks, systems, and holistic thinking; process/not product, becoming/not…

  14. [Social Networks of Children with Mentally Ill Parents].

    PubMed

    Stiawa, Maja; Kilian, Reinhold

    2017-10-01

    Social Networks of Children with Mentally Ill Parents Mental illness of parents can be a load situation for children. Supporting social relations might be an important source in such a situation. Social relations can be shown by social network analysis. Studies about social networks and mental health indicate differences regarding structure and potential for support when compared with social networks of healthy individuals. If and how mental illness of parents has an impact on their children's network is widely unknown. This systematic review shows methods and results of studies about social networks of children with mentally ill parents. By systematic search in electronic databases as well as manual search, two studies were found who met the target criteria. Both studies were conducted in the USA. Results of studies indicate that parental mental illness affects the state of mental health and social networks of children. Symptomatology of children changed due to perceived social support of network contacts. Impact of social support and strong network contacts seems to depend on age of children and the family situation. That's why support offers should be adapt to children's age. Focusing on social networks as potential resource for support and needs of the family affected seems appropriate during treatment.

  15. School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.

    ERIC Educational Resources Information Center

    Karpisek, Marian; And Others

    1995-01-01

    Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…

  16. Synchronous wearable wireless body sensor network composed of autonomous textile nodes.

    PubMed

    Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik

    2014-10-09

    A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system.

  17. Synchronous Wearable Wireless Body Sensor Network Composed of Autonomous Textile Nodes

    PubMed Central

    Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik

    2014-01-01

    A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system. PMID:25302808

  18. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  19. Diffusion models for innovation: s-curves, networks, power laws, catastrophes, and entropy.

    PubMed

    Jacobsen, Joseph J; Guastello, Stephen J

    2011-04-01

    This article considers models for the diffusion of innovation would be most relevant to the dynamics of early 21st century technologies. The article presents an overview of diffusion models and examines the adoption S-curve, network theories, difference models, influence models, geographical models, a cusp catastrophe model, and self-organizing dynamics that emanate from principles of network configuration and principles of heat diffusion. The diffusion dynamics that are relevant to information technologies and energy-efficient technologies are compared. Finally, principles of nonlinear dynamics for innovation diffusion that could be used to rehabilitate the global economic situation are discussed.

  20. Social network supported process recommender system.

    PubMed

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  1. Phase separation in living micellar networks

    NASA Astrophysics Data System (ADS)

    Cristobal, G.; Rouch, J.; Curély, J.; Panizza, P.

    We present a lattice model based on two n→0 spin vectors, capable of treating the thermodynamics of living networks in micellar solutions at any surfactant concentration. We establish an isomorphism between the coupling constants in the two spin vector Hamiltonian and the surfactant energies involved in the micellar situation. Solving this Hamiltonian in the mean-field approximation allows one to calculate osmotic pressure, aggregation number, free end and cross-link densities at any surfactant concentration. We derive a phase diagram, including changes in topology such as the transition between spheres and rods and between saturated and unsaturated networks. A phase separation can be found between a saturated network and a dilute solution composed of long flexible micelles or a saturated network and a solution of spherical micelles.

  2. Optimal Design of River Monitoring Network in Taizihe River by Matter Element Analysis

    PubMed Central

    Wang, Hui; Liu, Zhe; Sun, Lina; Luo, Qing

    2015-01-01

    The objective of this study is to optimize the river monitoring network in Taizihe River, Northeast China. The situation of the network and water characteristics were studied in this work. During this study, water samples were collected once a month during January 2009 - December 2010 from seventeen sites. Futhermore, the 16 monitoring indexes were analyzed in the field and laboratory. The pH value of surface water sample was found to be in the range of 6.83 to 9.31, and the average concentrations of NH4 +-N, chemical oxygen demand (COD), volatile phenol and total phosphorus (TP) were found decreasing significantly. The water quality of the river has been improved from 2009 to 2010. Through the calculation of the data availability and the correlation between adjacent sections, it was found that the present monitoring network was inefficient as well as the optimization was indispensable. In order to improve the situation, the matter element analysis and gravity distance were applied in the optimization of river monitoring network, which were proved to be a useful method to optimize river quality monitoring network. The amount of monitoring sections were cut from 17 to 13 for the monitoring network was more cost-effective after being optimized. The results of this study could be used in developing effective management strategies to improve the environmental quality of Taizihe River. Also, the results show that the proposed model can be effectively used for the optimal design of monitoring networks in river systems. PMID:26023785

  3. Design and Efficiency Analysis of Operational Scenarios for Space Situational Awareness Radar System

    NASA Astrophysics Data System (ADS)

    Choi, E. J.; Cho, S.; Jo, J. H.; Park, J.; Chung, T.; Park, J.; Jeon, H.; Yun, A.; Lee, Y.

    In order to perform the surveillance and tracking of space objects, optical and radar sensors are the technical components for space situational awareness system. Especially, space situational awareness radar system in combination with optical sensors network plays an outstanding role for space situational awareness. At present, OWL-Net(Optical Wide Field patrol Network) optical system, which is the only infra structures for tracking of space objects in Korea is very limited in all-weather and observation time. Therefore, the development of radar system capable of continuous operation is becoming an essential space situational awareness element. Therefore, for an efficient space situational awareness at the current state, the strategy of the space situational awareness radar development should be considered. The purpose of this paper is to analyze the efficiency of radar system for detection and tracking of space objects. The detection capabilities are limited to an altitude of 2,000 km with debris size of 1 m2 in radar cross section (RCS) for the radar operating frequencies of L, S, C, X, and Ku-band. The power budget analysis results showed that the maximum detection range of 2,000km can be achieved with the transmitted power of 900 kW, transmit and receive antenna gains of 40 dB and 43 dB, respectively, pulse width of 2 ms, and a signal processing gain of 13.3dB, at frequency of 1.3GHz. The required signal-to-noise ratio (SNR) was assumed to be 12.6 dB for probability of detection of 80% with false alarm rate 10-6. Through the efficiency analysis and trade-off study, the key parameters of the radar system are designed. As a result, this research will provide the guideline for the conceptual design of space situational awareness system.

  4. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  5. Visualization Techniques for Computer Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Steed, Chad A; Patton, Robert M

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operatormore » to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.« less

  6. Exploring the future with anticipatory networks

    NASA Astrophysics Data System (ADS)

    Skulimowski, A. M. J.

    2013-01-01

    This paper presents a theory of anticipatory networks that originates from anticipatory models of consequences in multicriteria decision problems. When making a decision, the decision maker takes into account the anticipated outcomes of each future decision problem linked by the causal relations with the present one. In a network of linked decision problems, the causal relations are defined between time-ordered nodes. The scenarios of future consequences of each decision are modeled by multiple vertices starting from an appropriate node. The network is supplemented by one or more relations of anticipation, or future feedback, which describe a situation where decision makers take into account the anticipated results of some future optimization problems while making their choice. So arises a multigraph of decision problems linked causally and by one or more anticipation relation, termed here the anticipatory network. We will present the properties of anticipatory networks and propose a method of reducing, transforming and using them to solve current decision problems. Furthermore, it will be shown that most anticipatory networks can be regarded as superanticipatory systems, i.e. systems that are anticipatory in the Rosen sense and contain a future model of at least one other anticipatory system. The anticipatory networks can also be applied to filter the set of future scenarios in a foresight exercise.

  7. Educational Robotics: Open Questions and New Challenges

    ERIC Educational Resources Information Center

    Alimisis, Dimitris

    2013-01-01

    This paper investigates the current situation in the field of educational robotics and identifies new challenges and trends focusing on the use of robotic technologies as a tool that will support creativity and other 21st-century learning skills. Finally, conclusions and proposals are presented for promoting cooperation and networking of…

  8. 75 FR 78722 - Intent To Prepare Programmatic Environmental Assessment Statement for the Nationwide...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-16

    ... sensor network and provide extended sensor network and components to fill critical situational awareness... different agencies), and share resources. The IOCs will improve tactical decision-making, situational awareness, operations monitoring/ interoperability, rules-based processing, and joint planning in a...

  9. Results of APL rain gauge network measurements in mid-Atlantic coast region and comparisons of distributions with CCIR models

    NASA Technical Reports Server (NTRS)

    Goldhirsh, Julius; Gebo, Norman; Rowland, John

    1988-01-01

    In this effort are described cumulative rain rate distributions for a network of nine tipping bucket rain gauge systems located in the mid-Atlantic coast region in the vicinity of the NASA Wallops Flight Facility, Wallops Island, Virginia. The rain gauges are situated within a gridded region of dimensions of 47 km east-west by 70 km north-south. Distributions are presented for the individual site measurements and the network average for the year period June 1, 1986 through May 31, 1987. A previous six year average distribution derived from measurements at one of the site locations is also presented. Comparisons are given of the network average, the CCIR (International Radio Consultative Committee) climatic zone, and the CCIR functional model distributions, the latter of which approximates a log normal at the lower rain rate and a gamma function at the higher rates.

  10. Ion trap architectures and new directions

    NASA Astrophysics Data System (ADS)

    Siverns, James D.; Quraishi, Qudsia

    2017-12-01

    Trapped ion technology has seen advances in performance, robustness and versatility over the last decade. With increasing numbers of trapped ion groups worldwide, a myriad of trap architectures are currently in use. Applications of trapped ions include: quantum simulation, computing and networking, time standards and fundamental studies in quantum dynamics. Design of such traps is driven by these various research aims, but some universally desirable properties have lead to the development of ion trap foundries. Additionally, the excellent control achievable with trapped ions and the ability to do photonic readout has allowed progress on quantum networking using entanglement between remotely situated ion-based nodes. Here, we present a selection of trap architectures currently in use by the community and present their most salient characteristics, identifying features particularly suited for quantum networking. We also discuss our own in-house research efforts aimed at long-distance trapped ion networking.

  11. Cyber situation awareness as distributed socio-cognitive work

    NASA Astrophysics Data System (ADS)

    Tyworth, Michael; Giacobe, Nicklaus A.; Mancuso, Vincent

    2012-06-01

    A key challenge for human cybersecurity operators is to develop an understanding of what is happening within, and to, their network. This understanding, or situation awareness, provides the cognitive basis for human operators to take action within their environments. Yet developing situation awareness of cyberspace (cyber-SA) is understood to be extremely difficult given the scope of the operating environment, the highly dynamic nature of the environment and the absence of physical constraints that serve to bound the cognitive task23. As a result, human cybersecurity operators are often "flying blind" regarding understanding the source, nature, and likely impact of malicious activity on their networked assets. In recent years, many scholars have dedicated their attention to finding ways to improve cyber-SA in human operators. In this paper we present our findings from our ongoing research of how cybersecurity analysts develop and maintain cyber-SA. Drawing from over twenty interviews of analysts working in the military, government, industrial, and educational domains, we find that cyber-SA to be distributed across human operators and technological artifacts operating in different functional areas.

  12. Motion planning with complete knowledge using a colored SOM.

    PubMed

    Vleugels, J; Kok, J N; Overmars, M

    1997-01-01

    The motion planning problem requires that a collision-free path be determined for a robot moving amidst a fixed set of obstacles. Most neural network approaches to this problem are for the situation in which only local knowledge about the configuration space is available. The main goal of the paper is to show that neural networks are also suitable tools in situations with complete knowledge of the configuration space. In this paper we present an approach that combines a neural network and deterministic techniques. We define a colored version of Kohonen's self-organizing map that consists of two different classes of nodes. The network is presented with random configurations of the robot and, from this information, it constructs a road map of possible motions in the work space. The map is a growing network, and different nodes are used to approximate boundaries of obstacles and the Voronoi diagram of the obstacles, respectively. In a second phase, the positions of the two kinds of nodes are combined to obtain the road map. In this way a number of typical problems with small obstacles and passages are avoided, and the required number of nodes for a given accuracy is within reasonable limits. This road map is searched to find a motion connecting the given source and goal configurations of the robot. The algorithm is simple and general; the only specific computation that is required is a check for intersection of two polygons. We implemented the algorithm for planar robots allowing both translation and rotation and experiments show that compared to conventional techniques it performs well, even for difficult motion planning scenes.

  13. Digital map and situation surface: a team-oriented multidisplay workspace for network enabled situation analysis

    NASA Astrophysics Data System (ADS)

    Peinsipp-Byma, E.; Geisler, Jürgen; Bader, Thomas

    2009-05-01

    System concepts for network enabled image-based ISR (intelligence, surveillance, reconnaissance) is the major mission of Fraunhofer IITB's applied research in the area of defence and security solutions. For the TechDemo08 as part of the NATO CNAD POW Defence against terrorism Fraunhofer IITB advanced a new multi display concept to handle the shear amount and high complexity of ISR data acquired by networked, distributed surveillance systems with the objective to support the generation of a common situation picture. Amount and Complexity of ISR data demands an innovative man-machine interface concept for humans to deal with it. The IITB's concept is the Digital Map & Situation Surface. This concept offers to the user a coherent multi display environment combining a horizontal surface for the situation overview from the bird's eye view, an attached vertical display for collateral information and so-called foveatablets as personalized magic lenses in order to obtain high resolved and role-specific information about a focused areaof- interest and to interact with it. In the context of TechDemo08 the Digital Map & Situation Surface served as workspace for team-based situation visualization and analysis. Multiple sea- and landside surveillance components were connected to the system.

  14. A Transmission Availability Forecast Service for Internet Protocol Networks

    DTIC Science & Technology

    1998-12-01

    long term changes in the network situation. The probe measurement takes a finite period and so can aggregate and characterise short term variations in...network situation. Nevertheless, the process remains vulnerable to medium term variations, ie changes that occur after the probe and before the download...vulnerable to the medium term changes that might occur between the completion of the examination and the commencement of the download. 3.2 TAF

  15. A Wearable Wireless Sensor Network for Indoor Smart Environment Monitoring in Safety Applications

    PubMed Central

    Antolín, Diego; Medrano, Nicolás; Calvo, Belén; Pérez, Francisco

    2017-01-01

    This paper presents the implementation of a wearable wireless sensor network aimed at monitoring harmful gases in industrial environments. The proposed solution is based on a customized wearable sensor node using a low-power low-rate wireless personal area network (LR-WPAN) communications protocol, which as a first approach measures CO2 concentration, and employs different low power strategies for appropriate energy handling which is essential to achieving long battery life. These wearables nodes are connected to a deployed static network and a web-based application allows data storage, remote control and monitoring of the complete network. Therefore, a complete and versatile remote web application with a locally implemented decision-making system is accomplished, which allows early detection of hazardous situations for exposed workers. PMID:28216556

  16. A Wearable Wireless Sensor Network for Indoor Smart Environment Monitoring in Safety Applications.

    PubMed

    Antolín, Diego; Medrano, Nicolás; Calvo, Belén; Pérez, Francisco

    2017-02-14

    This paper presents the implementation of a wearable wireless sensor network aimed at monitoring harmful gases in industrial environments. The proposed solution is based on a customized wearable sensor node using a low-power low-rate wireless personal area network (LR-WPAN) communications protocol, which as a first approach measures CO₂ concentration, and employs different low power strategies for appropriate energy handling which is essential to achieving long battery life. These wearables nodes are connected to a deployed static network and a web-based application allows data storage, remote control and monitoring of the complete network. Therefore, a complete and versatile remote web application with a locally implemented decision-making system is accomplished, which allows early detection of hazardous situations for exposed workers.

  17. Social Network Supported Process Recommender System

    PubMed Central

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced. PMID:24672309

  18. Network planning study of the metro-optical-network-oriented 3G application

    NASA Astrophysics Data System (ADS)

    Gong, Qian; Xu, Rong; Lin, Jin Tong

    2005-02-01

    To compare with the 2G mobile communication, 3G technologies can supply the perfect service scope and performance. 3G is the trend of the mobile communication. So now to build the transmission network, it is needed to consider how the transmission network to support the 3G applications. For the 3G network architecture, it include the 2 part: Utran access network and core network. So the metro optical network should consider how to build the network to adapt the 3G applications. Include the metro core and access layer. In the metro core, we should consider the network should evolved towards the Mesh architecture with ASON function to realize the fast protection and restoration, quick end-to-end service provision, and high capacity cross-connect matrix etc. In the access layer, the network should have the ability to access the 3G services such as ATM interface with IMA function. In addition, the traffic grooming should be provided to improve the bandwidth utility. In this paper, first we present the MCC network situation, the network planning model will be introduced. Then we present the topology architecture, node capacity and traffic forecast. At last, based on our analysis, we will give a total solution to MCC to build their metro optical network toward to the mesh network with the consideration of 3G services.

  19. [Social and health resources in Catalonia. Current situation].

    PubMed

    Bullich-Marín, Ingrid; Sánchez-Ferrín, Pau; Cabanes-Duran, Concepció; Salvà-Casanovas, Antoni

    The network of social and health care has advanced since its inception. Furthermore, news services have been created and some resources have been adapted within the framework of respective health plans. This article presents the current situation of the different social and health resources in Catalonia, as well as the main changes that have occurred in recent years, more specifically in the period of the Health Plan 2011-2015. This period is characterised by an adaptation of the social and health network within the context of chronic care, for which the development of intermediate care resources has become the most relevant aspect. There is also a need to create a single long-term care sector in which the health care quality is guaranteed. Moreover, in this period, integral and cross-care level is promoted in the health system through a greater coordination between all different levels of care. The social and health network, due to its trajectory and expertise, plays a key role in the quality of care for people with social and medical needs. Copyright © 2017 SEGG. Publicado por Elsevier España, S.L.U. All rights reserved.

  20. Women in physics in Slovenia

    NASA Astrophysics Data System (ADS)

    Remskar, Maja; Gunde, Marta Klanjsek; Zeleznik, Nadja; Kralj, Veronika Iglic; Janzekovic, Helena; Gomboc, Andreja

    2013-03-01

    Slovenian female physicists have been organized in the "Neformalna Mreža Slovenskih Fizičark" (Informal Network of Female Physicists) since 2002. The network incorporates more than 120 women working in research, academia, government, and industry. In the last three years we have been active in promoting physics among young girls, educating the public on progress in nuclear science for peaceful use, public discussion on the situation of women in science, and distribution of the book Fizika, Moj Poklic (Physics, My Profession), published in 2007. We have a representative on the National Commission of Women in Science at the Ministry of Higher Education, Science and Technology. In the Commission we proposed a research survey with gender sensitivity on the current situation of researchers with PhD degrees, which was performed in 2010. Here we present the main results of this survey for respondents of both genders working in the natural sciences.

  1. Impact of Collaborative Project-Based Learning on Self-Efficacy of Urban Minority Students in Engineering

    ERIC Educational Resources Information Center

    Chen, Pearl; Hernandez, Anthony; Dong, Jane

    2015-01-01

    This paper presents an interdisciplinary research project that studies the impact of collaborative project-based learning (CPBL) on the development of self-efficacy of students from various ethnic groups in an undergraduate senior-level computer networking class. Grounded in social constructivist and situated theories of learning, the study…

  2. Changing roles of academic societies due to globalization.

    PubMed

    Ehara, Shigeru; Aoki, Shigeki; Honda, Hiroshi

    2016-10-01

    Because of the globalization of environment around the academic society, the expected roles have changed significantly. In this short communication, we present the current situation in our international activities of the Japan Radiological Society, particularly in the academic activities and clinical practice. Establishing and reinforcing international network is one process of their promotion.

  3. Independent Video in Britain.

    ERIC Educational Resources Information Center

    Stewart, David

    Maintaining the status quo as well as the attitude toward cultural funding and development that it imposes on video are detrimental to the formation of a thriving video network, and also out of key with the present social and political situation in Britain. Independent video has some quite specific advantages as a medium for cultural production…

  4. Friendship, Status, and Repayment as Factors in Seeking Help.

    ERIC Educational Resources Information Center

    Shapiro, E. Gary

    Three variables, derived from Blau's (1955) analysis of consultation networks among federal agents and Homans' (1961) social exchange analysis, were manipulated to observe their effects on help seeking. Subjects were presented with a hypothetical situation where help was needed. Subjects indicated that they would be more likely to seek help from a…

  5. Reservoir Computing Properties of Neural Dynamics in Prefrontal Cortex

    PubMed Central

    Procyk, Emmanuel; Dominey, Peter Ford

    2016-01-01

    Primates display a remarkable ability to adapt to novel situations. Determining what is most pertinent in these situations is not always possible based only on the current sensory inputs, and often also depends on recent inputs and behavioral outputs that contribute to internal states. Thus, one can ask how cortical dynamics generate representations of these complex situations. It has been observed that mixed selectivity in cortical neurons contributes to represent diverse situations defined by a combination of the current stimuli, and that mixed selectivity is readily obtained in randomly connected recurrent networks. In this context, these reservoir networks reproduce the highly recurrent nature of local cortical connectivity. Recombining present and past inputs, random recurrent networks from the reservoir computing framework generate mixed selectivity which provides pre-coded representations of an essentially universal set of contexts. These representations can then be selectively amplified through learning to solve the task at hand. We thus explored their representational power and dynamical properties after training a reservoir to perform a complex cognitive task initially developed for monkeys. The reservoir model inherently displayed a dynamic form of mixed selectivity, key to the representation of the behavioral context over time. The pre-coded representation of context was amplified by training a feedback neuron to explicitly represent this context, thereby reproducing the effect of learning and allowing the model to perform more robustly. This second version of the model demonstrates how a hybrid dynamical regime combining spatio-temporal processing of reservoirs, and input driven attracting dynamics generated by the feedback neuron, can be used to solve a complex cognitive task. We compared reservoir activity to neural activity of dorsal anterior cingulate cortex of monkeys which revealed similar network dynamics. We argue that reservoir computing is a pertinent framework to model local cortical dynamics and their contribution to higher cognitive function. PMID:27286251

  6. Concurrent information affects response inhibition processes via the modulation of theta oscillations in cognitive control networks.

    PubMed

    Chmielewski, Witold X; Mückschel, Moritz; Dippel, Gabriel; Beste, Christian

    2016-11-01

    Inhibiting responses is a challenge, where the outcome (partly) depends on the situational context. In everyday situations, response inhibition performance might be altered when irrelevant input is presented simultaneously with the information relevant for response inhibition. More specifically, irrelevant concurrent information may either brace or interfere with response-relevant information, depending on whether these inputs are redundant or conflicting. The aim of this study is to investigate neurophysiological mechanisms and the network underlying such modulations using EEG beamforming as method. The results show that in comparison to a baseline condition without concurrent information, response inhibition performance can be aggravated or facilitated by manipulating the extent of conflict via concurrent input. This depends on whether the requirement for cognitive control is high, as in conflicting trials, or whether it is low, as in redundant trials. In line with this, the total theta frequency power decreases in a right hemispheric orbitofrontal response inhibition network including the SFG, MFG, and SMA, when concurrent redundant information facilitates response inhibition processes. Vice versa, theta activity in a left-hemispheric response inhibition network (i.e., SFG, MFG, and IFG) increases, when conflicting concurrent information compromises response inhibition processes. We conclude that concurrent information bi-directionally shifts response inhibition performance and modulates the network architecture underlying theta oscillations which are signaling different levels of the need for cognitive control.

  7. A neural networks application for the study of the influence of transport conditions on the working performance

    NASA Astrophysics Data System (ADS)

    Anghel, D.-C.; Ene, A.; Ştirbu, C.; Sicoe, G.

    2017-10-01

    This paper presents a study about the factors that influence the working performances of workers in the automotive industry. These factors regard mainly the transportations conditions, taking into account the fact that a large number of workers live in places that are far away of the enterprise. The quantitative data obtained from this study will be generalized by using a neural network, software simulated. The neural network is able to estimate the performance of workers even for the combinations of input factors that had been not recorded by the study. The experimental data obtained from the study will be divided in two classes. The first class that contains approximately 80% of data will be used by the Java software for the training of the neural network. The weights resulted from the training process will be saved in a text file. The other class that contains the rest of the 20% of experimental data will be used to validate the neural network. The training and the validation of the networks are performed in a Java software (TrainAndValidate java class). We designed another java class, Test.java that will be used with new input data, for new situations. The experimental data collected from the study. The software that simulated the neural network. The software that estimates the working performance, when new situations are met. This application is useful for human resources department of an enterprise. The output results are not quantitative. They are qualitative (from low performance to high performance, divided in five classes).

  8. Real-time network security situation visualization and threat assessment based on semi-Markov process

    NASA Astrophysics Data System (ADS)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  9. Identification of the actual state and entity availability forecasting in power engineering using neural-network technologies

    NASA Astrophysics Data System (ADS)

    Protalinsky, O. M.; Shcherbatov, I. A.; Stepanov, P. V.

    2017-11-01

    A growing number of severe accidents in RF call for the need to develop a system that could prevent emergency situations. In a number of cases accident rate is stipulated by careless inspections and neglects in developing repair programs. Across the country rates of accidents are growing because of a so-called “human factor”. In this regard, there has become urgent the problem of identification of the actual state of technological facilities in power engineering using data on engineering processes running and applying artificial intelligence methods. The present work comprises four model states of manufacturing equipment of engineering companies: defect, failure, preliminary situation, accident. Defect evaluation is carried out using both data from SCADA and ASEPCR and qualitative information (verbal assessments of experts in subject matter, photo- and video materials of surveys processed using pattern recognition methods in order to satisfy the requirements). Early identification of defects makes possible to predict the failure of manufacturing equipment using mathematical techniques of artificial neural network. In its turn, this helps to calculate predicted characteristics of reliability of engineering facilities using methods of reliability theory. Calculation of the given parameters provides the real-time estimation of remaining service life of manufacturing equipment for the whole operation period. The neural networks model allows evaluating possibility of failure of a piece of equipment consistent with types of actual defects and their previous reasons. The article presents the grounds for a choice of training and testing samples for the developed neural network, evaluates the adequacy of the neural networks model, and shows how the model can be used to forecast equipment failure. There have been carried out simulating experiments using a computer and retrospective samples of actual values for power engineering companies. The efficiency of the developed model for different types of manufacturing equipment has been proved. There have been offered other research areas in terms of the presented subject matter.

  10. Optimization with artificial neural network systems - A mapping principle and a comparison to gradient based methods

    NASA Technical Reports Server (NTRS)

    Leong, Harrison Monfook

    1988-01-01

    General formulae for mapping optimization problems into systems of ordinary differential equations associated with artificial neural networks are presented. A comparison is made to optimization using gradient-search methods. The performance measure is the settling time from an initial state to a target state. A simple analytical example illustrates a situation where dynamical systems representing artificial neural network methods would settle faster than those representing gradient-search. Settling time was investigated for a more complicated optimization problem using computer simulations. The problem was a simplified version of a problem in medical imaging: determining loci of cerebral activity from electromagnetic measurements at the scalp. The simulations showed that gradient based systems typically settled 50 to 100 times faster than systems based on current neural network optimization methods.

  11. The National Resource Library for Science and Technology in Sweden: A Nordic model of cooperating technology libraries

    NASA Technical Reports Server (NTRS)

    Lagar, Gunnar

    1994-01-01

    The scope of this presentation is to give a state-of-the-art report on the present situation of Nordic technology libraries, to elaborate on a plan for national resource libraries in Sweden, and to share how the Royal Institute of Technology Library in Stockholm (KTHB) has fostered a network of cooperating libraries in order to optimize government funding for the system of resource libraries.

  12. Negotiating for Computer Services. Proceedings of the 1977 Clinic on Library Applications of Data Processing.

    ERIC Educational Resources Information Center

    Divilbiss, J. L., Ed.

    To help the librarian in negotiating with vendors of automated library services, nine authors have presented methods of dealing with a specific service or situation. Paper topics include computer services, network contracts, innovative service, data processing, automated circulation, a turn-key system, data base sharing, online data base services,…

  13. A Combined Arms Approach to Defending Army Networks

    DTIC Science & Technology

    2012-01-01

    GIG operates, through cyberspace, as a globally interconnected, end...operations from the friendly to adversary box increases the situational awareness and unity of effort the Army lacks, and creates an economy of force that...indica- tions and warnings • Present a timely and accurate estimate of technical impact result- ing from the threat activity and determine

  14. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  15. Alternative Opportunistic Alert Diffusion to Support Infrastructure Failure during Disasters

    PubMed Central

    Mezghani, Farouk; Mitton, Nathalie

    2017-01-01

    Opportunistic communications present a promising solution for disaster network recovery in emergency situations such as hurricanes, earthquakes, and floods, where infrastructure might be destroyed. Some recent works in the literature have proposed opportunistic-based disaster recovery solutions, but they have omitted the consideration of mobile devices that come with different network technologies and various initial energy levels. This work presents COPE, an energy-aware Cooperative OPportunistic alErt diffusion scheme for trapped survivors to use during disaster scenarios to report their position and ease their rescue operation. It aims to maintain mobile devices functional for as long as possible for maximum network coverage until reaching proximate rescuers. COPE deals with mobile devices that come with an assortment of networks and aims to perform systematic network interface selection. Furthermore, it considers mobile devices with various energy levels and allows low-energy nodes to hold their charge for longer time with the support of high-energy nodes. A proof-of-concept implementation has been performed to study the doability and efficiency of COPE, and to highlight the lessons learned. PMID:29039770

  16. Quantum Bayesian networks with application to games displaying Parrondo's paradox

    NASA Astrophysics Data System (ADS)

    Pejic, Michael

    Bayesian networks and their accompanying graphical models are widely used for prediction and analysis across many disciplines. We will reformulate these in terms of linear maps. This reformulation will suggest a natural extension, which we will show is equivalent to standard textbook quantum mechanics. Therefore, this extension will be termed quantum. However, the term quantum should not be taken to imply this extension is necessarily only of utility in situations traditionally thought of as in the domain of quantum mechanics. In principle, it may be employed in any modelling situation, say forecasting the weather or the stock market---it is up to experiment to determine if this extension is useful in practice. Even restricting to the domain of quantum mechanics, with this new formulation the advantages of Bayesian networks can be maintained for models incorporating quantum and mixed classical-quantum behavior. The use of these will be illustrated by various basic examples. Parrondo's paradox refers to the situation where two, multi-round games with a fixed winning criteria, both with probability greater than one-half for one player to win, are combined. Using a possibly biased coin to determine the rule to employ for each round, paradoxically, the previously losing player now wins the combined game with probabilitygreater than one-half. Using the extended Bayesian networks, we will formulate and analyze classical observed, classical hidden, and quantum versions of a game that displays this paradox, finding bounds for the discrepancy from naive expectations for the occurrence of the paradox. A quantum paradox inspired by Parrondo's paradox will also be analyzed. We will prove a bound for the discrepancy from naive expectations for this paradox as well. Games involving quantum walks that achieve this bound will be presented.

  17. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  18. Surveying traffic congestion based on the concept of community structure of complex networks

    NASA Astrophysics Data System (ADS)

    Ma, Lili; Zhang, Zhanli; Li, Meng

    2016-07-01

    In this paper, taking the traffic of Beijing city as an instance, we study city traffic states, especially traffic congestion, based on the concept of network community structure. Concretely, using the floating car data (FCD) information of vehicles gained from the intelligent transport system (ITS) of the city, we construct a new traffic network model which is with floating cars as network nodes and time-varying. It shows that this traffic network has Gaussian degree distributions at different time points. Furthermore, compared with free traffic situations, our simulations show that the traffic network generally has more obvious community structures with larger values of network fitness for congested traffic situations, and through the GPSspg web page, we show that all of our results are consistent with the reality. Then, it indicates that network community structure should be an available way for investigating city traffic congestion problems.

  19. An Assessment of ELINT Exploitation for Situational Awareness Visualisations on Operator Situational Awareness

    DTIC Science & Technology

    2006-10-01

    C L A S I F I C A T I O N An Assessment of ELINT Exploitation for Situational Awareness Visualisations on Operator Situational...environment. The An Assessment of ELINT Exploitation for Situational Awareness Visualisations on Operator Situational Awareness EXECUTIVE SUMMARY...1. ELEXSA’s Process of Sequential Enrichment. 2 Figure 2. Sample ELEXSA Visualisation . 3 Figure 3. Example Llama/Cheetah Network Layout. 5

  20. Dynamic Graph Analytic Framework (DYGRAF): greater situation awareness through layered multi-modal network analysis

    NASA Astrophysics Data System (ADS)

    Margitus, Michael R.; Tagliaferri, William A., Jr.; Sudit, Moises; LaMonica, Peter M.

    2012-06-01

    Understanding the structure and dynamics of networks are of vital importance to winning the global war on terror. To fully comprehend the network environment, analysts must be able to investigate interconnected relationships of many diverse network types simultaneously as they evolve both spatially and temporally. To remove the burden from the analyst of making mental correlations of observations and conclusions from multiple domains, we introduce the Dynamic Graph Analytic Framework (DYGRAF). DYGRAF provides the infrastructure which facilitates a layered multi-modal network analysis (LMMNA) approach that enables analysts to assemble previously disconnected, yet related, networks in a common battle space picture. In doing so, DYGRAF provides the analyst with timely situation awareness, understanding and anticipation of threats, and support for effective decision-making in diverse environments.

  1. Leveraging Emerging Technology to Maintain Corporate Situational Awareness

    DTIC Science & Technology

    2008-06-01

    Abstract and Outline for 13th ICCRTS For the paper entitled: Leveraging Emerging Technology to Maintain Corporate ...Situational Awareness Topics: Topic 5. Organizational Issues Topic 4. Cognitive and Social Issues Topic: 2 Networks and Networking Mr. José...for the collection of information is estimated to average 1 hour per response , including the time for reviewing instructions, searching existing data

  2. Abductive networks applied to electronic combat

    NASA Astrophysics Data System (ADS)

    Montgomery, Gerard J.; Hess, Paul; Hwang, Jong S.

    1990-08-01

    A practical approach to dealing with combinatorial decision problems and uncertainties associated with electronic combat through the use of networks of high-level functional elements called abductive networks is presented. It describes the application of the Abductory Induction Mechanism (AIMTM) a supervised inductive learning tool for synthesizing polynomial abductive networks to the electronic combat problem domain. From databases of historical expert-generated or simulated combat engagements AIM can often induce compact and robust network models for making effective real-time electronic combat decisions despite significant uncertainties or a combinatorial explosion of possible situations. The feasibility of applying abductive networks to realize advanced combat decision aiding capabilities was demonstrated by applying AIM to a set of electronic combat simulations. The networks synthesized by AIM generated accurate assessments of the intent lethality and overall risk associated with a variety of simulated threats and produced reasonable estimates of the expected effectiveness of a group of electronic countermeasures for a large number of simulated combat scenarios. This paper presents the application of abductive networks to electronic combat summarizes the results of experiments performed using AIM discusses the benefits and limitations of applying abductive networks to electronic combat and indicates why abductive networks can often result in capabilities not attainable using alternative approaches. 1. ELECTRONIC COMBAT. UNCERTAINTY. AND MACHINE LEARNING Electronic combat has become an essential part of the ability to make war and has become increasingly complex since

  3. Availability Improvement of Layer 2 Seamless Networks Using OpenFlow

    PubMed Central

    Molina, Elias; Jacob, Eduardo; Matias, Jon; Moreira, Naiara; Astarloa, Armando

    2015-01-01

    The network robustness and reliability are strongly influenced by the implementation of redundancy and its ability of reacting to changes. In situations where packet loss or maximum latency requirements are critical, replication of resources and information may become the optimal technique. To this end, the IEC 62439-3 Parallel Redundancy Protocol (PRP) provides seamless recovery in layer 2 networks by delegating the redundancy management to the end-nodes. In this paper, we present a combination of the Software-Defined Networking (SDN) approach and PRP topologies to establish a higher level of redundancy and thereby, through several active paths provisioned via the OpenFlow protocol, the global reliability is increased, as well as data flows are managed efficiently. Hence, the experiments with multiple failure scenarios, which have been run over the Mininet network emulator, show the improvement in the availability and responsiveness over other traditional technologies based on a single active path. PMID:25759861

  4. Availability improvement of layer 2 seamless networks using OpenFlow.

    PubMed

    Molina, Elias; Jacob, Eduardo; Matias, Jon; Moreira, Naiara; Astarloa, Armando

    2015-01-01

    The network robustness and reliability are strongly influenced by the implementation of redundancy and its ability of reacting to changes. In situations where packet loss or maximum latency requirements are critical, replication of resources and information may become the optimal technique. To this end, the IEC 62439-3 Parallel Redundancy Protocol (PRP) provides seamless recovery in layer 2 networks by delegating the redundancy management to the end-nodes. In this paper, we present a combination of the Software-Defined Networking (SDN) approach and PRP topologies to establish a higher level of redundancy and thereby, through several active paths provisioned via the OpenFlow protocol, the global reliability is increased, as well as data flows are managed efficiently. Hence, the experiments with multiple failure scenarios, which have been run over the Mininet network emulator, show the improvement in the availability and responsiveness over other traditional technologies based on a single active path.

  5. [Critical reflexion on quality improvement and networking].

    PubMed

    Adler, R

    2012-06-06

    Qualitiy-control and networking are two issues of debate in modern medicine. The origin of these terms is not to be found in medicine, but rather in industry. However their naive transfer to the field of medicine causes damage. It is relatively easy to test industrial products for their quality. Dealing with meaningful medical problems is far too complex. Simple data such as blood pressure, HbA1c, etc. may be assessed. The only means of quality-control of complex medical situations and actions are ward rounds by attending physicians, case presentations at staff meetings, etc. Issues of clinical quality-control are discussed on the basis of the history of an aged couple. Furthermore a personal clinical experience illustrates how doctors create a useful network with other physicians and how they eliminate "useless" colleagues from their network. Economists should have no influence or impact whatsoever on the quality-control and networking of physicians.

  6. Control strategies of 3-cell Central Pattern Generator via global stimuli

    NASA Astrophysics Data System (ADS)

    Lozano, Álvaro; Rodríguez, Marcos; Barrio, Roberto

    2016-03-01

    The study of the synchronization patterns of small neuron networks that control several biological processes has become an interesting growing discipline. Some of these synchronization patterns of individual neurons are related to some undesirable neurological diseases, and they are believed to play a crucial role in the emergence of pathological rhythmic brain activity in different diseases, like Parkinson’s disease. We show how, with a suitable combination of short and weak global inhibitory and excitatory stimuli over the whole network, we can switch between different stable bursting patterns in small neuron networks (in our case a 3-neuron network). We develop a systematic study showing and explaining the effects of applying the pulses at different moments. Moreover, we compare the technique on a completely symmetric network and on a slightly perturbed one (a much more realistic situation). The present approach of using global stimuli may allow to avoid undesirable synchronization patterns with nonaggressive stimuli.

  7. An opinion-driven behavioral dynamics model for addictive behaviors

    NASA Astrophysics Data System (ADS)

    Moore, Thomas W.; Finley, Patrick D.; Apelberg, Benjamin J.; Ambrose, Bridget K.; Brodsky, Nancy S.; Brown, Theresa J.; Husten, Corinne; Glass, Robert J.

    2015-04-01

    We present a model of behavioral dynamics that combines a social network-based opinion dynamics model with behavioral mapping. The behavioral component is discrete and history-dependent to represent situations in which an individual's behavior is initially driven by opinion and later constrained by physiological or psychological conditions that serve to maintain the behavior. Individuals are modeled as nodes in a social network connected by directed edges. Parameter sweeps illustrate model behavior and the effects of individual parameters and parameter interactions on model results. Mapping a continuous opinion variable into a discrete behavioral space induces clustering on directed networks. Clusters provide targets of opportunity for influencing the network state; however, the smaller the network the greater the stochasticity and potential variability in outcomes. This has implications both for behaviors that are influenced by close relationships verses those influenced by societal norms and for the effectiveness of strategies for influencing those behaviors.

  8. Crossover between structured and well-mixed networks in an evolutionary prisoner's dilemma game

    NASA Astrophysics Data System (ADS)

    Dai, Qionglin; Cheng, Hongyan; Li, Haihong; Li, Yuting; Zhang, Mei; Yang, Junzhong

    2011-07-01

    In a spatial evolutionary prisoner’s dilemma game (PDG), individuals interact with their neighbors and update their strategies according to some rules. As is well known, cooperators are destined to become extinct in a well-mixed population, whereas they could emerge and be sustained on a structured network. In this work, we introduce a simple model to investigate the crossover between a structured network and a well-mixed one in an evolutionary PDG. In the model, each link j is designated a rewiring parameter τj, which defines the time interval between two successive rewiring events for link j. By adjusting the rewiring parameter τ (the mean time interval for any link in the network), we could change a structured network into a well-mixed one. For the link rewiring events, three situations are considered: one synchronous situation and two asynchronous situations. Simulation results show that there are three regimes of τ: large τ where the density of cooperators ρc rises to ρc,∞ (the value of ρc for the case without link rewiring), small τ where the mean-field description for a well-mixed network is applicable, and moderate τ where the crossover between a structured network and a well-mixed one happens.

  9. Architecture Design for the Space Situational Awareness System in the Preparedness Plan for Space Hazards of Republic of Korea

    NASA Astrophysics Data System (ADS)

    Choi, E.; Cho, S.; Shin, S.; Park, J.; Kim, J.; Kim, D.

    The threat posed by asteroids and comets has become one of the important issues. Jinju meteorite discovered in March 2014 has expanded the interest of the people of the fall of the natural space objects. Furthermore, the growing quantity of space debris is a serious threat to satellites and other spacecraft, which risk being damaged or even destroyed. In May of 2014, Korea established the preparedness plan for space hazards according to the space development promotion act which is amended to take action with respect to hazards from space. This plan is largely composed of 3 items such as system, technology and infrastructure. System is included the establishment and management of national space hazards headquarters at risk situation. Korea Astronomy and Space Science Institute (KASI) was designated as a space environment monitoring agency under the ministry of science, ICT and future planning (MSIP). Technology is supposed to develop the space situational awareness system that can monitor and detect space objects. For infrastructure, research and development of core technology will be promoted for capabilities improvement of space hazards preparedness such as software tools, application and data systems. This paper presents the architectural design for building space situational awareness system. The trade-off study of space situational awareness system for the Korea situation was performed. The results have shown the proposed architectural design. The baseline architecture is composed of Integrated Analysis System and Space Objects Monitoring System. Integrated Analysis System collects the status data from Space Objects Monitoring System and analyzes the space risk information through a data processing. For Space Objects Monitoring System, the all-sky surveillance camera, array radar and meteoroid surveillance sensor networks were considered. This system focuses on not only the threat of a large artificial satellite and natural space objects such as asteroids that crashed to Earth but also the prediction of potential collisions between space objects. Especially, array radar aims to accurately track space objects. By analyzing performance for radar system and sensor networks, several feasible approaches for such a space objects monitoring system will be presented in this paper.

  10. Correlates of hepatitis B virus health-related behaviors of Korean Americans: a situation-specific nursing theory.

    PubMed

    Lee, Haeok; Fawcett, Jacqueline; Yang, Jin Hyang; Hann, Hie-Won

    2012-12-01

    The purpose of this article is to explain the evolution of a situation-specific theory developed to enhance understanding of health-related behaviors of Korean Americans (KAs) who have or are at risk for a chronic hepatitis B virus (HBV) infection. The situation-specific theory evolved from an integration of the Network Episode Model, studies of health-related behaviors of people with HBV infection, and our studies of and practice experiences with Asian American individuals with HBV infection. The major concepts of the theory are sociocultural context, social network, individual-level factors, illness experience, and health-related behaviors. The major propositions of the theory are that sociocultural context, social network, and individual-level factors influence the illness experience, and that sociocultural context, social network, individual-level factors, and the illness experience influence health-related behaviors of KAs who have or are at risk for HBV infection. This situation-specific theory represents a translation of abstract concepts into clinical reality. The theory is an explanation of correlates of health-related HBV behaviors of KAs. The next step is to develop and test the effectiveness of a nursing intervention designed to promote behaviors that will enhance the health of KAs who have or are at risk for HBV infection, and that takes into account sociocultural context, social network, individual-level factors, and illness experience. © 2012 Sigma Theta Tau International.

  11. Enhancing situational awareness by means of visualization and information integration of sensor networks

    NASA Astrophysics Data System (ADS)

    Timonen, Jussi; Vankka, Jouko

    2013-05-01

    This paper presents a solution for information integration and sharing architecture, which is able to receive data simultaneously from multiple different sensor networks. Creating a Common Operational Picture (COP) object along with the base map of the building plays a key role in the research. The object is combined with desired map sources and then shared to the mobile devices worn by soldiers in the field. The sensor networks we used focus on location techniques indoors, and a simple set of symbols is created to present the information, as an addition to NATO APP6B symbols. A core element in this research is the MUSAS (Mobile Urban Situational Awareness System), a demonstration environment that implements central functionalities. Information integration of the system is handled by the Internet Connection Engine (Ice) middleware, as well as the server, which hosts COP information and maps. The entire system is closed, such that it does not need any external service, and the information transfer with the mobile devices is organized by a tactical 5 GHz WLAN solution. The demonstration environment is implemented using only commercial off-theshelf (COTS) products. We have presented a field experiment event in which the system was able to integrate and share real time information of a blue force tracking system, received signal strength indicator (RSSI) based intrusion detection system, and a robot using simultaneous location and mapping technology (SLAM), where all the inputs were based on real activities. The event was held in a training area on urban area warfare.

  12. Adaptive MANET multipath routing algorithm based on the simulated annealing approach.

    PubMed

    Kim, Sungwook

    2014-01-01

    Mobile ad hoc network represents a system of wireless mobile nodes that can freely and dynamically self-organize network topologies without any preexisting communication infrastructure. Due to characteristics like temporary topology and absence of centralized authority, routing is one of the major issues in ad hoc networks. In this paper, a new multipath routing scheme is proposed by employing simulated annealing approach. The proposed metaheuristic approach can achieve greater and reciprocal advantages in a hostile dynamic real world network situation. Therefore, the proposed routing scheme is a powerful method for finding an effective solution into the conflict mobile ad hoc network routing problem. Simulation results indicate that the proposed paradigm adapts best to the variation of dynamic network situations. The average remaining energy, network throughput, packet loss probability, and traffic load distribution are improved by about 10%, 10%, 5%, and 10%, respectively, more than the existing schemes.

  13. A feedback control model for network flow with multiple pure time delays

    NASA Technical Reports Server (NTRS)

    Press, J.

    1972-01-01

    A control model describing a network flow hindered by multiple pure time (or transport) delays is formulated. Feedbacks connect each desired output with a single control sector situated at the origin. The dynamic formulation invokes the use of differential difference equations. This causes the characteristic equation of the model to consist of transcendental functions instead of a common algebraic polynomial. A general graphical criterion is developed to evaluate the stability of such a problem. A digital computer simulation confirms the validity of such criterion. An optimal decision making process with multiple delays is presented.

  14. Analysis on the University’s Network Security Level System in the Big Data Era

    NASA Astrophysics Data System (ADS)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  15. Networked sensors for the combat forces

    NASA Astrophysics Data System (ADS)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details of these products and recent test results will be presented.

  16. Databases on Vocational Qualifications and Courses Accredited. Report on the Workshop Organised by CEDEFOP (Nurnberg, Germany, November 25-26, 1992).

    ERIC Educational Resources Information Center

    CEDEFOP Flash, 1993

    1993-01-01

    During 1992, CEDEFOP (the European Centre for the Development of Vocational Training) commissioned two projects to investigate the current situation with regard to databases on vocational qualifications in Member States of the European Community (EC) and possibilities for networking such databases. Results of these two studies were presented and…

  17. Leveraging AMI data for distribution system model calibration and situational awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peppanen, Jouni; Reno, Matthew J.; Thakkar, Mohini

    The many new distributed energy resources being installed at the distribution system level require increased visibility into system operations that will be enabled by distribution system state estimation (DSSE) and situational awareness applications. Reliable and accurate DSSE requires both robust methods for managing the big data provided by smart meters and quality distribution system models. This paper presents intelligent methods for detecting and dealing with missing or inaccurate smart meter data, as well as the ways to process the data for different applications. It also presents an efficient and flexible parameter estimation method based on the voltage drop equation andmore » regression analysis to enhance distribution system model accuracy. Finally, it presents a 3-D graphical user interface for advanced visualization of the system state and events. Moreover, we demonstrate this paper for a university distribution network with the state-of-the-art real-time and historical smart meter data infrastructure.« less

  18. Leveraging AMI data for distribution system model calibration and situational awareness

    DOE PAGES

    Peppanen, Jouni; Reno, Matthew J.; Thakkar, Mohini; ...

    2015-01-15

    The many new distributed energy resources being installed at the distribution system level require increased visibility into system operations that will be enabled by distribution system state estimation (DSSE) and situational awareness applications. Reliable and accurate DSSE requires both robust methods for managing the big data provided by smart meters and quality distribution system models. This paper presents intelligent methods for detecting and dealing with missing or inaccurate smart meter data, as well as the ways to process the data for different applications. It also presents an efficient and flexible parameter estimation method based on the voltage drop equation andmore » regression analysis to enhance distribution system model accuracy. Finally, it presents a 3-D graphical user interface for advanced visualization of the system state and events. Moreover, we demonstrate this paper for a university distribution network with the state-of-the-art real-time and historical smart meter data infrastructure.« less

  19. A Visual Language for Situational Awareness

    DTIC Science & Technology

    2016-12-01

    listening. The arrival of the information age has delivered the ability to transfer larger volumes of data at far greater rates. Wireless digital... wireless infrastructure for use in large-scale events where domestic power and private wireless networks are overloaded or unavailable. States should...lacking by responders using ANSI INCITS 415 symbols sets.226 When combined with the power of a wireless network, a situational awareness metalanguage is

  20. A Regularizer Approach for RBF Networks Under the Concurrent Weight Failure Situation.

    PubMed

    Leung, Chi-Sing; Wan, Wai Yan; Feng, Ruibin

    2017-06-01

    Many existing results on fault-tolerant algorithms focus on the single fault source situation, where a trained network is affected by one kind of weight failure. In fact, a trained network may be affected by multiple kinds of weight failure. This paper first studies how the open weight fault and the multiplicative weight noise degrade the performance of radial basis function (RBF) networks. Afterward, we define the objective function for training fault-tolerant RBF networks. Based on the objective function, we then develop two learning algorithms, one batch mode and one online mode. Besides, the convergent conditions of our online algorithm are investigated. Finally, we develop a formula to estimate the test set error of faulty networks trained from our approach. This formula helps us to optimize some tuning parameters, such as RBF width.

  1. Cloud Computing Services for Seismic Networks

    NASA Astrophysics Data System (ADS)

    Olson, Michael

    This thesis describes a compositional framework for developing situation awareness applications: applications that provide ongoing information about a user's changing environment. The thesis describes how the framework is used to develop a situation awareness application for earthquakes. The applications are implemented as Cloud computing services connected to sensors and actuators. The architecture and design of the Cloud services are described and measurements of performance metrics are provided. The thesis includes results of experiments on earthquake monitoring conducted over a year. The applications developed by the framework are (1) the CSN---the Community Seismic Network---which uses relatively low-cost sensors deployed by members of the community, and (2) SAF---the Situation Awareness Framework---which integrates data from multiple sources, including the CSN, CISN---the California Integrated Seismic Network, a network consisting of high-quality seismometers deployed carefully by professionals in the CISN organization and spread across Southern California---and prototypes of multi-sensor platforms that include carbon monoxide, methane, dust and radiation sensors.

  2. Differential Tuning of Ventral and Dorsal Streams during the Generation of Common and Uncommon Tool Uses.

    PubMed

    Matheson, Heath E; Buxbaum, Laurel J; Thompson-Schill, Sharon L

    2017-11-01

    Our use of tools is situated in different contexts. Prior evidence suggests that diverse regions within the ventral and dorsal streams represent information supporting common tool use. However, given the flexibility of object concepts, these regions may be tuned to different types of information when generating novel or uncommon uses of tools. To investigate this, we collected fMRI data from participants who reported common or uncommon tool uses in response to visually presented familiar objects. We performed a pattern dissimilarity analysis in which we correlated cortical patterns with behavioral measures of visual, action, and category information. The results showed that evoked cortical patterns within the dorsal tool use network reflected action and visual information to a greater extent in the uncommon use group, whereas evoked neural patterns within the ventral tool use network reflected categorical information more strongly in the common use group. These results reveal the flexibility of cortical representations of tool use and the situated nature of cortical representations more generally.

  3. Cellular computational generalized neuron network for frequency situational intelligence in a multi-machine power system.

    PubMed

    Wei, Yawei; Venayagamoorthy, Ganesh Kumar

    2017-09-01

    To prevent large interconnected power system from a cascading failure, brownout or even blackout, grid operators require access to faster than real-time information to make appropriate just-in-time control decisions. However, the communication and computational system limitations of currently used supervisory control and data acquisition (SCADA) system can only deliver delayed information. However, the deployment of synchrophasor measurement devices makes it possible to capture and visualize, in near-real-time, grid operational data with extra granularity. In this paper, a cellular computational network (CCN) approach for frequency situational intelligence (FSI) in a power system is presented. The distributed and scalable computing unit of the CCN framework makes it particularly flexible for customization for a particular set of prediction requirements. Two soft-computing algorithms have been implemented in the CCN framework: a cellular generalized neuron network (CCGNN) and a cellular multi-layer perceptron network (CCMLPN), for purposes of providing multi-timescale frequency predictions, ranging from 16.67 ms to 2 s. These two developed CCGNN and CCMLPN systems were then implemented on two different scales of power systems, one of which installed a large photovoltaic plant. A real-time power system simulator at weather station within the Real-Time Power and Intelligent Systems (RTPIS) laboratory at Clemson, SC, was then used to derive typical FSI results. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Empathy and contextual social cognition.

    PubMed

    Melloni, Margherita; Lopez, Vladimir; Ibanez, Agustin

    2014-03-01

    Empathy is a highly flexible and adaptive process that allows for the interplay of prosocial behavior in many different social contexts. Empathy appears to be a very situated cognitive process, embedded with specific contextual cues that trigger different automatic and controlled responses. In this review, we summarize relevant evidence regarding social context modulation of empathy for pain. Several contextual factors, such as stimulus reality and personal experience, affectively link with other factors, emotional cues, threat information, group membership, and attitudes toward others to influence the affective, sensorimotor, and cognitive processing of empathy. Thus, we propose that the frontoinsular-temporal network, the so-called social context network model (SCNM), is recruited during the contextual processing of empathy. This network would (1) update the contextual cues and use them to construct fast predictions (frontal regions), (2) coordinate the internal (body) and external milieus (insula), and (3) consolidate the context-target associative learning of empathic processes (temporal sites). Furthermore, we propose these context-dependent effects of empathy in the framework of the frontoinsular-temporal network and examine the behavioral and neural evidence of three neuropsychiatric conditions (Asperger syndrome, schizophrenia, and the behavioral variant of frontotemporal dementia), which simultaneously present with empathy and contextual integration impairments. We suggest potential advantages of a situated approach to empathy in the assessment of these neuropsychiatric disorders, as well as their relationship with the SCNM.

  5. Cognitive task analysis of network analysts and managers for network situational awareness

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah A.; Wong, Pak Chung; Moody, Sarah; Fink, Glenn

    2010-01-01

    The goal of our project is to create a set of next-generation cyber situational-awareness capabilities with applications to other domains in the long term. The situational-awareness capabilities being developed focus on novel visualization techniques as well as data analysis techniques designed to improve the comprehensibility of the visualizations. The objective is to improve the decision-making process to enable decision makers to choose better actions. To this end, we put extensive effort into ensuring we had feedback from network analysts and managers and understanding what their needs truly are. This paper discusses the cognitive task analysis methodology we followed to acquire feedback from the analysts. This paper also provides the details we acquired from the analysts on their processes, goals, concerns, etc. A final result we describe is the generation of a task-flow diagram.

  6. Cortical network architecture for context processing in primate brain

    PubMed Central

    Chao, Zenas C; Nagasaka, Yasuo; Fujii, Naotaka

    2015-01-01

    Context is information linked to a situation that can guide behavior. In the brain, context is encoded by sensory processing and can later be retrieved from memory. How context is communicated within the cortical network in sensory and mnemonic forms is unknown due to the lack of methods for high-resolution, brain-wide neuronal recording and analysis. Here, we report the comprehensive architecture of a cortical network for context processing. Using hemisphere-wide, high-density electrocorticography, we measured large-scale neuronal activity from monkeys observing videos of agents interacting in situations with different contexts. We extracted five context-related network structures including a bottom-up network during encoding and, seconds later, cue-dependent retrieval of the same network with the opposite top-down connectivity. These findings show that context is represented in the cortical network as distributed communication structures with dynamic information flows. This study provides a general methodology for recording and analyzing cortical network neuronal communication during cognition. DOI: http://dx.doi.org/10.7554/eLife.06121.001 PMID:26416139

  7. Representing situation awareness in collaborative systems: a case study in the energy distribution domain.

    PubMed

    Salmon, P M; Stanton, N A; Walker, G H; Jenkins, D; Baber, C; McMaster, R

    2008-03-01

    The concept of distributed situation awareness (DSA) is currently receiving increasing attention from the human factors community. This article investigates DSA in a collaborative real-world industrial setting by discussing the results derived from a recent naturalistic study undertaken within the UK energy distribution domain. The results describe the DSA-related information used by the networks of agents involved in the scenarios analysed, the sharing of this information between the agents and the salience of different information elements used. Thus, the structure, quality and content of each network's DSA is discussed, along with the implications for DSA theory. The findings reinforce the notion that when viewing situation awareness (SA) in collaborative systems, it is useful to focus on the coordinated behaviour of the system itself, rather than on the individual as the unit of analysis and suggest that the findings from such assessments can potentially be used to inform system, procedure and training design. SA is a critical commodity for teams working in industrial systems and systems, procedures and training programmes should be designed to facilitate efficient system SA acquisition and maintenance. This article presents approaches for describing and understanding SA during real-world collaborative tasks, the outputs from which can potentially be used to inform system, training programmes and procedure design.

  8. Management of a water distribution network by coupling GIS and hydraulic modeling: a case study of Chetouane in Algeria

    NASA Astrophysics Data System (ADS)

    Abdelbaki, Chérifa; Benchaib, Mohamed Mouâd; Benziada, Salim; Mahmoudi, Hacène; Goosen, Mattheus

    2017-06-01

    For more effective management of water distribution network in an arid region, Mapinfo GIS (8.0) software was coupled with a hydraulic model (EPANET 2.0) and applied to a case study region, Chetouane, situated in the north-west of Algeria. The area is characterized not only by water scarcity but also by poor water management practices. The results showed that a combination of GIS and modeling permits network operators to better analyze malfunctions with a resulting more rapid response as well as facilitating in an improved understanding of the work performed on the network. The grouping of GIS and modeling as an operating tool allows managers to diagnosis a network, to study solutions of problems and to predict future situations. The later can assist them in making informed decisions to ensure an acceptable performance level for optimal network operation.

  9. Using the eServices platform for detecting behavior patterns deviation in the elderly assisted living: a case study.

    PubMed

    Marcelino, Isabel; Lopes, David; Reis, Michael; Silva, Fernando; Laza, Rosalía; Pereira, António

    2015-01-01

    World's aging population is rising and the elderly are increasingly isolated socially and geographically. As a consequence, in many situations, they need assistance that is not granted in time. In this paper, we present a solution that follows the CRISP-DM methodology to detect the elderly's behavior pattern deviations that may indicate possible risk situations. To obtain these patterns, many variables are aggregated to ensure the alert system reliability and minimize eventual false positive alert situations. These variables comprehend information provided by body area network (BAN), by environment sensors, and also by the elderly's interaction in a service provider platform, called eServices--Elderly Support Service Platform. eServices is a scalable platform aggregating a service ecosystem developed specially for elderly people. This pattern recognition will further activate the adequate response. With the system evolution, it will learn to predict potential danger situations for a specified user, acting preventively and ensuring the elderly's safety and well-being. As the eServices platform is still in development, synthetic data, based on real data sample and empiric knowledge, is being used to populate the initial dataset. The presented work is a proof of concept of knowledge extraction using the eServices platform information. Regardless of not using real data, this work proves to be an asset, achieving a good performance in preventing alert situations.

  10. Using the eServices Platform for Detecting Behavior Patterns Deviation in the Elderly Assisted Living: A Case Study

    PubMed Central

    Marcelino, Isabel; Laza, Rosalía

    2015-01-01

    World's aging population is rising and the elderly are increasingly isolated socially and geographically. As a consequence, in many situations, they need assistance that is not granted in time. In this paper, we present a solution that follows the CRISP-DM methodology to detect the elderly's behavior pattern deviations that may indicate possible risk situations. To obtain these patterns, many variables are aggregated to ensure the alert system reliability and minimize eventual false positive alert situations. These variables comprehend information provided by body area network (BAN), by environment sensors, and also by the elderly's interaction in a service provider platform, called eServices—Elderly Support Service Platform. eServices is a scalable platform aggregating a service ecosystem developed specially for elderly people. This pattern recognition will further activate the adequate response. With the system evolution, it will learn to predict potential danger situations for a specified user, acting preventively and ensuring the elderly's safety and well-being. As the eServices platform is still in development, synthetic data, based on real data sample and empiric knowledge, is being used to populate the initial dataset. The presented work is a proof of concept of knowledge extraction using the eServices platform information. Regardless of not using real data, this work proves to be an asset, achieving a good performance in preventing alert situations. PMID:25874219

  11. Evaluation of Coordination of Emergency Response Team through the Social Network Analysis. Case Study: Oil and Gas Refinery.

    PubMed

    Mohammadfam, Iraj; Bastani, Susan; Esaghi, Mahbobeh; Golmohamadi, Rostam; Saee, Ali

    2015-03-01

    The purpose of this study was to examine the cohesions status of the coordination within response teams in the emergency response team (ERT) in a refinery. For this study, cohesion indicators of social network analysis (SNA; density, degree centrality, reciprocity, and transitivity) were utilized to examine the coordination of the response teams as a whole network. The ERT of this research, which was a case study, included seven teams consisting of 152 members. The required data were collected through structured interviews and were analyzed using the UCINET 6.0 Social Network Analysis Program. The results reported a relatively low number of triple connections, poor coordination with key members, and a high level of mutual relations in the network with low density, all implying that there were low cohesions of coordination in the ERT. The results showed that SNA provided a quantitative and logical approach for the examination of the coordination status among response teams and it also provided a main opportunity for managers and planners to have a clear understanding of the presented status. The research concluded that fundamental efforts were needed to improve the presented situations.

  12. Applying traditional signal processing techniques to social media exploitation for situational understanding

    NASA Astrophysics Data System (ADS)

    Abdelzaher, Tarek; Roy, Heather; Wang, Shiguang; Giridhar, Prasanna; Al Amin, Md. Tanvir; Bowman, Elizabeth K.; Kolodny, Michael A.

    2016-05-01

    Signal processing techniques such as filtering, detection, estimation and frequency domain analysis have long been applied to extract information from noisy sensor data. This paper describes the exploitation of these signal processing techniques to extract information from social networks, such as Twitter and Instagram. Specifically, we view social networks as noisy sensors that report events in the physical world. We then present a data processing stack for detection, localization, tracking, and veracity analysis of reported events using social network data. We show using a controlled experiment that the behavior of social sources as information relays varies dramatically depending on context. In benign contexts, there is general agreement on events, whereas in conflict scenarios, a significant amount of collective filtering is introduced by conflicted groups, creating a large data distortion. We describe signal processing techniques that mitigate such distortion, resulting in meaningful approximations of actual ground truth, given noisy reported observations. Finally, we briefly present an implementation of the aforementioned social network data processing stack in a sensor network analysis toolkit, called Apollo. Experiences with Apollo show that our techniques are successful at identifying and tracking credible events in the physical world.

  13. A seamless ubiquitous emergency medical service for crisis situations.

    PubMed

    Lin, Bor-Shing

    2016-04-01

    In crisis situations, a seamless ubiquitous communication is necessary to provide emergency medical service to save people's lives. An excellent prehospital emergency medicine provides immediate medical care to increase the survival rate of patients. On their way to the hospital, ambulance personnel must transmit real-time and uninterrupted patient information to the hospital to apprise the physician of the situation and provide options to the ambulance personnel. In emergency and crisis situations, many communication channels can be unserviceable because of damage to equipment or loss of power. Thus, data transmission over wireless communication to achieve uninterrupted network services is a major obstacle. This study proposes a mobile middleware for cognitive radio (CR) for improving the wireless communication link. CRs can sense their operating environment and optimize the spectrum usage so that the mobile middleware can integrate the existing wireless communication systems with a seamless communication service in heterogeneous network environments. Eventually, the proposed seamless mobile communication middleware was ported into an embedded system, which is compatible with the actual network environment without the need for changing the original system architecture. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. A Markov game theoretic data fusion approach for cyber situational awareness

    NASA Astrophysics Data System (ADS)

    Shen, Dan; Chen, Genshe; Cruz, Jose B., Jr.; Haynes, Leonard; Kruger, Martin; Blasch, Erik

    2007-04-01

    This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense. Alerts generated by Intrusion Detection Sensors (IDSs) or Intrusion Prevention Sensors (IPSs) are fed into the data refinement (Level 0) and object assessment (L1) data fusion components. High-level situation/threat assessment (L2/L3) data fusion based on Markov game model and Hierarchical Entity Aggregation (HEA) are proposed to refine the primitive prediction generated by adaptive feature/pattern recognition and capture new unknown features. A Markov (Stochastic) game method is used to estimate the belief of each possible cyber attack pattern. Game theory captures the nature of cyber conflicts: determination of the attacking-force strategies is tightly coupled to determination of the defense-force strategies and vice versa. Also, Markov game theory deals with uncertainty and incompleteness of available information. A software tool is developed to demonstrate the performance of the high level information fusion for cyber network defense situation and a simulation example shows the enhanced understating of cyber-network defense.

  15. Network reconstructions with partially available data

    NASA Astrophysics Data System (ADS)

    Zhang, Chaoyang; Chen, Yang; Hu, Gang

    2017-06-01

    Many practical systems in natural and social sciences can be described by dynamical networks. Day by day we have measured and accumulated huge amounts of data from these networks, which can be used by us to further our understanding of the world. The structures of the networks producing these data are often unknown. Consequently, understanding the structures of these networks from available data turns to be one of the central issues in interdisciplinary fields, which is called the network reconstruction problem. In this paper, we considered problems of network reconstructions using partially available data and some situations where data availabilities are not sufficient for conventional network reconstructions. Furthermore, we proposed to infer subnetwork with data of the subnetwork available only and other nodes of the entire network hidden; to depict group-group interactions in networks with averages of groups of node variables available; and to perform network reconstructions with known data of node variables only when networks are driven by both unknown internal fast-varying noises and unknown external slowly-varying signals. All these situations are expected to be common in practical systems and the methods and results may be useful for real world applications.

  16. Social Network Methods for the Educational and Psychological Sciences

    ERIC Educational Resources Information Center

    Sweet, Tracy M.

    2016-01-01

    Social networks are especially applicable in educational and psychological studies involving social interactions. A social network is defined as a specific relationship among a group of individuals. Social networks arise in a variety of situations such as friendships among children, collaboration and advice seeking among teachers, and coauthorship…

  17. An emergency-adaptive routing scheme for wireless sensor networks for building fire hazard monitoring.

    PubMed

    Zeng, Yuanyuan; Sreenan, Cormac J; Sitanayah, Lanny; Xiong, Naixue; Park, Jong Hyuk; Zheng, Guilin

    2011-01-01

    Fire hazard monitoring and evacuation for building environments is a novel application area for the deployment of wireless sensor networks. In this context, adaptive routing is essential in order to ensure safe and timely data delivery in building evacuation and fire fighting resource applications. Existing routing mechanisms for wireless sensor networks are not well suited for building fires, especially as they do not consider critical and dynamic network scenarios. In this paper, an emergency-adaptive, real-time and robust routing protocol is presented for emergency situations such as building fire hazard applications. The protocol adapts to handle dynamic emergency scenarios and works well with the routing hole problem. Theoretical analysis and simulation results indicate that our protocol provides a real-time routing mechanism that is well suited for dynamic emergency scenarios in building fires when compared with other related work.

  18. An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring

    PubMed Central

    Zeng, Yuanyuan; Sreenan, Cormac J.; Sitanayah, Lanny; Xiong, Naixue; Park, Jong Hyuk; Zheng, Guilin

    2011-01-01

    Fire hazard monitoring and evacuation for building environments is a novel application area for the deployment of wireless sensor networks. In this context, adaptive routing is essential in order to ensure safe and timely data delivery in building evacuation and fire fighting resource applications. Existing routing mechanisms for wireless sensor networks are not well suited for building fires, especially as they do not consider critical and dynamic network scenarios. In this paper, an emergency-adaptive, real-time and robust routing protocol is presented for emergency situations such as building fire hazard applications. The protocol adapts to handle dynamic emergency scenarios and works well with the routing hole problem. Theoretical analysis and simulation results indicate that our protocol provides a real-time routing mechanism that is well suited for dynamic emergency scenarios in building fires when compared with other related work. PMID:22163774

  19. Evaluation of the Effectiveness of Machine-based Situation Assessment - Preliminary Work

    DTIC Science & Technology

    2008-08-01

    consumers . 5. In nature, food webs can be described using networks. 6. An organisation is a network of people. 7. In the social domain there are...examine 6 DSTO-TN-0836 the linguistic affinity between concepts [16, 14, 17]. For example, if Concept A is drink and Concept B is beverage , they...of convergence behaviour they exhibit. A further extension to the methodology described above for comparing the situation assessment with the

  20. Wireless Sensor Networks for Ambient Assisted Living

    PubMed Central

    Aquino-Santos, Raúl; Martinez-Castro, Diego; Edwards-Block, Arthur; Murillo-Piedrahita, Andrés Felipe

    2013-01-01

    This paper introduces wireless sensor networks for Ambient Assisted Living as a proof of concept. Our workgroup has developed an arrhythmia detection algorithm that we evaluate in a closed space using a wireless sensor network to relay the information collected to where the information can be registered, monitored and analyzed to support medical decisions by healthcare providers. The prototype we developed is then evaluated using the TelosB platform. The proposed architecture considers very specific restrictions regarding the use of wireless sensor networks in clinical situations. The seamless integration of the system architecture enables both mobile node and network configuration, thus providing the versatile and robust characteristics necessary for real-time applications in medical situations. Likewise, this system architecture efficiently permits the different components of our proposed platform to interact efficiently within the parameters of this study. PMID:24351665

  1. Traumatic loss and major disasters: strengthening family and community resilience.

    PubMed

    Walsh, Froma

    2007-06-01

    This article presents the core principles and value of a family and community resilience-oriented approach to recovery from traumatic loss when catastrophic events occur. In contrast to individually based, symptom-focused approaches to trauma recovery, this multisystemic practice approach contextualizes the distress in the traumatic experience and taps strengths and resources in relational networks to foster healing and posttraumatic growth. The intertwining of trauma and traumatic losses is discussed. Key family and social processes in risk and resilience in traumatic loss situations are outlined. Case illustrations, model programs, and intervention guidelines are described in situations of community violence and major disasters to suggest ways to foster family and community resilience.

  2. Design on intelligent gateway technique in home network

    NASA Astrophysics Data System (ADS)

    Hu, Zhonggong; Feng, Xiancheng

    2008-12-01

    Based on digitization, multimedia, mobility, wide band, real-time interaction and so on,family networks, because can provide diverse and personalized synthesis service in information, correspondence work, entertainment, education and health care and so on, are more and more paid attention by the market. The family network product development has become the focus of the related industry. In this paper,the concept of the family network and the overall reference model of the family network are introduced firstly.Then the core techniques and the correspondence standard related with the family network are proposed.The key analysis is made for the function of family gateway, the function module of the software,the key technologies to client side software architecture and the trend of development of the family network entertainment seeing and hearing service and so on. Product present situation of the family gateway and the future trend of development, application solution of the digital family service are introduced. The development of the family network product bringing about the digital family network industry is introduced finally.It causes the development of software industries,such as communication industry,electrical appliances industry, computer and game and so on.It also causes the development of estate industry.

  3. Construction of Multimodal Transport Information Platform

    NASA Astrophysics Data System (ADS)

    Wang, Ya; Cheng, Yu; Zhao, Zhi

    2018-06-01

    With the rapid development of economy, the volume of transportation in China is increasing, the opening process of the market is accelerating, the scale of enterprises is expanding, the service quality is being improved, and the container multimodal transport is developing continuously.The hardware infrastructure of container multimodal transport is improved obviously, but the network platform construction of multimodal transport is still insufficient.Taking Shandong region of China as an example, the present situation of container multimodal transport in Shandong area can no longer meet the requirement of rapid development of container, and the construction of network platform needs to be solved urgently. Therefore, this paper will briefly describe the conception of construction of multimodal transport network platform in Shandong area.In order to achieve the rapid development of multimodal transport.

  4. Hardware and Software Integration to Support Real-Time Space Link Emulation

    NASA Technical Reports Server (NTRS)

    Murawski, Robert; Bhasin, Kul; Bittner, David; Sweet, Aaron; Coulter, Rachel; Schwab, Devin

    2012-01-01

    Prior to operational use, communications hardware and software must be thoroughly tested and verified. In space-link communications, field testing equipment can be prohibitively expensive and cannot test to non-ideal situations. In this paper, we show how software and hardware emulation tools can be used to accurately model the characteristics of a satellite communication channel in a lab environment. We describe some of the challenges associated with developing an emulation lab and present results to demonstrate the channel modeling. We then show how network emulation software can be used to extend a hardware emulation model without requiring additional network and channel simulation hardware.

  5. A global, multi-disciplinary, multi-sectorial initiative to combat leptospirosis: Global Leptospirosis Environmental Action Network (GLEAN).

    PubMed

    Durski, Kara N; Jancloes, Michel; Chowdhary, Tej; Bertherat, Eric

    2014-06-05

    Leptospirosis has emerged as a major public health problem in both animals and humans. The true burden of this epidemic and endemic disease is likely to be grossly under-estimated due to the non-specific clinical presentations of the disease and the difficulty of laboratory confirmation. The complexity that surrounds the transmission dynamics, particularly in epidemic situations, requires a coordinated, multi-disciplinary effort. Therefore, the Global Leptospirosis Environmental Action Network (GLEAN) was developed to improve global and local strategies of how to predict, prevent, detect, and intervene in leptospirosis outbreaks in order to prevent and control leptospirosis in high-risk populations.

  6. A Global, Multi-Disciplinary, Multi-Sectorial Initiative to Combat Leptospirosis: Global Leptospirosis Environmental Action Network (GLEAN)

    PubMed Central

    Durski, Kara N.; Jancloes, Michel; Chowdhary, Tej; Bertherat, Eric

    2014-01-01

    Leptospirosis has emerged as a major public health problem in both animals and humans. The true burden of this epidemic and endemic disease is likely to be grossly under-estimated due to the non-specific clinical presentations of the disease and the difficulty of laboratory confirmation. The complexity that surrounds the transmission dynamics, particularly in epidemic situations, requires a coordinated, multi-disciplinary effort. Therefore, the Global Leptospirosis Environmental Action Network (GLEAN) was developed to improve global and local strategies of how to predict, prevent, detect, and intervene in leptospirosis outbreaks in order to prevent and control leptospirosis in high-risk populations. PMID:24905245

  7. Hardware and Software Integration to Support Real-Time Space-Link Emulation

    NASA Technical Reports Server (NTRS)

    Murawski, Robert; Bhasin, Kul; Bittner, David

    2012-01-01

    Prior to operational use, communications hardware and software must be thoroughly tested and verified. In space-link communications, field testing equipment can be prohibitively expensive and cannot test to non-ideal situations. In this paper, we show how software and hardware emulation tools can be used to accurately model the characteristics of a satellite communication channel in a lab environment. We describe some of the challenges associated with developing an emulation lab and present results to demonstrate the channel modeling. We then show how network emulation software can be used to extend a hardware emulation model without requiring additional network and channel simulation hardware.

  8. Topology design and performance analysis of an integrated communication network

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Lam, Y. F.; Hou, T. C.; Yuen, J. H.

    1985-01-01

    A research study on the topology design and performance analysis for the Space Station Information System (SSIS) network is conducted. It is begun with a survey of existing research efforts in network topology design. Then a new approach for topology design is presented. It uses an efficient algorithm to generate candidate network designs (consisting of subsets of the set of all network components) in increasing order of their total costs, and checks each design to see if it forms an acceptable network. This technique gives the true cost-optimal network, and is particularly useful when the network has many constraints and not too many components. The algorithm for generating subsets is described in detail, and various aspects of the overall design procedure are discussed. Two more efficient versions of this algorithm (applicable in specific situations) are also given. Next, two important aspects of network performance analysis: network reliability and message delays are discussed. A new model is introduced to study the reliability of a network with dependent failures. For message delays, a collection of formulas from existing research results is given to compute or estimate the delays of messages in a communication network without making the independence assumption. The design algorithm coded in PASCAL is included as an appendix.

  9. An opinion-driven behavioral dynamics model for addictive behaviors

    DOE PAGES

    Moore, Thomas W.; Finley, Patrick D.; Apelberg, Benjamin J.; ...

    2015-04-08

    We present a model of behavioral dynamics that combines a social network-based opinion dynamics model with behavioral mapping. The behavioral component is discrete and history-dependent to represent situations in which an individual’s behavior is initially driven by opinion and later constrained by physiological or psychological conditions that serve to maintain the behavior. Additionally, individuals are modeled as nodes in a social network connected by directed edges. Parameter sweeps illustrate model behavior and the effects of individual parameters and parameter interactions on model results. Mapping a continuous opinion variable into a discrete behavioral space induces clustering on directed networks. Clusters providemore » targets of opportunity for influencing the network state; however, the smaller the network the greater the stochasticity and potential variability in outcomes. Furthermore, this has implications both for behaviors that are influenced by close relationships verses those influenced by societal norms and for the effectiveness of strategies for influencing those behaviors.« less

  10. Failure dynamics of the global risk network.

    PubMed

    Szymanski, Boleslaw K; Lin, Xin; Asztalos, Andrea; Sreenivasan, Sameet

    2015-06-18

    Risks threatening modern societies form an intricately interconnected network that often underlies crisis situations. Yet, little is known about how risk materializations in distinct domains influence each other. Here we present an approach in which expert assessments of likelihoods and influence of risks underlie a quantitative model of the global risk network dynamics. The modeled risks range from environmental to economic and technological, and include difficult to quantify risks, such as geo-political and social. Using the maximum likelihood estimation, we find the optimal model parameters and demonstrate that the model including network effects significantly outperforms the others, uncovering full value of the expert collected data. We analyze the model dynamics and study its resilience and stability. Our findings include such risk properties as contagion potential, persistence, roles in cascades of failures and the identity of risks most detrimental to system stability. The model provides quantitative means for measuring the adverse effects of risk interdependencies and the materialization of risks in the network.

  11. Communication and cooperation in networked environments: an experimental analysis.

    PubMed

    Galimberti, C; Ignazi, S; Vercesi, P; Riva, G

    2001-02-01

    Interpersonal communication and cooperation do not happen exclusively face to face. In work contexts, as in private life, there are more and more situations of mediated communication and cooperation in which new online tools are used. However, understanding how to use the Internet to support collaborative interaction presents a substantial challenge for the designers and users of this emerging technology. First, collaborative Internet environments are designed to serve a purpose, so must be designed with intended users' tasks and goals explicitly considered. Second, in cooperative activities the key content of communication is the interpretation of the situations in which actors are involved. So, the most effective way of clarifying the meaning of messages is to connect them to a shared context of meaning. However, this is more difficult in the Internet than in other computer-based activities. This paper tries to understand the characteristics of cooperative activities in networked environments--shared 3D virtual worlds--through two different studies. The first used the analysis of conversations to explore the characteristics of the interaction during the cooperative task; the second analyzed whether and how the level of immersion in the networked environments influenced the performance and the interactional process. The results are analyzed to identify the psychosocial roots used to support cooperation in a digital interactive communication.

  12. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    PubMed Central

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-01

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109

  13. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    PubMed

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  14. Networks and Collaboration in Spanish Education Policy

    ERIC Educational Resources Information Center

    Azorín, Cecilia M.; Muijs, Daniel

    2017-01-01

    Background: Networks play an important role in today's societies. As a consequence, changes are apparent in the political, economic, cultural, educational and social agendas. Purpose: The main goal of this article is to map the situation of school networks in Spain. The research questions are focused on what forms collaboration and networking take…

  15. [Predictors of institutionalization of elderly persons in dependency situation in Andalusia].

    PubMed

    Pinzón-Pulido, Sandra; Garrido Peña, Francisco; Reyes Alcázar, Víctor; Lima-Rodríguez, Joaquín Salvador; Raposo Triano, María Fernanda; Martínez Domene, Manuel; Alonso Trujillo, Federico

    2016-01-01

    Identifying preferences regarding type of care and risk factors for institutionalization of elderly persons in dependency situations in Andalusia. The data on 200,039 persons registered in the System for Autonomy and Dependency Care over the period 2007-2012 were analysed. The study population was described in terms of: age, dependency situation, preferences, support network and clinical factors at the time of inclusion in the study. Separate analysis was made for men and women. A logistic regression model was designed to determine the risk factors for institutionalization for each sex. 87,4% of women and 85,9% of men expressed their wish to receive care in their own home. The risk of institutionalization is three times higher among men than among women. Among women, the risks of institutionalization are: level of dependency, wishing to move into a residential care home, medium consistency and fragility of support network and being diagnosed with dementia. Among men, the risks are: wishing to move into a residential care home and low or medium consistency of support network. Care in the home is the preferred alternative for elderly persons in dependency situations. The risk of institutionalization is conditioned more by the preferences of the person and their family and the characteristics of the support network than by individual's clinical condition. Copyright © 2015 Elsevier España, S.L.U. All rights reserved.

  16. Neuro-genetic non-invasive temperature estimation: intensity and spatial prediction.

    PubMed

    Teixeira, César A; Ruano, M Graça; Ruano, António E; Pereira, Wagner C A

    2008-06-01

    The existence of proper non-invasive temperature estimators is an essential aspect when thermal therapy applications are envisaged. These estimators must be good predictors to enable temperature estimation at different operational situations, providing better control of the therapeutic instrumentation. In this work, radial basis functions artificial neural networks were constructed to access temperature evolution on an ultrasound insonated medium. The employed models were radial basis functions neural networks with external dynamics induced by their inputs. Both the most suited set of model inputs and number of neurons in the network were found using the multi-objective genetic algorithm. The neural models were validated in two situations: the operating ones, as used in the construction of the network; and in 11 unseen situations. The new data addressed two new spatial locations and a new intensity level, assessing the intensity and space prediction capacity of the proposed model. Good performance was obtained during the validation process both in terms of the spatial points considered and whenever the new intensity level was within the range of applied intensities. A maximum absolute error of 0.5 degrees C+/-10% (0.5 degrees C is the gold-standard threshold in hyperthermia/diathermia) was attained with low computationally complex models. The results confirm that the proposed neuro-genetic approach enables foreseeing temperature propagation, in connection to intensity and space parameters, thus enabling the assessment of different operating situations with proper temperature resolution.

  17. Pragmatically Framed Cross-Situational Noun Learning Using Computational Reinforcement Models

    PubMed Central

    Najnin, Shamima; Banerjee, Bonny

    2018-01-01

    Cross-situational learning and social pragmatic theories are prominent mechanisms for learning word meanings (i.e., word-object pairs). In this paper, the role of reinforcement is investigated for early word-learning by an artificial agent. When exposed to a group of speakers, the agent comes to understand an initial set of vocabulary items belonging to the language used by the group. Both cross-situational learning and social pragmatic theory are taken into account. As social cues, joint attention and prosodic cues in caregiver's speech are considered. During agent-caregiver interaction, the agent selects a word from the caregiver's utterance and learns the relations between that word and the objects in its visual environment. The “novel words to novel objects” language-specific constraint is assumed for computing rewards. The models are learned by maximizing the expected reward using reinforcement learning algorithms [i.e., table-based algorithms: Q-learning, SARSA, SARSA-λ, and neural network-based algorithms: Q-learning for neural network (Q-NN), neural-fitted Q-network (NFQ), and deep Q-network (DQN)]. Neural network-based reinforcement learning models are chosen over table-based models for better generalization and quicker convergence. Simulations are carried out using mother-infant interaction CHILDES dataset for learning word-object pairings. Reinforcement is modeled in two cross-situational learning cases: (1) with joint attention (Attentional models), and (2) with joint attention and prosodic cues (Attentional-prosodic models). Attentional-prosodic models manifest superior performance to Attentional ones for the task of word-learning. The Attentional-prosodic DQN outperforms existing word-learning models for the same task. PMID:29441027

  18. [Reflections on the topic of good housing conditions and growing old: Not everybody has a choice].

    PubMed

    Jann, A

    2015-04-01

    The variety of options with regard to housing for elderly people has increased. This study was carried out to understand how individuals reflect on their own options within this growing market. In a qualitative study design 26 single person households (65+ years) were interviewed. The aim of the study was to understand what influences the individual ideas about moving residence or staying put. A great majority of the elderly seem to reflect on their own living situation. There are not just spatial and constructional reasons that make people consider moving residence but also the financial situation, the possibility to spend the day with meaningful activities and the existence of a social network. The individual need for security and autonomy for the present and the future influences the interpretation of a given situation. The reflection on ones own housing situation is interlinked with the person's ability and capacity. One can only find solutions if one can think of them and one can only act if one has the potential.

  19. Biology-inspired Architecture for Situation Management

    NASA Technical Reports Server (NTRS)

    Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin, Chunsheng

    2006-01-01

    Situation Management is a rapidly developing science combining new techniques for data collection with advanced methods of data fusion to facilitate the process leading to correct decisions prescribing action. Current research focuses on reducing increasing amounts of diverse data to knowledge used by decision makers and on reducing time between observations, decisions and actions. No new technology is more promising for increasing the diversity and fidelity of observations than sensor networks. However, current research on sensor networks concentrates on a centralized network architecture. We believe this trend will not realize the full potential of situation management. We propose a new architecture modeled after biological ecosystems where motes are autonomous and intelligent, yet cooperate with local neighborhoods. Providing a layered approach, they sense and act independently when possible, and cooperate with neighborhoods when necessary. The combination of their local actions results in global effects. While situation management research is currently dominated by military applications, advances envisioned for industrial and business applications have similar requirements. NASA has requirements for intelligent and autonomous systems in future missions that can benefit from advances in situation management. We describe requirements for the Integrated Vehicle Health Management program where our biology-inspired architecture provides a layered approach and decisions can be made at the proper level to improve safety, reduce costs, and improve efficiency in making diagnostic and prognostic assessments of the structural integrity, aerodynamic characteristics, and operation of aircraft.

  20. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    ERIC Educational Resources Information Center

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  1. Effect of synapse dilution on the memory retrieval in structured attractor neural networks

    NASA Astrophysics Data System (ADS)

    Brunel, N.

    1993-08-01

    We investigate a simple model of structured attractor neural network (ANN). In this network a module codes for the category of the stored information, while another group of neurons codes for the remaining information. The probability distribution of stabilities of the patterns and the prototypes of the categories are calculated, for two different synaptic structures. The stability of the prototypes is shown to increase when the fraction of neurons coding for the category goes down. Then the effect of synapse destruction on the retrieval is studied in two opposite situations : first analytically in sparsely connected networks, then numerically in completely connected ones. In both cases the behaviour of the structured network and that of the usual homogeneous networks are compared. When lesions increase, two transitions are shown to appear in the behaviour of the structured network when one of the patterns is presented to the network. After the first transition the network recognizes the category of the pattern but not the individual pattern. After the second transition the network recognizes nothing. These effects are similar to syndromes caused by lesions in the central visual system, namely prosopagnosia and agnosia. In both types of networks (structured or homogeneous) the stability of the prototype is greater than the stability of individual patterns, however the first transition, for completely connected networks, occurs only when the network is structured.

  2. Performance study of the application of Artificial Neural Networks to the completion and prediction of data retrieved by underwater sensors.

    PubMed

    Baladrón, Carlos; Aguiar, Javier M; Calavia, Lorena; Carro, Belén; Sánchez-Esguevillas, Antonio; Hernández, Luis

    2012-01-01

    This paper presents a proposal for an Artificial Neural Network (ANN)-based architecture for completion and prediction of data retrieved by underwater sensors. Due to the specific conditions under which these sensors operate, it is not uncommon for them to fail, and maintenance operations are difficult and costly. Therefore, completion and prediction of the missing data can greatly improve the quality of the underwater datasets. A performance study using real data is presented to validate the approach, concluding that the proposed architecture is able to provide very low errors. The numbers show as well that the solution is especially suitable for cases where large portions of data are missing, while in situations where the missing values are isolated the improvement over other simple interpolation methods is limited.

  3. Issues and challenges of information fusion in contested environments: panel results

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Kadar, Ivan; Chong, Chee; Jones, Eric K.; Tierno, Jorge E.; Fenstermacher, Laurie; Gorman, John D.; Levchuk, Georgiy

    2015-05-01

    With the plethora of information, there are many aspects to contested environments such as the protection of information, network privacy, and restricted observational and entry access. In this paper, we review and contrast the perspectives of challenges and opportunities for future developments in contested environments. The ability to operate in a contested environment would aid societal operations for highly congested areas with limited bandwidth such as transportation, the lack of communication and observations after a natural disaster, or planning for situations in which freedom of movement is restricted. Different perspectives were presented, but common themes included (1) Domain: targets and sensors, (2) network: communications, control, and social networks, and (3) user: human interaction and analytics. The paper serves as a summary and organization of the panel discussion as towards future concerns for research needs in contested environments.

  4. Sentient networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A bettermore » idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.« less

  5. A Brief Analysis of Development Situations and Trend of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Yang, Wenyan

    2017-12-01

    in recent years, the rapid development of Internet technology has radically changed people's work, learning and lifestyles. More and more activities are completed by virtue of computers and networks. The amount of information and data generated is bigger day by day, and people rely more on computer, which makes computing power of computer fail to meet demands of accuracy and rapidity from people. The cloud computing technology has experienced fast development, which is widely applied in the computer industry as a result of advantages of high precision, fast computing and easy usage. Moreover, it has become a focus in information research at present. In this paper, the development situations and trend of cloud computing shall be analyzed and researched.

  6. Applications of Time-Reversal Processing for Planetary Surface Communications

    NASA Technical Reports Server (NTRS)

    Barton, Richard J.

    2007-01-01

    Due to the power constraints imposed on wireless sensor and communication networks deployed on a planetary surface during exploration, energy efficient transfer of data becomes a critical issue. In situations where groups of nodes within a network are located in relatively close proximity, cooperative communication techniques can be utilized to improve the range, data rate, power efficiency, and lifetime of the network. In particular, if the point-to-point communication channels on the network are well modeled as frequency non-selective, distributed or cooperative beamforming can employed. For frequency-selective channels, beamforming itself is not generally appropriate, but a natural generalization of it, time-reversal communication (TRC), can still be effective. Time-reversal processing has been proposed and studied previously for other applications, including acoustical imaging, electromagnetic imaging, underwater acoustic communication, and wireless communication channels. In this paper, we study both the theoretical advantages and the experimental performance of cooperative TRC for wireless communication on planetary surfaces. We give a brief introduction to TRC and present several scenarios where TRC could be profitably employed during planetary exploration. We also present simulation results illustrating the performance of cooperative TRC employed in a complex multipath environment and discuss the optimality of cooperative TRC for data aggregation in wireless sensor networks

  7. [Information system of the national network of public health laboratories in Peru (Netlab)].

    PubMed

    Vargas-Herrera, Javier; Segovia-Juarez, José; Garro Nuñez, Gladys María

    2015-01-01

    Clinical laboratory information systems produce improvements in the quality of information, reduce service costs, and diminish wait times for results, among other things. In the construction process of this information system, the National Institute of Health (NIH) of Peru has developed and implemented a web-based application to communicate to health personnel (laboratory workers, epidemiologists, health strategy managers, physicians, etc.) the results of laboratory tests performed at the Peruvian NIH or in the laboratories of the National Network of Public Health Laboratories which is called NETLAB. This article presents the experience of implementing NETLAB, its current situation, perspectives of its use, and its contribution to the prevention and control of diseases in Peru.

  8. Measurement results obtained from air quality monitoring system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turzanski, P.K.; Beres, R.

    1995-12-31

    An automatic system of air pollution monitoring operates in Cracow since 1991. The organization, assembling and start-up of the network is a result of joint efforts of the US Environmental Protection Agency and the Cracow environmental protection service. At present the automatic monitoring network is operated by the Provincial Inspection of Environmental Protection. There are in total seven stationary stations situated in Cracow to measure air pollution. These stations are supported continuously by one semi-mobile (transportable) station. It allows to modify periodically the area under investigation and therefore the 3-dimensional picture of creation and distribution of air pollutants within Cracowmore » area could be more intelligible.« less

  9. Environments for online maritime simulators with cloud computing capabilities

    NASA Astrophysics Data System (ADS)

    Raicu, Gabriel; Raicu, Alexandra

    2016-12-01

    This paper presents the cloud computing environments, network principles and methods for graphical development in realistic naval simulation, naval robotics and virtual interactions. The aim of this approach is to achieve a good simulation quality in large networked environments using open source solutions designed for educational purposes. Realistic rendering of maritime environments requires near real-time frameworks with enhanced computing capabilities during distance interactions. E-Navigation concepts coupled with the last achievements in virtual and augmented reality will enhance the overall experience leading to new developments and innovations. We have to deal with a multiprocessing situation using advanced technologies and distributed applications using remote ship scenario and automation of ship operations.

  10. Fuzzy mobile-robot positioning in intelligent spaces using wireless sensor networks.

    PubMed

    Herrero, David; Martínez, Humberto

    2011-01-01

    This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using wireless sensor networks (WSNs). The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.

  11. Older Rural Black Men: Their Life Situation and Subjective Well-Being (Expanded Summary).

    ERIC Educational Resources Information Center

    Kivett, Vira R.

    To help agencies serve the needs of older black men, this paper presents an overview of the physical, social, and economic status of older rural black men. The report is based on a study of a sample of 62 black men, aged 65 to 97, who constituted a subset of older adults from a larger study of the kin network system of 368 adults over 65 living in…

  12. Real-time visual communication to aid disaster recovery in a multi-segment hybrid wireless networking system

    NASA Astrophysics Data System (ADS)

    Al Hadhrami, Tawfik; Wang, Qi; Grecos, Christos

    2012-06-01

    When natural disasters or other large-scale incidents occur, obtaining accurate and timely information on the developing situation is vital to effective disaster recovery operations. High-quality video streams and high-resolution images, if available in real time, would provide an invaluable source of current situation reports to the incident management team. Meanwhile, a disaster often causes significant damage to the communications infrastructure. Therefore, another essential requirement for disaster management is the ability to rapidly deploy a flexible incident area communication network. Such a network would facilitate the transmission of real-time video streams and still images from the disrupted area to remote command and control locations. In this paper, a comprehensive end-to-end video/image transmission system between an incident area and a remote control centre is proposed and implemented, and its performance is experimentally investigated. In this study a hybrid multi-segment communication network is designed that seamlessly integrates terrestrial wireless mesh networks (WMNs), distributed wireless visual sensor networks, an airborne platform with video camera balloons, and a Digital Video Broadcasting- Satellite (DVB-S) system. By carefully integrating all of these rapidly deployable, interworking and collaborative networking technologies, we can fully exploit the joint benefits provided by WMNs, WSNs, balloon camera networks and DVB-S for real-time video streaming and image delivery in emergency situations among the disaster hit area, the remote control centre and the rescue teams in the field. The whole proposed system is implemented in a proven simulator. Through extensive simulations, the real-time visual communication performance of this integrated system has been numerically evaluated, towards a more in-depth understanding in supporting high-quality visual communications in such a demanding context.

  13. The role of autobiographical memory networks in the experience of negative emotions: how our remembered past elicits our current feelings.

    PubMed

    Philippe, Frederick L; Koestner, Richard; Lecours, Serge; Beaulieu-Pelletier, Genevieve; Bois, Katy

    2011-12-01

    The present research examined the role of autobiographical memory networks on negative emotional experiences. Results from 2 studies found support for an active but also discriminant role of autobiographical memories and their related networked memories on negative emotions. In addition, in line with self-determination theory, thwarting of the psychological needs for competence, autonomy, and relatedness was found to be the critical component of autobiographical memory affecting negative emotional experiences. Study 1 revealed that need thwarting in a specific autobiographical memory network related to the theme of loss was positively associated with depressive negative emotions, but not with other negative emotions. Study 2 showed within a prospective design a differential predictive validity between 2 autobiographical memory networks (an anger-related vs. a guilt-related memory) on situational anger reactivity with respect to unfair treatment. All of these results held after controlling for neuroticism (Studies 1 and 2), self-control (Study 2), and for the valence (Study 1) and emotions (Study 2) found in the measured autobiographical memory network. These findings highlight the ongoing emotional significance of representations of need thwarting in autobiographical memory networks. (c) 2011 APA, all rights reserved.

  14. Cyber-physical networking for wireless mesh infrastructures

    NASA Astrophysics Data System (ADS)

    Mannweiler, C.; Lottermann, C.; Klein, A.; Schneider, J.; Schotten, H. D.

    2012-09-01

    This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.

  15. Unobstructive Body Area Networks (BAN) for efficient movement monitoring.

    PubMed

    Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user.

  16. Interacting epidemics on overlay networks

    NASA Astrophysics Data System (ADS)

    Funk, Sebastian; Jansen, Vincent A. A.

    2010-03-01

    The interaction between multiple pathogens spreading on networks connecting a given set of nodes presents an ongoing theoretical challenge. Here, we aim to understand such interactions by studying bond percolation of two different processes on overlay networks of arbitrary joint degree distribution. We find that an outbreak of a first pathogen providing immunity to another one spreading subsequently on a second network connecting the same set of nodes does so most effectively if the degrees on the two networks are positively correlated. In that case, the protection is stronger the more heterogeneous the degree distributions of the two networks are. If, on the other hand, the degrees are uncorrelated or negatively correlated, increasing heterogeneity reduces the potential of the first process to prevent the second one from reaching epidemic proportions. We generalize these results to cases where the edges of the two networks overlap to arbitrary amount, or where the immunity granted is only partial. If both processes grant immunity to each other, we find a wide range of possible situations of coexistence or mutual exclusion, depending on the joint degree distribution of the underlying networks and the amount of immunity granted mutually. These results generalize the concept of a coexistence threshold and illustrate the impact of large-scale network structure on the interaction between multiple spreading agents.

  17. Spike frequency adaptation is a possible mechanism for control of attractor preference in auto-associative neural networks

    NASA Astrophysics Data System (ADS)

    Roach, James; Sander, Leonard; Zochowski, Michal

    Auto-associative memory is the ability to retrieve a pattern from a small fraction of the pattern and is an important function of neural networks. Within this context, memories that are stored within the synaptic strengths of networks act as dynamical attractors for network firing patterns. In networks with many encoded memories, some attractors will be stronger than others. This presents the problem of how networks switch between attractors depending on the situation. We suggest that regulation of neuronal spike-frequency adaptation (SFA) provides a universal mechanism for network-wide attractor selectivity. Here we demonstrate in a Hopfield type attractor network that neurons minimal SFA will reliably activate in the pattern corresponding to a local attractor and that a moderate increase in SFA leads to the network to converge to the strongest attractor state. Furthermore, we show that on long time scales SFA allows for temporal sequences of activation to emerge. Finally, using a model of cholinergic modulation within the cortex we argue that dynamic regulation of attractor preference by SFA could be critical for the role of acetylcholine in attention or for arousal states in general. This work was supported by: NSF Graduate Research Fellowship Program under Grant No. DGE 1256260 (JPR), NSF CMMI 1029388 (MRZ) and NSF PoLS 1058034 (MRZ & LMS).

  18. Transnational Chinese Students' Literacy and Networking Practices

    ERIC Educational Resources Information Center

    Wang, Xiqiao

    2017-01-01

    Situated in the context of a first-year writing course at a Midwestern public university in the United States, this study examines Chinese international students' networking practices through the mediation of WeChat, a popular social networking application for smartphones. Based on interviews with 36 students and detailed accounts of one focal…

  19. Help, I Am Losing Control! Examining the Reporting of Sexual Harassment by Adolescents to Social Networking Sites.

    PubMed

    Van Royen, Kathleen; Poels, Karolien; Vandebosch, Heidi

    2016-01-01

    Sexual harassment is often encountered by adolescents on social networking sites (SNS). One option to cope with a situation of harassment on SNS is to alarm the provider by reporting the transgressive content. It is yet unclear what the determinants of reporting a sexual harassment situation on SNS are, as well as the subsequent actions to these reports from the part of the SNS provider. In this article, we seek to address these gaps, and in particular examine whether control-by-the-self over the situation and negative emotions play a role in the reporting of sexual harassment on SNS. Findings indicate that a low situational control-by-the-self, indirectly (namely through a higher experience of negative emotions such as anger and shame) increases the reporting of sexual harassment by the victim. Public visibility of the incident and the impossibility to remove the content reduce the situational control-by-the-self. Results further suggest that SNS providers often ignore reported situations of sexual harassment. The study concludes with suggestions for responses to reported harassment on SNS, which should be directed toward increasing behavioral control and thereby alleviating negative emotions.

  20. Neural coding in graphs of bidirectional associative memories.

    PubMed

    Bouchain, A David; Palm, Günther

    2012-01-24

    In the last years we have developed large neural network models for the realization of complex cognitive tasks in a neural network architecture that resembles the network of the cerebral cortex. We have used networks of several cortical modules that contain two populations of neurons (one excitatory, one inhibitory). The excitatory populations in these so-called "cortical networks" are organized as a graph of Bidirectional Associative Memories (BAMs), where edges of the graph correspond to BAMs connecting two neural modules and nodes of the graph correspond to excitatory populations with associative feedback connections (and inhibitory interneurons). The neural code in each of these modules consists essentially of the firing pattern of the excitatory population, where mainly it is the subset of active neurons that codes the contents to be represented. The overall activity can be used to distinguish different properties of the patterns that are represented which we need to distinguish and control when performing complex tasks like language understanding with these cortical networks. The most important pattern properties or situations are: exactly fitting or matching input, incomplete information or partially matching pattern, superposition of several patterns, conflicting information, and new information that is to be learned. We show simple simulations of these situations in one area or module and discuss how to distinguish these situations based on the overall internal activation of the module. This article is part of a Special Issue entitled "Neural Coding". Copyright © 2011 Elsevier B.V. All rights reserved.

  1. Boarding Team Networking on the Move: Applying Unattended Relay Nodes

    DTIC Science & Technology

    2014-09-01

    below the main deck via a wireless ad-hoc network will enhance the situational awareness. Regarding the boarding of a non-compliant vessel, tracking...reaction time. 14. SUBJECT TERMS Maritime Interdiction Operations, Boarding Team Networking , Unattended Relay Nodes, Wireless Mesh Networks Onboard...the steel structures of naval vessels obstruct signals to propagate below the main deck. Extending the network below the main deck via a wireless ad

  2. The Situation Awareness Weighted Network (SAWN) model and method: Theory and application.

    PubMed

    Kalloniatis, Alexander; Ali, Irena; Neville, Timothy; La, Phuong; Macleod, Iain; Zuparic, Mathew; Kohn, Elizabeth

    2017-05-01

    We introduce a novel model and associated data collection method to examine how a distributed organisation of military staff who feed a Common Operating Picture (COP) generates Situation Awareness (SA), a critical component in organisational performance. The proposed empirically derived Situation Awareness Weighted Network (SAWN) model draws on two scientific models of SA, by Endsley involving perception, comprehension and projection, and by Stanton et al. positing that SA exists across a social and semantic network of people and information objects in activities connected across a set of tasks. The output of SAWN is a representation as a weighted semi-bipartite network of the interaction between people ('human nodes') and information artefacts such as documents and system displays ('product nodes'); link weights represent the Endsley levels of SA that individuals acquire from or provide to information objects and other individuals. The SAWN method is illustrated with aggregated empirical data from a case study of Australian military staff undertaking their work during two very different scenarios, during steady-state operations and in a crisis threat context. A key outcome of analysis of the weighted networks is that we are able to quantify flow of SA through an organisation as staff seek to "value-add" in the conduct of their work. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.

  3. Jamming Attack in Wireless Sensor Network: From Time to Space

    NASA Astrophysics Data System (ADS)

    Sun, Yanqiang; Wang, Xiaodong; Zhou, Xingming

    Classical jamming attack models in the time domain have been proposed, such as constant jammer, random jammer, and reactive jammer. In this letter, we consider a new problem: given k jammers, how does the attacker minimize the pair-wise connectivity among the nodes in a Wireless Sensor Network (WSN)? We call this problem k-Jammer Deployment Problem (k-JDP). To the best of our knowledge, this is the first attempt at considering the position-critical jamming attack against wireless sensor network. We mainly make three contributions. First, we prove that the decision version of k-JDP is NP-complete even in the ideal situation where the attacker has full knowledge of the topology information of sensor network. Second, we propose a mathematical formulation based on Integer Programming (IP) model which yields an optimal solution. Third, we present a heuristic algorithm HAJDP, and compare it with the IP model. Numerical results show that our heuristic algorithm is computationally efficient.

  4. Dynamic node immunization for restraint of harmful information diffusion in social networks

    NASA Astrophysics Data System (ADS)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-08-01

    To restrain the spread of harmful information is crucial for the healthy and sustainable development of social networks. We address the problem of restraining the spread of harmful information by immunizing nodes in the networks. Previous works have developed methods based on the network topology or studied how to immunize nodes in the presence of initial infected nodes. These static methods, in which nodes are immunized at once, may have poor performance in the certain situation due to the dynamics of diffusion. To tackle this problem, we introduce a new dynamic immunization problem of immunizing nodes during the process of the diffusion in this paper. We formulate the problem and propose a novel heuristic algorithm by dealing with two sub-problems: (1) how to select a node to achieve the best immunization effect at the present time? (2) whether the selected node should be immunized right now? Finally, we demonstrate the effectiveness of our algorithm through extensive experiments on various real datasets.

  5. Establishing conversation spaces in hastily formed networks: the worst fire in modern Swedish history.

    PubMed

    Lundberg, Jonas; Törnqvist, Eva K; Nadjm-Tehrani, Simin

    2014-10-01

    In presenting examples from the most extensive and demanding fire in modern Swedish history, this paper describes challenges facing hastily formed networks in exceptional situations. Two concepts that have been used in the analysis of the socio-technical systems that make up a response are conversation space and sensemaking. This paper argues that a framework designed to promote understanding of the sensemaking process must take into consideration the time and the location at which an individual is engaged in an event. In hastily formed networks, location is partly mediated through physical systems that form conversation spaces of players and their interaction practices. This paper identifies and discusses four challenges to the formation of shared conversation spaces. It is based on the case study of the 2006 Bodträskfors forest fire in Sweden and draws on the experiences of organised volunteers and firefighters who participated in a hastily formed network created to combat the fire. © 2014 The Author(s). Disasters © Overseas Development Institute, 2014.

  6. Role of the plurality rule in multiple choices

    NASA Astrophysics Data System (ADS)

    Calvão, A. M.; Ramos, M.; Anteneodo, C.

    2016-02-01

    People are often challenged to select one among several alternatives. This situation is present not only in decisions about complex issues, e.g. political or academic choices, but also about trivial ones, such as in daily purchases at a supermarket. We tackle this scenario by means of the tools of statistical mechanics. Following this approach, we introduce and analyse a model of opinion dynamics, using a Potts-like state variable to represent the multiple choices, including the ‘undecided state’, which represents the individuals who do not make a choice. We investigate the dynamics over Erdös-Rényi and Barabási-Albert networks, two paradigmatic classes with the small-world property, and we show the impact of the type of network on the opinion dynamics. Depending on the number of available options q and on the degree distribution of the network of contacts, different final steady states are accessible: from a wide distribution of choices to a state where a given option largely dominates. The abrupt transition between them is consistent with the sudden viral dominance of a given option over many similar ones. Moreover, the probability distributions produced by the model are validated by real data. Finally, we show that the model also contemplates the real situation of overchoice, where a large number of similar alternatives makes the choice process harder and indecision prevail.

  7. Signature neural networks: definition and application to multidimensional sorting problems.

    PubMed

    Latorre, Roberto; de Borja Rodriguez, Francisco; Varona, Pablo

    2011-01-01

    In this paper we present a self-organizing neural network paradigm that is able to discriminate information locally using a strategy for information coding and processing inspired in recent findings in living neural systems. The proposed neural network uses: 1) neural signatures to identify each unit in the network; 2) local discrimination of input information during the processing; and 3) a multicoding mechanism for information propagation regarding the who and the what of the information. The local discrimination implies a distinct processing as a function of the neural signature recognition and a local transient memory. In the context of artificial neural networks none of these mechanisms has been analyzed in detail, and our goal is to demonstrate that they can be used to efficiently solve some specific problems. To illustrate the proposed paradigm, we apply it to the problem of multidimensional sorting, which can take advantage of the local information discrimination. In particular, we compare the results of this new approach with traditional methods to solve jigsaw puzzles and we analyze the situations where the new paradigm improves the performance.

  8. Handheld portable real-time tracking and communications device

    DOEpatents

    Wiseman, James M [Albuquerque, NM; Riblett, Jr., Loren E.; Green, Karl L [Albuquerque, NM; Hunter, John A [Albuquerque, NM; Cook, III, Robert N.; Stevens, James R [Arlington, VA

    2012-05-22

    Portable handheld real-time tracking and communications devices include; a controller module, communications module including global positioning and mesh network radio module, data transfer and storage module, and a user interface module enclosed in a water-resistant enclosure. Real-time tracking and communications devices can be used by protective force, security and first responder personnel to provide situational awareness allowing for enhance coordination and effectiveness in rapid response situations. Such devices communicate to other authorized devices via mobile ad-hoc wireless networks, and do not require fixed infrastructure for their operation.

  9. Open architecture of smart sensor suites

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Kuwertz, Achim; Grönwall, Christina; Petersson, Henrik; Dekker, Rob; Reinert, Frank; Ditzel, Maarten

    2017-10-01

    Experiences from recent conflicts show the strong need for smart sensor suites comprising different multi-spectral imaging sensors as core elements as well as additional non-imaging sensors. Smart sensor suites should be part of a smart sensor network - a network of sensors, databases, evaluation stations and user terminals. Its goal is to optimize the use of various information sources for military operations such as situation assessment, intelligence, surveillance, reconnaissance, target recognition and tracking. Such a smart sensor network will enable commanders to achieve higher levels of situational awareness. Within the study at hand, an open system architecture was developed in order to increase the efficiency of sensor suites. The open system architecture for smart sensor suites, based on a system-of-systems approach, enables combining different sensors in multiple physical configurations, such as distributed sensors, co-located sensors combined in a single package, tower-mounted sensors, sensors integrated in a mobile platform, and trigger sensors. The architecture was derived from a set of system requirements and relevant scenarios. Its mode of operation is adaptable to a series of scenarios with respect to relevant objects of interest, activities to be observed, available transmission bandwidth, etc. The presented open architecture is designed in accordance with the NATO Architecture Framework (NAF). The architecture allows smart sensor suites to be part of a surveillance network, linked e.g. to a sensor planning system and a C4ISR center, and to be used in combination with future RPAS (Remotely Piloted Aircraft Systems) for supporting a more flexible dynamic configuration of RPAS payloads.

  10. Short Cuts and Extended Techniques: Rethinking Relations between Technology and Educational Theory

    ERIC Educational Resources Information Center

    Thumlert, Kurt; de Castell, Suzanne; Jenson, Jennifer

    2015-01-01

    Building upon a recent call to renew actor-network theory (ANT) for educational research, this article reconsiders relations between technology and educational theory. Taking cues from actor-network theorists, this discussion considers the technologically-mediated networks in which learning actors are situated, acted upon, and acting, and traces…

  11. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  12. Manpower and Personnel Integration (MANPRINT) and Network Integration Evaluation 13.2: Observations on Cognitive Load in Mission Command

    DTIC Science & Technology

    2014-03-01

    using scales like NASA’s Task Load Index ( TLX ) (Hart and Staveland, 1988). At present, there are no comparable measurement scales for cognitive...Staveland, L. E. Development of NASA- TLX (Task Load Index): Results of empirical and theoretical research. In Human Mental Workload; Hancock, P. A...Requests for Information SA situation awareness TLX Task Load Index TOC tactical operations center WSMR White Sands Missile Range XO executive

  13. Macroscopic brain dynamics during verbal and pictorial processing of affective stimuli.

    PubMed

    Keil, Andreas

    2006-01-01

    Emotions can be viewed as action dispositions, preparing an individual to act efficiently and successfully in situations of behavioral relevance. To initiate optimized behavior, it is essential to accurately process the perceptual elements indicative of emotional relevance. The present chapter discusses effects of affective content on neural and behavioral parameters of perception, across different information channels. Electrocortical data are presented from studies examining affective perception with pictures and words in different task contexts. As a main result, these data suggest that sensory facilitation has an important role in affective processing. Affective pictures appear to facilitate perception as a function of emotional arousal at multiple levels of visual analysis. If the discrimination between affectively arousing vs. nonarousing content relies on fine-grained differences, amplification of the cortical representation may occur as early as 60-90 ms after stimulus onset. Affectively arousing information as conveyed via visual verbal channels was not subject to such very early enhancement. However, electrocortical indices of lexical access and/or activation of semantic networks showed that affectively arousing content may enhance the formation of semantic representations during word encoding. It can be concluded that affective arousal is associated with activation of widespread networks, which act to optimize sensory processing. On the basis of prioritized sensory analysis for affectively relevant stimuli, subsequent steps such as working memory, motor preparation, and action may be adjusted to meet the adaptive requirements of the situation perceived.

  14. STUDY ON SUPPORTING FOR DRAWING UP THE BCP FOR URBAN EXPRESSWAY NETWORK USING BY TRAFFIC SIMULATION SYSTEM

    NASA Astrophysics Data System (ADS)

    Yamawaki, Masashi; Shiraki, Wataru; Inomo, Hitoshi; Yasuda, Keiichi

    The urban expressway network is an important infrastructure to execute a disaster restoration. Therefore, it is necessary to draw up the BCP (Business Continuity Plan) to enable securing of road user's safety and restoration of facilities, etc. It is important that each urban expressway manager execute decision and improvement of effective BCP countermeasures when disaster occurs by assuming various disaster situations. Then, in this study, we develop the traffic simulation system that can reproduce various disaster situations and traffic actions, and examine some methods supporting for drawing up the BCP for an urban expressway network. For disaster outside assumption such as tsunami generated by a huge earthquake, we examine some approaches securing safety of users and cars on the Hanshin Expressway Network as well as on general roads. And, we aim to propose a tsunami countermeasure not considered in the current urban expressway BCP.

  15. Collaboration Networks in the Brazilian Scientific Output in Evolutionary Biology: 2000-2012.

    PubMed

    Santin, Dirce M; Vanz, Samile A S; Stumpf, Ida R C

    2016-03-01

    This article analyzes the existing collaboration networks in the Brazilian scientific output in Evolutionary Biology, considering articles published during the period from 2000 to 2012 in journals indexed by Web of Science. The methodology integrates bibliometric techniques and Social Network Analysis resources to describe the growth of Brazilian scientific output and understand the levels, dynamics and structure of collaboration between authors, institutions and countries. The results unveil an enhancement and consolidation of collaborative relationships over time and suggest the existence of key institutions and authors, whose influence on research is expressed by the variety and intensity of the relationships established in the co-authorship of articles. International collaboration, present in more than half of the publications, is highly significant and unusual in Brazilian science. The situation indicates the internationalization of scientific output and the ability of the field to take part in the science produced by the international scientific community.

  16. Social learning in the Anthropocene: Novel challenges, shadow networks, and ethical practices.

    PubMed

    Schmidt, Jeremy J

    2017-05-15

    The Anthropocene presents novel challenges for environmental management. This paper considers the challenges that the Anthropocene poses for social learning techniques in adaptive management. It situates these challenges with respect to how anthropogenic forcing on the Earth system affects the conditions required for: (1) The cooperative exercises of social learning; (2) The techniques used for assessing the fit of institutions to social-ecological systems; and, (3) The strategies employed for identifying management targets that are transformed by human action. In view of these challenges, the paper then examines how the practices of shadow networks may provide paths for incorporating a broader, more robust suite of social learning practices in the Anthropocene. The paper emphasizes how novel challenges in the Anthropocene demand increased attention to ethical practices, particularly those that establish center-periphery relationships between social learning communities and shadow networks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Network Analysis of Students' Use of Representations in Problem Solving

    NASA Astrophysics Data System (ADS)

    McPadden, Daryl; Brewe, Eric

    2016-03-01

    We present the preliminary results of a study on student use of representations in problem solving within the Modeling Instruction - Electricity and Magnetism (MI-E&M) course. Representational competence is a critical skill needed for students to develop a sophisticated understanding of college science topics and to succeed in their science courses. In this study, 70 students from the MI-E&M, calculus-based course were given a survey of 25 physics problem statements both pre- and post- instruction, covering both Newtonian Mechanics and Electricity and Magnetism (E&M). For each problem statement, students were asked which representations they would use in that given situation. We analyze the survey results through network analysis, identifying which representations are linked together in which contexts. We also compare the representation networks for those students who had already taken the first-semester Modeling Instruction Mechanics course and those students who had taken a non-Modeling Mechanics course.

  18. Two neural network algorithms for designing optimal terminal controllers with open final time

    NASA Technical Reports Server (NTRS)

    Plumer, Edward S.

    1992-01-01

    Multilayer neural networks, trained by the backpropagation through time algorithm (BPTT), have been used successfully as state-feedback controllers for nonlinear terminal control problems. Current BPTT techniques, however, are not able to deal systematically with open final-time situations such as minimum-time problems. Two approaches which extend BPTT to open final-time problems are presented. In the first, a neural network learns a mapping from initial-state to time-to-go. In the second, the optimal number of steps for each trial run is found using a line-search. Both methods are derived using Lagrange multiplier techniques. This theoretical framework is used to demonstrate that the derived algorithms are direct extensions of forward/backward sweep methods used in N-stage optimal control. The two algorithms are tested on a Zermelo problem and the resulting trajectories compare favorably to optimal control results.

  19. Neural network application for thermal image recognition of low-resolution objects

    NASA Astrophysics Data System (ADS)

    Fang, Yi-Chin; Wu, Bo-Wen

    2007-02-01

    In the ever-changing situation on a battle field, accurate recognition of a distant object is critical to a commander's decision-making and the general public's safety. Efficiently distinguishing between an enemy's armoured vehicles and ordinary civilian houses under all weather conditions has become an important research topic. This study presents a system for recognizing an armoured vehicle by distinguishing marks and contours. The characteristics of 12 different shapes and 12 characters are used to explore thermal image recognition under the circumstance of long distance and low resolution. Although the recognition capability of human eyes is superior to that of artificial intelligence under normal conditions, it tends to deteriorate substantially under long-distance and low-resolution scenarios. This study presents an effective method for choosing features and processing images. The artificial neural network technique is applied to further improve the probability of accurate recognition well beyond the limit of the recognition capability of human eyes.

  20. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  1. A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks.

    PubMed

    Zhu, Mingqiang; Song, Fei; Xu, Lei; Seo, Jung Taek; You, Ilsun

    2017-11-29

    As the key element, sensor networks are widely investigated by the Internet of Things (IoT) community. When massive numbers of devices are well connected, malicious attackers may deliberately propagate fake position information to confuse the ordinary users and lower the network survivability in belt-type situation. However, most existing positioning solutions only focus on the algorithm accuracy and do not consider any security aspects. In this paper, we propose a comprehensive scheme for node localization protection, which aims to improve the energy-efficient, reliability and accuracy. To handle the unbalanced resource consumption, a node deployment mechanism is presented to satisfy the energy balancing strategy in resource-constrained scenarios. According to cooperation localization theory and network connection property, the parameter estimation model is established. To achieve reliable estimations and eliminate large errors, an improved localization algorithm is created based on modified average hop distances. In order to further improve the algorithms, the node positioning accuracy is enhanced by using the steepest descent method. The experimental simulations illustrate the performance of new scheme can meet the previous targets. The results also demonstrate that it improves the belt-type sensor networks' survivability, in terms of anti-interference, network energy saving, etc.

  2. Summary of human social, cultural, behavioral (HSCB) modeling for information fusion panel discussion

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Salerno, John; Kadar, Ivan; Yang, Shanchieh J.; Fenstermacher, Laurie; Endsley, Mica; Grewe, Lynne

    2013-05-01

    During the SPIE 2012 conference, panelists convened to discuss "Real world issues and challenges in Human Social/Cultural/Behavioral modeling with Applications to Information Fusion." Each panelist presented their current trends and issues. The panel had agreement on advanced situation modeling, working with users for situation awareness and sense-making, and HSCB context modeling in focusing research activities. Each panelist added different perspectives based on the domain of interest such as physical, cyber, and social attacks from which estimates and projections can be forecasted. Also, additional techniques were addressed such as interest graphs, network modeling, and variable length Markov Models. This paper summarizes the panelists discussions to highlight the common themes and the related contrasting approaches to the domains in which HSCB applies to information fusion applications.

  3. SSA Sensor Calibration Best Practices

    NASA Astrophysics Data System (ADS)

    Johnson, T.

    Best practices for calibrating orbit determination sensors in general and space situational awareness (SSA) sensors in particular are presented. These practices were developed over the last ten years within AGI and most recently applied to over 70 sensors in AGI's Commercial Space Operations Center (ComSpOC) and the US Air Force Space Command (AFSPC) Space Surveillance Network (SSN) to evaluate and configure new sensors and perform on-going system calibration. They are generally applicable to any SSA sensor and leverage some unique capabilities of an SSA estimation approach using an optimal sequential filter and smoother. Real world results are presented and analyzed.

  4. Distributed Teaching Presence and Communicative Patterns in Asynchronous Learning: Name versus Reply Networks

    ERIC Educational Resources Information Center

    Engel, Anna; Coll, Cesar; Bustos, Alfonso

    2013-01-01

    This work explores some methodological challenges in the application of Social Network Analysis (SNA) to the study of "Asynchronous Learning Networks" (ALN). Our interest in the SNA is situated within the framework of the study of Distributed Teaching Presence (DTP), understood as the exercise of educational influence, through a multi-method…

  5. Extension algorithm for generic low-voltage networks

    NASA Astrophysics Data System (ADS)

    Marwitz, S.; Olk, C.

    2018-02-01

    Distributed energy resources (DERs) are increasingly penetrating the energy system which is driven by climate and sustainability goals. These technologies are mostly connected to low- voltage electrical networks and change the demand and supply situation in these networks. This can cause critical network states. Network topologies vary significantly and depend on several conditions including geography, historical development, network design or number of network connections. In the past, only some of these aspects were taken into account when estimating the network investment needs for Germany on the low-voltage level. Typically, fixed network topologies are examined or a Monte Carlo approach is used to quantify the investment needs at this voltage level. Recent research has revealed that DERs differ substantially between rural, suburban and urban regions. The low-voltage network topologies have different design concepts in these regions, so that different network topologies have to be considered when assessing the need for network extensions and investments due to DERs. An extension algorithm is needed to calculate network extensions and investment needs for the different typologies of generic low-voltage networks. We therefore present a new algorithm, which is capable of calculating the extension for generic low-voltage networks of any given topology based on voltage range deviations and thermal overloads. The algorithm requires information about line and cable lengths, their topology and the network state only. We test the algorithm on a radial, a loop, and a heavily meshed network. Here we show that the algorithm functions for electrical networks with these topologies. We found that the algorithm is able to extend different networks efficiently by placing cables between network nodes. The main value of the algorithm is that it does not require any information about routes for additional cables or positions for additional substations when it comes to estimating network extension needs.

  6. The Integrated Marine Postdoc Network: Support for postdoctoral researchers in marine sciences in Kiel, Germany

    NASA Astrophysics Data System (ADS)

    Braker, Gesche; Schelten, Christiane K.

    2016-04-01

    Despite the important role postdoctoral researchers play in the German academic system their status is largely undefined: Being challenged by a multitude of tasks, their employment situation is often characterized by short term contracts and a well-defined and articulated academic career path is lacking. Moreover, their employment situation becomes increasingly insecure as the time post Ph.D. increases unless they manage to shift into a tenured professorship or into similar opportunities in the non-academic employment sector. All this results in insecurity in terms of career perspectives. The support of postdoctoral researchers through the 'Integrated Marine Postdoc Network (IMAP)' has been identified as one of the strategic goals of the Cluster of Excellence 'The Future Ocean' in Kiel, Germany, a large collaborative research project funded through the German Excellence Initiative. To improve the situation of researchers post Ph.D., IMAP has identified three main actions: Building a vibrant community of postdoctoral researchers, engaging in a strategic dialogue on structural changes within the academic system in Germany with special emphasis on more predictable career paths below the professorship level and enhancing the competitiveness of postdoctoral researchers in marine sciences in Kiel through tailored schemes for career support. Since 2012 IMAP has developed into a vibrant network of researchers post Ph.D. who engage in the diverse disciplines of marine sciences in Kiel - in natural, social and medical sciences, computing, economics, and law. With currently more than 90 members working at one of the partner institutions of the Cluster in Kiel - Kiel University, GEOMAR Helmholtz Centre for Ocean Research, and the Institute for the World Economy the network hosts broad scientific expertise in integrated ocean research. It is professionally coordinated and operates at the interface between the partner institutions and large scale collaborative research projects, e.g. the SFB 754 'Climate-biogeochemical interactions in the tropical ocean' in Kiel, to provide a structure for complementary support of researchers post Ph.D. (This contribution is linked to the presentation by Dr. Christiane K. Schelten.)

  7. Switching performance of OBS network model under prefetched real traffic

    NASA Astrophysics Data System (ADS)

    Huang, Zhenhua; Xu, Du; Lei, Wen

    2005-11-01

    Optical Burst Switching (OBS) [1] is now widely considered as an efficient switching technique in building the next generation optical Internet .So it's very important to precisely evaluate the performance of the OBS network model. The performance of the OBS network model is variable in different condition, but the most important thing is that how it works under real traffic load. In the traditional simulation models, uniform traffics are usually generated by simulation software to imitate the data source of the edge node in the OBS network model, and through which the performance of the OBS network is evaluated. Unfortunately, without being simulated by real traffic, the traditional simulation models have several problems and their results are doubtable. To deal with this problem, we present a new simulation model for analysis and performance evaluation of the OBS network, which uses prefetched IP traffic to be data source of the OBS network model. The prefetched IP traffic can be considered as real IP source of the OBS edge node and the OBS network model has the same clock rate with a real OBS system. So it's easy to conclude that this model is closer to the real OBS system than the traditional ones. The simulation results also indicate that this model is more accurate to evaluate the performance of the OBS network system and the results of this model are closer to the actual situation.

  8. Evidence for a cerebral cortical thickness network anti-correlated with amygdalar volume in healthy youths: implications for the neural substrates of emotion regulation.

    PubMed

    Albaugh, Matthew D; Ducharme, Simon; Collins, D Louis; Botteron, Kelly N; Althoff, Robert R; Evans, Alan C; Karama, Sherif; Hudziak, James J

    2013-05-01

    Recent functional connectivity studies have demonstrated that, in resting humans, activity in a dorsally-situated neocortical network is inversely associated with activity in the amygdalae. Similarly, in human neuroimaging studies, aspects of emotion regulation have been associated with increased activity in dorsolateral, dorsomedial, orbital and ventromedial prefrontal regions, as well as concomitant decreases in amygdalar activity. These findings indicate the presence of two countervailing systems in the human brain that are reciprocally related: a dorsally-situated cognitive control network, and a ventrally-situated limbic network. We investigated the extent to which this functional reciprocity between limbic and dorsal neocortical regions is recapitulated from a purely structural standpoint. Specifically, we hypothesized that amygdalar volume would be related to cerebral cortical thickness in cortical regions implicated in aspects of emotion regulation. In 297 typically developing youths (162 females, 135 males; 572 MRIs), the relationship between cortical thickness and amygdalar volume was characterized. Amygdalar volume was found to be inversely associated with thickness in bilateral dorsolateral and dorsomedial prefrontal, inferior parietal, as well as bilateral orbital and ventromedial prefrontal cortices. Our findings are in line with previous work demonstrating that a predominantly dorsally-centered neocortical network is reciprocally related to core limbic structures such as the amygdalae. Future research may benefit from investigating the extent to which such cortical-limbic morphometric relations are qualified by the presence of mood and anxiety psychopathology. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Research of G3-PLC net self-organization processes in the NS-3 modeling framework

    NASA Astrophysics Data System (ADS)

    Pospelova, Irina; Chebotayev, Pavel; Klimenko, Aleksey; Myakochin, Yuri; Polyakov, Igor; Shelupanov, Alexander; Zykov, Dmitriy

    2017-11-01

    When modern infocommunication networks are designed, the combination of several data transfer channels is widely used. It is necessary for the purposes of improvement in quality and robustness of communication. Communication systems based on more than one data transfer channel are named heterogeneous communication systems. For the design of a heterogeneous network, the most optimal solution is the use of mesh technology. Mesh technology ensures message delivery to the destination under conditions of unpredictable interference environment situation in each of two channels. Therewith, one of the high-priority problems is the choice of a routing protocol when the mesh networks are designed. An important design stage for any computer network is modeling. Modeling allows us to design a few different variants of design solutions and also to compute all necessary functional specifications for each of these solutions. As a result, it allows us to reduce costs for the physical realization of a network. In this article the research of dynamic routing in the NS3 simulation modeling framework is presented. The article contains an evaluation of simulation modeling applicability in solving the problem of heterogeneous networks design. Results of modeling may be afterwards used for physical realization of this kind of networks.

  10. Unobstructive Body Area Networks (BAN) for Efficient Movement Monitoring

    PubMed Central

    Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user. PMID:23112726

  11. Designing a New Urban Internet.

    ERIC Educational Resources Information Center

    Burke, Lauren

    2002-01-01

    Discusses Web site design and information architecture in light of principles of New Urbanism that are being applied in urban planning situations. Topics include networked electronic environment design; user-centered network design; multidisciplinary approaches; knowledge access and collaboration; and the Global Information Infrastructure…

  12. Social patterns revealed through random matrix theory

    NASA Astrophysics Data System (ADS)

    Sarkar, Camellia; Jalan, Sarika

    2014-11-01

    Despite the tremendous advancements in the field of network theory, very few studies have taken weights in the interactions into consideration that emerge naturally in all real-world systems. Using random matrix analysis of a weighted social network, we demonstrate the profound impact of weights in interactions on emerging structural properties. The analysis reveals that randomness existing in particular time frame affects the decisions of individuals rendering them more freedom of choice in situations of financial security. While the structural organization of networks remains the same throughout all datasets, random matrix theory provides insight into the interaction pattern of individuals of the society in situations of crisis. It has also been contemplated that individual accountability in terms of weighted interactions remains as a key to success unless segregation of tasks comes into play.

  13. A comparison of two IPv4/IPv6 transition mechanisms - OpenVPN and IVI

    NASA Astrophysics Data System (ADS)

    Vu, Cong Tuan; Tran, Quang Anh; Jiang, Frank

    2012-09-01

    This document presents a comparison of two IPv4/IPv6 transition mechanisms. They are OpenVPN and IVI. Meanwhile OpenVPN is based on tunneling technology, IVI is a stateless IPv4/IPv6 translation technique which is developed by China Education and Research Network (CERNET). This research focus on the quantitative and qualitative comparison of these two main mechanisms; how they are applied in practical situation by the Internet Service Providers, as well as their advantages and drawbacks.

  14. Geomagnetic field observations at a new Antarctic site, within the AIMNet project

    NASA Astrophysics Data System (ADS)

    Lepidi, Stefania; Cafarella, Lili; Santarelli, Lucia; Pietrolungo, Manuela; Urbini, Stefano; Piancatelli, Andrea; Biasini, Fulvio; di Persio, Manuele; Rose, Mike

    2010-05-01

    During the 2007-2008 antarctic campaign, the Italian PNRA installed a Low Power Magnetometer within the framework of the AIMNet (Antarctic International Magnetometer Network) project, proposed and coordinated by BAS. The magnetometer is situated at Talos Dome, around 300 km geographically North-West from Mario Zucchelli Station (MZS), and approximately at the same geomagnetic latitude as MZS. In this work we present a preliminary analysis of the geomagnetic field 1-min data, and a comparison with simultaneous data from different Antarctic stations.

  15. VolunteerGet--a novel information system for engaging society in volunteering for emergency care.

    PubMed

    Varadarajan, Vivek; Ganz, Aura

    2008-01-01

    This work presents VolunteerGet, a novel information system for engaging society in volunteering for emergency situations. We will use the social networking and location services infrastructure as a means of 1) registering volunteers and other users, 2) spreading the word on volunteering opportunities and increasing the volunteer database, 3) matching the users and volunteers at time and location of need. Such a system has the potential to promote volunteering as a social phenomenon and eventually reduce suffering and mortality.

  16. Game-theoretic homological sensor resource management for SSA

    NASA Astrophysics Data System (ADS)

    Chin, Sang Peter

    2009-05-01

    We present a game-theoretic approach to Level 2/3/4 fusion for the purpose of Space Situational Awareness (SSA) along with prototypical SW implementation of this approach to demonstrate its effectiveness for possible future space operations. Our approach is based upon innovative techniques that we are developing to solve dynamic games and Nperson cooperative/non-cooperative games, as well as a new emerging homological sensing algorithms which we apply to control disparate network of space sensors in order to gain better SSA.

  17. The Improvement on the Xinjiekou Subway Transfer Channel of Nanjing

    NASA Astrophysics Data System (ADS)

    Xu, X. D.; Zheng, C. J.

    The subway, which is an effective way to alleviate the traffic congestion, has gradually been constructed in many cities. With the completion of the construction, the transfer station will become the factor that affects the efficiency of the whole transport network. Based on investigation and analysis of the present situation of the passenger flow, the essay will make a prediction with the multiple linear regression and put forward two kinds of transfer channel improvement schemes for xinjiekou transfer station.

  18. Research on the Wireless Sensor Networks Applied in the Battlefield Situation Awareness System

    NASA Astrophysics Data System (ADS)

    Hua, Guan; Li, Yan-Xiao; Yan, Xiao-Mei

    In the modern warfare information is the crucial key of winning. Battlefield situation awareness contributes to grasping and retaining the intelligence predominance. Due to its own special characteristics Wireless Sensor Networks (WSN) have been widely used to realize reconnaissance and surveillance in the joint operations and provide simultaneous, comprehensive, accurate data to multiechelon commanders and the combatant personnel for decision making and rapid response. Military sensors have drawn great attention in the ongoing projects which have satisfied the initial design or research purpose. As the interface of the "Internet of Things" which will have an eye on every corner of the battlespace WSNs play the necessary role in the incorporated situation awareness system. WSNs, radar, infrared ray or other means work together to acquire awareness intelligence for the deployed functional units to enhance the fighting effect.

  19. The data-driven null models for information dissemination tree in social networks

    NASA Astrophysics Data System (ADS)

    Zhang, Zhiwei; Wang, Zhenyu

    2017-10-01

    For the purpose of detecting relatedness and co-occurrence between users, as well as the distribution features of nodes in spreading path of a social network, this paper explores topological characteristics of information dissemination trees (IDT) that can be employed indirectly to probe the information dissemination laws within social networks. Hence, three different null models of IDT are presented in this article, including the statistical-constrained 0-order IDT null model, the random-rewire-broken-edge 0-order IDT null model and the random-rewire-broken-edge 2-order IDT null model. These null models firstly generate the corresponding randomized copy of an actual IDT; then the extended significance profile, which is developed by adding the cascade ratio of information dissemination path, is exploited not only to evaluate degree correlation of two nodes associated with an edge, but also to assess the cascade ratio of different length of information dissemination paths. The experimental correspondences of the empirical analysis for several SinaWeibo IDTs and Twitter IDTs indicate that the IDT null models presented in this paper perform well in terms of degree correlation of nodes and dissemination path cascade ratio, which can be better to reveal the features of information dissemination and to fit the situation of real social networks.

  20. Laptops in Classroom Interaction: The Dynamic Reach of the Laptoped Situation

    ERIC Educational Resources Information Center

    Lindroth, Tomas; Lundin, Johan; Svensson, Lars

    2013-01-01

    Laptops and other networked technologies are commonplace at university campuses. While a range of studies researches the negative effects of multitasking, screenpeeking and other laptop related side effects this article emphasize the situational impact of student-laptop interaction. Departing from Goffman's framework on unfocused interaction and…

  1. USAF Academy Center for Space Situational Awareness

    NASA Astrophysics Data System (ADS)

    Dearborn, M.; Chun, F.; Liu, J.; Tippets, R.

    2011-09-01

    Since the days of Sputnik, the Air Force has maintained the surveillance of space and a position catalog of objects that can be tracked by primarily ground-based radars and optical systems. Recent events in space such as the test of the Chinese anti-satellite weapon in 2007 and the collision between an Iridium and Russian Cosmo satellite have demonstrated the great need to have a more comprehensive awareness of the situation in space. Hence space situational awareness (SSA) has become an increasingly important mission to the Air Force and to the security of the United States. To help meet the need for future leaders knowledgeable about SSA, the Air Force Academy formally stood up the Center for Space Situational Awareness (CSSAR). The goal of the CSSAR is to provide a unique combination of educational operational experience as well as a world-class research capability for hands-on education in SSA. In order to meet this goal, the CSSAR is implementing an array of sensors, operations center, and associated software, and analysis tools. For example we have radar receivers for bi-static returns from the VHF space fence, a network of small aperture telescopes, AFSPC astro standards software, and Joint Mission System software. This paper focuses on the observational capabilities of our telescopes. In general, the preferable method for characterizing a satellite is to obtain a high-resolution image. However, high-resolution images from groundbased telescopes are only achievable if the satellite is large and close in range. Thus small satellites in low-earth orbits and large satellites in geosynchronous orbits are essentially unresolved in the focal plane of a ground-based telescope. Building ever larger telescopes capable of tracking fast enough for satellites at high resolution requires tremendous resources and funding. Cost is one of the reasons we decided to develop a network of small, commercially available telescopes spatially diverse and networked together. We call this the Falcon Telescope Network (FTN) and it provides the Air Force Academy, Air Force and Department of Defense with a unique capability that is essentially non-existent in today’s research and operational environment. With the FTN we will have the eventual capability to conduct simultaneous observations of satellites for non-resolved space object identification (NRSOI). We present preliminary photometric and spectroscopic observations from LEO to GEO satellites. The Air Force Academy has a unique mission to educate future leaders in the science, technology, and operations in missions critical to the Air Force and the CSSAR is stepping up to meet these requirements for the SSA mission.

  2. Networks--New York Subways, A Piece of String, and African Traditions.

    ERIC Educational Resources Information Center

    Zaslavsky, Claudia

    1981-01-01

    Introducing network theory to schoolchildren is promoted as a way of encouraging students to deal with new situations, be unafraid of challenges, and learn to think. Several applications, methods of analysis, and suggestions for further activities are provided. (MP)

  3. Multimedia Network Design Study

    DTIC Science & Technology

    1989-09-30

    manipulation and analysis of the equations involved, thereby providing the application of the great range of powerful mathematical optimization...be treated by this analysis. First, all arrivals to the network have the Poisson distribution, and separate traffic classes may have separate qrrival...different for open and closed networks, so these two situations will be treated separately in the following subsections. 2.3.1 The Computational Process in

  4. Virtual terrain: a security-based representation of a computer network

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh; Argauer, Brian

    2008-03-01

    Much research has been put forth towards detection, correlating, and prediction of cyber attacks in recent years. As this set of research progresses, there is an increasing need for contextual information of a computer network to provide an accurate situational assessment. Typical approaches adopt contextual information as needed; yet such ad hoc effort may lead to unnecessary or even conflicting features. The concept of virtual terrain is, therefore, developed and investigated in this work. Virtual terrain is a common representation of crucial information about network vulnerabilities, accessibilities, and criticalities. A virtual terrain model encompasses operating systems, firewall rules, running services, missions, user accounts, and network connectivity. It is defined as connected graphs with arc attributes defining dynamic relationships among vertices modeling network entities, such as services, users, and machines. The virtual terrain representation is designed to allow feasible development and maintenance of the model, as well as efficacy in terms of the use of the model. This paper will describe the considerations in developing the virtual terrain schema, exemplary virtual terrain models, and algorithms utilizing the virtual terrain model for situation and threat assessment.

  5. Visualizing common operating picture of critical infrastructure

    NASA Astrophysics Data System (ADS)

    Rummukainen, Lauri; Oksama, Lauri; Timonen, Jussi; Vankka, Jouko

    2014-05-01

    This paper presents a solution for visualizing the common operating picture (COP) of the critical infrastructure (CI). The purpose is to improve the situational awareness (SA) of the strategic-level actor and the source system operator in order to support decision making. The information is obtained through the Situational Awareness of Critical Infrastructure and Networks (SACIN) framework. The system consists of an agent-based solution for gathering, storing, and analyzing the information, and a user interface (UI) is presented in this paper. The UI consists of multiple views visualizing information from the CI in different ways. Different CI actors are categorized in 11 separate sectors, and events are used to present meaningful incidents. Past and current states, together with geographical distribution and logical dependencies, are presented to the user. The current states are visualized as segmented circles to represent event categories. Geographical distribution of assets is displayed with a well-known map tool. Logical dependencies are presented in a simple directed graph, and users also have a timeline to review past events. The objective of the UI is to provide an easily understandable overview of the CI status. Therefore, testing methods, such as a walkthrough, an informal walkthrough, and the Situation Awareness Global Assessment Technique (SAGAT), were used in the evaluation of the UI. Results showed that users were able to obtain an understanding of the current state of CI, and the usability of the UI was rated as good. In particular, the designated display for the CI overview and the timeline were found to be efficient.

  6. Spatial Variability of Co On The Scale of The Street According To Street Morphology, Car Traffic and Local Climate In Paris

    NASA Astrophysics Data System (ADS)

    Quenol, H.; Bridier, S.; Beltrando, G.; Frangi, J. P.

    The purpose of this study is to observe CO distribution on street level according to variations of car traffic, weather situation and street morphology. The experimentation use an electronical CO sensor connected to a data logger. Two kinds of observations are carried out : - measurements along an itinerary from the n´ butte de Montmartre z to the n´ Seine z highlights the spatial variability of CO distribution according to car traffic and weather characteristics (radiativ, advectiv, cloudy, rainy) ; - measurements in fixed stations underlines the differences in concentration according the situation (in or out of buildings) and according to level of the vertical measure (from 1.5 to 10 m). This approach of pollution distribution at the street and the district scale is made possible by using low cost sensors. They allow an very fine approach of CO distribution by multiplying measurements points. All of these data are integrated in a GIS with a DEM, a cartography of building implantation and width of the streets. This study shows that the CO concentration is in relation to street morphology (width, height, topography), intensity of car traffic and local meteorology (breezes and wind channeled by street network). This method leads to the constitution of a mobil network used to produce data on horizontal and vertical CO distribution inside the n´ meshs z of the present network of pollution observation.

  7. A Web-Based Tool for Automatic Data Collection, Curation, and Visualization of Complex Healthcare Survey Studies including Social Network Analysis.

    PubMed

    Benítez, José Alberto; Labra, José Emilio; Quiroga, Enedina; Martín, Vicente; García, Isaías; Marqués-Sánchez, Pilar; Benavides, Carmen

    2017-01-01

    There is a great concern nowadays regarding alcohol consumption and drug abuse, especially in young people. Analyzing the social environment where these adolescents are immersed, as well as a series of measures determining the alcohol abuse risk or personal situation and perception using a number of questionnaires like AUDIT, FAS, KIDSCREEN, and others, it is possible to gain insight into the current situation of a given individual regarding his/her consumption behavior. But this analysis, in order to be achieved, requires the use of tools that can ease the process of questionnaire creation, data gathering, curation and representation, and later analysis and visualization to the user. This research presents the design and construction of a web-based platform able to facilitate each of the mentioned processes by integrating the different phases into an intuitive system with a graphical user interface that hides the complexity underlying each of the questionnaires and techniques used and presenting the results in a flexible and visual way, avoiding any manual handling of data during the process. Advantages of this approach are shown and compared to the previous situation where some of the tasks were accomplished by time consuming and error prone manipulations of data.

  8. Enabling Research Network Connectivity to Clouds with Virtual Router Technology

    NASA Astrophysics Data System (ADS)

    Seuster, R.; Casteels, K.; Leavett-Brown, CR; Paterson, M.; Sobie, RJ

    2017-10-01

    The use of opportunistic cloud resources by HEP experiments has significantly increased over the past few years. Clouds that are owned or managed by the HEP community are connected to the LHCONE network or the research network with global access to HEP computing resources. Private clouds, such as those supported by non-HEP research funds are generally connected to the international research network; however, commercial clouds are either not connected to the research network or only connect to research sites within their national boundaries. Since research network connectivity is a requirement for HEP applications, we need to find a solution that provides a high-speed connection. We are studying a solution with a virtual router that will address the use case when a commercial cloud has research network connectivity in a limited region. In this situation, we host a virtual router in our HEP site and require that all traffic from the commercial site transit through the virtual router. Although this may increase the network path and also the load on the HEP site, it is a workable solution that would enable the use of the remote cloud for low I/O applications. We are exploring some simple open-source solutions. In this paper, we present the results of our studies and how it will benefit our use of private and public clouds for HEP computing.

  9. Becoming popular: interpersonal emotion regulation predicts relationship formation in real life social networks.

    PubMed

    Niven, Karen; Garcia, David; van der Löwe, Ilmo; Holman, David; Mansell, Warren

    2015-01-01

    Building relationships is crucial for satisfaction and success, especially when entering new social contexts. In the present paper, we investigate whether attempting to improve others' feelings helps people to make connections in new networks. In Study 1, a social network study following new networks of people for a 12-week period indicated that use of interpersonal emotion regulation (IER) strategies predicted growth in popularity, as indicated by other network members' reports of spending time with the person, in work and non-work interactions. In Study 2, linguistic analysis of the tweets from over 8000 Twitter users from formation of their accounts revealed that use of IER predicted greater popularity in terms of the number of followers gained. However, not all types of IER had positive effects. Behavioral IER strategies (which use behavior to reassure or comfort in order to regulate affect) were associated with greater popularity, while cognitive strategies (which change a person's thoughts about his or her situation or feelings in order to regulate affect) were negatively associated with popularity. Our findings have implications for our understanding of how new relationships are formed, highlighting the important the role played by intentional emotion regulatory processes.

  10. The resilient hybrid fiber sensor network with self-healing function

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xu, Shibo, E-mail: Shibo-Xu@tju.edu.cn; Liu, Tiegen; Ge, Chunfeng

    This paper presents a novel resilient fiber sensor network (FSN) with multi-ring architecture, which could interconnect various kinds of fiber sensors responsible for more than one measurands. We explain how the intelligent control system provides sensors with self-healing function meanwhile sensors are working properly, besides each fiber in FSN is under real-time monitoring. We explain the software process and emergency mechanism to respond failures or other circumstances. To improve the efficiency in the use of limited spectrum resources in some situations, we have two different structures to distribute the light sources rationally. Then, we propose a hybrid sensor working inmore » FSN which is a combination of a distributed sensor and a FBG (Fiber Bragg Grating) array fused in a common fiber sensing temperature and vibrations simultaneously with neglectable crosstalk to each other. By making a failure to a working fiber in experiment, the feasibility and effectiveness of the network with a hybrid sensor has been demonstrated, hybrid sensors could not only work as designed but also survive from destructive failures with the help of resilient network and smart and quick self-healing actions. The network has improved the viability of the fiber sensors and diversity of measurands.« less

  11. Evolutionary fuzzy ARTMAP neural networks for classification of semiconductor defects.

    PubMed

    Tan, Shing Chiang; Watada, Junzo; Ibrahim, Zuwairie; Khalid, Marzuki

    2015-05-01

    Wafer defect detection using an intelligent system is an approach of quality improvement in semiconductor manufacturing that aims to enhance its process stability, increase production capacity, and improve yields. Occasionally, only few records that indicate defective units are available and they are classified as a minority group in a large database. Such a situation leads to an imbalanced data set problem, wherein it engenders a great challenge to deal with by applying machine-learning techniques for obtaining effective solution. In addition, the database may comprise overlapping samples of different classes. This paper introduces two models of evolutionary fuzzy ARTMAP (FAM) neural networks to deal with the imbalanced data set problems in a semiconductor manufacturing operations. In particular, both the FAM models and hybrid genetic algorithms are integrated in the proposed evolutionary artificial neural networks (EANNs) to classify an imbalanced data set. In addition, one of the proposed EANNs incorporates a facility to learn overlapping samples of different classes from the imbalanced data environment. The classification results of the proposed evolutionary FAM neural networks are presented, compared, and analyzed using several classification metrics. The outcomes positively indicate the effectiveness of the proposed networks in handling classification problems with imbalanced data sets.

  12. A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks

    PubMed Central

    Zhu, Mingqiang; Song, Fei; Xu, Lei; Seo, Jung Taek

    2017-01-01

    As the key element, sensor networks are widely investigated by the Internet of Things (IoT) community. When massive numbers of devices are well connected, malicious attackers may deliberately propagate fake position information to confuse the ordinary users and lower the network survivability in belt-type situation. However, most existing positioning solutions only focus on the algorithm accuracy and do not consider any security aspects. In this paper, we propose a comprehensive scheme for node localization protection, which aims to improve the energy-efficient, reliability and accuracy. To handle the unbalanced resource consumption, a node deployment mechanism is presented to satisfy the energy balancing strategy in resource-constrained scenarios. According to cooperation localization theory and network connection property, the parameter estimation model is established. To achieve reliable estimations and eliminate large errors, an improved localization algorithm is created based on modified average hop distances. In order to further improve the algorithms, the node positioning accuracy is enhanced by using the steepest descent method. The experimental simulations illustrate the performance of new scheme can meet the previous targets. The results also demonstrate that it improves the belt-type sensor networks’ survivability, in terms of anti-interference, network energy saving, etc. PMID:29186072

  13. Becoming popular: interpersonal emotion regulation predicts relationship formation in real life social networks

    PubMed Central

    Niven, Karen; Garcia, David; van der Löwe, Ilmo; Holman, David; Mansell, Warren

    2015-01-01

    Building relationships is crucial for satisfaction and success, especially when entering new social contexts. In the present paper, we investigate whether attempting to improve others’ feelings helps people to make connections in new networks. In Study 1, a social network study following new networks of people for a 12-week period indicated that use of interpersonal emotion regulation (IER) strategies predicted growth in popularity, as indicated by other network members’ reports of spending time with the person, in work and non-work interactions. In Study 2, linguistic analysis of the tweets from over 8000 Twitter users from formation of their accounts revealed that use of IER predicted greater popularity in terms of the number of followers gained. However, not all types of IER had positive effects. Behavioral IER strategies (which use behavior to reassure or comfort in order to regulate affect) were associated with greater popularity, while cognitive strategies (which change a person’s thoughts about his or her situation or feelings in order to regulate affect) were negatively associated with popularity. Our findings have implications for our understanding of how new relationships are formed, highlighting the important the role played by intentional emotion regulatory processes. PMID:26483718

  14. Memory and pattern storage in neural networks with activity dependent synapses

    NASA Astrophysics Data System (ADS)

    Mejias, J. F.; Torres, J. J.

    2009-01-01

    We present recently obtained results on the influence of the interplay between several activity dependent synaptic mechanisms, such as short-term depression and facilitation, on the maximum memory storage capacity in an attractor neural network [1]. In contrast with the case of synaptic depression, which drastically reduces the capacity of the network to store and retrieve activity patterns [2], synaptic facilitation is able to enhance the memory capacity in different situations. In particular, we find that a convenient balance between depression and facilitation can enhance the memory capacity, reaching maximal values similar to those obtained with static synapses, that is, without activity-dependent processes. We also argue, employing simple arguments, that this level of balance is compatible with experimental data recorded from some cortical areas, where depression and facilitation may play an important role for both memory-oriented tasks and information processing. We conclude that depressing synapses with a certain level of facilitation allow to recover the good retrieval properties of networks with static synapses while maintaining the nonlinear properties of dynamic synapses, convenient for information processing and coding.

  15. MATE: Machine Learning for Adaptive Calibration Template Detection

    PubMed Central

    Donné, Simon; De Vylder, Jonas; Goossens, Bart; Philips, Wilfried

    2016-01-01

    The problem of camera calibration is two-fold. On the one hand, the parameters are estimated from known correspondences between the captured image and the real world. On the other, these correspondences themselves—typically in the form of chessboard corners—need to be found. Many distinct approaches for this feature template extraction are available, often of large computational and/or implementational complexity. We exploit the generalized nature of deep learning networks to detect checkerboard corners: our proposed method is a convolutional neural network (CNN) trained on a large set of example chessboard images, which generalizes several existing solutions. The network is trained explicitly against noisy inputs, as well as inputs with large degrees of lens distortion. The trained network that we evaluate is as accurate as existing techniques while offering improved execution time and increased adaptability to specific situations with little effort. The proposed method is not only robust against the types of degradation present in the training set (lens distortions, and large amounts of sensor noise), but also to perspective deformations, e.g., resulting from multi-camera set-ups. PMID:27827920

  16. Multiparameter Estimation in Networked Quantum Sensors

    NASA Astrophysics Data System (ADS)

    Proctor, Timothy J.; Knott, Paul A.; Dunningham, Jacob A.

    2018-02-01

    We introduce a general model for a network of quantum sensors, and we use this model to consider the following question: When can entanglement between the sensors, and/or global measurements, enhance the precision with which the network can measure a set of unknown parameters? We rigorously answer this question by presenting precise theorems proving that for a broad class of problems there is, at most, a very limited intrinsic advantage to using entangled states or global measurements. Moreover, for many estimation problems separable states and local measurements are optimal, and can achieve the ultimate quantum limit on the estimation uncertainty. This immediately implies that there are broad conditions under which simultaneous estimation of multiple parameters cannot outperform individual, independent estimations. Our results apply to any situation in which spatially localized sensors are unitarily encoded with independent parameters, such as when estimating multiple linear or nonlinear optical phase shifts in quantum imaging, or when mapping out the spatial profile of an unknown magnetic field. We conclude by showing that entangling the sensors can enhance the estimation precision when the parameters of interest are global properties of the entire network.

  17. Structure solution of network materials by solid-state NMR without knowledge of the crystallographic space group.

    PubMed

    Brouwer, Darren H

    2013-01-01

    An algorithm is presented for solving the structures of silicate network materials such as zeolites or layered silicates from solid-state (29)Si double-quantum NMR data for situations in which the crystallographic space group is not known. The algorithm is explained and illustrated in detail using a hypothetical two-dimensional network structure as a working example. The algorithm involves an atom-by-atom structure building process in which candidate partial structures are evaluated according to their agreement with Si-O-Si connectivity information, symmetry restraints, and fits to (29)Si double quantum NMR curves followed by minimization of a cost function that incorporates connectivity, symmetry, and quality of fit to the double quantum curves. The two-dimensional network material is successfully reconstructed from hypothetical NMR data that can be reasonably expected to be obtained for real samples. This advance in "NMR crystallography" is expected to be important for structure determination of partially ordered silicate materials for which diffraction provides very limited structural information. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Equilibria of perceptrons for simple contingency problems.

    PubMed

    Dawson, Michael R W; Dupuis, Brian

    2012-08-01

    The contingency between cues and outcomes is fundamentally important to theories of causal reasoning and to theories of associative learning. Researchers have computed the equilibria of Rescorla-Wagner models for a variety of contingency problems, and have used these equilibria to identify situations in which the Rescorla-Wagner model is consistent, or inconsistent, with normative models of contingency. Mathematical analyses that directly compare artificial neural networks to contingency theory have not been performed, because of the assumed equivalence between the Rescorla-Wagner learning rule and the delta rule training of artificial neural networks. However, recent results indicate that this equivalence is not as straightforward as typically assumed, suggesting a strong need for mathematical accounts of how networks deal with contingency problems. One such analysis is presented here, where it is proven that the structure of the equilibrium for a simple network trained on a basic contingency problem is quite different from the structure of the equilibrium for a Rescorla-Wagner model faced with the same problem. However, these structural differences lead to functionally equivalent behavior. The implications of this result for the relationships between associative learning, contingency theory, and connectionism are discussed.

  19. Emergency Situation Prediction Mechanism: A Novel Approach for Intelligent Transportation System Using Vehicular Ad Hoc Networks

    PubMed Central

    Gokulakrishnan, P.

    2015-01-01

    In Indian four-lane express highway, millions of vehicles are travelling every day. Accidents are unfortunate and frequently occurring in these highways causing deaths, increase in death toll, and damage to infrastructure. A mechanism is required to avoid such road accidents at the maximum to reduce the death toll. An Emergency Situation Prediction Mechanism, a novel and proactive approach, is proposed in this paper for achieving the best of Intelligent Transportation System using Vehicular Ad Hoc Network. ESPM intends to predict the possibility of occurrence of an accident in an Indian four-lane express highway. In ESPM, the emergency situation prediction is done by the Road Side Unit based on (i) the Status Report sent by the vehicles in the range of RSU and (ii) the road traffic flow analysis done by the RSU. Once the emergency situation or accident is predicted in advance, an Emergency Warning Message is constructed and disseminated to all vehicles in the area of RSU to alert and prevent the vehicles from accidents. ESPM performs well in emergency situation prediction in advance to the occurrence of an accident. ESPM predicts the emergency situation within 0.20 seconds which is comparatively less than the statistical value. The prediction accuracy of ESPM against vehicle density is found better in different traffic scenarios. PMID:26065014

  20. Climate change impacts on urban wildfire and flooding policy in Idaho: a comparative policy network perspective

    NASA Astrophysics Data System (ADS)

    Lindquist, E.; Pierce, J. L.

    2013-12-01

    Numerous frameworks and models exist for understanding the dynamics of the public policy process. A policy network approach considers how and why stakeholders and interests pay attention to and engage in policy problems, such as flood control or developing resilient and fire resistant landscapes. Variables considered in this approach include what the relationships are between these stakeholders, how they influence the process and outcomes, communication patterns within and between policy networks, and how networks change as a result of new information, science, or public interest and involvement with the problem. This approach is useful in understanding the creation of natural hazards policy as new information or situations, such as projected climate change impacts, influence and disrupt the policy process and networks. Two significant natural hazard policy networks exist in the semi-arid Treasure Valley region of Southwest Idaho, which includes the capitol city of Boise and the surrounding metropolitan area. Boise is situated along the Boise River and adjacent to steep foothills; this physiographic setting makes Boise vulnerable to both wildfires at the wildland-urban interface (WUI) and flooding. Both of these natural hazards have devastated the community in the past and floods and fires are projected to occur with more frequency in the future as a result of projected climate change impacts in the region. While both hazards are fairly well defined problems, there are stark differences lending themselves to comparisons across their respective networks. The WUI wildfire network is large and well developed, includes stakeholders from all levels of government, the private sector and property owner organizations, has well defined objectives, and conducts promotional and educational activities as part of its interaction with the public in order to increase awareness and garner support for its policies. The flood control policy network, however, is less defined, dominated by a few historically strong interests and is constrained (and supported) by the complex legal and management foundations of Western water rights, as well as federal and state regulatory practices for flood control and water provision. Overlap between these networks does occur as many of the stakeholders are the same, adding another dimension to the comparative approach presented here. It is the physical and natural sciences that bind these two networks, however, and create opportunities for convergence as hydrological inputs (snowmelt and rain) and summer drought simultaneously inform and impact efforts to increase resilience and reduce vulnerability and risk from both fire and flood. For example, early spring snowmelt can both increase risks of flooding and contribute to later severe fire conditions, and fires greatly increase the risk of catastrophic floods and debris flows in burned basins. Contributing to both of these potential hazards are changes in the climate in the region. This paper will present findings from a comparative study of these two policy networks and discuss the implications from how climate change is defined, understood, accepted, and integrated in both networks and the policy processes associated with these urban hazards.

  1. Mitigating TCP Degradation over Intermittent Link Failures using Intermediate Buffers

    DTIC Science & Technology

    2006-06-01

    signal strength [10]. The Preemptive routing in ad hoc networks [10] attempts to predict that a route will fail by looking at the signal power of the...when the error rate is high there are non -optimal back offs in the Retransmission Timeout. And third, in the high error situation the slow start...network storage follows. In Beck et. al. [3], Logistical Networking is outlined as a means of storing data throughout the network. End to end

  2. Engineering rules for evaluating the efficiency of multiplexing traffic streams

    NASA Astrophysics Data System (ADS)

    Klincewicz, John G.

    2004-09-01

    It is common, either for a telecommunications service provider or for a corporate enterprise, to have multiple data networks. For example, both an IP network and an ATM or Frame Relay network could be in operation to serve different applications. This can result in parallel transport links between the same two locations, each carrying data traffic under a different protocol. In this paper, we consider some practical engineering rules, for particular situations, to evaluate whether or not it is advantageous to combine these parallel traffic streams onto a single transport link. Combining the streams requires additional overhead (a so-called "cell tax" ) but, in at least some situations, can result in more efficient use of modular transport capacity. Simple graphs can be used to summarize the analysis. Some interesting, and perhaps unexpected, observations can be made.

  3. Hybrid neuro-heuristic methodology for simulation and control of dynamic systems over time interval.

    PubMed

    Woźniak, Marcin; Połap, Dawid

    2017-09-01

    Simulation and positioning are very important aspects of computer aided engineering. To process these two, we can apply traditional methods or intelligent techniques. The difference between them is in the way they process information. In the first case, to simulate an object in a particular state of action, we need to perform an entire process to read values of parameters. It is not very convenient for objects for which simulation takes a long time, i.e. when mathematical calculations are complicated. In the second case, an intelligent solution can efficiently help on devoted way of simulation, which enables us to simulate the object only in a situation that is necessary for a development process. We would like to present research results on developed intelligent simulation and control model of electric drive engine vehicle. For a dedicated simulation method based on intelligent computation, where evolutionary strategy is simulating the states of the dynamic model, an intelligent system based on devoted neural network is introduced to control co-working modules while motion is in time interval. Presented experimental results show implemented solution in situation when a vehicle transports things over area with many obstacles, what provokes sudden changes in stability that may lead to destruction of load. Therefore, applied neural network controller prevents the load from destruction by positioning characteristics like pressure, acceleration, and stiffness voltage to absorb the adverse changes of the ground. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Characterizing Mobility and Contact Networks in Virtual Worlds

    NASA Astrophysics Data System (ADS)

    Machado, Felipe; Santos, Matheus; Almeida, Virgílio; Guedes, Dorgival

    Virtual worlds have recently gained wide recognition as an important field of study in Computer Science. In this work we present an analysis of the mobility and interactions among characters in World of Warcraft (WoW) and Second Life based on the contact opportunities extracted from actual user data in each of those domains. We analyze character contacts in terms of their spatial and temporal characteristics, as well as the social network derived from such contacts. Our results show that the contacts observed may be more influenced by the nature of the interactions and goals of the users in each situation than by the intrinsic structure of such worlds. In particular, observations from a city in WoW are closer to those of Second Life than to other areas in WoW itself.

  5. The Department of Defense energy vulnerabilities: Potential problems and observations

    NASA Astrophysics Data System (ADS)

    Freiwald, D. A.; Berger, M. E.; Roach, J. F.

    1982-08-01

    The Department of Defense is almost entirely dependent on civilian energy supplies to meet its needs in both peacetime and periods of heightened conflict. There are a number of potential vulnerabilities to the continual and timely supply of energy to both the civilian and military sectors. These include denial of the energy resources themselves, disruption of critical transportation networks, destruction of storage facilities, and interruption of electrical power. This report briefly reviews the present situation for provision of energy from the civilian sector to the military. General vulnerabilities of the existing energy supply system are identified, along with the potential for armed aggression (including terrorist and sabotage activities) against the energy network. Conclusions and some tentative observations are made as to a proper response to the existing vulnerabilities.

  6. Architectural Design for European SST System

    NASA Astrophysics Data System (ADS)

    Utzmann, Jens; Wagner, Axel; Blanchet, Guillaume; Assemat, Francois; Vial, Sophie; Dehecq, Bernard; Fernandez Sanchez, Jaime; Garcia Espinosa, Jose Ramon; Agueda Mate, Alberto; Bartsch, Guido; Schildknecht, Thomas; Lindman, Niklas; Fletcher, Emmet; Martin, Luis; Moulin, Serge

    2013-08-01

    The paper presents the results of a detailed design, evaluation and trade-off of a potential European Space Surveillance and Tracking (SST) system architecture. The results have been produced in study phase 1 of the on-going "CO-II SSA Architectural Design" project performed by the Astrium consortium as part of ESA's Space Situational Awareness Programme and are the baseline for further detailing and consolidation in study phase 2. The sensor network is comprised of both ground- and space-based assets and aims at being fully compliant with the ESA SST System Requirements. The proposed ground sensors include a surveillance radar, an optical surveillance system and a tracking network (radar and optical). A space-based telescope system provides significant performance and robustness for the surveillance and tracking of beyond-LEO target objects.

  7. [Personal emergency call system based on human vital and system technical parameters in a Smart Home environment].

    PubMed

    Hampicke, M; Schadow, B; Rossdeutscher, W; Fellbaum, K; Boenick, U

    2002-11-01

    Progress in microtechnology and radio transmission technology has enabled the development of highly reliable emergency-call systems. The present article describes systems that have been specially designed to improve the safety and independence of handicapped and elderly persons living at home. For such persons immediate help in an emergency situation is of crucial importance. The technical state of the art of emergency-call systems specially developed for use by the elderly, is briefly discussed, in particular the well-known radio emergency-call button, with the aid of which an alarm can be activated manually. This system, however, does not offer adequate safety in all emergency situations. Alternative or complementary systems designed to automatically trigger an alarm on the basis of the recording and evaluation of so-called vital parameters, are therefore proposed. In addition, in a smart-home environment with networked devices, further parameters--so-called environment parameters can be used. It is found that the identification of an emergency situation becomes more reliable as the number of parameters employed increases.

  8. On the design of a hierarchical SS7 network: A graph theoretical approach

    NASA Astrophysics Data System (ADS)

    Krauss, Lutz; Rufa, Gerhard

    1994-04-01

    This contribution is concerned with the design of Signaling System No. 7 networks based on graph theoretical methods. A hierarchical network topology is derived by combining the advantage of the hierarchical network structure with the realization of node disjoint routes between nodes of the network. By using specific features of this topology, we develop an algorithm to construct circle-free routing data and to assure bidirectionality also in case of failure situations. The methods described are based on the requirements that the network topology, as well as the routing data, may be easily changed.

  9. Competing edge networks

    NASA Astrophysics Data System (ADS)

    Parsons, Mark; Grindrod, Peter

    2012-06-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails.

  10. [Cyberbullying and Suicidal Behavior: What is the Connection? About a Case].

    PubMed

    Escobar Echavarría, Juliana; Montoya González, Laura Elisa; Restrepo Bernal, Diana; Mejía Rodríguez, David

    Social networks have increased in recent decades, and with them the bullying, causing difficulties in young people's mental health expressed through depressive symptoms, suicidal ideation and suicide attempts. Up next, we present a case that exemplifies this situation. To describe a case report that exemplifies this new outlook in young people and how it affects their mental health. Case report and non-systematic literature review. One case report, treated at a hospital in Medellin due to two suicide attempts related to social networks is presented. Currently, there are multiple social media resources, the advent of internet and smartphones is not only a strategy for improving social interactions, but it also contributes to impair mental health of some vulnerable young people. This case sensitize us, about the relationship between the growing social networking and cyberbullying as well as suicidal thoughts / attempts; thanks to this case and the available literature, we can't establish causality but we could deduce that the internet utter a increased risk for young people who are exposed and more vulnerable. Copyright © 2016 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  11. [Study on network architecture of a tele-medical information sharing platform].

    PubMed

    Pan, Lin; Yu, Lun; Chen, Jin-xiong

    2006-07-01

    In the article,a plan of network construction which satisfies the demand of applications for a telemedical information sharing platform is proposed. We choice network access plans in view of user actual situation, through the analysis of the service demand and many kinds of network access technologies. Hospital servers that locate in LAN link sharing platform with node servers, should separate from the broadband network of sharing platform in order to ensure the security of the internal hospital network and the administration management. We use the VPN technology to realize the safe transmission of information in the platform network. Preliminary experiments have proved the plan is practicable.

  12. Supporting interoperability of collaborative networks through engineering of a service-based Mediation Information System (MISE 2.0)

    NASA Astrophysics Data System (ADS)

    Benaben, Frederick; Mu, Wenxin; Boissel-Dallier, Nicolas; Barthe-Delanoe, Anne-Marie; Zribi, Sarah; Pingaud, Herve

    2015-08-01

    The Mediation Information System Engineering project is currently finishing its second iteration (MISE 2.0). The main objective of this scientific project is to provide any emerging collaborative situation with methods and tools to deploy a Mediation Information System (MIS). MISE 2.0 aims at defining and designing a service-based platform, dedicated to initiating and supporting the interoperability of collaborative situations among potential partners. This MISE 2.0 platform implements a model-driven engineering approach to the design of a service-oriented MIS dedicated to supporting the collaborative situation. This approach is structured in three layers, each providing their own key innovative points: (i) the gathering of individual and collaborative knowledge to provide appropriate collaborative business behaviour (key point: knowledge management, including semantics, exploitation and capitalisation), (ii) deployment of a mediation information system able to computerise the previously deduced collaborative processes (key point: the automatic generation of collaborative workflows, including connection with existing devices or services) (iii) the management of the agility of the obtained collaborative network of organisations (key point: supervision of collaborative situations and relevant exploitation of the gathered data). MISE covers business issues (through BPM), technical issues (through an SOA) and agility issues of collaborative situations (through EDA).

  13. Aberrant neural networks for the recognition memory of socially relevant information in patients with schizophrenia.

    PubMed

    Oh, Jooyoung; Chun, Ji-Won; Kim, Eunseong; Park, Hae-Jeong; Lee, Boreom; Kim, Jae-Jin

    2017-01-01

    Patients with schizophrenia exhibit several cognitive deficits, including memory impairment. Problems with recognition memory can hinder socially adaptive behavior. Previous investigations have suggested that altered activation of the frontotemporal area plays an important role in recognition memory impairment. However, the cerebral networks related to these deficits are not known. The aim of this study was to elucidate the brain networks required for recognizing socially relevant information in patients with schizophrenia performing an old-new recognition task. Sixteen patients with schizophrenia and 16 controls participated in this study. First, the subjects performed the theme-identification task during functional magnetic resonance imaging. In this task, pictures depicting social situations were presented with three words, and the subjects were asked to select the best theme word for each picture. The subjects then performed an old-new recognition task in which they were asked to discriminate whether the presented words were old or new. Task performance and neural responses in the old-new recognition task were compared between the subject groups. An independent component analysis of the functional connectivity was performed. The patients with schizophrenia exhibited decreased discriminability and increased activation of the right superior temporal gyrus compared with the controls during correct responses. Furthermore, aberrant network activities were found in the frontopolar and language comprehension networks in the patients. The functional connectivity analysis showed aberrant connectivity in the frontopolar and language comprehension networks in the patients with schizophrenia, and these aberrations possibly contribute to their low recognition performance and social dysfunction. These results suggest that the frontopolar and language comprehension networks are potential therapeutic targets in patients with schizophrenia.

  14. Improving Situation Awareness with the Android Team Awareness Kit (ATAK)

    DTIC Science & Technology

    2015-04-01

    fluid user experience and enhanced data sharing. 19 6.2.2 Esri Esri is a US-based company that sells geospatial information systems and data services...field, Situational Awareness (SA) needs to be conveyed in a de- centralized manner to the users at the edge of the network as well as at operations...that ATAK has built-in, and the ways it is being used by a variety of military, homeland security, and law enforcement users . Keywords: situational

  15. Location accuracy evaluation of lightning location systems using natural lightning flashes recorded by a network of high-speed cameras

    NASA Astrophysics Data System (ADS)

    Alves, J.; Saraiva, A. C. V.; Campos, L. Z. D. S.; Pinto, O., Jr.; Antunes, L.

    2014-12-01

    This work presents a method for the evaluation of location accuracy of all Lightning Location System (LLS) in operation in southeastern Brazil, using natural cloud-to-ground (CG) lightning flashes. This can be done through a multiple high-speed cameras network (RAMMER network) installed in the Paraiba Valley region - SP - Brazil. The RAMMER network (Automated Multi-camera Network for Monitoring and Study of Lightning) is composed by four high-speed cameras operating at 2,500 frames per second. Three stationary black-and-white (B&W) cameras were situated in the cities of São José dos Campos and Caçapava. A fourth color camera was mobile (installed in a car), but operated in a fixed location during the observation period, within the city of São José dos Campos. The average distance among cameras was 13 kilometers. Each RAMMER sensor position was determined so that the network can observe the same lightning flash from different angles and all recorded videos were GPS (Global Position System) time stamped, allowing comparisons of events between cameras and the LLS. The RAMMER sensor is basically composed by a computer, a Phantom high-speed camera version 9.1 and a GPS unit. The lightning cases analyzed in the present work were observed by at least two cameras, their position was visually triangulated and the results compared with BrasilDAT network, during the summer seasons of 2011/2012 and 2012/2013. The visual triangulation method is presented in details. The calibration procedure showed an accuracy of 9 meters between the accurate GPS position of the object triangulated and the result from the visual triangulation method. Lightning return stroke positions, estimated with the visual triangulation method, were compared with LLS locations. Differences between solutions were not greater than 1.8 km.

  16. From brain to earth and climate systems: small-world interaction networks or not?

    PubMed

    Bialonski, Stephan; Horstmann, Marie-Therese; Lehnertz, Klaus

    2010-03-01

    We consider recent reports on small-world topologies of interaction networks derived from the dynamics of spatially extended systems that are investigated in diverse scientific fields such as neurosciences, geophysics, or meteorology. With numerical simulations that mimic typical experimental situations, we have identified an important constraint when characterizing such networks: indications of a small-world topology can be expected solely due to the spatial sampling of the system along with the commonly used time series analysis based approaches to network characterization.

  17. Social Network Collaboration for Crisis Response Operations: Developing a Situational Awareness (SA) Tool to Improve Haiti’s Interagency Relief Efforts

    DTIC Science & Technology

    2011-06-01

    and interpret patterns of social ties among actors, either multitudinous or relatively few (de Nooy, Mrvar , & Batagelj , 2005, p. 5). An aspect of...millions of vertices [aka nodes] ( Batagelj & Mrvar , 2003). With its ability to process large networks, it is considered an excellent social-network...8217Vladimir Batagelj and Andrej Mrvar —program package Pajek: http://vlado.fmf.uni-lj.si/pub/networks/pajek/’ name=’generator’/> </head> <Scene

  18. Real-time prediction of acute cardiovascular events using hardware-implemented Bayesian networks.

    PubMed

    Tylman, Wojciech; Waszyrowski, Tomasz; Napieralski, Andrzej; Kamiński, Marek; Trafidło, Tamara; Kulesza, Zbigniew; Kotas, Rafał; Marciniak, Paweł; Tomala, Radosław; Wenerski, Maciej

    2016-02-01

    This paper presents a decision support system that aims to estimate a patient׳s general condition and detect situations which pose an immediate danger to the patient׳s health or life. The use of this system might be especially important in places such as accident and emergency departments or admission wards, where a small medical team has to take care of many patients in various general conditions. Particular stress is laid on cardiovascular and pulmonary conditions, including those leading to sudden cardiac arrest. The proposed system is a stand-alone microprocessor-based device that works in conjunction with a standard vital signs monitor, which provides input signals such as temperature, blood pressure, pulseoxymetry, ECG, and ICG. The signals are preprocessed and analysed by a set of artificial intelligence algorithms, the core of which is based on Bayesian networks. The paper focuses on the construction and evaluation of the Bayesian network, both its structure and numerical specification. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Real-time scalable visual analysis on mobile devices

    NASA Astrophysics Data System (ADS)

    Pattath, Avin; Ebert, David S.; May, Richard A.; Collins, Timothy F.; Pike, William

    2008-02-01

    Interactive visual presentation of information can help an analyst gain faster and better insight from data. When combined with situational or context information, visualization on mobile devices is invaluable to in-field responders and investigators. However, several challenges are posed by the form-factor of mobile devices in developing such systems. In this paper, we classify these challenges into two broad categories - issues in general mobile computing and issues specific to visual analysis on mobile devices. Using NetworkVis and Infostar as example systems, we illustrate some of the techniques that we employed to overcome many of the identified challenges. NetworkVis is an OpenVG-based real-time network monitoring and visualization system developed for Windows Mobile devices. Infostar is a flash-based interactive, real-time visualization application intended to provide attendees access to conference information. Linked time-synchronous visualization, stylus/button-based interactivity, vector graphics, overview-context techniques, details-on-demand and statistical information display are some of the highlights of these applications.

  20. A security framework for nationwide health information exchange based on telehealth strategy.

    PubMed

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  1. Modeling and Computing of Stock Index Forecasting Based on Neural Network and Markov Chain

    PubMed Central

    Dai, Yonghui; Han, Dongmei; Dai, Weihui

    2014-01-01

    The stock index reflects the fluctuation of the stock market. For a long time, there have been a lot of researches on the forecast of stock index. However, the traditional method is limited to achieving an ideal precision in the dynamic market due to the influences of many factors such as the economic situation, policy changes, and emergency events. Therefore, the approach based on adaptive modeling and conditional probability transfer causes the new attention of researchers. This paper presents a new forecast method by the combination of improved back-propagation (BP) neural network and Markov chain, as well as its modeling and computing technology. This method includes initial forecasting by improved BP neural network, division of Markov state region, computing of the state transition probability matrix, and the prediction adjustment. Results of the empirical study show that this method can achieve high accuracy in the stock index prediction, and it could provide a good reference for the investment in stock market. PMID:24782659

  2. Development of Power Supply Management Module for Radio Signal Repeaters of Automatic Metering Reading System in Variable Solar Density Conditions

    NASA Astrophysics Data System (ADS)

    Kondratjevs, K.; Zabasta, A.; Selmanovs-Pless, V.

    2016-02-01

    In recent years, there has been significant research focus that revolves around harvesting and minimising energy consumption by wireless sensor network nodes. When a sensor node is depleted of energy, it becomes unresponsive and disconnected from the network that can significantly influence the performance of the whole network. The purpose of the present research is to create a power supply management module in order to provide stable operating voltage for autonomous operations of radio signal repeaters, sensors or gateways of WSN. The developed management module is composed of a solar panel, lithium battery and power supply management module. The novelty of the research is the management module, which ensures stable and uninterrupted operations of electronic equipment in various power supply modes in different situations, simultaneously ensuring energy protection and sustainability of the module components. The management module is able to provide power supply of 5 V for electronics scheme independently, without power interruption switching between power sources and power flows in different directions.

  3. Emergent Subjectivity in Caring Institutions for Teenagers

    ERIC Educational Resources Information Center

    Severinsson, Susanne; Nord, Catharina

    2015-01-01

    We investigate how different mealtime situations help shape teenager and staff subjectivities in two Swedish residential care homes and a special school for girls and boys, 12-15 years old, with social, emotional and behavioural difficulties. Three mealtime networks are analysed using concepts from actor-network theory, treating architectural…

  4. Peer Apprenticeship Learning in Networked Learning Communities: The Diffusion of Epistemic Learning

    ERIC Educational Resources Information Center

    Jamaludin, Azilawati; Shaari, Imran

    2016-01-01

    This article discusses peer apprenticeship learning (PAL) as situated within networked learning communities (NLCs). The context revolves around the diffusion of technologically-mediated learning in Singapore schools, where teachers begin to implement inquiry-oriented learning, consistent with 21st century learning, among students. As these schools…

  5. Reengineering for optimized control of DC networks

    NASA Astrophysics Data System (ADS)

    Vintea, Adela; Schiopu, Paul

    2015-02-01

    The management of the Independent Power Grids is the global body/structure with flexible technological support for Command-Control-Communications and Informatized Management having the responsibility for providing the conditions and information (the informational flux of decision) for the decision-maker aiming at predictable and harmonic administration of the situations (crises) and for generating the harmonic situations (results).

  6. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  7. A Framework for Achieving Situational Awareness during Crisis based on Twitter Analysis

    NASA Astrophysics Data System (ADS)

    Zielinski, Andrea; Tokarchuk, Laurissa; Middleton, Stuart; Chaves, Fernando

    2013-04-01

    Decision Support Systems for Natural Crisis Management increasingly employ Web 2.0 and 3.0 technologies for future collaborative decision making, including the use of social networks like Twitter. However, human sensor data is not readily accessible and interpretable, since the texts are unstructured, noisy and available in various languages. The present work focusses on the detection of crisis events in a multilingual setting as part of the FP7-funded EU project TRIDEC and is motivated by the goal to establish a Tsunami warning system for the Mediterranean. It is integrated into a dynamic spatial-temporal decision making component with a command and control unit's graphical user interface that presents all relevant information to the human operator to support critical decision-support. To this end, a tool for the interactive visualization of geospatial data is implemented: All tweets with an exact timestamp or geo-location are monitored on the map in real-time so that the operator on duty can get an overall picture of the situation. Apart from the human sensor data, the seismic sensor data will appear also on the same screen. Signs of abnormal activity from twitter usage in social networks as well as in sensor networks devices can then be used to trigger official warning alerts according to the CAP message standard. Whenever a certain threshold of relevant tweets in a HASC region (Hierarchical Administrative Subdivision Code) is exceeded, the twitter activity in this administrative region will be shown on a map. We believe that the following functionalities are crucial for monitoring crisis, making use of text mining and network analysis techniques: Focussed crawling, trustworthyness analysis geo-parsing, and multilingual tweet classification. In the first step, the Twitter Streaming API accesses the social data, using an adaptive keyword list (focussed crawling). Then, tweets are filtered and aggregated to form counts for a certain time-span (e.g., an interval of 1-2 minutes). Particularly, we investigate the following novel techniques that help to fulfill this task: trustworthyness analysis (linkage analysis and user network analysis), geo-parsing (locating the event in space), and multilingual tweet classification (filtering out of noisy tweets for various Mediterranean languages). Lastly, an aberration algorithm looks for spikes in the temporal stream of twitter data.

  8. Cognitive Task Analysis of Network Analysts and Managers for Network Situational Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erbacher, Robert; Frincke, Deborah A.; Wong, Pak C.

    The goal of the project was to create a set of next generation cyber situational awareness capabilities with applications to other domains in the long term. The goal is to improve the decision making process such that decision makers can choose better actions. To this end, we put extensive effort into ensuring we had feedback from network analysts and managers and understood what their needs truly were. Consequently, this is the focus of this portion of the research. This paper discusses the methodology we followed to acquire this feedback from the analysts, namely a cognitive task analysis. Additionally, this papermore » provides the details we acquired from the analysts. This essentially provides details on their processes, goals, concerns, the data and meta-data they analyze, etc. A final result we describe is the generation of a task-flow diagram.« less

  9. Making sense of the transition from the Detroit streets to drug treatment.

    PubMed

    Draus, Paul; Roddy, Juliette; Asabigi, Kanzoni

    2015-02-01

    In this article we consider the process of adjustment from active street sex work to life in structured substance abuse treatment among Detroit-area women who participated in a semicoercive program administered through a drug court. We examine this transition in terms of changes in daily routines and social networks, drawing on extensive qualitative data to illuminate the ways in which women defined their own situations. Using concepts from Bourdieu and Latour as analytical aids, we analyze the role of daily routines, environments, and networks in producing the shifts in identity that those who embraced the goals of recovery demonstrated. We conclude with a discussion of how the restrictive environments and redundant situations experienced by women in treatment could be paradoxically embraced as a means to achieve expanded opportunity and enhanced individual responsibility because women effectively reassembled their social networks and identities to align with the goals of recovery. © The Author(s) 2014.

  10. Practical example of game theory application for production route selection

    NASA Astrophysics Data System (ADS)

    Olender, M.; Krenczyk, D.

    2017-08-01

    The opportunity which opens before manufacturers on the dynamic market, especially before those from the sector of the small and medium-sized enterprises, is associated with the use of the virtual organizations concept. The planning stage of such organizations could be based on supporting decision-making tasks using the tools and formalisms taken from the game theory. In the paper the model of the virtual manufacturing network, along with the practical example of decision-making situation as two person game and the decision strategies with an analysis of calculation results are presented.

  11. Power-law behavior in complex organizational communication networks during crisis

    NASA Astrophysics Data System (ADS)

    Uddin, Shahadat; Murshed, Shahriar Tanvir Hasan; Hossain, Liaquat

    2011-08-01

    Communication networks can be described as patterns of contacts which are created due to the flow of messages and information shared among participating actors. Contemporary organizations are now commonly viewed as dynamic systems of adaptation and evolution containing several parts, which interact with one another both in internal and in external environment. Although there is limited consensus among researchers on the precise definition of organizational crisis, there is evidence of shared meaning: crisis produces individual crisis, crisis can be associated with positive or negative conditions, crises can be situations having been precipitated quickly or suddenly or situations that have developed over time and are predictable etc. In this research, we study the power-law behavior of an organizational email communication network during crisis from complexity perspective. Power law simply describes that, the probability that a randomly selected node has k links (i.e. degree k) follows P(k)∼k, where γ is the degree exponent. We used social network analysis tools and techniques to analyze the email communication dataset. We tested two propositions: (1) as organization goes through crisis, a few actors, who are prominent or more active, will become central, and (2) the daily communication network as well as the actors in the communication network exhibit power-law behavior. Our preliminary results support these two propositions. The outcome of this study may provide significant advancement in exploring organizational communication network behavior during crisis.

  12. Social Network Influence and Personal Financial Status

    NASA Astrophysics Data System (ADS)

    Luo, Shaojun; Morone, Flaviano; Sarraute, Carlos; Makse, Hernan

    Networks of social ties emerging from individual economic needs display a highly structured architecture. In response to socio-economic demands, people reshape their circle of contacts for maximizing their social status, and ipso facto, the pattern of their interconnections is strongly correlates with their personal financial situation. In this work we transform this qualitative and verbal statement into an operative definition, which allows us to quantify the economic wellness of individuals trough a measure of their collective influence. We consider the network of mobile phone calls made by the Mexican population during three months, in order to study the correlation of person's economic situation with her network location. Notably, we find that rich people tend to be also the most influential nodes, i.e., they self-organize to optimally position themselves in the network. This finding may be also raised at the level of a principle, a fact that would explain the emergence of the phenomenon of collective influence itself as the result of the local optimization of socio-economic interactions. Our method represents a powerful and efficient indicator of socio-economic robustness, which may be applied to maximize the effect of large scale economic intervention and stimulus policies

  13. How should I decide? The neural correlates of everyday moral reasoning.

    PubMed

    Sommer, Monika; Rothmayr, Christoph; Döhnel, Katrin; Meinhardt, Jörg; Schwerdtner, Johannes; Sodian, Beate; Hajak, Göran

    2010-06-01

    The present fMRI study is the first that investigates everyday moral conflict situations in which a moral standard clashes with a personal desire. In such situations people have to decide between a morally guided and a hedonistic behaviour. Twelve healthy subjects were presented with verbal stories describing conflicts with either moral or neutral content. The moral stories described conflicts requiring a decision between a personal desire and a conflicting moral standard, whereas the neutral conflicts required a decision between two conflicting personal desires. When compared to neutral conflicts, moral conflicts elicited higher activity in a wide spread neural network including the medial frontal cortex, the temporal cortex and the temporo-parietal junction and the posterior cingulate cortex. Further analyses of the moral conflicts revealed that hedonistic decisions in contrast to morally guided decisions were associated with significantly higher rankings of uncertainty and unpleasant emotions and induced significant more activation in the amygdala/parahippocampal region. The present results generalise findings on the neuroscience of moral understanding by extending it to everyday moral decisions. Furthermore, the results show that the amydala region plays a central role in the processing of negative emotional consequences associated with immoral decisions. Copyright 2010 Elsevier Ltd. All rights reserved.

  14. The GNSS network at Piton de la Fournaise

    NASA Astrophysics Data System (ADS)

    Staudacher, Thomas; Peltier, Aline; Boissier, Patrice; Di Muro, Andrea; Kowalski, Philippe; Lauret, Frederic

    2013-04-01

    The Piton de la Fournaise volcano at La Réunion Island in the western Indian Ocean is amongst the most active volcanoes in the world with a mean over 2 centuries of one eruption every 9 month. Since 1998 up to 4 eruptions occurred per year. The volcanological observatory, which is a branch of the Institut de Physique du Globe de Paris, is in charge of the monitoring of the volcanic activity and the prediction of eruptions by means of several networks: deformation, seismicity and gas emission. We will focus here on the GNSS network. The permanent GNSS network consist in 25 stations, 5 stations around the summit craters "Bory" and "Dolomieu", 5 stations at the base of the central cone at about 2 km away from the summit, 6 stations on the eastern flank in the Grandes Pentes and Grand Brûlé area. Two stations are situated north and south outside of the Enclos Fouqué Caldera. Four basis stations are situated farther away outside of the caldera Fouqué at high and low elevation. Very first GPS measurements at Piton de la Fournaise were attempted since 1994 between Bory (BORG) and "Enclos Zéro" (ENCG). The present permanent network was built up since 2004; the central network, covering the volcanic cone was upgraded till 2006. Between end 2009 and early 2010 the eastern flank, which is difficult to access, was equipped in the frame of the "Undervolc program". Data acquisition is usually done every 30 seconds, but can be incremented to 1Hz and even to 20 Hz for the most recent NetR9 receivers. Data files were transmitted by radio every day and evaluated. Presently we move the daily evaluation of the data from Winprism to Gamit, which shows in some cases more precise results, in particular when we compare stations at low and high elevation. The cinematic GPS network consist today in 78 sites, equipped with stainless steel rods cemented in the rock or fixed on metallic tripods. These sites are measured routinely one or two times per year, or more often in case of eruptions or particular events. Finally 3 stations are situated on the 60 meter thick exceptional April 2007 lava flow and record the subsidence of the thick lava flow. The GNSS data, and in particular the base line changes, which are much more precise than DGPS, indicate a general increase between several days and several weeks before each eruption. These increases correspond to an inflation of the massif and allow precise forecasting. It also shows a systematic change after the 2007 collapse of the Dolomieu crater. After eliminating quick deformations due to eruptive and pre-eruptive events, the base lines indicate a general increase (or inflation) of Piton de la Fournaise central cone before 2007, while after the summit collapse in 2007 the base lines changes indicates a still ongoing deflation of the massif. More recent data from the Grandes Pentes and the Grand Brûlé area reveal a continuous shift of the east flank of Piton de la Fournaise to the east with a rate of up to 3 cm per year and a subsidence of up to 4 cm per year, most probably due to a large sill injected beneath the east flank end March 2007 just before the April eruption.

  15. [The situation of Brazilian children and adolescents with regard to mental health and violence].

    PubMed

    de Assis, Simone Gonçalves; Avanci, Joviana Quintes; Pesce, Renata Pires; Ximenes, Liana Furtado

    2009-01-01

    This article reflects about the situation of mental health and violence against Brazilian children and adolescents, proposing a discussion about the need for public health policies including these extremely relevant issues in their priority agenda. In Brazil, the debate about this problem has occurred in a fragmented and not very consistent way. This article presents a non-systematic selection of epidemiological investigations on this subject conducted in Brazilian schools and communities. The great variety and prevalence of familiar and community violence and of mental health problems is pointed out and the methodological differences between the studies and the concentration of studies in the South and Southeastern regions of the country are emphasized. The article still highlights to the scarce service network for dealing with this kind of problem and the lack of concern with the prevention of mental disorders and promotion of mental health.

  16. Use of social network analysis in maternity care to identify the profession most suited for case manager role.

    PubMed

    Groenen, Carola J M; van Duijnhoven, Noortje T L; Faber, Marjan J; Koetsenruijter, Jan; Kremer, Jan A M; Vandenbussche, Frank P H A

    2017-02-01

    To improve Dutch maternity care, professionals start working in interdisciplinary patient-centred networks, which includes the patients as a member. The introduction of the case manager is expected to work positively on both the individual and the network level. However, case management is new in Dutch maternity care. The present study aims to define the profession that would be most suitable to fulfil the role of case manager. The maternal care network in the Nijmegen region was determined by using Social Network Analysis (SNA). SNA is a quantitative methodology that measures and analyses patient-related connections between different professionals working in a network. To identify the case manager we focused on the position, reach, and connections in the network of the maternal care professionals. Maternity healthcare professionals in a single region of the Netherlands with an average of 4,500 births/year. The participants were 214 individual healthcare workers from eight different professions. The total network showed 3948 connections between 214 maternity healthcare professionals with a density of 0.08. Each profession had some central individuals in the network. The 52 community-based midwives were responsible for 51% of all measured connections. The youth health doctors and nurses were mostly situated on the periphery and less connected. The betweenness centrality had the highest score in obstetricians and community-based midwives. Only the community-based midwives had connections with all other groups of professions. Almost all professionals in the network could reach other professionals in two steps. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Wireless Network Security Vulnerabilities and Concerns

    NASA Astrophysics Data System (ADS)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  18. Disease Surveillance on Complex Social Networks.

    PubMed

    Herrera, Jose L; Srinivasan, Ravi; Brownstein, John S; Galvani, Alison P; Meyers, Lauren Ancel

    2016-07-01

    As infectious disease surveillance systems expand to include digital, crowd-sourced, and social network data, public health agencies are gaining unprecedented access to high-resolution data and have an opportunity to selectively monitor informative individuals. Contact networks, which are the webs of interaction through which diseases spread, determine whether and when individuals become infected, and thus who might serve as early and accurate surveillance sensors. Here, we evaluate three strategies for selecting sensors-sampling the most connected, random, and friends of random individuals-in three complex social networks-a simple scale-free network, an empirical Venezuelan college student network, and an empirical Montreal wireless hotspot usage network. Across five different surveillance goals-early and accurate detection of epidemic emergence and peak, and general situational awareness-we find that the optimal choice of sensors depends on the public health goal, the underlying network and the reproduction number of the disease (R0). For diseases with a low R0, the most connected individuals provide the earliest and most accurate information about both the onset and peak of an outbreak. However, identifying network hubs is often impractical, and they can be misleading if monitored for general situational awareness, if the underlying network has significant community structure, or if R0 is high or unknown. Taking a theoretical approach, we also derive the optimal surveillance system for early outbreak detection but find that real-world identification of such sensors would be nearly impossible. By contrast, the friends-of-random strategy offers a more practical and robust alternative. It can be readily implemented without prior knowledge of the network, and by identifying sensors with higher than average, but not the highest, epidemiological risk, it provides reasonably early and accurate information.

  19. GNSS Network time series analysis

    NASA Astrophysics Data System (ADS)

    Normand, M.; Balodis, J.; Janpaule, I.; Haritonova, D.

    2012-12-01

    Time series of GNSS station results of both the EUPOS®-Riga and LatPos networks have been developed at the Institute of Geodesy and Geoinformation (University of Latvia) using Bernese v.5.0 software. The base stations were selected among the EPN and IGS stations in surroundings of Latvia at the distances up to 700 km. The results of time series are analysed and coordinate velocity vectors have been determined. The background of the map of tectonic faults helps to interpret the GNSS station coordinate velocity vector behaviour in proper environment. The outlying situations recognized. The question still aroused on the nature of the some of outlying situations. The dependence from various influences has been tested.

  20. Coevolutionary, coexisting learning and teaching agents model for prisoner’s dilemma games enhancing cooperation with assortative heterogeneous networks

    NASA Astrophysics Data System (ADS)

    Tanimoto, Jun

    2013-07-01

    Unlike other natural network systems, assortativity can be observed in most human social networks, although it has been reported that a social dilemma situation represented by the prisoner’s dilemma favors dissortativity to enhance cooperation. We established a new coevolutionary model for both agents’ strategy and network topology, where teaching and learning agents coexist. Remarkably, this model enables agents’ enhancing cooperation more than a learners-only model on a time-frozen scale-free network and produces an underlying assortative network with a fair degree of power-law distribution. The model may imply how and why assortative networks are adaptive in human society.

  1. An Adaptive Critic Approach to Reference Model Adaptation

    NASA Technical Reports Server (NTRS)

    Krishnakumar, K.; Limes, G.; Gundy-Burlet, K.; Bryant, D.

    2003-01-01

    Neural networks have been successfully used for implementing control architectures for different applications. In this work, we examine a neural network augmented adaptive critic as a Level 2 intelligent controller for a C- 17 aircraft. This intelligent control architecture utilizes an adaptive critic to tune the parameters of a reference model, which is then used to define the angular rate command for a Level 1 intelligent controller. The present architecture is implemented on a high-fidelity non-linear model of a C-17 aircraft. The goal of this research is to improve the performance of the C-17 under degraded conditions such as control failures and battle damage. Pilot ratings using a motion based simulation facility are included in this paper. The benefits of using an adaptive critic are documented using time response comparisons for severe damage situations.

  2. Comparing Eyewitness-Derived Trajectories of Bright Meteors to Ground Truth Data

    NASA Technical Reports Server (NTRS)

    Moser, D. E.

    2016-01-01

    The NASA Meteoroid Environment Office is a US government agency tasked with analyzing meteors of public interest. When queried about a meteor observed over the United States, the MEO must respond with a characterization of the trajectory, orbit, and size within a few hours. If the event is outside meteor network coverage and there is no imagery recorded by the public, a timely assessment can be difficult if not impossible. In this situation, visual reports made by eyewitnesses may be the only resource available. This has led to the development of a tool to quickly calculate crude meteor trajectories from eyewitness reports made to the American Meteor Society. A description of the tool, example case studies, and a comparison to ground truth data observed by the NASA All Sky Fireball Network are presented.

  3. Commercial satellite broadcasting for Europe

    NASA Astrophysics Data System (ADS)

    Forrest, J. R.

    1988-12-01

    A review is presented of the current television broadcasting situation in European countries, which involves a varied mix of terrestrial VHF or UHF systems and cable networks. A small market has emerged in Europe for receivers using the low-power telecommunications satellite transmission between the program providers and cable network companies. This is expected to change with the launch of medium-power pan-European telecommunication satellites (e.g. ASTRA, EUTELSAT II), which are now directly addressing the market of home reception. DBS (direct broadcast satellite) in the UK, using the D-MAC transmission standard, will offer three additional television channels, data broadcasting services, and a planned evolution to compatible forms of wide-screen, high-definition television. Comments are given on receiver and conditional access system standardization. Some views are expressed on satellite broadcasting as part of an overall broadcasting framework for the future.

  4. Design of verification platform for wireless vision sensor networks

    NASA Astrophysics Data System (ADS)

    Ye, Juanjuan; Shang, Fei; Yu, Chuang

    2017-08-01

    At present, the majority of research for wireless vision sensor networks (WVSNs) still remains in the software simulation stage, and the verification platforms of WVSNs that available for use are very few. This situation seriously restricts the transformation from theory research of WVSNs to practical application. Therefore, it is necessary to study the construction of verification platform of WVSNs. This paper combines wireless transceiver module, visual information acquisition module and power acquisition module, designs a high-performance wireless vision sensor node whose core is ARM11 microprocessor and selects AODV as the routing protocol to set up a verification platform called AdvanWorks for WVSNs. Experiments show that the AdvanWorks can successfully achieve functions of image acquisition, coding, wireless transmission, and obtain the effective distance parameters between nodes, which lays a good foundation for the follow-up application of WVSNs.

  5. Social Demand of New Generation Information Network: Introduction to High Spectral Density Optical Communication Technology

    NASA Astrophysics Data System (ADS)

    Kamiya, Takeshi; Miyazaki, Tetsuya; Kubota, Fumito

    In this section, first, current situation of traffic growth and penetration of broadband services are described. Then social demand, technical issues, and research trend for future information network in the United States, Europe, and Japan are described. Finally, a detailed construction of this book is introduced.

  6. Implementation of Networking-by-Touch to Small Unit, Network-Enabled Operations

    DTIC Science & Technology

    2010-09-01

    Monitoring – Telemanipulation ............... 54  5.  Entertainment and Educational Applications...................... 55  6.  Tactile Displays Embedded...military situational awareness systems, text and graphics applications, medical applications, entertainment and educational applications...25] ) Electromechanical transducer Electromagnetic field sensors Computer driver 21 Now, consider another simple scenario: John loves music

  7. Attitude of Teachers and Students towards Formal Learning through Online Social Networks

    ERIC Educational Resources Information Center

    Akbari, Elham; Naderi, Ahmad; Yazdi, Mahdi Hosseinzadeh; Simons, Robert Jan; Pilot, Albert

    2016-01-01

    Despite the potential of social networks in formal learning, there should be more knowledge on the students and teachers attitudes toward such technology and more recent information in the context of the actual educational situation. The Technology Acceptance Model (TAM) was used. The instruments included a questionnaire investigate the attitudes…

  8. Complementary Schools in Action: Networking for Language Development in East London

    ERIC Educational Resources Information Center

    Sneddon, Raymonde

    2014-01-01

    In a challenging economic and political context, complementary schools in East London are mentoring each other and forming networks across communities to gain recognition and status for community languages in education and the wider community. As issues of power and status impact in different ways on differently situated communities, complementary…

  9. Situated Learning through Social Networking Communities: The Development of Joint Enterprise, Mutual Engagement, and a Shared Repertoire

    ERIC Educational Resources Information Center

    Mills, Nicole

    2011-01-01

    Scholars praise social networking tools for their ability to engage and motivate iGeneration students in meaningful communicative practice, content exchange, and collaboration (Greenhow, Robelia, & Hughes, 2009; Ziegler, 2007). To gain further insight about the nature of student participation, knowledge acquisition, and relationship development…

  10. Potential Uses of Bayesian Networks as Tools for Synthesis of Systematic Reviews of Complex Interventions

    ERIC Educational Resources Information Center

    Stewart, G. B.; Mengersen, K.; Meader, N.

    2014-01-01

    Bayesian networks (BNs) are tools for representing expert knowledge or evidence. They are especially useful for synthesising evidence or belief concerning a complex intervention, assessing the sensitivity of outcomes to different situations or contextual frameworks and framing decision problems that involve alternative types of intervention.…

  11. Social Network Perspectives Reveal Strength of Academic Developers as Weak Ties

    ERIC Educational Resources Information Center

    Matthews, Kelly E.; Crampton, Andrea; Hill, Matthew; Johnson, Elizabeth D.; Sharma, Manjula D.; Varsavsky, Cristina

    2015-01-01

    Social network perspectives acknowledge the influence of disciplinary cultures on academics' teaching beliefs and practices with implications for academic developers. The contribution of academic developers in 18 scholarship of teaching and learning (SoTL) projects situated in the sciences are explored by drawing on data from a two-year national…

  12. Social class shapes the form and function of relationships and selves.

    PubMed

    Carey, Rebecca M; Markus, Hazel Rose

    2017-12-01

    Social class shapes relational realities, which in turn situate and structure different selves and their associated psychological tendencies. We first briefly review how higher class contexts tend to foster independent models of self and lower class contexts tend to foster interdependent models of self. We then consider how these independent and interdependent models of self are situated in and adapted to different social class-driven relational realities. We review research demonstrating that in lower social class contexts, social networks tend to be small, dense, homogenous and strongly connected. Ties in these networks provide the bonding capital that is key for survival and that promotes the interdependence between self and other(s). In higher social class contexts, social networks tend to be large, far-reaching, diverse and loosely connected. Ties in these networks provide the bridging capital that is key for achieving personal goals and that promotes an independence of self from other. We conclude that understanding and addressing issues tied to social class and inequality requires understanding the form and function of relationships across class contexts. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Awareness Through Agility: Teenagers as a Model for Terrorist Development of Situational Awareness

    DTIC Science & Technology

    2006-05-01

    relationship. Two of the most popular social networking sites are Myspace.com and Facebook.com. MySpace is currently the world’s...blogs allows teenagers to express themselves and, in some cases, gain limited notoriety. Blogs differ from web-based social networking sites as the...posted to web-based social networking sites , blogs, or instant messaging profiles; pictures that are taken out of context can be sent via cell

  14. Social network approaches to leadership: an integrative conceptual review.

    PubMed

    Carter, Dorothy R; DeChurch, Leslie A; Braun, Michael T; Contractor, Noshir S

    2015-05-01

    Contemporary definitions of leadership advance a view of the phenomenon as relational, situated in specific social contexts, involving patterned emergent processes, and encompassing both formal and informal influence. Paralleling these views is a growing interest in leveraging social network approaches to study leadership. Social network approaches provide a set of theories and methods with which to articulate and investigate, with greater precision and rigor, the wide variety of relational perspectives implied by contemporary leadership theories. Our goal is to advance this domain through an integrative conceptual review. We begin by answering the question of why-Why adopt a network approach to study leadership? Then, we offer a framework for organizing prior research. Our review reveals 3 areas of research, which we term: (a) leadership in networks, (b) leadership as networks, and (c) leadership in and as networks. By clarifying the conceptual underpinnings, key findings, and themes within each area, this review serves as a foundation for future inquiry that capitalizes on, and programmatically builds upon, the insights of prior work. Our final contribution is to advance an agenda for future research that harnesses the confluent ideas at the intersection of leadership in and as networks. Leadership in and as networks represents a paradigm shift in leadership research-from an emphasis on the static traits and behaviors of formal leaders whose actions are contingent upon situational constraints, toward an emphasis on the complex and patterned relational processes that interact with the embedding social context to jointly constitute leadership emergence and effectiveness. (c) 2015 APA, all rights reserved.

  15. "Mao Might Cheat": The Interactional Construction of the Imaginary Situation in a Fifth Dimension After-School Setting

    ERIC Educational Resources Information Center

    Poole, Deborah

    2011-01-01

    This article explores Vygtosky's (1978) notion of the imaginary situation through analysis of interaction and activity in a Fifth Dimension after-school setting, one of a network of programs designed with an aim to realize developmental concepts proposed by Vygotsky and others in the cultural-historical tradition (see, e.g., Cole & the…

  16. Network Structures for Distributed Situation Assessment

    DTIC Science & Technology

    1980-08-01

    name a few-can contribute to the study of DAI. Presumably, DAI will advance these fields as well by providing a modeling technology suitable for precise...moreover, current SA sys- tems are highly centralized and vulnerable. Technological advances in cheap sen- sors, microprocessors, packet radio...communications, and artificial intelligence offer promising alternatives for performing military surveillance in many situations. A new approach now being

  17. Maintaining Long-Distance Friendships: Communication Practices for Seeking and Providing Social Support across Geographic Divides

    ERIC Educational Resources Information Center

    Lobburi, Patipan

    2012-01-01

    People seek and provide support through their personal social network, especially when they must cope with stress, deal with an emergency, or need help. Coping with a new culture or new environment is a stressful situation that sojourner students must face. Support through friendship plays an important role in facing such new situations. Focusing…

  18. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  19. A Qualitative Study of the Formation and Composition of Social Networks Among Homeless Youth

    PubMed Central

    Tyler, Kimberly A.; Melander, Lisa A.

    2011-01-01

    Although social networks are essential for explaining protective and risk factors among homeless youth, little is known about the formation and composition of these groups. In this study, we utilized 19 in-depth interviews with homeless youth to investigate their social network formation, role relationships, housing status, and network member functions. Our findings reveal that the formation of these networks occurred in different ways including meeting network members through others or in specific social situations. The majority of social network members were currently housed and provided various functions including instrumental and social support and protection. Responses from participants provide valuable insight into the formation of social networks and potentially explain their subsequent involvement in risky behaviors. PMID:22121330

  20. Local level sustainability policies in the Baltic Sea area: Local Agenda 21 within the Union of the Baltic Cities network.

    PubMed

    Joas, M; Grönholm, B

    2001-08-01

    Local Agenda 21 (LA21) processes have 2 central goals. i) On the basis of some of the empirical evidence in this study, the primary goal is to improve democratic (environmental) policy-making processes in such a manner that a larger share of the population will be able to participate in planning and decision making and will also be able to understand the consequences of these decisions. ii) The LA21 processes seek to improve (at least indirectly) the broadly defined environmental situation locally in a manner that takes into account both the local and the global contexts. The first part of this article discusses the concept and methods of LA21 and sheds light on the different action areas that are central to the Baltic LA21 processes. In addition, the study will describe and display the LA21 situation within one network of cities, the Union of the Baltic Cities (UBC). Networking, including transfer of information, models and ideas, has been among the main tools for the diffusion of LA21 ideas especially into newly democratized societies. Finally, the article will conclude with an overall assessment of the LA21 situation on the Baltic rim.

  1. Evolutionary Conservation and Emerging Functional Diversity of the Cytosolic Hsp70:J Protein Chaperone Network of Arabidopsis thaliana.

    PubMed

    Verma, Amit K; Diwan, Danish; Raut, Sandeep; Dobriyal, Neha; Brown, Rebecca E; Gowda, Vinita; Hines, Justin K; Sahi, Chandan

    2017-06-07

    Heat shock proteins of 70 kDa (Hsp70s) partner with structurally diverse Hsp40s (J proteins), generating distinct chaperone networks in various cellular compartments that perform myriad housekeeping and stress-associated functions in all organisms. Plants, being sessile, need to constantly maintain their cellular proteostasis in response to external environmental cues. In these situations, the Hsp70:J protein machines may play an important role in fine-tuning cellular protein quality control. Although ubiquitous, the functional specificity and complexity of the plant Hsp70:J protein network has not been studied. Here, we analyzed the J protein network in the cytosol of Arabidopsis thaliana and, using yeast genetics, show that the functional specificities of most plant J proteins in fundamental chaperone functions are conserved across long evolutionary timescales. Detailed phylogenetic and functional analysis revealed that increased number, regulatory differences, and neofunctionalization in J proteins together contribute to the emerging functional diversity and complexity in the Hsp70:J protein network in higher plants. Based on the data presented, we propose that higher plants have orchestrated their "chaperome," especially their J protein complement, according to their specialized cellular and physiological stipulations. Copyright © 2017 Verma et al.

  2. Managing Emergency Situations in VANET Through Heterogeneous Technologies Cooperation.

    PubMed

    Santamaria, Amilcare Francesco; Tropea, Mauro; Fazio, Peppino; De Rango, Floriano

    2018-05-08

    Nowadays, the research on vehicular computing enhanced a very huge amount of services and protocols, aimed to vehicles security and comfort. The investigation of the IEEE802.11p, Wireless Access in Vehicular Environments (WAVE) and Dedicated Short Range Communication (DSRC) standards gave to the scientific world the chance to integrate new services, protocols, algorithms and devices inside vehicles. This opportunity attracted the attention of private/public organizations, which spent lot of resources and money to promote vehicular technologies. In this paper, the attention is focused on the design of a new approach for vehicular environments able to gather information during mobile node trips, for advising dangerous or emergency situations by exploiting on-board sensors. It is assumed that each vehicle has an integrated on-board unit composed of several sensors and Global Position System (GPS) device, able to spread alerting messages around the network, regarding warning and dangerous situations/conditions. On-board units, based on the standard communication protocols, share the collected information with the surrounding road-side units, while the sensing platform is able to recognize the environment that vehicles are passing through (obstacles, accidents, emergencies, dangerous situations, etc.). Finally, through the use of the GPS receiver, the exact location of the caught event is determined and spread along the network. In this way, if an accident occurs, the arriving cars will, probably, avoid delay and danger situations.

  3. Managing Emergency Situations in VANET Through Heterogeneous Technologies Cooperation

    PubMed Central

    Tropea, Mauro; De Rango, Floriano

    2018-01-01

    Nowadays, the research on vehicular computing enhanced a very huge amount of services and protocols, aimed to vehicles security and comfort. The investigation of the IEEE802.11p, Wireless Access in Vehicular Environments (WAVE) and Dedicated Short Range Communication (DSRC) standards gave to the scientific world the chance to integrate new services, protocols, algorithms and devices inside vehicles. This opportunity attracted the attention of private/public organizations, which spent lot of resources and money to promote vehicular technologies. In this paper, the attention is focused on the design of a new approach for vehicular environments able to gather information during mobile node trips, for advising dangerous or emergency situations by exploiting on-board sensors. It is assumed that each vehicle has an integrated on-board unit composed of several sensors and Global Position System (GPS) device, able to spread alerting messages around the network, regarding warning and dangerous situations/conditions. On-board units, based on the standard communication protocols, share the collected information with the surrounding road-side units, while the sensing platform is able to recognize the environment that vehicles are passing through (obstacles, accidents, emergencies, dangerous situations, etc.). Finally, through the use of the GPS receiver, the exact location of the caught event is determined and spread along the network. In this way, if an accident occurs, the arriving cars will, probably, avoid delay and danger situations. PMID:29738453

  4. Folksonomical P2P File Sharing Networks Using Vectorized KANSEI Information as Search Tags

    NASA Astrophysics Data System (ADS)

    Ohnishi, Kei; Yoshida, Kaori; Oie, Yuji

    We present the concept of folksonomical peer-to-peer (P2P) file sharing networks that allow participants (peers) to freely assign structured search tags to files. These networks are similar to folksonomies in the present Web from the point of view that users assign search tags to information distributed over a network. As a concrete example, we consider an unstructured P2P network using vectorized Kansei (human sensitivity) information as structured search tags for file search. Vectorized Kansei information as search tags indicates what participants feel about their files and is assigned by the participant to each of their files. A search query also has the same form of search tags and indicates what participants want to feel about files that they will eventually obtain. A method that enables file search using vectorized Kansei information is the Kansei query-forwarding method, which probabilistically propagates a search query to peers that are likely to hold more files having search tags that are similar to the query. The similarity between the search query and the search tags is measured in terms of their dot product. The simulation experiments examine if the Kansei query-forwarding method can provide equal search performance for all peers in a network in which only the Kansei information and the tendency with respect to file collection are different among all of the peers. The simulation results show that the Kansei query forwarding method and a random-walk-based query forwarding method, for comparison, work effectively in different situations and are complementary. Furthermore, the Kansei query forwarding method is shown, through simulations, to be superior to or equal to the random-walk based one in terms of search speed.

  5. Brain activity and prosocial behavior in a simulated life-threatening situation.

    PubMed

    Zanon, Marco; Novembre, Giovanni; Zangrando, Nicola; Chittaro, Luca; Silani, Giorgia

    2014-09-01

    To study the neuronal basis of altruistic behavior, we investigated functional connectivity within brain networks of participants who exhibited either a self-benefit behavior or an altruistic one in a life-threatening situation simulated in a virtual environment. In particular, participants were asked to evacuate a virtual building on fire and, without being previously informed, they were faced with a decision on whether to stop and help a trapped virtual human, at the possible cost of losing their own life in the virtual experience. Group independent component analysis (gICA) applied on blood-oxygen-level-dependent (BOLD) functional images revealed significant differences between the group of participants who showed selfish behavior and those who acted prosocially. Specifically, an increased functional connectivity in the salience network, comprising the anterior insula (AI) and the anterior mid cingulate cortex (aMCC), was observed in the selfish group compared to the prosocial one. Conversely, higher ICA weights in the medial prefrontal cortex and temporo-parietal junction (TPJ), were observed in the prosocial group. The findings show that an increased functional connectivity of the salience network, which suggests an enhanced sensitivity to the threatening situation and potential danger for the individual, resulted in more selfish choices, while the engagement of the medial prefrontal and temporo-parietal cortices subserved prosocial behavior, possibly due to their role in perspective-taking. The study provides the first online neurophysiological measurement of prosocial decision-making during threatening situations, opening new avenues to the investigation of neuronal substrates of complex social behaviors. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Intercluster Connection in Cognitive Wireless Mesh Networks Based on Intelligent Network Coding

    NASA Astrophysics Data System (ADS)

    Chen, Xianfu; Zhao, Zhifeng; Jiang, Tao; Grace, David; Zhang, Honggang

    2009-12-01

    Cognitive wireless mesh networks have great flexibility to improve spectrum resource utilization, within which secondary users (SUs) can opportunistically access the authorized frequency bands while being complying with the interference constraint as well as the QoS (Quality-of-Service) requirement of primary users (PUs). In this paper, we consider intercluster connection between the neighboring clusters under the framework of cognitive wireless mesh networks. Corresponding to the collocated clusters, data flow which includes the exchanging of control channel messages usually needs four time slots in traditional relaying schemes since all involved nodes operate in half-duplex mode, resulting in significant bandwidth efficiency loss. The situation is even worse at the gateway node connecting the two colocated clusters. A novel scheme based on network coding is proposed in this paper, which needs only two time slots to exchange the same amount of information mentioned above. Our simulation shows that the network coding-based intercluster connection has the advantage of higher bandwidth efficiency compared with the traditional strategy. Furthermore, how to choose an optimal relaying transmission power level at the gateway node in an environment of coexisting primary and secondary users is discussed. We present intelligent approaches based on reinforcement learning to solve the problem. Theoretical analysis and simulation results both show that the intelligent approaches can achieve optimal throughput for the intercluster relaying in the long run.

  7. Twitter web-service for soft agent reporting in persistent surveillance systems

    NASA Astrophysics Data System (ADS)

    Rababaah, Haroun; Shirkhodaie, Amir

    2010-04-01

    Persistent surveillance is an intricate process requiring monitoring, gathering, processing, tracking, and characterization of many spatiotemporal events occurring concurrently. Data associated with events can be readily attained by networking of hard (physical) sensors. Sensors may have homogeneous or heterogeneous (hybrid) sensing modalities with different communication bandwidth requirements. Complimentary to hard sensors are human observers or "soft sensors" that can report occurrences of evolving events via different communication devices (e.g., texting, cell phones, emails, instant messaging, etc.) to the command control center. However, networking of human observers in ad-hoc way is rather a difficult task. In this paper, we present a Twitter web-service for soft agent reporting in persistent surveillance systems (called Web-STARS). The objective of this web-service is to aggregate multi-source human observations in hybrid sensor networks rapidly. With availability of Twitter social network, such a human networking concept can not only be realized for large scale persistent surveillance systems (PSS), but also, it can be employed with proper interfaces to expedite rapid events reporting by human observers. The proposed technique is particularly suitable for large-scale persistent surveillance systems with distributed soft and hard sensor networks. The efficiency and effectiveness of the proposed technique is measured experimentally by conducting several simulated persistent surveillance scenarios. It is demonstrated that by fusion of information from hard and soft agents improves understanding of common operating picture and enhances situational awareness.

  8. Disease Surveillance on Complex Social Networks

    PubMed Central

    Herrera, Jose L.; Srinivasan, Ravi; Brownstein, John S.; Galvani, Alison P.; Meyers, Lauren Ancel

    2016-01-01

    As infectious disease surveillance systems expand to include digital, crowd-sourced, and social network data, public health agencies are gaining unprecedented access to high-resolution data and have an opportunity to selectively monitor informative individuals. Contact networks, which are the webs of interaction through which diseases spread, determine whether and when individuals become infected, and thus who might serve as early and accurate surveillance sensors. Here, we evaluate three strategies for selecting sensors—sampling the most connected, random, and friends of random individuals—in three complex social networks—a simple scale-free network, an empirical Venezuelan college student network, and an empirical Montreal wireless hotspot usage network. Across five different surveillance goals—early and accurate detection of epidemic emergence and peak, and general situational awareness—we find that the optimal choice of sensors depends on the public health goal, the underlying network and the reproduction number of the disease (R0). For diseases with a low R0, the most connected individuals provide the earliest and most accurate information about both the onset and peak of an outbreak. However, identifying network hubs is often impractical, and they can be misleading if monitored for general situational awareness, if the underlying network has significant community structure, or if R0 is high or unknown. Taking a theoretical approach, we also derive the optimal surveillance system for early outbreak detection but find that real-world identification of such sensors would be nearly impossible. By contrast, the friends-of-random strategy offers a more practical and robust alternative. It can be readily implemented without prior knowledge of the network, and by identifying sensors with higher than average, but not the highest, epidemiological risk, it provides reasonably early and accurate information. PMID:27415615

  9. Training program for the management of two obstetric emergencies within a French perinatal care network.

    PubMed

    Noblot, Edouard; Raia-Barjat, Tiphaine; Lajeunesse, Cecile; Trombert, Béatrice; Weiss, Stéphanie; Colombié, Maud; Chauleur, Céline

    2015-06-01

    To evaluate the effectiveness of an interdisciplinary team training program based on simulated scenarios and focusing on two obstetrical emergency situations: shoulder dystocia and complicated breech vaginal delivery (CBVD). These situations are rare, so there are few opportunities for real-life training, yet their competent and efficient management is crucial to minimizing the risks to mother and child. The target population for training comprised the 450 professionals working in the French regional perinatal care network ELENA. An expert committee defined the topics for the training program, selected the simulated scenarios and developed the evaluation grids. The training sessions were conducted by two qualified and experienced professionals in each maternity unit. They comprised a theoretical introduction followed by practical exercises in management of simulated emergency situations by the participant teams, with the aid of a mannequin. Each team completed the exercises twice, their performances being filmed, reviewed and evaluated in each case. The training sessions took place over 9 months between September 2012 and June 2013. A total of 298 professionals (obstetricians, residents in obstetrics, midwives and nursery nurses) were trained, representing 75% of the staff working in the ELENA perinatal care network. The results showed substantial and significant increases in the overall scores for management of the two emergency situations (from 74.5% to 91.4% for shoulder dystocia [p<0.0001], and from 67.2% to 88.4% [p<0.0001] for CBVD) as well as in the scores for all the specific areas of expertise assessed: safety, know-how, technique, team communication and communication with the patient. This study demonstrated the value of multidisciplinary team training for obstetric emergencies, encouraging the ELENA perinatal care network to implement an annual training program for its staff. Over and above our experience, the future establishment of a national education program to optimize the management of obstetric emergencies seems to be essential. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. An economic analysis on optical Ethernet in the access network

    NASA Astrophysics Data System (ADS)

    Kim, Sung Hwi; Nam, Dohyun; Yoo, Gunil; Kim, WoonHa

    2004-04-01

    Nowadays, Broadband service subscribers have increased exponentially and have almost saturated in Korea. Several types of solutions for broadband service applied to the field. Among several types of broadband services, most of subscribers provided xDSL service like ADSL or VDSL. Usually, they who live in an apartment provided Internet service by Ntopia network as FTTC structure that is a dormant network in economical view at KT. Under competitive telecom environment for new services like video, we faced with needing to expand or rebuild portions of our access networks, are looking for ways to provide any service that competitors might offer presently or in the near future. In order to look for new business model like FTTH service, we consider deploying optical access network. In spite of numerous benefits of PON until now, we cannot believe that PON is the best solution in Korea. Because we already deployed optical access network of ring type feeder cable and have densely population of subscribers that mainly distributed inside 6km from central office. So we try to utilize an existing Ntopia network for FTTH service under optical access environment. Despite of such situations, we try to deploy PON solution in the field as FTTC or FTTH architecture. Therefore we analyze PON structure in comparison with AON structure in order to look for optimized structure in Korea. At first, we describe the existing optical access networks and network architecture briefly. Secondly we investigate the cost of building optical access networks by modeling cost functions on AON and PON structure which based on Ethernet protocol, and analyze two different network architectures according to different deployment scenarios: Urban, small town, rural. Finally we suggest the economic and best solution with PON structure to optimize to optical access environment of KT.

  11. Multiparameter Estimation in Networked Quantum Sensors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Proctor, Timothy J.; Knott, Paul A.; Dunningham, Jacob A.

    We introduce a general model for a network of quantum sensors, and we use this model to consider the question: When can entanglement between the sensors, and/or global measurements, enhance the precision with which the network can measure a set of unknown parameters? We rigorously answer this question by presenting precise theorems proving that for a broad class of problems there is, at most, a very limited intrinsic advantage to using entangled states or global measurements. Moreover, for many estimation problems separable states and local measurements are optimal, and can achieve the ultimate quantum limit on the estimation uncertainty. Thismore » immediately implies that there are broad conditions under which simultaneous estimation of multiple parameters cannot outperform individual, independent estimations. Our results apply to any situation in which spatially localized sensors are unitarily encoded with independent parameters, such as when estimating multiple linear or non-linear optical phase shifts in quantum imaging, or when mapping out the spatial profile of an unknown magnetic field. We conclude by showing that entangling the sensors can enhance the estimation precision when the parameters of interest are global properties of the entire network.« less

  12. Maximizing the Spread of Influence via Generalized Degree Discount.

    PubMed

    Wang, Xiaojie; Zhang, Xue; Zhao, Chengli; Yi, Dongyun

    2016-01-01

    It is a crucial and fundamental issue to identify a small subset of influential spreaders that can control the spreading process in networks. In previous studies, a degree-based heuristic called DegreeDiscount has been shown to effectively identify multiple influential spreaders and has severed as a benchmark method. However, the basic assumption of DegreeDiscount is not adequate, because it treats all the nodes equally without any differences. To consider a general situation in real world networks, a novel heuristic method named GeneralizedDegreeDiscount is proposed in this paper as an effective extension of original method. In our method, the status of a node is defined as a probability of not being influenced by any of its neighbors, and an index generalized discounted degree of one node is presented to measure the expected number of nodes it can influence. Then the spreaders are selected sequentially upon its generalized discounted degree in current network. Empirical experiments are conducted on four real networks, and the results show that the spreaders identified by our approach are more influential than several benchmark methods. Finally, we analyze the relationship between our method and three common degree-based methods.

  13. Maximizing the Spread of Influence via Generalized Degree Discount

    PubMed Central

    Wang, Xiaojie; Zhang, Xue; Zhao, Chengli; Yi, Dongyun

    2016-01-01

    It is a crucial and fundamental issue to identify a small subset of influential spreaders that can control the spreading process in networks. In previous studies, a degree-based heuristic called DegreeDiscount has been shown to effectively identify multiple influential spreaders and has severed as a benchmark method. However, the basic assumption of DegreeDiscount is not adequate, because it treats all the nodes equally without any differences. To consider a general situation in real world networks, a novel heuristic method named GeneralizedDegreeDiscount is proposed in this paper as an effective extension of original method. In our method, the status of a node is defined as a probability of not being influenced by any of its neighbors, and an index generalized discounted degree of one node is presented to measure the expected number of nodes it can influence. Then the spreaders are selected sequentially upon its generalized discounted degree in current network. Empirical experiments are conducted on four real networks, and the results show that the spreaders identified by our approach are more influential than several benchmark methods. Finally, we analyze the relationship between our method and three common degree-based methods. PMID:27732681

  14. Multiparameter Estimation in Networked Quantum Sensors

    DOE PAGES

    Proctor, Timothy J.; Knott, Paul A.; Dunningham, Jacob A.

    2018-02-21

    We introduce a general model for a network of quantum sensors, and we use this model to consider the question: When can entanglement between the sensors, and/or global measurements, enhance the precision with which the network can measure a set of unknown parameters? We rigorously answer this question by presenting precise theorems proving that for a broad class of problems there is, at most, a very limited intrinsic advantage to using entangled states or global measurements. Moreover, for many estimation problems separable states and local measurements are optimal, and can achieve the ultimate quantum limit on the estimation uncertainty. Thismore » immediately implies that there are broad conditions under which simultaneous estimation of multiple parameters cannot outperform individual, independent estimations. Our results apply to any situation in which spatially localized sensors are unitarily encoded with independent parameters, such as when estimating multiple linear or non-linear optical phase shifts in quantum imaging, or when mapping out the spatial profile of an unknown magnetic field. We conclude by showing that entangling the sensors can enhance the estimation precision when the parameters of interest are global properties of the entire network.« less

  15. Blocking performance of the hose model and the pipe model for VPN service provisioning over WDM optical networks

    NASA Astrophysics Data System (ADS)

    Wang, Haibo; Swee Poo, Gee

    2004-08-01

    We study the provisioning of virtual private network (VPN) service over WDM optical networks. For this purpose, we investigate the blocking performance of the hose model versus the pipe model for the provisioning. Two techniques are presented: an analytical queuing model and a discrete event simulation. The queuing model is developed from the multirate reduced-load approximation technique. The simulation is done with the OPNET simulator. Several experimental situations were used. The blocking probabilities calculated from the two approaches show a close match, indicating that the multirate reduced-load approximation technique is capable of predicting the blocking performance for the pipe model and the hose model in WDM networks. A comparison of the blocking behavior of the two models shows that the hose model has superior blocking performance as compared with pipe model. By and large, the blocking probability of the hose model is better than that of the pipe model by a few orders of magnitude, particularly at low load regions. The flexibility of the hose model allowing for the sharing of resources on a link among all connections accounts for its superior performance.

  16. A discrete mathematical model applied to genetic regulation and metabolic networks.

    PubMed

    Asenjo, A J; Ramirez, P; Rapaport, I; Aracena, J; Goles, E; Andrews, B A

    2007-03-01

    This paper describes the use of a discrete mathematical model to represent the basic mechanisms of regulation of the bacteria E. coli in batch fermentation. The specific phenomena studied were the changes in metabolism and genetic regulation when the bacteria use three different carbon substrates (glucose, glycerol, and acetate). The model correctly predicts the behavior of E. coli vis-à-vis substrate mixtures. In a mixture of glucose, glycerol, and acetate, it prefers glucose, then glycerol, and finally acetate. The model included 67 nodes; 28 were genes, 20 enzymes, and 19 regulators/biochemical compounds. The model represents both the genetic regulation and metabolic networks in an inrtegrated form, which is how they function biologically. This is one of the first attempts to include both of these networks in one model. Previously, discrete mathematical models were used only to describe genetic regulation networks. The study of the network dynamics generated 8 (2(3)) fixed points, one for each nutrient configuration (substrate mixture) in the medium. The fixed points of the discrete model reflect the phenotypes described. Gene expression and the patterns of the metabolic fluxes generated are described accurately. The activation of the gene regulation network depends basically on the presence of glucose and glycerol. The model predicts the behavior when mixed carbon sources are utilized as well as when there is no carbon source present. Fictitious jokers (Joker1, Joker2, and Repressor SdhC) had to be created to control 12 genes whose regulation mechanism is unknown, since glycerol and glucose do not act directly on the genes. The approach presented in this paper is particularly useful to investigate potential unknown gene regulation mechanisms; such a novel approach can also be used to describe other gene regulation situations such as the comparison between non-recombinant and recombinant yeast strain, producing recombinant proteins, presently under investigation in our group.

  17. Calculation of Crystallographic Texture of BCC Steels During Cold Rolling

    NASA Astrophysics Data System (ADS)

    Das, Arpan

    2017-05-01

    BCC alloys commonly tend to develop strong fibre textures and often represent as isointensity diagrams in φ 1 sections or by fibre diagrams. Alpha fibre in bcc steels is generally characterised by <110> crystallographic axis parallel to the rolling direction. The objective of present research is to correlate carbon content, carbide dispersion, rolling reduction, Euler angles (ϕ) (when φ 1 = 0° and φ 2 = 45° along alpha fibre) and the resulting alpha fibre texture orientation intensity. In the present research, Bayesian neural computation has been employed to correlate these and compare with the existing feed-forward neural network model comprehensively. Excellent match to the measured texture data within the bounding box of texture training data set has been already predicted through the feed-forward neural network model by other researchers. Feed-forward neural network prediction outside the bounds of training texture data showed deviations from the expected values. Currently, Bayesian computation has been similarly applied to confirm that the predictions are reasonable in the context of basic metallurgical principles, and matched better outside the bounds of training texture data set than the reported feed-forward neural network. Bayesian computation puts error bars on predicted values and allows significance of each individual parameters to be estimated. Additionally, it is also possible by Bayesian computation to estimate the isolated influence of particular variable such as carbon concentration, which exactly cannot in practice be varied independently. This shows the ability of the Bayesian neural network to examine the new phenomenon in situations where the data cannot be accessed through experiments.

  18. Application of bayesian networks to real-time flood risk estimation

    NASA Astrophysics Data System (ADS)

    Garrote, L.; Molina, M.; Blasco, G.

    2003-04-01

    This paper presents the application of a computational paradigm taken from the field of artificial intelligence - the bayesian network - to model the behaviour of hydrologic basins during floods. The final goal of this research is to develop representation techniques for hydrologic simulation models in order to define, develop and validate a mechanism, supported by a software environment, oriented to build decision models for the prediction and management of river floods in real time. The emphasis is placed on providing decision makers with tools to incorporate their knowledge of basin behaviour, usually formulated in terms of rainfall-runoff models, in the process of real-time decision making during floods. A rainfall-runoff model is only a step in the process of decision making. If a reliable rainfall forecast is available and the rainfall-runoff model is well calibrated, decisions can be based mainly on model results. However, in most practical situations, uncertainties in rainfall forecasts or model performance have to be incorporated in the decision process. The computation paradigm adopted for the simulation of hydrologic processes is the bayesian network. A bayesian network is a directed acyclic graph that represents causal influences between linked variables. Under this representation, uncertain qualitative variables are related through causal relations quantified with conditional probabilities. The solution algorithm allows the computation of the expected probability distribution of unknown variables conditioned to the observations. An approach to represent hydrologic processes by bayesian networks with temporal and spatial extensions is presented in this paper, together with a methodology for the development of bayesian models using results produced by deterministic hydrologic simulation models

  19. Fast algorithm for automatically computing Strahler stream order

    USGS Publications Warehouse

    Lanfear, Kenneth J.

    1990-01-01

    An efficient algorithm was developed to determine Strahler stream order for segments of stream networks represented in a Geographic Information System (GIS). The algorithm correctly assigns Strahler stream order in topologically complex situations such as braided streams and multiple drainage outlets. Execution time varies nearly linearly with the number of stream segments in the network. This technique is expected to be particularly useful for studying the topology of dense stream networks derived from digital elevation model data.

  20. Bio-Inspired Stretchable Network-Based Intelligent Composites

    DTIC Science & Technology

    2012-05-03

    on par with that of lead zirconate titanate ( PZT ). This shows that the BSPT piezo-transducer has the potential to function in ultrasonic situations as...well as the PZTs typically used As a final test, the full network was used, with the same data acquisition computer, designed for PZT - based networks...ality of BSPT in SHM systems. These experiments indicate that BSPT has function- ality on par with PZT -5A and can simply replace the PZT in existing

  1. Networking for applied field epidemiology - Eastern Mediterranean Public Health Network (EMPHNET) Conference 2011.

    PubMed

    Al Nsour, M; Kaiser, R

    2011-12-01

    On the occasion of the second Eastern Mediterranean Public Health Network (EMPHNET) conference that was held from 6-9 December 2011 in Sharm Al Sheikh, Egypt, this article introduces EMPHNET and its role to link Field Epidemiology Training Programs (FETP) in the region. The paper briefly describes the changing epidemiology situation in the region to illustrate the urgent need to strengthen public health systems and to build up the epidemiologist workforce.

  2. Communication: Analysing kinetic transition networks for rare events.

    PubMed

    Stevenson, Jacob D; Wales, David J

    2014-07-28

    The graph transformation approach is a recently proposed method for computing mean first passage times, rates, and committor probabilities for kinetic transition networks. Here we compare the performance to existing linear algebra methods, focusing on large, sparse networks. We show that graph transformation provides a much more robust framework, succeeding when numerical precision issues cause the other methods to fail completely. These are precisely the situations that correspond to rare event dynamics for which the graph transformation was introduced.

  3. Walk-based measure of balance in signed networks: Detecting lack of balance in social networks

    NASA Astrophysics Data System (ADS)

    Estrada, Ernesto; Benzi, Michele

    2014-10-01

    There is a longstanding belief that in social networks with simultaneous friendly and hostile interactions (signed networks) there is a general tendency to a global balance. Balance represents a state of the network with a lack of contentious situations. Here we introduce a method to quantify the degree of balance of any signed (social) network. It accounts for the contribution of all signed cycles in the network and gives, in agreement with empirical evidence, more weight to the shorter cycles than to the longer ones. We found that, contrary to what is generally believed, many signed social networks, in particular very large directed online social networks, are in general very poorly balanced. We also show that unbalanced states can be changed by tuning the weights of the social interactions among the agents in the network.

  4. Analysis of an algorithm for distributed recognition and accountability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ko, C.; Frincke, D.A.; Goan, T. Jr.

    1993-08-01

    Computer and network systems are available to attacks. Abandoning the existing huge infrastructure of possibly-insecure computer and network systems is impossible, and replacing them by totally secure systems may not be feasible or cost effective. A common element in many attacks is that a single user will often attempt to intrude upon multiple resources throughout a network. Detecting the attack can become significantly easier by compiling and integrating evidence of such intrusion attempts across the network rather than attempting to assess the situation from the vantage point of only a single host. To solve this problem, we suggest an approachmore » for distributed recognition and accountability (DRA), which consists of algorithms which ``process,`` at a central location, distributed and asynchronous ``reports`` generated by computers (or a subset thereof) throughout the network. Our highest-priority objectives are to observe ways by which an individual moves around in a network of computers, including changing user names to possibly hide his/her true identity, and to associate all activities of multiple instance of the same individual to the same network-wide user. We present the DRA algorithm and a sketch of its proof under an initial set of simplifying albeit realistic assumptions. Later, we relax these assumptions to accommodate pragmatic aspects such as missing or delayed ``reports,`` clock slew, tampered ``reports,`` etc. We believe that such algorithms will have widespread applications in the future, particularly in intrusion-detection system.« less

  5. The game of go as a complex network

    NASA Astrophysics Data System (ADS)

    Georgeot, B.; Giraud, O.

    2012-03-01

    We study the game of go from a complex network perspective. We construct a directed network using a suitable definition of tactical moves including local patterns, and study this network for different datasets of professional and amateur games. The move distribution follows Zipf's law and the network is scale free, with statistical peculiarities different from other real directed networks, such as, e.g., the World Wide Web. These specificities reflect in the outcome of ranking algorithms applied to it. The fine study of the eigenvalues and eigenvectors of matrices used by the ranking algorithms singles out certain strategic situations. Our results should pave the way to a better modelization of board games and other types of human strategic scheming.

  6. Preservice Teachers' Social Networking Use, Concerns, and Educational Possibilities: Trends from 2008 to 2012

    ERIC Educational Resources Information Center

    Hughes, Joan E.; Ko, Yujung; Lim, Mihyun; Liu, Sa

    2015-01-01

    This four-year, cross-sectional study, situated in one U.S. university, investigated 206 preservice teachers' use of social network services (SNS) in teacher preparation and their disposition toward using it in their future teaching. Using descriptive survey methodology, results revealed nearly all preservice teachers used a general SNS (e.g.,…

  7. Mobile Tracking and Location Awareness in Disaster Relief and Humanitarian Assistance Situations

    DTIC Science & Technology

    2012-09-01

    establishing mobile ad - hoc networks. Smartphones also have accelerometers that are used to detect any motion by the device. Furthermore, almost every...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words...Picture, Situational Awareness 15. NUMBER OF PAGES 55 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY

  8. Type D personality, stress coping strategies and self-efficacy as predictors of Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Czuczwar, Stanisław Jerzy

    2017-07-01

    Recently, Facebook has become one of the most popular social networking sites. People use it more and more often. A number of studies have recently addressed the issue of excessive Facebook use, showing this phenomenon to be a spreading problem. The main aim of the present study was to examine whether Type D personality, self-efficacy and coping strategies are related to Facebook intrusion. The participants were 882 students of Polish universities, all of them Facebook users (72% women, mean age: 22.25 years, SD =2.06). We used the Facebook Intrusion Questionnaire, the Facebook Intensity Scale, the General Self-Efficacy Scale, the Coping Inventory for Stressful Situations, and the Type D Scale. We applied the pen-and-paper procedure. Our results indicate that emotion-oriented and avoidance-oriented strategies of coping in stressful situations are predictors of Facebook intrusion and Facebook intensity. The relations between both Facebook intrusion and intensity and social inhibition are significant only when emotion-oriented coping strategy is controlled. The knowledge of whether coping strategies in stressful situations, such as focus on emotions or avoidance, are related to Facebook intrusion might be useful for clinical purposes. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  9. Interaction of compass sensing and object-motion detection in the locust central complex.

    PubMed

    Bockhorst, Tobias; Homberg, Uwe

    2017-07-01

    Goal-directed behavior is often complicated by unpredictable events, such as the appearance of a predator during directed locomotion. This situation requires adaptive responses like evasive maneuvers followed by subsequent reorientation and course correction. Here we study the possible neural underpinnings of such a situation in an insect, the desert locust. As in other insects, its sense of spatial orientation strongly relies on the central complex, a group of midline brain neuropils. The central complex houses sky compass cells that signal the polarization plane of skylight and thus indicate the animal's steering direction relative to the sun. Most of these cells additionally respond to small moving objects that drive fast sensory-motor circuits for escape. Here we investigate how the presentation of a moving object influences activity of the neurons during compass signaling. Cells responded in one of two ways: in some neurons, responses to the moving object were simply added to the compass response that had adapted during continuous stimulation by stationary polarized light. By contrast, other neurons disadapted, i.e., regained their full compass response to polarized light, when a moving object was presented. We propose that the latter case could help to prepare for reorientation of the animal after escape. A neuronal network based on central-complex architecture can explain both responses by slight changes in the dynamics and amplitudes of adaptation to polarized light in CL columnar input neurons of the system. NEW & NOTEWORTHY Neurons of the central complex in several insects signal compass directions through sensitivity to the sky polarization pattern. In locusts, these neurons also respond to moving objects. We show here that during polarized-light presentation, responses to moving objects override their compass signaling or restore adapted inhibitory as well as excitatory compass responses. A network model is presented to explain the variations of these responses that likely serve to redirect flight or walking following evasive maneuvers. Copyright © 2017 the American Physiological Society.

  10. Solar radiation data sources, applications, and network design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    A prerequisite to considering solar energy projects is to determine the requirements for information about solar radiation to apply to possible projects. This report offers techniques to help the reader specify requirements in terms of solar radiation data and information currently available, describes the past and present programs to record and present information to be used for most requirements, presents courses of action to help the user meet his needs for information, lists sources of solar radiation data and presents the problems, costs, benefits and responsibilities of programs to acquire additional solar radiation data. Extensive background information is provided aboutmore » solar radiation data and its use. Specialized information about recording, collecting, processing, storing and disseminating solar radiation data is given. Several Appendices are included which provide reference material for special situations.« less

  11. Research on the Integration of IT Network Technology and TV Production and Broadcasting System

    NASA Astrophysics Data System (ADS)

    Zhang, Wenqing

    2017-12-01

    In recent years, based on the development of China’s economy and the progress of science and technology, China’s TV industry has made great progress and provided a new platform for residents to understand the social situation. In this situation, in order to protect the efficiency of the TV system and the steady improvement on quality, technical staff have strengthened the rational use of IT technology, and as a basis to promote the sound of television production system. Based on this, this paper focuses on the connotation of IT network technology, and discusses the integration of the design and TV production system, hoping to realize the sustainable development of China’s TV industry.

  12. Study of network resource allocation based on market and game theoretic mechanism

    NASA Astrophysics Data System (ADS)

    Liu, Yingmei; Wang, Hongwei; Wang, Gang

    2004-04-01

    We work on the network resource allocation issue concerning network management system function based on market-oriented mechanism. The scheme is to model the telecommunication network resources as trading goods in which the various network components could be owned by different competitive, real-world entities. This is a multidisciplinary framework concentrating on the similarity between resource allocation in network environment and the market mechanism in economic theory. By taking an economic (market-based and game theoretic) approach in routing of communication network, we study the dynamic behavior under game-theoretic framework in allocating network resources. Based on the prior work of Gibney and Jennings, we apply concepts of utility and fitness to the market mechanism with an intention to close the gap between experiment environment and real world situation.

  13. Communication networks for the tactical edge

    NASA Astrophysics Data System (ADS)

    Evans, Joseph B.; Pennington, Steven G.; Ewy, Benjamin J.

    2017-04-01

    Information at the tactical level is increasingly critical in today's conflicts. The proliferation of commercial tablets and smart phones has created the ability for extensive information sharing at the tactical edge, beyond the traditional tactical voice communications and location information. This is particularly the case in Gray Zone conflicts, in which tactical decision making and actions are intertwined with information sharing and exploitation. Networking of tactical devices is the key to this information sharing. In this work, we detail and analyze two network models at different parts of the Gray Zone spectrum, and explore a number of networking options including Named Data Networking. We also compare networking approaches in a variety of realistic operating environments. Our results show that Named Data Networking is a good match for the disrupted networking environments found in many tactical situations

  14. Quantifying capability of a local seismic network in terms of locations and focal mechanism solutions of weak earthquakes

    NASA Astrophysics Data System (ADS)

    Fojtíková, Lucia; Kristeková, Miriam; Málek, Jiří; Sokos, Efthimios; Csicsay, Kristián; Zahradník, Jiří

    2016-01-01

    Extension of permanent seismic networks is usually governed by a number of technical, economic, logistic, and other factors. Planned upgrade of the network can be justified by theoretical assessment of the network capability in terms of reliable estimation of the key earthquake parameters (e.g., location and focal mechanisms). It could be useful not only for scientific purposes but also as a concrete proof during the process of acquisition of the funding needed for upgrade and operation of the network. Moreover, the theoretical assessment can also identify the configuration where no improvement can be achieved with additional stations, establishing a tradeoff between the improvement and additional expenses. This paper presents suggestion of a combination of suitable methods and their application to the Little Carpathians local seismic network (Slovakia, Central Europe) monitoring epicentral zone important from the point of seismic hazard. Three configurations of the network are considered: 13 stations existing before 2011, 3 stations already added in 2011, and 7 new planned stations. Theoretical errors of the relative location are estimated by a new method, specifically developed in this paper. The resolvability of focal mechanisms determined by waveform inversion is analyzed by a recent approach based on 6D moment-tensor error ellipsoids. We consider potential seismic events situated anywhere in the studied region, thus enabling "mapping" of the expected errors. Results clearly demonstrate that the network extension remarkably decreases the errors, mainly in the planned 23-station configuration. The already made three-station extension of the network in 2011 allowed for a few real data examples. Free software made available by the authors enables similar application in any other existing or planned networks.

  15. Acting discursively: the development of UK organic food and farming policy networks.

    PubMed

    TOMLINSON, Isobel Jane

    2010-01-01

    This paper documents the early evolution of UK organic food and farming policy networks and locates this empirical focus in a theoretical context concerned with understanding the contemporary policy-making process. While policy networks have emerged as a widely acknowledged empirical manifestation of governance, debate continues as to the concept's explanatory utility and usefulness in situations of network and policy transformation since, historically, policy networks have been applied to "static" circumstances. Recognizing this criticism, and in drawing on an interpretivist perspective, this paper sees policy networks as enacted by individual actors whose beliefs and actions construct the nature of the network. It seeks to make links between the characteristics of the policy network and the policy outcomes through the identification of discursively constructed "storylines" that form a tool for consensus building in networks. This study analyses the functioning of the organic policy networks through the discursive actions of policy-network actors.

  16. High fidelity wireless network evaluation for heterogeneous cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Ding, Lei; Sagduyu, Yalin; Yackoski, Justin; Azimi-Sadjadi, Babak; Li, Jason; Levy, Renato; Melodia, Tammaso

    2012-06-01

    We present a high fidelity cognitive radio (CR) network emulation platform for wireless system tests, measure- ments, and validation. This versatile platform provides the configurable functionalities to control and repeat realistic physical channel effects in integrated space, air, and ground networks. We combine the advantages of scalable simulation environment with reliable hardware performance for high fidelity and repeatable evaluation of heterogeneous CR networks. This approach extends CR design only at device (software-defined-radio) or lower-level protocol (dynamic spectrum access) level to end-to-end cognitive networking, and facilitates low-cost deployment, development, and experimentation of new wireless network protocols and applications on frequency- agile programmable radios. Going beyond the channel emulator paradigm for point-to-point communications, we can support simultaneous transmissions by network-level emulation that allows realistic physical-layer inter- actions between diverse user classes, including secondary users, primary users, and adversarial jammers in CR networks. In particular, we can replay field tests in a lab environment with real radios perceiving and learning the dynamic environment thereby adapting for end-to-end goals over distributed spectrum coordination channels that replace the common control channel as a single point of failure. CR networks offer several dimensions of tunable actions including channel, power, rate, and route selection. The proposed network evaluation platform is fully programmable and can reliably evaluate the necessary cross-layer design solutions with configurable op- timization space by leveraging the hardware experiments to represent the realistic effects of physical channel, topology, mobility, and jamming on spectrum agility, situational awareness, and network resiliency. We also provide the flexibility to scale up the test environment by introducing virtual radios and establishing seamless signal-level interactions with real radios. This holistic wireless evaluation approach supports a large-scale, het- erogeneous, and dynamic CR network architecture and allows developing cross-layer network protocols under high fidelity, repeatable, and scalable wireless test scenarios suitable for heterogeneous space, air, and ground networks.

  17. Optical Analysis Of The Vacuum Arc Plasma Generated In Cup-Shape Contacts

    NASA Astrophysics Data System (ADS)

    Pavelescu, G.; Pavelescu, D.; Dumitrescu, G.; Anghelita, P.; Gherendi, F.

    2007-04-01

    In this paper are presented the results of the optical analysis on the rotating arc plasma, generated in the vacuum low voltage circuit breaker with cup-shaped contacts. An adequate experimental setup was used for single shot time and spatial resolved spectroscopy in order to analyze the evolution of the vacuum arc plasma. Different current interruption situations are correlated with plasma spectral diagnosis. The study is aimed to contribute to a better understanding of the complex phenomena that take place in the interruption process of high currents that appears in the short-circuit regime of electrical networks.

  18. Continuous country-wide rainfall observation using a large network of commercial microwave links: Challenges, solutions and applications

    NASA Astrophysics Data System (ADS)

    Chwala, Christian; Boose, Yvonne; Smiatek, Gerhard; Kunstmann, Harald

    2017-04-01

    Commercial microwave link (CML) networks have proven to be a valuable source for rainfall information over the last years. However, up to now, analysis of CML data was always limited to certain snapshots of data for historic periods due to limited data access. With the real-time availability of CML data in Germany (Chwala et al. 2016) this situation has improved significantly. We are continuously acquiring and processing data from 3000 CMLs in Germany in near real-time with one minute temporal resolution. Currently the data acquisition system is extended to 10000 CMLs so that the whole of Germany is covered and a continuous country-wide rainfall product can be provided. In this contribution we will elaborate on the challenges and solutions regarding data acquisition, data management and robust processing. We will present the details of our data acquisition system that we run operationally at the network of the CML operator Ericsson Germany to solve the problem of limited data availability. Furthermore we will explain the implementation of our data base, its web-frontend for easy data access and present our data processing algorithms. Finally we will showcase an application of our data in hydrological modeling and its potential usage to improve radar QPE. Bibliography: Chwala, C., Keis, F., and Kunstmann, H.: Real-time data acquisition of commercial microwave link networks for hydrometeorological applications, Atmos. Meas. Tech., 9, 991-999, doi:10.5194/amt-9-991-2016, 2016

  19. A Human Sensor Network Framework in Support of Near Real Time Situational Geophysical Modeling

    NASA Astrophysics Data System (ADS)

    Aulov, O.; Price, A.; Smith, J. A.; Halem, M.

    2013-12-01

    The area of Disaster Management is well established among Federal Agencies such as FEMA, EPA, NOAA and NASA. These agencies have well formulated frameworks for response and mitigation based on near real time satellite and conventional observing networks for assimilation into geophysical models. Forecasts from these models are used to communicate with emergency responders and the general public. More recently, agencies have started using social media to broadcast warnings and alerts to potentially affected communities. In this presentation, we demonstrate the added benefits of mining and assimilating the vast amounts of social media data available from heterogeneous hand held devices and social networks into established operational geophysical modeling frameworks as they apply to the five cornerstones of disaster management - Prevention, Mitigation, Preparedness, Response and Recovery. Often, in situations of extreme events, social media provide the earliest notification of adverse extreme events. However, various forms of social media data also can provide useful geolocated and time stamped in situ observations, complementary to directly sensed conventional observations. We use the concept of a Human Sensor Network where one views social media users as carrying field deployed "sensors" whose posts are the remotely "sensed instrument measurements.' These measurements can act as 'station data' providing the resolution and coverage needed for extreme event specific modeling and validation. Here, we explore the use of social media through the use of a Human Sensor Network (HSN) approach as another data input source for assimilation into geophysical models. Employing the HSN paradigm can provide useful feedback in near real-time, but presents software challenges for rapid access, quality filtering and transforming massive social media data into formats consistent with the operational models. As a use case scenario, we demonstrate the value of HSN for disaster management and mitigation in the wake of Hurricane Sandy. Hurricane Sandy devastated multiple regions along the Atlantic coast causing damage estimated at $68 billion to the Eastern United States. We developed a framework consisting of a set of APIs that harvested over 8 million tweets and 370 thousand Instagram photos mentioning Hurricane Sandy over 4 days from Oct. 29 -Nov. 1, 2012. The flexibility of the framework allows for easy integration with such geophysical models such as GNOME, SLOSH, HySplit, and WRF. We use ElasticSearch, a RESTful, distributed search engine based on Apache Lucene, as the underlying platform for indexing, filtering and extracting feature content from the Twitter and Instagram metadata. We identify microscale events and visually present time varying correlation results of forecasts from the NOAA operational surge model SLOSH with those obtained from our SM database on a Google Earth based map. We are exploring the benefits of our framework to illuminate gaps in our understanding of the use of such data in geophysical models.

  20. A scenario planning approach for disasters on Swiss road network

    NASA Astrophysics Data System (ADS)

    Mendes, G. A.; Axhausen, K. W.; Andrade, J. S.; Herrmann, H. J.

    2014-05-01

    We study a vehicular traffic scenario on Swiss roads in an emergency situation, calculating how sequentially roads block due to excessive traffic load until global collapse (gridlock) occurs and in this way displays the fragilities of the system. We used a database from Bundesamt für Raumentwicklung which contains length and maximum allowed speed of all roads in Switzerland. The present work could be interesting for government agencies in planning and managing for emergency logistics for a country or a big city. The model used to generate the flux on the Swiss road network was proposed by Mendes et al. [Physica A 391, 362 (2012)]. It is based on the conservation of the number of vehicles and allows for an easy and fast way to follow the formation of traffic jams in large systems. We also analyze the difference between a nonlinear and a linear model and the distribution of fluxes on the Swiss road.

  1. A semantic autonomous video surveillance system for dense camera networks in Smart Cities.

    PubMed

    Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M; Carro, Belén; Sánchez-Esguevillas, Antonio

    2012-01-01

    This paper presents a proposal of an intelligent video surveillance system able to detect and identify abnormal and alarming situations by analyzing object movement. The system is designed to minimize video processing and transmission, thus allowing a large number of cameras to be deployed on the system, and therefore making it suitable for its usage as an integrated safety and security solution in Smart Cities. Alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. This means that the system employs a high-level conceptual language easy to understand for human operators, capable of raising enriched alarms with descriptions of what is happening on the image, and to automate reactions to them such as alerting the appropriate emergency services using the Smart City safety network.

  2. Markov logic network based complex event detection under uncertainty

    NASA Astrophysics Data System (ADS)

    Lu, Jingyang; Jia, Bin; Chen, Genshe; Chen, Hua-mei; Sullivan, Nichole; Pham, Khanh; Blasch, Erik

    2018-05-01

    In a cognitive reasoning system, the four-stage Observe-Orient-Decision-Act (OODA) reasoning loop is of interest. The OODA loop is essential for the situational awareness especially in heterogeneous data fusion. Cognitive reasoning for making decisions can take advantage of different formats of information such as symbolic observations, various real-world sensor readings, or the relationship between intelligent modalities. Markov Logic Network (MLN) provides mathematically sound technique in presenting and fusing data at multiple levels of abstraction, and across multiple intelligent sensors to conduct complex decision-making tasks. In this paper, a scenario about vehicle interaction is investigated, in which uncertainty is taken into consideration as no systematic approaches can perfectly characterize the complex event scenario. MLNs are applied to the terrestrial domain where the dynamic features and relationships among vehicles are captured through multiple sensors and information sources regarding the data uncertainty.

  3. Internal services simulation control in 220/110kV power transformer station Mintia

    NASA Astrophysics Data System (ADS)

    Ciulica, D.; Rob, R.

    2018-01-01

    The main objectives in developing the electric transport and distribution networks infrastructure are satisfying the electric energy demand, ensuring the continuity of supply to customers, minimizing electricity losses in the transmission and distribution networks of public interest. This paper presents simulations in functioning of the internal services system 400/230 V ac in the 220/110 kV power transformer station Mintia. Using simulations in Visual Basic, the following premises are taken into consideration. All the ac consumers of the 220/110 kV power transformer station Mintia will be supplied by three 400/230 V transformers for internal services which can mutual reserve. In case of damaging at one transformer, the others are able to assume the entire consumption using automatic release of reserves. The simulation program studies three variants in which the continuity of supply to customers are ensured. As well, by simulations, all the functioning situations are analyzed in detail.

  4. Advanced visualization platform for surgical operating room coordination: distributed video board system.

    PubMed

    Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas

    2006-06-01

    One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.

  5. A Semantic Autonomous Video Surveillance System for Dense Camera Networks in Smart Cities

    PubMed Central

    Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M.; Carro, Belén; Sánchez-Esguevillas, Antonio

    2012-01-01

    This paper presents a proposal of an intelligent video surveillance system able to detect and identify abnormal and alarming situations by analyzing object movement. The system is designed to minimize video processing and transmission, thus allowing a large number of cameras to be deployed on the system, and therefore making it suitable for its usage as an integrated safety and security solution in Smart Cities. Alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. This means that the system employs a high-level conceptual language easy to understand for human operators, capable of raising enriched alarms with descriptions of what is happening on the image, and to automate reactions to them such as alerting the appropriate emergency services using the Smart City safety network. PMID:23112607

  6. An Emotional ANN (EANN) approach to modeling rainfall-runoff process

    NASA Astrophysics Data System (ADS)

    Nourani, Vahid

    2017-01-01

    This paper presents the first hydrological implementation of Emotional Artificial Neural Network (EANN), as a new generation of Artificial Intelligence-based models for daily rainfall-runoff (r-r) modeling of the watersheds. Inspired by neurophysiological form of brain, in addition to conventional weights and bias, an EANN includes simulated emotional parameters aimed at improving the network learning process. EANN trained by a modified version of back-propagation (BP) algorithm was applied to single and multi-step-ahead runoff forecasting of two watersheds with two distinct climatic conditions. Also to evaluate the ability of EANN trained by smaller training data set, three data division strategies with different number of training samples were considered for the training purpose. The overall comparison of the obtained results of the r-r modeling indicates that the EANN could outperform the conventional feed forward neural network (FFNN) model up to 13% and 34% in terms of training and verification efficiency criteria, respectively. The superiority of EANN over classic ANN is due to its ability to recognize and distinguish dry (rainless days) and wet (rainy days) situations using hormonal parameters of the artificial emotional system.

  7. Development of dynamic Bayesian models for web application test management

    NASA Astrophysics Data System (ADS)

    Azarnova, T. V.; Polukhin, P. V.; Bondarenko, Yu V.; Kashirina, I. L.

    2018-03-01

    The mathematical apparatus of dynamic Bayesian networks is an effective and technically proven tool that can be used to model complex stochastic dynamic processes. According to the results of the research, mathematical models and methods of dynamic Bayesian networks provide a high coverage of stochastic tasks associated with error testing in multiuser software products operated in a dynamically changing environment. Formalized representation of the discrete test process as a dynamic Bayesian model allows us to organize the logical connection between individual test assets for multiple time slices. This approach gives an opportunity to present testing as a discrete process with set structural components responsible for the generation of test assets. Dynamic Bayesian network-based models allow us to combine in one management area individual units and testing components with different functionalities and a direct influence on each other in the process of comprehensive testing of various groups of computer bugs. The application of the proposed models provides an opportunity to use a consistent approach to formalize test principles and procedures, methods used to treat situational error signs, and methods used to produce analytical conclusions based on test results.

  8. Energy-Aware Topology Control Strategy for Human-Centric Wireless Sensor Networks

    PubMed Central

    Meseguer, Roc; Molina, Carlos; Ochoa, Sergio F.; Santos, Rodrigo

    2014-01-01

    The adoption of mobile and ubiquitous solutions that involve participatory or opportunistic sensing increases every day. This situation has highlighted the relevance of optimizing the energy consumption of these solutions, because their operation depends on the devices' battery lifetimes. This article presents a study that intends to understand how the prediction of topology control messages in human-centric wireless sensor networks can be used to help reduce the energy consumption of the participating devices. In order to do that, five research questions have been defined and a study based on simulations was conducted to answer these questions. The obtained results help identify suitable mobile computing scenarios where the prediction of topology control messages can be used to save energy of the network nodes. These results also allow estimating the percentage of energy saving that can be expected, according to the features of the work scenario and the participants behavior. Designers of mobile collaborative applications that involve participatory or opportunistic sensing, can take advantage of these findings to increase the autonomy of their solutions. PMID:24514884

  9. Changes in adolescents' conflict responses associated with consecutive presentation of hypothetical conflict situations.

    PubMed

    Johnson, H D; LaVoie, J C; Eggenburg, E; Mahoney, M A; Pounds, L

    2001-10-01

    The advantages of using hypothetical situations are one reason they have been widely used to examine adolescents' responses to conflict situations. One frequently used research protocol involves presenting several conflict scenarios to participants during a single session. However, in real-life situations multiple conflicts rarely occur within short periods of time, and the nature of this presentation may be associated with changes in adolescents' reports of conflict behaviors. Trend analyses of emotional, conflict goal, and conflict tactic responses from grade 8, 10, 12, and college students to consecutively presented conflict situations showed that responses were associated with presentation of the hypothetical situations. Findings revealed an increase in reports of assertive conflict behaviors and a decrease in reports of constructive conflict behaviors with successive situation presentation. Results from the current study suggest that researchers must consider trends in responses when examining findings from successive situation presentation methodologies because adolescent reports of conflict behavior may change as situation presentation proceeds. Copyright 2001 The Association for Professionals in Services for Adolescents.

  10. INL Control System Situational Awareness Technology Annual Report 2012

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gordon Rueff; Bryce Wheeler; Todd Vollmer

    The overall goal of this project is to develop an interoperable set of tools to provide a comprehensive, consistent implementation of cyber security and overall situational awareness of control and sensor network implementations. The operation and interoperability of these tools will fill voids in current technological offerings and address issues that remain an impediment to the security of control systems. This report provides an FY 2012 update on the Sophia, Mesh Mapper, Intelligent Cyber Sensor, and Data Fusion projects with respect to the year-two tasks and annual reporting requirements of the INL Control System Situational Awareness Technology report (July 2010).

  11. Content-based image exploitation for situational awareness

    NASA Astrophysics Data System (ADS)

    Gains, David

    2008-04-01

    Image exploitation is of increasing importance to the enterprise of building situational awareness from multi-source data. It involves image acquisition, identification of objects of interest in imagery, storage, search and retrieval of imagery, and the distribution of imagery over possibly bandwidth limited networks. This paper describes an image exploitation application that uses image content alone to detect objects of interest, and that automatically establishes and preserves spatial and temporal relationships between images, cameras and objects. The application features an intuitive user interface that exposes all images and information generated by the system to an operator thus facilitating the formation of situational awareness.

  12. Maintaining relationships is critical in network's success.

    PubMed

    Huerta, Timothy

    2006-01-01

    As the authors of the lead paper recognize, networks have become an increasingly popular form of organizing, both in the delivery of public services and within political arenas. A network is an arrangement of individuals and/or organizations that are linked through connections that range from informal relationships to formally agreed protocols. Networks have proved useful in addressing complex and intractable problems that require a holistic approach to identifying and implementing long-term solutions. They succeed in situations where hierarchies and "silo-based" systems have failed, and are particularly valuable in facilitating the transfer of resources and knowledge across sectoral and organizational boundaries.

  13. Assessing Group Interaction with Social Language Network Analysis

    NASA Astrophysics Data System (ADS)

    Scholand, Andrew J.; Tausczik, Yla R.; Pennebaker, James W.

    In this paper we discuss a new methodology, social language network analysis (SLNA), that combines tools from social language processing and network analysis to assess socially situated working relationships within a group. Specifically, SLNA aims to identify and characterize the nature of working relationships by processing artifacts generated with computer-mediated communication systems, such as instant message texts or emails. Because social language processing is able to identify psychological, social, and emotional processes that individuals are not able to fully mask, social language network analysis can clarify and highlight complex interdependencies between group members, even when these relationships are latent or unrecognized.

  14. An Algorithm for Critical Nodes Problem in Social Networks Based on Owen Value

    PubMed Central

    Wang, Xue-Guang

    2014-01-01

    Discovering critical nodes in social networks has many important applications. For finding out the critical nodes and considering the widespread community structure in social networks, we obtain each node's marginal contribution by Owen value. And then we can give a method for the solution of the critical node problem. We validate the feasibility and effectiveness of our method on two synthetic datasets and six real datasets. At the same time, the result obtained by using our method to analyze the terrorist network is in line with the actual situation. PMID:25006592

  15. Family group conferences in public mental health care: an exploration of opportunities.

    PubMed

    de Jong, Gideon; Schout, Gert

    2011-02-01

    Family group conferences are usually organized in youth care settings, especially in cases of (sexual) abuse of children and domestic violence. Studies on the application of family group conferences in mental health practices are scarce, let alone in a setting even more specific, such as public mental health care. The present study reports on an exploratory study on the applicability of family group conferencing in public mental health care. Findings suggest that there are six reasons to start family group conference pilots in public mental health care. First, care providers who work in public mental health care often need to deal with clients who are not motivated in seeking help. Family group conferences could yield support or provide a plan, even without the presence of the client. Second, conferences might complement the repertoire of treatment options between voluntary help and coercive treatment. Third, clients in public mental health care often have a limited network. Conferences promote involvement, as they expand and restore relationships, and generate support. Fourth, conferences could succeed both in a crisis and in other non-critical situations. Sometimes pressure is needed for clients to accept help from their network (such as in the case of an imminent eviction), while in other situations, it is required that clients are stabilized before a conference can be organized (such as in the case of a psychotic episode). Fifth, clients who have negative experiences with care agencies and their representatives might be inclined to accept a conference because these agencies act in another (modest) role. Finally, the social network could elevate the work of professionals. © 2011 The Authors. International Journal of Mental Health Nursing © 2011 Australian College of Mental Health Nurses Inc.

  16. Networking: the view from HEP

    NASA Astrophysics Data System (ADS)

    McKee, Shawn

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. National and global-scale collaborations that characterize HEP would not be feasible without ubiquitous capable networks. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. This paper will briefly discuss the history of networking in HEP, the current activities and challenges we are facing, and try to provide some understanding of where networking may be going in the next 5 to 10 years.

  17. Situation Awareness. Report of Break-Out Group 4.

    DTIC Science & Technology

    2006-10-01

    abstraction of the objects and contents, which are displayed and analysed with a visualisation tool. To get a clear picture of the situation around you do...cities, villages etc.). It is possible for other types of information to be visualised /handled similarly for network and data analysis. A good example...interesting feature of a visualisation tool concerning reliability/uncertainty might be the possibility to show/hide uncertain information. This means that

  18. MNE7 Access to the Global Commons Outcome 3 Cyber Domain. Objective 3.5 Cyber Situational Awareness. Concept of Employment for Cyber Situational Awareness Within the Global Commons Version 1.0

    DTIC Science & Technology

    2013-02-25

    such as authentication , protocols, and ‘signature’ management exist but the imposition of such techniques must be balan 15p the legal requirements...gulation, mation face onflicting pressures to keep this data secure and yet allow access by authorised users. in the sharing network should be

  19. An extreme events laboratory to provide network centric collaborative situation assessment and decision making

    NASA Astrophysics Data System (ADS)

    Panulla, Brian J.; More, Loretta D.; Shumaker, Wade R.; Jones, Michael D.; Hooper, Robert; Vernon, Jeffrey M.; Aungst, Stanley G.

    2009-05-01

    Rapid improvements in communications infrastructure and sophistication of commercial hand-held devices provide a major new source of information for assessing extreme situations such as environmental crises. In particular, ad hoc collections of humans can act as "soft sensors" to augment data collected by traditional sensors in a net-centric environment (in effect, "crowd-sourcing" observational data). A need exists to understand how to task such soft sensors, characterize their performance and fuse the data with traditional data sources. In order to quantitatively study such situations, as well as study distributed decision-making, we have developed an Extreme Events Laboratory (EEL) at The Pennsylvania State University. This facility provides a network-centric, collaborative situation assessment and decision-making capability by supporting experiments involving human observers, distributed decision making and cognition, and crisis management. The EEL spans the information chain from energy detection via sensors, human observations, signal and image processing, pattern recognition, statistical estimation, multi-sensor data fusion, visualization and analytics, and modeling and simulation. The EEL command center combines COTS and custom collaboration tools in innovative ways, providing capabilities such as geo-spatial visualization and dynamic mash-ups of multiple data sources. This paper describes the EEL and several on-going human-in-the-loop experiments aimed at understanding the new collective observation and analysis landscape.

  20. Improved representation of situational awareness within a dismounted small combat unit constructive simulation

    NASA Astrophysics Data System (ADS)

    Lee, K. David; Colony, Mike

    2011-06-01

    Modeling and simulation has been established as a cost-effective means of supporting the development of requirements, exploring doctrinal alternatives, assessing system performance, and performing design trade-off analysis. The Army's constructive simulation for the evaluation of equipment effectiveness in small combat unit operations is currently limited to representation of situation awareness without inclusion of the many uncertainties associated with real world combat environments. The goal of this research is to provide an ability to model situation awareness and decision process uncertainties in order to improve evaluation of the impact of battlefield equipment on ground soldier and small combat unit decision processes. Our Army Probabilistic Inference and Decision Engine (Army-PRIDE) system provides this required uncertainty modeling through the application of two critical techniques that allow Bayesian network technology to be applied to real-time applications. (Object-Oriented Bayesian Network methodology and Object-Oriented Inference technique). In this research, we implement decision process and situation awareness models for a reference scenario using Army-PRIDE and demonstrate its ability to model a variety of uncertainty elements, including: confidence of source, information completeness, and information loss. We also demonstrate that Army-PRIDE improves the realism of the current constructive simulation's decision processes through Monte Carlo simulation.

  1. INFORM Lab: a testbed for high-level information fusion and resource management

    NASA Astrophysics Data System (ADS)

    Valin, Pierre; Guitouni, Adel; Bossé, Eloi; Wehn, Hans; Happe, Jens

    2011-05-01

    DRDC Valcartier and MDA have created an advanced simulation testbed for the purpose of evaluating the effectiveness of Network Enabled Operations in a Coastal Wide Area Surveillance situation, with algorithms provided by several universities. This INFORM Lab testbed allows experimenting with high-level distributed information fusion, dynamic resource management and configuration management, given multiple constraints on the resources and their communications networks. This paper describes the architecture of INFORM Lab, the essential concepts of goals and situation evidence, a selected set of algorithms for distributed information fusion and dynamic resource management, as well as auto-configurable information fusion architectures. The testbed provides general services which include a multilayer plug-and-play architecture, and a general multi-agent framework based on John Boyd's OODA loop. The testbed's performance is demonstrated on 2 types of scenarios/vignettes for 1) cooperative search-and-rescue efforts, and 2) a noncooperative smuggling scenario involving many target ships and various methods of deceit. For each mission, an appropriate subset of Canadian airborne and naval platforms are dispatched to collect situation evidence, which is fused, and then used to modify the platform trajectories for the most efficient collection of further situation evidence. These platforms are fusion nodes which obey a Command and Control node hierarchy.

  2. A Cyber Situational Awareness Model for Network Administrators

    DTIC Science & Technology

    2017-03-01

    environments, the Internet of Things, artificial intelligence , and so on. As users’ data requirements grow more complex, they demand information...security of systems of interest. Further, artificial intelligence is a powerful concept in information technology. Therefore, new research should...look into how to use artificial intelligence to develop CSA. Human interaction with cyber systems is not making networks and their components safer

  3. Research Capacity-Building with New Technologies within New Communities of Practice: Reflections on the First Year of the Teacher Education Research Network

    ERIC Educational Resources Information Center

    Fowler, Zoe; Stanley, Grant; Murray, Jean; Jones, Marion; McNamara, Olwen

    2013-01-01

    This article focuses on a virtual research environment (VRE) and how it facilitated the networking of teacher educators participating in an Economic and Social Research Council-funded research capacity-building project. Using the theoretical lenses of situated learning and socio-cultural approaches to literacy, participants' ways of engaging with…

  4. Future Technology Themes: 2030 to 2060

    DTIC Science & Technology

    2013-07-01

    Rocket-Based Combined Cycle RF Radio Frequency RNA Ribonucleic Acid SA Situational Awareness SEAD Suppression of Enemy Air Defences SME...and re-routing light in information processing and optical communications ; or for processing radio signals in mobile phones [44]. UNCLASSIFIED DSTO...make use of network polymorphism technologies from 2020 onwards to create frequency -agile and adaptive14 communications links that would change network

  5. Talking and Learning Physics: Predicting Future Grades from Network Measures and Force Concept Inventory Pretest Scores

    ERIC Educational Resources Information Center

    Bruun, Jesper; Brewe, Eric

    2013-01-01

    The role of student interactions in learning situations is a foundation of sociocultural learning theory, and social network analysis can be used to quantify student relations. We discuss how self-reported student interactions can be viewed as processes of meaning making and use this to understand how quantitative measures that describe the…

  6. Decision making and preferences for acoustic signals in choice situations by female crickets.

    PubMed

    Gabel, Eileen; Kuntze, Janine; Hennig, R Matthias

    2015-08-01

    Multiple attributes usually have to be assessed when choosing a mate. Efficient choice of the best mate is complicated if the available cues are not positively correlated, as is often the case during acoustic communication. Because of varying distances of signalers, a female may be confronted with signals of diverse quality at different intensities. Here, we examined how available cues are weighted for a decision by female crickets. Two songs with different temporal patterns and/or sound intensities were presented in a choice paradigm and compared with female responses from a no-choice test. When both patterns were presented at equal intensity, preference functions became wider in choice situations compared with a no-choice paradigm. When the stimuli in two-choice tests were presented at different intensities, this effect was counteracted as preference functions became narrower compared with choice tests using stimuli of equal intensity. The weighting of intensity differences depended on pattern quality and was therefore non-linear. A simple computational model based on pattern and intensity cues reliably predicted female decisions. A comparison of processing schemes suggested that the computations for pattern recognition and directionality are performed in a network with parallel topology. However, the computational flow of information corresponded to serial processing. © 2015. Published by The Company of Biologists Ltd.

  7. Convolutional Neural Network-Based Embarrassing Situation Detection under Camera for Social Robot in Smart Homes

    PubMed Central

    Sheng, Weihua; Junior, Francisco Erivaldo Fernandes; Li, Shaobo

    2018-01-01

    Recent research has shown that the ubiquitous use of cameras and voice monitoring equipment in a home environment can raise privacy concerns and affect human mental health. This can be a major obstacle to the deployment of smart home systems for elderly or disabled care. This study uses a social robot to detect embarrassing situations. Firstly, we designed an improved neural network structure based on the You Only Look Once (YOLO) model to obtain feature information. By focusing on reducing area redundancy and computation time, we proposed a bounding-box merging algorithm based on region proposal networks (B-RPN), to merge the areas that have similar features and determine the borders of the bounding box. Thereafter, we designed a feature extraction algorithm based on our improved YOLO and B-RPN, called F-YOLO, for our training datasets, and then proposed a real-time object detection algorithm based on F-YOLO (RODA-FY). We implemented RODA-FY and compared models on our MAT social robot. Secondly, we considered six types of situations in smart homes, and developed training and validation datasets, containing 2580 and 360 images, respectively. Meanwhile, we designed three types of experiments with four types of test datasets composed of 960 sample images. Thirdly, we analyzed how a different number of training iterations affects our prediction estimation, and then we explored the relationship between recognition accuracy and learning rates. Our results show that our proposed privacy detection system can recognize designed situations in the smart home with an acceptable recognition accuracy of 94.48%. Finally, we compared the results among RODA-FY, Inception V3, and YOLO, which indicate that our proposed RODA-FY outperforms the other comparison models in recognition accuracy. PMID:29757211

  8. Convolutional Neural Network-Based Embarrassing Situation Detection under Camera for Social Robot in Smart Homes.

    PubMed

    Yang, Guanci; Yang, Jing; Sheng, Weihua; Junior, Francisco Erivaldo Fernandes; Li, Shaobo

    2018-05-12

    Recent research has shown that the ubiquitous use of cameras and voice monitoring equipment in a home environment can raise privacy concerns and affect human mental health. This can be a major obstacle to the deployment of smart home systems for elderly or disabled care. This study uses a social robot to detect embarrassing situations. Firstly, we designed an improved neural network structure based on the You Only Look Once (YOLO) model to obtain feature information. By focusing on reducing area redundancy and computation time, we proposed a bounding-box merging algorithm based on region proposal networks (B-RPN), to merge the areas that have similar features and determine the borders of the bounding box. Thereafter, we designed a feature extraction algorithm based on our improved YOLO and B-RPN, called F-YOLO, for our training datasets, and then proposed a real-time object detection algorithm based on F-YOLO (RODA-FY). We implemented RODA-FY and compared models on our MAT social robot. Secondly, we considered six types of situations in smart homes, and developed training and validation datasets, containing 2580 and 360 images, respectively. Meanwhile, we designed three types of experiments with four types of test datasets composed of 960 sample images. Thirdly, we analyzed how a different number of training iterations affects our prediction estimation, and then we explored the relationship between recognition accuracy and learning rates. Our results show that our proposed privacy detection system can recognize designed situations in the smart home with an acceptable recognition accuracy of 94.48%. Finally, we compared the results among RODA-FY, Inception V3, and YOLO, which indicate that our proposed RODA-FY outperforms the other comparison models in recognition accuracy.

  9. Cost-assessment Analysis of Local Vehicle Scrapping Facility

    NASA Astrophysics Data System (ADS)

    Grabowski, Lukasz; Gliniak, Maciej; Polek, Daria; Gruca, Maria

    2017-12-01

    The purpose of the paper was to analyse the costs of recycling vehicles at local vehicle scrapping facility. The article contains regulations concerning vehicle decommissioning, describes the types of recovery, vehicles recycling networks, analyses the structure of a disassembly station, as well as the financial and institutional system in charge of dealing with the recycling of vehicles in Poland. The authors present the number of scrapped vehicles at local recycling company and the level of achieved recovery and recycling. The research presented in the article shows financial situation of the vehicle scrapping industry. In addition, it has been observed that the number of subsidies are directly proportional to the number of scrapped vehicles, and achieved levels of recycling and recovery depends on the percentage of incomplete vehicles.

  10. Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components

    NASA Astrophysics Data System (ADS)

    Liu, Zonghua; Lai, Ying-Cheng; Ye, Nong

    2003-03-01

    We consider the entire spectrum of architectures of general networks, ranging from being heterogeneous (scale-free) to homogeneous (random), and investigate the infection dynamics by using a three-state epidemiological model that does not involve the mechanism of self-recovery. This model is relevant to realistic situations such as the propagation of a flu virus or information over a social network. Our heuristic analysis and computations indicate that (1) regardless of the network architecture, there exists a substantial fraction of nodes that can never be infected and (2) heterogeneous networks are relatively more robust against spreads of infection as compared with homogeneous networks. We have also considered the problem of immunization for preventing wide spread of infection, with the result that targeted immunization is effective for heterogeneous networks.

  11. A Novel Energy-Aware Distributed Clustering Algorithm for Heterogeneous Wireless Sensor Networks in the Mobile Environment

    PubMed Central

    Gao, Ying; Wkram, Chris Hadri; Duan, Jiajie; Chou, Jarong

    2015-01-01

    In order to prolong the network lifetime, energy-efficient protocols adapted to the features of wireless sensor networks should be used. This paper explores in depth the nature of heterogeneous wireless sensor networks, and finally proposes an algorithm to address the problem of finding an effective pathway for heterogeneous clustering energy. The proposed algorithm implements cluster head selection according to the degree of energy attenuation during the network’s running and the degree of candidate nodes’ effective coverage on the whole network, so as to obtain an even energy consumption over the whole network for the situation with high degree of coverage. Simulation results show that the proposed clustering protocol has better adaptability to heterogeneous environments than existing clustering algorithms in prolonging the network lifetime. PMID:26690440

  12. Modelling the public opinion transmission on social networks under opinion leaders

    NASA Astrophysics Data System (ADS)

    Li, Zuozhi; Li, Meng; Ji, Wanwan

    2017-06-01

    In this paper, based on Social Network Analysis (SNA), the social network model of opinion leaders influencing the public opinion transmission is explored. The hot event, A Female Driver Was Beaten Due To Lane Change, has characteristics of individual short-term and non-government intervention, which is used to data extraction, and formed of the network structure on opinion leaders influencing the public opinion transmission. And the evolution mechanism are analyzed in the three evolutionary situations. Opinion leaders influence micro-blogging public opinion on social network evolution model shows that this type of network public opinion transmission is largely constrained by opinion leaders, so the opinion leaders behavior supervising on the spread of this public opinion is pivotal, and which has a guiding significance.

  13. Connexin-Dependent Neuroglial Networking as a New Therapeutic Target.

    PubMed

    Charvériat, Mathieu; Naus, Christian C; Leybaert, Luc; Sáez, Juan C; Giaume, Christian

    2017-01-01

    Astrocytes and neurons dynamically interact during physiological processes, and it is now widely accepted that they are both organized in plastic and tightly regulated networks. Astrocytes are connected through connexin-based gap junction channels, with brain region specificities, and those networks modulate neuronal activities, such as those involved in sleep-wake cycle, cognitive, or sensory functions. Additionally, astrocyte domains have been involved in neurogenesis and neuronal differentiation during development; they participate in the "tripartite synapse" with both pre-synaptic and post-synaptic neurons by tuning down or up neuronal activities through the control of neuronal synaptic strength. Connexin-based hemichannels are also involved in those regulations of neuronal activities, however, this feature will not be considered in the present review. Furthermore, neuronal processes, transmitting electrical signals to chemical synapses, stringently control astroglial connexin expression, and channel functions. Long-range energy trafficking toward neurons through connexin-coupled astrocytes and plasticity of those networks are hence largely dependent on neuronal activity. Such reciprocal interactions between neurons and astrocyte networks involve neurotransmitters, cytokines, endogenous lipids, and peptides released by neurons but also other brain cell types, including microglial and endothelial cells. Over the past 10 years, knowledge about neuroglial interactions has widened and now includes effects of CNS-targeting drugs such as antidepressants, antipsychotics, psychostimulants, or sedatives drugs as potential modulators of connexin function and thus astrocyte networking activity. In physiological situations, neuroglial networking is consequently resulting from a two-way interaction between astrocyte gap junction-mediated networks and those made by neurons. As both cell types are modulated by CNS drugs we postulate that neuroglial networking may emerge as new therapeutic targets in neurological and psychiatric disorders.

  14. Survey of the WHO-REMPAN network's capability for strengthening preparedness for radiological and nuclear emergencies.

    PubMed

    Kumagai, Atsushi; Carr, Zhanat; Akira, Ohtsuru; Christie, Derek; Yamashita, Shunichi

    2012-10-01

    This paper investigates the capacity of the World Health Organization (WHO)-REMPAN network in responding to radiological incidents and nuclear emergencies. A survey developed by the WHO Secretariat and Nagasaki University was sent to all 40 WHO-REMPAN collaborating centres and liaison institutes in order to verify the current situation of the network, identify needs and collect suggestions for future improvements. Most of the responding institutions said they were satisfied with the current status of the network. However, several responses to the survey indicate that better internal communication is needed, as well as a position document to specify the roles, rights and responsibilities of the network members.

  15. Stability and Topology of Scale-Free Networks under Attack and Defense Strategies

    NASA Astrophysics Data System (ADS)

    Gallos, Lazaros K.; Cohen, Reuven; Argyrakis, Panos; Bunde, Armin; Havlin, Shlomo

    2005-05-01

    We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction pc of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce pc. At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions.

  16. Is a practice-based rural research network feasible in Europe?

    PubMed

    Klemenc-Ketis, Zalika; Kurpas, Donata; Tsiligianni, Ioanna; Petrazzuoli, Ferdinando; Jacquet, Jean-Pierre; Buono, Nicola; Lopez-Abuin, Jose; Lionis, Christos

    2015-01-01

    Research in family medicine is a well-established entity nationally and internationally, covering all aspects of primary care including remote and isolated practices. However, due to limited capacity and resources in rural family medicine, its potential is not fully exploited yet. An idea to foster European rural primary care research by establishing a practice-based research network has been recently put forward by several members of the European Rural and Isolated Practitioners Association (EURIPA) and the European General Practice Research Network (EGPRN). Two workshops on why, and how to design a practice-based research network among rural family practices in Europe were conducted at two international meetings. This paper revisits the definition of practice-based research in family medicine, reflects on the current situation in Europe regarding the research in rural family practice, and discusses a rationale for practice-based research in rural family medicine. A SWOT analysis was used as the main tool to analyse the current situation in Europe regarding the research in rural family practice at both meetings. The key messages gained from these meetings may be employed by the Wonca Working Party on research, the International Federation of Primary Care Research Network and the EGPRN that seek to introduce a practice-based research approach. The cooperation and collaboration between EURIPA and EGPRN creates a fertile ground to discuss further the prospect of a European practice-based rural family medicine research network, and to draw on the joint experience.

  17. An efficient link prediction index for complex military organization

    NASA Astrophysics Data System (ADS)

    Fan, Changjun; Liu, Zhong; Lu, Xin; Xiu, Baoxin; Chen, Qing

    2017-03-01

    Quality of information is crucial for decision-makers to judge the battlefield situations and design the best operation plans, however, real intelligence data are often incomplete and noisy, where missing links prediction methods and spurious links identification algorithms can be applied, if modeling the complex military organization as the complex network where nodes represent functional units and edges denote communication links. Traditional link prediction methods usually work well on homogeneous networks, but few for the heterogeneous ones. And the military network is a typical heterogeneous network, where there are different types of nodes and edges. In this paper, we proposed a combined link prediction index considering both the nodes' types effects and nodes' structural similarities, and demonstrated that it is remarkably superior to all the 25 existing similarity-based methods both in predicting missing links and identifying spurious links in a real military network data; we also investigated the algorithms' robustness under noisy environment, and found the mistaken information is more misleading than incomplete information in military areas, which is different from that in recommendation systems, and our method maintained the best performance under the condition of small noise. Since the real military network intelligence must be carefully checked at first due to its significance, and link prediction methods are just adopted to purify the network with the left latent noise, the method proposed here is applicable in real situations. In the end, as the FINC-E model, here used to describe the complex military organizations, is also suitable to many other social organizations, such as criminal networks, business organizations, etc., thus our method has its prospects in these areas for many tasks, like detecting the underground relationships between terrorists, predicting the potential business markets for decision-makers, and so on.

  18. Enabling information management systems in tactical network environments

    NASA Astrophysics Data System (ADS)

    Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher

    2009-05-01

    Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.

  19. Comparing Eyewitness-Derived Trajectories of Bright Meteors to Ground Truth Data

    NASA Technical Reports Server (NTRS)

    Moser, D. E.

    2016-01-01

    The NASA Meteoroid Environment Office (MEO) is the only US government agency tasked with analyzing meteors of public interest. When queried about a meteor observed over the United States, the MEO must respond with a characterization of the trajectory, orbit, and size within a few hours. Using observations from meteor networks like the NASA All Sky Fireball Network or the Southern Ontario Meteor Network, such a characterization is often easy. If found, casual recordings from the public and stationary web cameras can be used to roughly analyze a meteor if the camera's location can be identified and its imagery calibrated. This technique was used with great success in the analysis of the Chelyabinsk meteorite fall. But if the event is outside meteor network coverage, if an insufficient number of videos are found, or if the imagery cannot be geolocated or calibrated, a timely assessment can be difficult if not impossible. In this situation, visual reports made by eyewitnesses may be the only resource available. This has led to the development of a tool to quickly calculate crude meteor trajectories from eyewitness reports made to the American Meteor Society. The output is illustrated in Figure 1. A description of the tool, example case studies, and a comparison to ground truth data observed by the NASA All Sky Fireball Network will be presented.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bordetsky, A; Dougan, A D; Nekoogar, F

    The paper addresses technological and operational challenges of developing a global plug-and-play Maritime Domain Security testbed for the Global War on Terrorism mission. This joint NPS-LLNL project is based on the NPS Tactical Network Topology (TNT) composed of long-haul OFDM networks combined with self-forming wireless mesh links to air, surface, ground, and underwater unmanned vehicles. This long-haul network is combined with ultra-wideband (UWB) communications systems for wireless communications in harsh radio propagation channels. LLNL's UWB communication prototypes are designed to overcome shortcomings of the present narrowband communications systems in heavy metallic and constricted corridors inside ships. In the center ofmore » our discussion are networking solutions for the Maritime Interdiction Operation (MIO) Experiments in which geographically distributed command centers and subject matter experts collaborate with the Boarding Party in real time to facilitate situational understanding and course of action selection. The most recent experiment conducted via the testbed extension to the Alameda Island exercised several key technologies aimed at improving MIO. These technologies included UWB communications from within the ship to Boarding Party leader sending data files and pictures, advanced radiation detection equipment for search and identification, biometric equipment to record and send fingerprint files to facilitate rapid positive identification of crew members, and the latest updates of the NPS Tactical Network Topology facilitating reachback to LLNL, Biometric Fusion Center, USCG, and DTRA experts.« less

  1. Analysis of the surveillance situation for viral encephalitis and meningitis in Europe.

    PubMed

    Donoso Mantke, O; Vaheri, A; Ambrose, H; Koopmans, M; de Ory, F; Zeller, H; Beyrer, K; Windorfer, A; Niedrig, M

    2008-01-17

    Infective processes in the brain, spinal cord and meninges are considered to be the main causes of encephalitis, myelitis and meningitis. However, most cases remain unexplained. The incidence of different viral aetiologies (zoonotic and non-zoonotic) is especially poorly estimated, due to the lack of a standard case definition and of agreed diagnostic algorithms, including harmonised diagnostic methods and sample collection. It is important to clarify the incidence of viral encephalitis/meningitis and to optimise the diagnosis of infectious neurological illness, particularly to ensure early recognition of outbreaks or emerging infectious such a West Nile encephalitis. The European Network for Diagnostics of 'Imported' Viral Diseases (ENIVD) has analysed the present surveillance situation for viral encephalitis/meningitis in Europe. Here we give an overview of the existing epidemiological sources of information in European Union (EU) Member States, mapping the laboratory capacity and identifying key requirements for a possible future surveillance study at European level. The data presented will help design a harmonised/standardised Europe-wide surveillance study investigating patients with encephalitis and/or meningitis in order to obtain more information on the role of infections in these rarely analysed syndromes, both from a clinical and an epidemiological perspective.

  2. A multi-phase network situational awareness cognitive task analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erbacher, Robert; Frincke, Deborah A.; Wong, Pak C.

    Abstract The goal of our project is to create a set of next-generation cyber situational-awareness capabilities with applications to other domains in the long term. The objective is to improve the decision-making process to enable decision makers to choose better actions. To this end, we put extensive effort into making certain that we had feedback from network analysts and managers and understand what their genuine needs are. This article discusses the cognitive task-analysis methodology that we followed to acquire feedback from the analysts. This article also provides the details we acquired from the analysts on their processes, goals, concerns, themore » data and metadata that they analyze. Finally, we describe the generation of a novel task-flow diagram representing the activities of the target user base.« less

  3. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describemore » the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.« less

  4. A kinetic Monte Carlo approach to study fluid transport in pore networks

    NASA Astrophysics Data System (ADS)

    Apostolopoulou, M.; Day, R.; Hull, R.; Stamatakis, M.; Striolo, A.

    2017-10-01

    The mechanism of fluid migration in porous networks continues to attract great interest. Darcy's law (phenomenological continuum theory), which is often used to describe macroscopically fluid flow through a porous material, is thought to fail in nano-channels. Transport through heterogeneous and anisotropic systems, characterized by a broad distribution of pores, occurs via a contribution of different transport mechanisms, all of which need to be accounted for. The situation is likely more complicated when immiscible fluid mixtures are present. To generalize the study of fluid transport through a porous network, we developed a stochastic kinetic Monte Carlo (KMC) model. In our lattice model, the pore network is represented as a set of connected finite volumes (voxels), and transport is simulated as a random walk of molecules, which "hop" from voxel to voxel. We simulated fluid transport along an effectively 1D pore and we compared the results to those expected by solving analytically the diffusion equation. The KMC model was then implemented to quantify the transport of methane through hydrated micropores, in which case atomistic molecular dynamic simulation results were reproduced. The model was then used to study flow through pore networks, where it was able to quantify the effect of the pore length and the effect of the network's connectivity. The results are consistent with experiments but also provide additional physical insights. Extension of the model will be useful to better understand fluid transport in shale rocks.

  5. The development of Human Functional Brain Networks

    PubMed Central

    Power, Jonathan D; Fair, Damien A; Schlaggar, Bradley L

    2010-01-01

    Recent advances in MRI technology have enabled precise measurements of correlated activity throughout the brain, leading to the first comprehensive descriptions of functional brain networks in humans. This article reviews the growing literature on the development of functional networks, from infancy through adolescence, as measured by resting state functional connectivity MRI. We note several limitations of traditional approaches to describing brain networks, and describe a powerful framework for analyzing networks, called graph theory. We argue that characterization of the development of brain systems (e.g. the default mode network) should be comprehensive, considering not only relationships within a given system, but also how these relationships are situated within wider network contexts. We note that, despite substantial reorganization of functional connectivity, several large-scale network properties appear to be preserved across development, suggesting that functional brain networks, even in children, are organized in manners similar to other complex systems. PMID:20826306

  6. Network architecture in a converged optical + IP network

    NASA Astrophysics Data System (ADS)

    Wakim, Walid; Zottmann, Harald

    2012-01-01

    As demands on Provider Networks continue to grow at exponential rates, providers are forced to evaluate how to continue to grow the network while increasing service velocity, enhancing resiliency while decreasing the total cost of ownership (TCO). The bandwidth growth that networks are experiencing is in the form packet based multimedia services such as video, video conferencing, gaming, etc... mixed with Over the Top (OTT) content providers such as Netflix, and the customer's expectations that best effort is not enough you end up with a situation that forces the provider to analyze how to gain more out of the network with less cost. In this paper we will discuss changes in the network that are driving us to a tighter integration between packet and optical layers and how to improve on today's multi - layer inefficiencies to drive down network TCO and provide for a fully integrated and dynamic network that will decrease time to revenue.

  7. Analysis of the characteristics of the synchronous clusters in the adaptive Kuramoto network and neural network of the epileptic brain

    NASA Astrophysics Data System (ADS)

    Hramov, Alexander E.; Kharchenko, Alexander A.; Makarov, Vladimir V.; Khramova, Marina V.; Koronovskii, Alexey A.; Pavlov, Alexey N.; Dana, Syamal K.

    2016-04-01

    In the paper we study the mechanisms of phase synchronization in the adaptive model network of Kuramoto oscillators and the neural network of brain by consideration of the integral characteristics of the observed networks signals. As the integral characteristics of the model network we consider the summary signal produced by the oscillators. Similar to the model situation we study the ECoG signal as the integral characteristic of neural network of the brain. We show that the establishment of the phase synchronization results in the increase of the peak, corresponding to synchronized oscillators, on the wavelet energy spectrum of the integral signals. The observed correlation between the phase relations of the elements and the integral characteristics of the whole network open the way to detect the size of synchronous clusters in the neural networks of the epileptic brain before and during seizure.

  8. Dynamic Uncertain Causality Graph for Knowledge Representation and Reasoning: Utilization of Statistical Data and Domain Knowledge in Complex Cases.

    PubMed

    Zhang, Qin; Yao, Quanying

    2018-05-01

    The dynamic uncertain causality graph (DUCG) is a newly presented framework for uncertain causality representation and probabilistic reasoning. It has been successfully applied to online fault diagnoses of large, complex industrial systems, and decease diagnoses. This paper extends the DUCG to model more complex cases than what could be previously modeled, e.g., the case in which statistical data are in different groups with or without overlap, and some domain knowledge and actions (new variables with uncertain causalities) are introduced. In other words, this paper proposes to use -mode, -mode, and -mode of the DUCG to model such complex cases and then transform them into either the standard -mode or the standard -mode. In the former situation, if no directed cyclic graph is involved, the transformed result is simply a Bayesian network (BN), and existing inference methods for BNs can be applied. In the latter situation, an inference method based on the DUCG is proposed. Examples are provided to illustrate the methodology.

  9. a Cloud-Based Architecture for Smart Video Surveillance

    NASA Astrophysics Data System (ADS)

    Valentín, L.; Serrano, S. A.; Oves García, R.; Andrade, A.; Palacios-Alonso, M. A.; Sucar, L. Enrique

    2017-09-01

    Turning a city into a smart city has attracted considerable attention. A smart city can be seen as a city that uses digital technology not only to improve the quality of people's life, but also, to have a positive impact in the environment and, at the same time, offer efficient and easy-to-use services. A fundamental aspect to be considered in a smart city is people's safety and welfare, therefore, having a good security system becomes a necessity, because it allows us to detect and identify potential risk situations, and then take appropriate decisions to help people or even prevent criminal acts. In this paper we present an architecture for automated video surveillance based on the cloud computing schema capable of acquiring a video stream from a set of cameras connected to the network, process that information, detect, label and highlight security-relevant events automatically, store the information and provide situational awareness in order to minimize response time to take the appropriate action.

  10. Wedge cutting of mild steel by CO 2 laser and cut-quality assessment in relation to normal cutting

    NASA Astrophysics Data System (ADS)

    Yilbas, B. S.; Karatas, C.; Uslan, I.; Keles, O.; Usta, Y.; Yilbas, Z.; Ahsan, M.

    2008-10-01

    In some applications, laser cutting of wedge surfaces cannot be avoided in sheet metal processing and the quality of the end product defines the applicability of the laser-cutting process in such situations. In the present study, CO 2 laser cutting of the wedge surfaces as well as normal surfaces (normal to laser beam axis) is considered and the end product quality is assessed using the international standards for thermal cutting. The cut surfaces are examined by the optical microscopy and geometric features of the cut edges such as out of flatness and dross height are measured from the micrographs. A neural network is introduced to classify the striation patterns of the cut surfaces. It is found that the dross height and out of flatness are influenced significantly by the laser output power, particularly for wedge-cutting situation. Moreover, the cut quality improves at certain value of the laser power intensity.

  11. Effects of threshold on the topology of gene co-expression networks.

    PubMed

    Couto, Cynthia Martins Villar; Comin, César Henrique; Costa, Luciano da Fontoura

    2017-09-26

    Several developments regarding the analysis of gene co-expression profiles using complex network theory have been reported recently. Such approaches usually start with the construction of an unweighted gene co-expression network, therefore requiring the selection of a suitable threshold defining which pairs of vertices will be connected. We aimed at addressing such an important problem by suggesting and comparing five different approaches for threshold selection. Each of the methods considers a respective biologically-motivated criterion for electing a potentially suitable threshold. A set of 21 microarray experiments from different biological groups was used to investigate the effect of applying the five proposed criteria to several biological situations. For each experiment, we used the Pearson correlation coefficient to measure the relationship between each gene pair, and the resulting weight matrices were thresholded considering several values, generating respective adjacency matrices (co-expression networks). Each of the five proposed criteria was then applied in order to select the respective threshold value. The effects of these thresholding approaches on the topology of the resulting networks were compared by using several measurements, and we verified that, depending on the database, the impact on the topological properties can be large. However, a group of databases was verified to be similarly affected by most of the considered criteria. Based on such results, it can be suggested that when the generated networks present similar measurements, the thresholding method can be chosen with greater freedom. If the generated networks are markedly different, the thresholding method that better suits the interests of each specific research study represents a reasonable choice.

  12. Historical feature pattern extraction based network attack situation sensing algorithm.

    PubMed

    Zeng, Yong; Liu, Dacheng; Lei, Zhou

    2014-01-01

    The situation sequence contains a series of complicated and multivariate random trends, which are very sudden, uncertain, and difficult to recognize and describe its principle by traditional algorithms. To solve the above questions, estimating parameters of super long situation sequence is essential, but very difficult, so this paper proposes a situation prediction method based on historical feature pattern extraction (HFPE). First, HFPE algorithm seeks similar indications from the history situation sequence recorded and weighs the link intensity between occurred indication and subsequent effect. Then it calculates the probability that a certain effect reappears according to the current indication and makes a prediction after weighting. Meanwhile, HFPE method gives an evolution algorithm to derive the prediction deviation from the views of pattern and accuracy. This algorithm can continuously promote the adaptability of HFPE through gradual fine-tuning. The method preserves the rules in sequence at its best, does not need data preprocessing, and can track and adapt to the variation of situation sequence continuously.

  13. Historical Feature Pattern Extraction Based Network Attack Situation Sensing Algorithm

    PubMed Central

    Zeng, Yong; Liu, Dacheng; Lei, Zhou

    2014-01-01

    The situation sequence contains a series of complicated and multivariate random trends, which are very sudden, uncertain, and difficult to recognize and describe its principle by traditional algorithms. To solve the above questions, estimating parameters of super long situation sequence is essential, but very difficult, so this paper proposes a situation prediction method based on historical feature pattern extraction (HFPE). First, HFPE algorithm seeks similar indications from the history situation sequence recorded and weighs the link intensity between occurred indication and subsequent effect. Then it calculates the probability that a certain effect reappears according to the current indication and makes a prediction after weighting. Meanwhile, HFPE method gives an evolution algorithm to derive the prediction deviation from the views of pattern and accuracy. This algorithm can continuously promote the adaptability of HFPE through gradual fine-tuning. The method preserves the rules in sequence at its best, does not need data preprocessing, and can track and adapt to the variation of situation sequence continuously. PMID:24892054

  14. Situation and person attributions under spontaneous and intentional instructions: an fMRI study

    PubMed Central

    Kestemont, Jenny; Vandekerckhove, Marie; Ma, Ning; Van Hoeck, Nicole

    2013-01-01

    This functional magnetic resonance imaging (fMRI) research explores how observers make causal beliefs about an event in terms of the person or situation. Thirty-four participants read various short descriptions of social events that implied either the person or the situation as the cause. Half of them were explicitly instructed to judge whether the event was caused by something about the person or the situation (intentional inferences), whereas the other half was instructed simply to read the material carefully (spontaneous inferences). The results showed common activation in areas related to mentalizing, across all types of causes or instructions (posterior superior temporal sulcus, temporo-parietal junction, precuneus). However, the medial prefrontal cortex was activated only under spontaneous instructions, but not under intentional instruction. This suggests a bias toward person attributions (e.g. fundamental attribution bias). Complementary to this, intentional situation attributions activated a stronger and more extended network compared to intentional person attributions, suggesting that situation attributions require more controlled, extended and broader processing of the information. PMID:22345370

  15. Periodically Launched, Dedicated CubeSats/SmallSats for Space Situational Awareness Through NASA Communications Networks

    NASA Astrophysics Data System (ADS)

    Stromberg, E. M.; Shaw, H.; Estabrook, P.; Neilsen, T. L.; Gunther, J.; Swenson, C.; Fish, C. S.; Schaire, S. H.

    2014-12-01

    Space Situational Awareness (SSA) is an area where spaceflight activities and missions can directly influence the quality of life on earth. The combination of space weather, near earth orbiting objects, atmospheric conditions at the space boundary, and other phenomena can have significant short-term and long-term implications for the inhabitants of this planet. The importance of SSA has led to increased activity in this area from both space and ground based platforms. The emerging capability of CubeSats and SmallSats provides an opportunity for these low-cost, versatile platforms to augment the SSA infrastructure. The CubeSats and SmallSats can be launched opportunistically with shorter lead times than larger missions. They can be organized both as constellations or individual sensor elements. Combining CubeSats and SmallSats with the existing NASA communications networks (TDRS Space Network, Deep Space Network and the Near Earth Network) provide a backbone structure for SSA which can be tied to a SSA portal for data distribution and management. In this poster we will describe the instruments and sensors needed for CubeSat and SmallSat SSA missions. We will describe the architecture and concept of operations for a set of opportunistic, periodically launched, SSA CubeSats and SmallSats. We will also describe the integrated communications infrastructure to support end-to-end data delivery and management to a SSA portal.

  16. Conceptual Architecture for Obtaining Cyber Situational Awareness

    DTIC Science & Technology

    2014-06-01

    1-893723-17-8. [10] SKYBOX SECURITY. Developer´s Guide. Skybox View. Manual.Version 11. 2010. [11] SCALABLE Network. EXata communications...E. Understanding command and control. Washington, D.C.: CCRP Publication Series, 2006. 255 p. ISBN 1-893723-17-8. • [10] SKYBOX SECURITY. Developer...s Guide. Skybox View. Manual.Version 11. 2010. • [11] SCALABLE Network. EXata communications simulation platform. Available: <http://www.scalable

  17. An Experiment in the Development of Social Networks for Women: Women's Colleges in Ireland in the Nineteenth Century

    ERIC Educational Resources Information Center

    Harford, Judith

    2007-01-01

    This article examines the network of women's colleges which emerged in Ireland in the latter half of the nineteenth century in response to women's exclusion from the realm of the university and their desire to participate in higher education. These colleges, run largely along denominational lines, were situated in the major cities with the…

  18. Modeling Limited Foresight in Water Management Systems

    NASA Astrophysics Data System (ADS)

    Howitt, R.

    2005-12-01

    The inability to forecast future water supplies means that their management inevitably occurs under situations of limited foresight. Three modeling problems arise, first what type of objective function is a manager with limited foresight optimizing? Second how can we measure these objectives? Third can objective functions that incorporate uncertainty be integrated within the structure of optimizing water management models? The paper reviews the concepts of relative risk aversion and intertemporal substitution that underlie stochastic dynamic preference functions. Some initial results from the estimation of such functions for four different dam operations in northern California are presented and discussed. It appears that the path of previous water decisions and states influences the decision-makers willingness to trade off water supplies between periods. A compromise modeling approach that incorporates carry-over value functions under limited foresight within a broader net work optimal water management model is developed. The approach uses annual carry-over value functions derived from small dimension stochastic dynamic programs embedded within a larger dimension water allocation network. The disaggregation of the carry-over value functions to the broader network is extended using the space rule concept. Initial results suggest that the solution of such annual nonlinear network optimizations is comparable to, or faster than, the solution of linear network problems over long time series.

  19. Wireless remote monitoring of toxic gases in shipbuilding.

    PubMed

    Pérez-Garrido, Carlos; González-Castaño, Francisco J; Chaves-Díeguez, David; Rodríguez-Hernández, Pedro S

    2014-02-14

    Large-scale wireless sensor networks have not achieved market impact, so far. Nevertheless, this technology may be applied successfully to small-scale niche markets. Shipyards are hazardous working environments with many potential risks to worker safety. Toxic gases generated in soldering processes in enclosed spaces (e.g., cargo holds) are one such risk. The dynamic environment of a ship under construction makes it very difficult to plan gas detection fixed infrastructures connected to external monitoring stations via wired links. While portable devices with gas level indicators exist, they require workers to monitor measurements, often in situations where they are focused on other tasks for relatively long periods. In this work, we present a wireless multihop remote gas monitoring system for shipyard environments that has been tested in a real ship under construction. Using this system, we validate IEEE 802.15.4/Zigbee wireless networks as a suitable technology to connect gas detectors to control stations outside the ships. These networks have the added benefit that they reconfigure themselves dynamically in case of network failure or redeployment, for example when a relay is moved to a new location. Performance measurements include round trip time (which determines the alert response time for safety teams) and link quality indicator and packet error rate (which determine communication robustness).

  20. Wireless Remote Monitoring of Toxic Gases in Shipbuilding

    PubMed Central

    Pérez-Garrido, Carlos; González-Castaño, Francisco J.; Chaves-Diéguez, David; Rodríguez-Hernández, Pedro S.

    2014-01-01

    Large-scale wireless sensor networks have not achieved market impact, so far. Nevertheless, this technology may be applied successfully to small-scale niche markets. Shipyards are hazardous working environments with many potential risks to worker safety. Toxic gases generated in soldering processes in enclosed spaces (e.g., cargo holds) are one such risk. The dynamic environment of a ship under construction makes it very difficult to plan gas detection fixed infrastructures connected to external monitoring stations via wired links. While portable devices with gas level indicators exist, they require workers to monitor measurements, often in situations where they are focused on other tasks for relatively long periods. In this work, we present a wireless multihop remote gas monitoring system for shipyard environments that has been tested in a real ship under construction. Using this system, we validate IEEE 802.15.4/Zigbee wireless networks as a suitable technology to connect gas detectors to control stations outside the ships. These networks have the added benefit that they reconfigure themselves dynamically in case of network failure or redeployment, for example when a relay is moved to a new location. Performance measurements include round trip time (which determines the alert response time for safety teams) and link quality indicator and packet error rate (which determine communication robustness). PMID:24534919

  1. A Model of Mental State Transition Network

    NASA Astrophysics Data System (ADS)

    Xiang, Hua; Jiang, Peilin; Xiao, Shuang; Ren, Fuji; Kuroiwa, Shingo

    Emotion is one of the most essential and basic attributes of human intelligence. Current AI (Artificial Intelligence) research is concentrating on physical components of emotion, rarely is it carried out from the view of psychology directly(1). Study on the model of artificial psychology is the first step in the development of human-computer interaction. As affective computing remains unpredictable, creating a reasonable mental model becomes the primary task for building a hybrid system. A pragmatic mental model is also the fundament of some key topics such as recognition and synthesis of emotions. In this paper a Mental State Transition Network Model(2) is proposed to detect human emotions. By a series of psychological experiments, we present a new way to predict coming human's emotions depending on the various current emotional states under various stimuli. Besides, people in different genders and characters are taken into consideration in our investigation. According to the psychological experiments data derived from 200 questionnaires, a Mental State Transition Network Model for describing the transitions in distribution among the emotions and relationships between internal mental situations and external are concluded. Further more the coefficients of the mental transition network model were achieved. Comparing seven relative evaluating experiments, an average precision rate of 0.843 is achieved using a set of samples for the proposed model.

  2. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    NASA Astrophysics Data System (ADS)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  3. Energy Logic (EL): a novel fusion engine of multi-modality multi-agent data/information fusion for intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Rababaah, Haroun; Shirkhodaie, Amir

    2009-04-01

    The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.

  4. An Inside Look at Homeless Youths’ Social Networks: Perceptions of Substance Use Norms1

    PubMed Central

    Melander, Lisa A.; Tyler, Kimberly A.; Schmitz, Rachel M.

    2016-01-01

    Substance use among homeless young people is a pervasive problem, and there have been many efforts to understand more about the dynamics of this health compromising behavior. The current study examined perceived substance use norms within homeless youths’ social networks utilizing in-depth interviews. The sample included 19 homeless individuals aged 16 to 21. Four elements of substance use within networks emerged: substance use choices, drug use safety issues, encouragement and/or discouragement, and appropriate situations in which substance use is condoned. These findings provide unique insight into the norms associated with drug and alcohol use within homeless youths’ social networks. PMID:26989340

  5. An improved sampling method of complex network

    NASA Astrophysics Data System (ADS)

    Gao, Qi; Ding, Xintong; Pan, Feng; Li, Weixing

    2014-12-01

    Sampling subnet is an important topic of complex network research. Sampling methods influence the structure and characteristics of subnet. Random multiple snowball with Cohen (RMSC) process sampling which combines the advantages of random sampling and snowball sampling is proposed in this paper. It has the ability to explore global information and discover the local structure at the same time. The experiments indicate that this novel sampling method could keep the similarity between sampling subnet and original network on degree distribution, connectivity rate and average shortest path. This method is applicable to the situation where the prior knowledge about degree distribution of original network is not sufficient.

  6. Cascade-based attacks on complex networks

    NASA Astrophysics Data System (ADS)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  7. Reverse logistics in the Brazilian construction industry.

    PubMed

    Nunes, K R A; Mahler, C F; Valle, R A

    2009-09-01

    In Brazil most Construction and Demolition Waste (C&D waste) is not recycled. This situation is expected to change significantly, since new federal regulations oblige municipalities to create and implement sustainable C&D waste management plans which assign an important role to recycling activities. The recycling organizational network and its flows and components are fundamental to C&D waste recycling feasibility. Organizational networks, flows and components involve reverse logistics. The aim of this work is to introduce the concepts of reverse logistics and reverse distribution channel networks and to study the Brazilian C&D waste case.

  8. The Construction of Higher Education Entrepreneur Services Network System a Research Based on Ecological Systems Theory

    NASA Astrophysics Data System (ADS)

    Xue, Jingxin

    The article aims to completely, systematically and objectively analyze the current situation of Entrepreneurship Education in China with Ecological Systems Theory. From this perspective, the author discusses the structure, function and its basic features of higher education entrepreneur services network system, and puts forward the opinion that every entrepreneurship organization in higher education institution does not limited to only one platform. Different functional supporting platforms should be combined closed through composite functional organization to form an integrated network system, in which each unit would impels others' development.

  9. Ramifying feedback networks, cross-scale interactions, and emergent quasi individuals in Conway's game of Life.

    PubMed

    Gotts, Nicholas M

    2009-01-01

    Small patterns of state 1 cells on an infinite, otherwise empty array of Conway's game of Life can produce sets of growing structures resembling in significant ways a population of spatially situated individuals in a nonuniform, highly structured environment. Ramifying feedback networks and cross-scale interactions play a central role in the emergence and subsequent dynamics of the quasi population. The implications are discussed: It is proposed that analogous networks and interactions may have been precursors to natural selection in the real world.

  10. A Neural Network Aero Design System for Advanced Turbo-Engines

    NASA Technical Reports Server (NTRS)

    Sanz, Jose M.

    1999-01-01

    An inverse design method calculates the blade shape that produces a prescribed input pressure distribution. By controlling this input pressure distribution the aerodynamic design objectives can easily be met. Because of the intrinsic relationship between pressure distribution and airfoil physical properties, a Neural Network can be trained to choose the optimal pressure distribution that would meet a set of physical requirements. Neural network systems have been attempted in the context of direct design methods. From properties ascribed to a set of blades the neural network is trained to infer the properties of an 'interpolated' blade shape. The problem is that, especially in transonic regimes where we deal with intrinsically non linear and ill posed problems, small perturbations of the blade shape can produce very large variations of the flow parameters. It is very unlikely that, under these circumstances, a neural network will be able to find the proper solution. The unique situation in the present method is that the neural network can be trained to extract the required input pressure distribution from a database of pressure distributions while the inverse method will still compute the exact blade shape that corresponds to this 'interpolated' input pressure distribution. In other words, the interpolation process is transferred to a smoother problem, namely, finding what pressure distribution would produce the required flow conditions and, once this is done, the inverse method will compute the exact solution for this problem. The use of neural network is, in this context, highly related to the use of proper optimization techniques. The optimization is used essentially as an automation procedure to force the input pressure distributions to achieve the required aero and structural design parameters. A multilayered feed forward network with back-propagation is used to train the system for pattern association and classification.

  11. PalymSys (TM): An extended version of CLIPS for construction and reasoning using blackboards

    NASA Technical Reports Server (NTRS)

    Bryson, Travis; Ballard, Dan

    1994-01-01

    This paper describes PalymSys(TM) -- an extended version of the CLIPS language that is designed to facilitate the implementation of blackboard systems. The paper first describes the general characteristics of blackboards and shows how a control blackboard architecture can be used by AI systems to examine their own behavior and adapt to real-time problem-solving situations by striking a balance between domain and control reasoning. The paper then describes the use of PalymSys in the development of a situation assessment subsystem for use aboard Army helicopters. This system performs real-time inferencing about the current battlefield situation using multiple domain blackboards as well as a control blackboard. A description of the control and domain blackboards and their implementation is presented. The paper also describes modifications made to the standard CLIPS 6.02 language in PalymSys(TM) 2.0. These include: (1) a dynamic Dempster-Shafer belief network whose structure is completely specifiable at run-time in the consequent of a PalymSys(TM) rule, (2) extension of the run command including a continuous run feature that enables the system to run even when the agenda is empty, and (3) a built-in communications link that uses shared memory to communicate with other independent processes.

  12. Ramp - Metering Algorithms Evaluated within Simplified Conditions

    NASA Astrophysics Data System (ADS)

    Janota, Aleš; Holečko, Peter; Gregor, Michal; Hruboš, Marián

    2017-12-01

    Freeway networks reach their limits, since it is usually impossible to increase traffic volumes by indefinitely extending transport infrastructure through adding new traffic lanes. One of the possible solutions is to use advanced intelligent transport systems, particularly ramp metering systems. The paper shows how two particular algorithms of local and traffic-responsive control (Zone, ALINEA) can be adapted to simplified conditions corresponding to Slovak freeways. Both control strategies are modelled and simulated using PTV Vissim software, including the module VisVAP. Presented results demonstrate the properties of both control strategies, which are compared mutually as well as with the initial situation in which no control strategy is applied

  13. Health social workers sources of knowledge for decision making in practice.

    PubMed

    McDermott, Fiona; Henderson, Annabel; Quayle, Carol

    2017-10-01

    This article presents findings from research examining knowledge social workers in a health network in Victoria, Australia identified as informing their decision-making. Data for 13 patients, and in-depth interviews with six social workers who worked with these patients, were studied. A thematic analysis of interviews revealed that participants identified reliance on past experience and contextual/situational information as underpinning their decisions, demonstrating their commitment to person-in-environment perspectives. However, despite the availability of a repository of empirical evidence, no respondent made use of this. This study provided insight into health practitioners' sources of knowledge, highlighting gaps and areas for further exploration.

  14. Toward multiscale modelings of grain-fluid systems

    NASA Astrophysics Data System (ADS)

    Chareyre, Bruno; Yuan, Chao; Montella, Eduard P.; Salager, Simon

    2017-06-01

    Computationally efficient methods have been developed for simulating partially saturated granular materials in the pendular regime. In contrast, one hardly avoid expensive direct resolutions of 2-phase fluid dynamics problem for mixed pendular-funicular situations or even saturated regimes. Following previous developments for single-phase flow, a pore-network approach of the coupling problems is described. The geometry and movements of phases and interfaces are described on the basis of a tetrahedrization of the pore space, introducing elementary objects such as bridge, meniscus, pore body and pore throat, together with local rules of evolution. As firmly established local rules are still missing on some aspects (entry capillary pressure and pore-scale pressure-saturation relations, forces on the grains, or kinetics of transfers in mixed situations) a multi-scale numerical framework is introduced, enhancing the pore-network approach with the help of direct simulations. Small subsets of a granular system are extracted, in which multiphase scenario are solved using the Lattice-Boltzman method (LBM). In turns, a global problem is assembled and solved at the network scale, as illustrated by a simulated primary drainage.

  15. Generalizing the Network Scale-Up Method: A New Estimator for the Size of Hidden Populations*

    PubMed Central

    Feehan, Dennis M.; Salganik, Matthew J.

    2018-01-01

    The network scale-up method enables researchers to estimate the size of hidden populations, such as drug injectors and sex workers, using sampled social network data. The basic scale-up estimator offers advantages over other size estimation techniques, but it depends on problematic modeling assumptions. We propose a new generalized scale-up estimator that can be used in settings with non-random social mixing and imperfect awareness about membership in the hidden population. Further, the new estimator can be used when data are collected via complex sample designs and from incomplete sampling frames. However, the generalized scale-up estimator also requires data from two samples: one from the frame population and one from the hidden population. In some situations these data from the hidden population can be collected by adding a small number of questions to already planned studies. For other situations, we develop interpretable adjustment factors that can be applied to the basic scale-up estimator. We conclude with practical recommendations for the design and analysis of future studies. PMID:29375167

  16. INFOTERRA: Gateway to International Environmental Information.

    ERIC Educational Resources Information Center

    McNamar, Emma J.

    1993-01-01

    Describes the components, collaborators, and services of INFOTERRA, an environmental information exchange network designed to facilitate the exchange of information among countries and to promote knowledge with countries of the international environmental situation. (MDH)

  17. Short-term memory capacity in networks via the restricted isometry property.

    PubMed

    Charles, Adam S; Yap, Han Lun; Rozell, Christopher J

    2014-06-01

    Cortical networks are hypothesized to rely on transient network activity to support short-term memory (STM). In this letter, we study the capacity of randomly connected recurrent linear networks for performing STM when the input signals are approximately sparse in some basis. We leverage results from compressed sensing to provide rigorous nonasymptotic recovery guarantees, quantifying the impact of the input sparsity level, the input sparsity basis, and the network characteristics on the system capacity. Our analysis demonstrates that network memory capacities can scale superlinearly with the number of nodes and in some situations can achieve STM capacities that are much larger than the network size. We provide perfect recovery guarantees for finite sequences and recovery bounds for infinite sequences. The latter analysis predicts that network STM systems may have an optimal recovery length that balances errors due to omission and recall mistakes. Furthermore, we show that the conditions yielding optimal STM capacity can be embodied in several network topologies, including networks with sparse or dense connectivities.

  18. Complexity analysis on public transport networks of 97 large- and medium-sized cities in China

    NASA Astrophysics Data System (ADS)

    Tian, Zhanwei; Zhang, Zhuo; Wang, Hongfei; Ma, Li

    2018-04-01

    The traffic situation in Chinese urban areas is continuing to deteriorate. To make a better planning and designing of the public transport system, it is necessary to make profound research on the structure of urban public transport networks (PTNs). We investigate 97 large- and medium-sized cities’ PTNs in China, construct three types of network models — bus stop network, bus transit network and bus line network, then analyze the structural characteristics of them. It is revealed that bus stop network is small-world and scale-free, bus transit network and bus line network are both small-world. Betweenness centrality of each city’s PTN shows similar distribution pattern, although these networks’ size is various. When classifying cities according to the characteristics of PTNs or economic development level, the results are similar. It means that the development of cities’ economy and transport network has a strong correlation, PTN expands in a certain model with the development of economy.

  19. Contagions across networks: colds and markets

    NASA Astrophysics Data System (ADS)

    Berryman, Matthew J.; Johnson, Neil F.; Abbott, Derek

    2005-12-01

    We explore a variety of network models describing transmission across a network. In particular we focus on transmission across composite networks, or "networks of networks", in which a finite number of networked objects are then themselves connected together into a network. In a disease context we introduce two interrelated viruses to hosts on a network, to model the infection of hosts in a classroom situation, with high rates of infection within a classroom, and lower rates of infection between classrooms. The hosts can be either susceptible to infection, infected, or recovering from each virus. During the infection stage and recovery stage there is some level of cross-immunity to related viruses. We explore the effects of immunizing sections of the community on transmission through social networks. In a stock market context we introduce memes, or virus-like ideas into a virtual agent-based model of a stock exchange. By varying the parameters of the individual traders and the way in which they are connected we are able to show emergent behaviour, including boom and bust cycles.

  20. Congestion control and routing over satellite networks

    NASA Astrophysics Data System (ADS)

    Cao, Jinhua

    Satellite networks and transmissions find their application in fields of computer communications, telephone communications, television broadcasting, transportation, space situational awareness systems and so on. This thesis mainly focuses on two networking issues affecting satellite networking: network congestion control and network routing optimization. Congestion, which leads to long queueing delays, packet losses or both, is a networking problem that has drawn the attention of many researchers. The goal of congestion control mechanisms is to ensure high bandwidth utilization while avoiding network congestion by regulating the rate at which traffic sources inject packets into a network. In this thesis, we propose a stable congestion controller using data-driven, safe switching control theory to improve the dynamic performance of satellite Transmission Control Protocol/Active Queue Management (TCP/AQM) networks. First, the stable region of the Proportional-Integral (PI) parameters for a nominal model is explored. Then, a PI controller, whose parameters are adaptively tuned by switching among members of a given candidate set, using observed plant data, is presented and compared with some classical AQM policy examples, such as Random Early Detection (RED) and fixed PI control. A new cost detectable switching law with an interval cost function switching algorithm, which improves the performance and also saves the computational cost, is developed and compared with a law commonly used in the switching control literature. Finite-gain stability of the system is proved. A fuzzy logic PI controller is incorporated as a special candidate to achieve good performance at all nominal points with the available set of candidate controllers. Simulations are presented to validate the theory. An effocient routing algorithm plays a key role in optimizing network resources. In this thesis, we briefly analyze Low Earth Orbit (LEO) satellite networks, review the Cross Entropy (CE) method and then develop a novel on-demand routing system named Cross Entropy Accelerated Ant Routing System (CEAARS) for regular constellation LEO satellite networks. By implementing simulations on an Iridium-like satellite network, we compare the proposed CEAARS algorithm with the two approaches to adaptive routing protocols on the Internet: distance-vector (DV) and link-state (LS), as well as with the original Cross Entropy Ant Routing System (CEARS). DV algorithms are based on distributed Bellman Ford algorithm, and LS algorithms are implementation of Dijkstras single source shortest path. The results show that CEAARS not only remarkably improves the convergence speed of achieving optimal or suboptimal paths, but also reduces the number of overhead ants (management packets).

  1. Scalable Matrix Algorithms for Interactive Analytics of Very Large Informatics Graphs

    DTIC Science & Technology

    2017-06-14

    information networks. Depending on the situation, these larger networks may not fit on a single machine. Although we considered traditional matrix and graph...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources...gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this burden estimate or

  2. Beyond Line-of-Sight Information Dissemination for Force Protection

    DTIC Science & Technology

    2012-11-01

    utilize ad hoc, mesh networks to support data-in-motion and remote data storage and access. These types of sensors are common among Force Protection...Operations and Forward Operating Base security . Current Force Protection Kits include a rich set of sensors that can be monitored from a core operator...and tactical war fighters in tactical network environments . Marti has the potential to improve situation awareness and Force Protection for

  3. Providing Self-Healing Ability for Wireless Sensor Node by Using Reconfigurable Hardware

    PubMed Central

    Yuan, Shenfang; Qiu, Lei; Gao, Shang; Tong, Yao; Yang, Weiwei

    2012-01-01

    Wireless sensor networks (WSNs) have received tremendous attention over the past ten years. In engineering applications of WSNs, a number of sensor nodes are usually spread across some specific geographical area. Some of these nodes have to work in harsh environments. Dependability of the Wireless Sensor Network (WSN) is very important for its successful applications in the engineering area. In ordinary research, when a node has a failure, it is usually discarded and the network is reorganized to ensure the normal operation of the WSN. Using appropriate WSN re-organization methods, though the sensor networks can be reorganized, this causes additional maintenance costs and sometimes still decreases the function of the networks. In those situations where the sensor networks cannot be reorganized, the performance of the whole WSN will surely be degraded. In order to ensure the reliable and low cost operation of WSNs, a method to develop a wireless sensor node with self-healing ability based on reconfigurable hardware is proposed in this paper. Two self-healing WSN node realization paradigms based on reconfigurable hardware are presented, including a redundancy-based self-healing paradigm and a whole FPAA/FPGA based self-healing paradigm. The nodes designed with the self-healing ability can dynamically change their node configurations to repair the nodes' hardware failures. To demonstrate these two paradigms, a strain sensor node is adopted as an illustration to show the concepts. Two strain WSN sensor nodes with self-healing ability are developed respectively according to the proposed self-healing paradigms. Evaluation experiments on self-healing ability and power consumption are performed. Experimental results show that the developed nodes can self-diagnose the failures and recover to a normal state automatically. The research presented can improve the robustness of WSNs and reduce the maintenance cost of WSNs in engineering applications. PMID:23202176

  4. Using ArcGIS software in the pre-hospital emergency medical system.

    PubMed

    Manole, M; Duma, Odetta; Custură, Maria Alexandra; Petrariu, F D; Manole, Alina

    2014-01-01

    To measure the accessibility to healtcare services in order to reveal their quality and to improve the overall coverage, continuity and other features. We used the software ESRI Arc GIS 9.3, the Network Analyst function and data provided by Ambulance Service of Iasi (A.S.I.) with emergencies statistics for the first four months of 2012, processed by Microsoft Office Excel 2010. As examples, we chose "St. Maria" Children's Emergency Hospital and "St. Spiridon" Emergency Hospital. ArcGIS Network Analyst finds the best route to get from one location to another or a route that includes multiple locations. Each route is characterized by three stops. The starting point is always the office of Ambulance Service of Iasi (A.S.I.), a second stop at the case address and the third to the hospital unit chosen according to the patient's diagnosis and age. Spatial distribution of emergency cases for the first four months of 2012 in these two examples is one unequable, with higher concentrations in districts located in two areas of the city. The presented examples highlight the poor coverage of healthcare services for the population of Iasi, Romania, especially the South-West area and its vulnerability in situations of emergency. Implementing such a broad project would lead to more complex analyses that would improve the situation of pre-hospital emergency medical services, with final goal to deserve the population, improve the quality of healthcare and develop the interdisciplinary relationships.

  5. Validation of WBMOD in the Southeast Asian region

    NASA Astrophysics Data System (ADS)

    Cervera, M. A.; Thomas, R. M.; Groves, K. M.; Ramli, A. G.; Effendy

    2001-01-01

    The scintillation modeling code WBMOD, developed at North West Research, provides a global description of scintillation occurrence. However, the model has had limited calibration globally. Thus its performance in localized regions such as Australia-Southeast Asia is required to be evaluated. The Defence Science and Technology Organisation, Australia, in conjunction with Indonesian National Institute of Aeronautics and Space (LAPAN), Defence Science and Technology Centre, Malaysia, Air Force Research laboratory, United States, and IPS Radio and Space Services of Australia, has commissioned a network of GPS receivers to measure scintillation from sites in the region. One of the objectives of this deployment is to carry out a validation of WBMOD in the region. This paper describes the network of GPS receivers used to record the scintillation data. The details of the procedure used to validate WBMOD are given and results of the validation are presented for data collected during 1998 and 1999 from two sites, one situated in the southern anomaly region and the other situated near the geomagnetic equator. We found good overall agreement between WBMOD and the observations for low sunspot numbers at both sites, although some differences were noted, the major one being that the scintillation activity predicted by WBMOD tended to cut off too early in the night. At higher levels of sunspot activity, while WBMOD agreed with the observations in the southern anomaly region, we found that it significantly underestimated the level of scintillation activity at the geomagnetic equator.

  6. [Arthropods with vectorial interest in spanish public health].

    PubMed

    Bueno Marí, Rubén; Moreno Marí, Josefa; Oltra Moscardó, M Teresa; Jiménez Peydró, Ricardo

    2009-01-01

    Fifteen of the thirty-one Obligatory Communicable Diseases in Spain, exempting those of congenital or neonatal types, can be transmitted by several species of arthropods that are present in our country. Several arthropod orders are the suitable transmitters of tens of bacteria, fungi, virus and protozoa. This fact demands a through of the biology knowledge of these vectors in order to adopt efficient control measures that allow us to reduce the incidence levels of these diseases. Nevertheless, the epidemiological studies shouldn't remain only restricted to the diseases with active transmission cycles in our country. It is necessary to acquire a global vision because of allochton diseases that are perfectly extensible to our territory in the globalization context in which we are situated. All this information is important to know which factors are preventing the disease presence. The aim is to provide the National Epidemiological Surveillance Network with a valuable predictive capacity that allows it to predict the potential arrival of diseases and the consequent strengthening of the spanish Public Health. The goal of this work is to carry out a review of the spanish arthropod fauna with any vectorial interest. The current situation of some of the more important vectorial diseases in our country and the factors related to a resurgence reappearance and/or intensification of those ones are also discussed. Therefore, the study of these inappealable protagonists in our Public Health as an articulatory element in the complex network that any vectorial disease entails is absolutely necessary.

  7. A Korean Space Situational Awareness Program : OWL Network

    NASA Astrophysics Data System (ADS)

    Park, J.; Choi, Y.; Jo, J.; Moon, H.; Im, H.; Park, J.

    2012-09-01

    We are going to present a brief introduction to the OWL (Optical Wide-field patroL) network, one of Korean space situational awareness facilities. Primary objectives of the OWL network are 1) to obtain orbital information of Korean domestic LEOs using optical method, 2) to monitor GEO-belt over territory of Korea, and 3) to alleviate collisional risks posed to Korean satellites from space debris. For these purposes, we are planning to build a global network of telescopes which consists of five small wide-field telescopes and one 2m class telescope. The network of small telescopes will be dedicated mainly to the observation of domestic LEOs, but many slots will be open to other scientific programs such as GRB follow-up observations. Main targets of 2m telescope not only include artificial objects such as GEO debris and LEO debris with low inclination and high eccentricity, but also natural objects such as near Earth asteroids. We expect to monitor space objects down to 10cm in size in GEO using the 2m telescope system. Main research topics include size distribution and evolution of space debris. We also expect to utilize this facility for physical characterization and population study of near Earth asteroids. The aperture size of the small telescope system is 0.5m with Rechey-Cretian configuration and its field of view is 1.75 deg x 1.75 deg. It is equipped with 4K CCD with 9um pixel size, and its plate scale is 1.3 arcsec/pixel. A chopper wheel is employed to maximize astrometric solutions in a single CCD frame, and a de-rotator is used to compensate field rotation of the alt-az type mount. We have designed a compact end unit in which three rotating parts (chopper wheel, filter wheel, de-rotator) and a CCD camera are integrated, and dedicated telescope/site control boards for the OWL network. The design of 2m class telescope is still under discussion yet is expected to be fixed in the first half of 2013 at the latest. The OWL network will be operated in a fully autonomous mode based on scheduled observation. We have designed a compact and robust system for fully robotic operation. The network operating system located in the headquarter issues command files for observation which are transferred to each local site. After that, the site operating system interprets command files and controls each telescope system. In this way, we obtain and update orbital information of domestic satellites based on purely optical method. A prototype of the network telescope system will be installed at a test bed in Korea in commissioning phase. After the test operation, the design of the network telescope system will be finalized in the end of 2012. The installation of the telescope systems in 3 local sites will be completed in 2013, and the so-called "OWL basic network"" will start normal operations. In the first two years of the second stage of the OWL Project (2014-2015), we plan to place two small wide-field telescopes, and we build the 2m telescope system to complete the OWL network in the 2016.

  8. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    PubMed Central

    Murata, Masayuki

    2013-01-01

    The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account. PMID:24319375

  9. An Extended N-Player Network Game and Simulation of Four Investment Strategies on a Complex Innovation Network

    PubMed Central

    Zhou, Wen; Koptyug, Nikita; Ye, Shutao; Jia, Yifan; Lu, Xiaolong

    2016-01-01

    As computer science and complex network theory develop, non-cooperative games and their formation and application on complex networks have been important research topics. In the inter-firm innovation network, it is a typical game behavior for firms to invest in their alliance partners. Accounting for the possibility that firms can be resource constrained, this paper analyzes a coordination game using the Nash bargaining solution as allocation rules between firms in an inter-firm innovation network. We build an extended inter-firm n-player game based on nonidealized conditions, describe four investment strategies and simulate the strategies on an inter-firm innovation network in order to compare their performance. By analyzing the results of our experiments, we find that our proposed greedy strategy is the best-performing in most situations. We hope this study provides a theoretical insight into how firms make investment decisions. PMID:26745375

  10. An Extended N-Player Network Game and Simulation of Four Investment Strategies on a Complex Innovation Network.

    PubMed

    Zhou, Wen; Koptyug, Nikita; Ye, Shutao; Jia, Yifan; Lu, Xiaolong

    2016-01-01

    As computer science and complex network theory develop, non-cooperative games and their formation and application on complex networks have been important research topics. In the inter-firm innovation network, it is a typical game behavior for firms to invest in their alliance partners. Accounting for the possibility that firms can be resource constrained, this paper analyzes a coordination game using the Nash bargaining solution as allocation rules between firms in an inter-firm innovation network. We build an extended inter-firm n-player game based on nonidealized conditions, describe four investment strategies and simulate the strategies on an inter-firm innovation network in order to compare their performance. By analyzing the results of our experiments, we find that our proposed greedy strategy is the best-performing in most situations. We hope this study provides a theoretical insight into how firms make investment decisions.

  11. Successful strategies for competing networks

    NASA Astrophysics Data System (ADS)

    Aguirre, J.; Papo, D.; Buldú, J. M.

    2013-04-01

    Competitive interactions represent one of the driving forces behind evolution and natural selection in biological and sociological systems. For example, animals in an ecosystem may vie for food or mates; in a market economy, firms may compete over the same group of customers; sensory stimuli may compete for limited neural resources to enter the focus of attention. Here, we derive rules based on the spectral properties of the network governing the competitive interactions between groups of agents organized in networks. In the scenario studied here the winner of the competition, and the time needed to prevail, essentially depend on the way a given network connects to its competitors and on its internal structure. Our results allow assessment of the extent to which real networks optimize the outcome of their interaction, but also provide strategies through which competing networks can improve on their situation. The proposed approach is applicable to a wide range of systems that can be modelled as networks.

  12. Efficient spatial privacy preserving scheme for sensor network

    NASA Astrophysics Data System (ADS)

    Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar

    2013-03-01

    The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

  13. Implementation of an Adaptive Controller System from Concept to Flight Test

    NASA Technical Reports Server (NTRS)

    Larson, Richard R.; Burken, John J.; Butler, Bradley S.; Yokum, Steve

    2009-01-01

    The National Aeronautics and Space Administration Dryden Flight Research Center (Edwards, California) is conducting ongoing flight research using adaptive controller algorithms. A highly modified McDonnell-Douglas NF-15B airplane called the F-15 Intelligent Flight Control System (IFCS) is used to test and develop these algorithms. Modifications to this airplane include adding canards and changing the flight control systems to interface a single-string research controller processor for neural network algorithms. Research goals include demonstration of revolutionary control approaches that can efficiently optimize aircraft performance in both normal and failure conditions and advancement of neural-network-based flight control technology for new aerospace system designs. This report presents an overview of the processes utilized to develop adaptive controller algorithms during a flight-test program, including a description of initial adaptive controller concepts and a discussion of modeling formulation and performance testing. Design finalization led to integration with the system interfaces, verification of the software, validation of the hardware to the requirements, design of failure detection, development of safety limiters to minimize the effect of erroneous neural network commands, and creation of flight test control room displays to maximize human situational awareness; these are also discussed.

  14. Applying graphs and complex networks to football metric interpretation.

    PubMed

    Arriaza-Ardiles, E; Martín-González, J M; Zuniga, M D; Sánchez-Flores, J; de Saa, Y; García-Manso, J M

    2018-02-01

    This work presents a methodology for analysing the interactions between players in a football team, from the point of view of graph theory and complex networks. We model the complex network of passing interactions between players of a same team in 32 official matches of the Liga de Fútbol Profesional (Spain), using a passing/reception graph. This methodology allows us to understand the play structure of the team, by analysing the offensive phases of game-play. We utilise two different strategies for characterising the contribution of the players to the team: the clustering coefficient, and centrality metrics (closeness and betweenness). We show the application of this methodology by analyzing the performance of a professional Spanish team according to these metrics and the distribution of passing/reception in the field. Keeping in mind the dynamic nature of collective sports, in the future we will incorporate metrics which allows us to analyse the performance of the team also according to the circumstances of game-play and to different contextual variables such as, the utilisation of the field space, the time, and the ball, according to specific tactical situations. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Relative Localization in Wireless Sensor Networks for Measurement of Electric Fields under HVDC Transmission Lines

    PubMed Central

    Cui, Yong; Wang, Qiusheng; Yuan, Haiwen; Song, Xiao; Hu, Xuemin; Zhao, Luxing

    2015-01-01

    In the wireless sensor networks (WSNs) for electric field measurement system under the High-Voltage Direct Current (HVDC) transmission lines, it is necessary to obtain the electric field distribution with multiple sensors. The location information of each sensor is essential to the correct analysis of measurement results. Compared with the existing approach which gathers the location information by manually labelling sensors during deployment, the automatic localization can reduce the workload and improve the measurement efficiency. A novel and practical range-free localization algorithm for the localization of one-dimensional linear topology wireless networks in the electric field measurement system is presented. The algorithm utilizes unknown nodes' neighbor lists based on the Received Signal Strength Indicator (RSSI) values to determine the relative locations of nodes. The algorithm is able to handle the exceptional situation of the output permutation which can effectively improve the accuracy of localization. The performance of this algorithm under real circumstances has been evaluated through several experiments with different numbers of nodes and different node deployments in the China State Grid HVDC test base. Results show that the proposed algorithm achieves an accuracy of over 96% under different conditions. PMID:25658390

  16. Relative localization in wireless sensor networks for measurement of electric fields under HVDC transmission lines.

    PubMed

    Cui, Yong; Wang, Qiusheng; Yuan, Haiwen; Song, Xiao; Hu, Xuemin; Zhao, Luxing

    2015-02-04

    In the wireless sensor networks (WSNs) for electric field measurement system under the High-Voltage Direct Current (HVDC) transmission lines, it is necessary to obtain the electric field distribution with multiple sensors. The location information of each sensor is essential to the correct analysis of measurement results. Compared with the existing approach which gathers the location information by manually labelling sensors during deployment, the automatic localization can reduce the workload and improve the measurement efficiency. A novel and practical range-free localization algorithm for the localization of one-dimensional linear topology wireless networks in the electric field measurement system is presented. The algorithm utilizes unknown nodes' neighbor lists based on the Received Signal Strength Indicator (RSSI) values to determine the relative locations of nodes. The algorithm is able to handle the exceptional situation of the output permutation which can effectively improve the accuracy of localization. The performance of this algorithm under real circumstances has been evaluated through several experiments with different numbers of nodes and different node deployments in the China State Grid HVDC test base. Results show that the proposed algorithm achieves an accuracy of over 96% under different conditions.

  17. Neural correlates of individual performance differences in resolving perceptual conflict.

    PubMed

    Labrenz, Franziska; Themann, Maria; Wascher, Edmund; Beste, Christian; Pfleiderer, Bettina

    2012-01-01

    Attentional mechanisms are a crucial prerequisite to organize behavior. Most situations may be characterized by a 'competition' between salient, but irrelevant stimuli and less salient, relevant stimuli. In such situations top-down and bottom-up mechanisms interact with each other. In the present fMRI study, we examined how interindividual differences in resolving situations of perceptual conflict are reflected in brain networks mediating attentional selection. Doing so, we employed a change detection task in which subjects had to detect luminance changes in the presence and absence of competing distractors. The results show that good performers presented increased activation in the orbitofrontal cortex (BA 11), anterior cingulate (BA 25), inferior parietal lobule (BA 40) and visual areas V2 and V3 but decreased activation in BA 39. This suggests that areas mediating top-down attentional control are stronger activated in this group. Increased activity in visual areas reflects distinct neuronal enhancement relating to selective attentional mechanisms in order to solve the perceptual conflict. Opposed to good performers, brain areas activated by poor performers comprised the left inferior parietal lobule (BA 39) and fronto-parietal and visual regions were continuously deactivated, suggesting that poor performers perceive stronger conflict than good performers. Moreover, the suppression of neural activation in visual areas might indicate a strategy of poor performers to inhibit the processing of the irrelevant non-target feature. These results indicate that high sensitivity in perceptual areas and increased attentional control led to less conflict in stimulus processing and consequently to higher performance in competitive attentional selection.

  18. Group Formation in Economics

    NASA Astrophysics Data System (ADS)

    Demange, Gabrielle; Wooders, Myrna

    2005-01-01

    Broad and diverse ranges of activities are conducted within and by organized groups of individuals, including political, economic and social activities. These activities have recently become a subject of intense interest in economics and game theory. Some of the topics investigated in this collection are models of networks of power and privilege, trade networks, co-authorship networks, buyer-seller networks with differentiated products, and networks of medical innovation and the adaptation of new information. Other topics are social norms on punctuality, clubs and the provision of club goods and public goods, research and development and collusive alliances among corporations, and international alliances and trading agreements. While relatively recent, the literature on game theoretic studies of group formation in economics is already vast. This volume provides an introduction to this important literature on game-theoretic treatments of situations with networks, clubs, and coalitions, including some applications.

  19. Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Fisk, Michael Edward; Brugh, Alexander William

    A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalousmore » behavior. Data collected by a Unified Host Collection Agent ("UHCA") may also be used to detect anomalous behavior.« less

  20. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization approaches based on neural networks and other mathematical techniques.

  1. From hydrofracture to gaseofracture in porous rocks: influence of the nature of the injection fluid on the process

    NASA Astrophysics Data System (ADS)

    Johnsen, O.; Chevalier, C.; Toussaint, R.; Lindner, A.; Niebling, M.; Schmittbuhl, J.; Maloy, K. J.; Clement, E.; Flekkoy, E. G.

    2009-04-01

    We present experimental systems where we inject a fluid at high pressure in a poorly cohesive porous material saturated with the same fluid. This fluid is either a highly compressible gas (air), or an almost incompressible and viscous fluid (oil), in an otherwise identical porous matrix. We compare both situations. These porous materials are designed as analogs to real rocks in terms of processes, but their cohesion and geometry are tuned so that the hydrofracture process can be followed optically in the lab, in addition to the ability to follow the imposed pressure and fluxes. Namely, we work with lowly cohesive granular materials, confined in thin elongated Hele-Shaw cell, and follow it with high speed cameras. The fluid is injected on the side of the material, and the injection overpressure is maintained constant after the start. At sufficiently high overpressures, the mobilization of grains is observed, and the formation of hydrofracture fingering patterns is followed and analyzed quantitatively. The two situations where air is injected and where oil is injected are compared together. Many striking similarities are observed between both situations about the shape selections and dynamics, when time is rescaled according to the viscosity of the interstitial fluid. Some differences survive in the speed of the traveling hydrofracture, and their physical origin is discussed. In practice, this problem is relevant for important aspects in the formation and sustenance of increased permeability macroporous networks as demonstrated in nature and industry in many situations. E.g., in active hydrofracture in boreholes, piping/internal erosion in soils and dams, sand production in oil or water wells, and wormholes in oil sands. It is also important to understand the formation of macroporous channels, and the behavior of confined gouges when overpressured fluids are mobilized in seismic sources. Indeed, the formation of preferential paths in this situation can severely affect the fluid and heat transport properties in this situations, and thus affect the pore pressurization effects.

  2. European perspectives on pediatric formulations.

    PubMed

    Breitkreutz, Jörg

    2008-11-01

    The 2007 European Union (EU) regulation on medicinal products for pediatric use may change the present unsatisfying situation in the EU by stimulating research and development of medicines for use in children through rewards and incentives. This commentary reflects on the new EU regulations and guidelines, with special attention paid to the impact on pediatric formulation science. The focus of this article is on the EU perspective for pediatric formulations and highlights the differences compared with the pediatric drug formulation situation in the United States. Materials for this article were gathered during a literature search of MEDLINE and Chemical Abstracts (1970-October 2008) using the following terms: paediatric/pediatric drug formulations, age-appropriate dosage forms, child-appropriate medicines, and paediatric/pediatric regulation. Since the EU legislation on medicines for children came into force in 2007, a great emphasis has been placed on creating new organizations, scientific networks, and programs dealing with pediatric medicines and child-appropriate drug formulations. Although the US legislation was an appropriate model, the EU introduced some novel measures to improve the current situation, such as the Paediatric Investigation Plan and the Paediatric Use Marketing Authorisation. For globally operating pharmaceutical companies, the peculiarities of the European market have a strong impact on their product development strategies. Because the European approach demands early investigations into drug formulations for children, various issues must be resolved, including the following: choosing formulations for each age group, determining which excipients may be used in the formulation and which delivery device is appropriate, and predicting the taste sensation of an oral formulation. Numerous initiatives and networks are evolving in Europe. An important future task will be the coordination of these activities and the linking to other groups working on pediatric formulations outside the EU. Similar to the research in pediatric drug formulations that was stimulated by the US legislation and incentives of the last decade, the 2007 EU legislation promises improvements in the availability of child-appropriate drugs in Europe.

  3. Digital divide 2.0: the role of social networking sites in seeking health information online from a longitudinal perspective.

    PubMed

    Feng, Yang; Xie, Wenjing

    2015-01-01

    Adopting a longitudinal angle, this study analyzed data from the Pew Internet's Health Tracking Survey in 2006, 2008, and 2010 to identify potential communication inequalities in social networking site use. Results showed that with the growing role of social networking site use in predicting people's likelihood of seeking health information online, the socioeconomic and demographic factors that contributed to the disparities in social networking site use could also lead to disparities in seeking health information online. Also, results indicated that people are more likely to seek heath-related information online if they or their close family or friends have a chronic disease situation.

  4. Solving a bi-objective mathematical model for location-routing problem with time windows in multi-echelon reverse logistics using metaheuristic procedure

    NASA Astrophysics Data System (ADS)

    Ghezavati, V. R.; Beigi, M.

    2016-12-01

    During the last decade, the stringent pressures from environmental and social requirements have spurred an interest in designing a reverse logistics (RL) network. The success of a logistics system may depend on the decisions of the facilities locations and vehicle routings. The location-routing problem (LRP) simultaneously locates the facilities and designs the travel routes for vehicles among established facilities and existing demand points. In this paper, the location-routing problem with time window (LRPTW) and homogeneous fleet type and designing a multi-echelon, and capacitated reverse logistics network, are considered which may arise in many real-life situations in logistics management. Our proposed RL network consists of hybrid collection/inspection centers, recovery centers and disposal centers. Here, we present a new bi-objective mathematical programming (BOMP) for LRPTW in reverse logistic. Since this type of problem is NP-hard, the non-dominated sorting genetic algorithm II (NSGA-II) is proposed to obtain the Pareto frontier for the given problem. Several numerical examples are presented to illustrate the effectiveness of the proposed model and algorithm. Also, the present work is an effort to effectively implement the ɛ-constraint method in GAMS software for producing the Pareto-optimal solutions in a BOMP. The results of the proposed algorithm have been compared with the ɛ-constraint method. The computational results show that the ɛ-constraint method is able to solve small-size instances to optimality within reasonable computing times, and for medium-to-large-sized problems, the proposed NSGA-II works better than the ɛ-constraint.

  5. Artificial neural networks and the study of the psychoactivity of cannabinoid compounds.

    PubMed

    Honório, Káthia M; de Lima, Emmanuela F; Quiles, Marcos G; Romero, Roseli A F; Molfetta, Fábio A; da Silva, Albérico B F

    2010-06-01

    Cannabinoid compounds have widely been employed because of its medicinal and psychotropic properties. These compounds are isolated from Cannabis sativa (or marijuana) and are used in several medical treatments, such as glaucoma, nausea associated to chemotherapy, pain and many other situations. More recently, its use as appetite stimulant has been indicated in patients with cachexia or AIDS. In this work, the influence of several molecular descriptors on the psychoactivity of 50 cannabinoid compounds is analyzed aiming one obtain a model able to predict the psychoactivity of new cannabinoids. For this purpose, initially, the selection of descriptors was carried out using the Fisher's weight, the correlation matrix among the calculated variables and principal component analysis. From these analyses, the following descriptors have been considered more relevant: E(LUMO) (energy of the lowest unoccupied molecular orbital), Log P (logarithm of the partition coefficient), VC4 (volume of the substituent at the C4 position) and LP1 (Lovasz-Pelikan index, a molecular branching index). To follow, two neural network models were used to construct a more adequate model for classifying new cannabinoid compounds. The first model employed was multi-layer perceptrons, with algorithm back-propagation, and the second model used was the Kohonen network. The results obtained from both networks were compared and showed that both techniques presented a high percentage of correctness to discriminate psychoactive and psychoinactive compounds. However, the Kohonen network was superior to multi-layer perceptrons.

  6. Navigation Architecture for a Space Mobile Network

    NASA Technical Reports Server (NTRS)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.

  7. Estimating National-scale Emissions using Dense Monitoring Networks

    NASA Astrophysics Data System (ADS)

    Ganesan, A.; Manning, A.; Grant, A.; Young, D.; Oram, D.; Sturges, W. T.; Moncrieff, J. B.; O'Doherty, S.

    2014-12-01

    The UK's DECC (Deriving Emissions linked to Climate Change) network consists of four greenhouse gas measurement stations that are situated to constrain emissions from the UK and Northwest Europe. These four stations are located in Mace Head (West Coast of Ireland), and on telecommunication towers at Ridge Hill (Western England), Tacolneston (Eastern England) and Angus (Eastern Scotland). With the exception of Angus, which currently only measures carbon dioxide (CO2) and methane (CH4), the remaining sites are additionally equipped to monitor nitrous oxide (N2O). We present an analysis of the network's CH4 and N2O observations from 2011-2013 and compare derived top-down regional emissions with bottom-up inventories, including a recently produced high-resolution inventory (UK National Atmospheric Emissions Inventory). As countries are moving toward national-level emissions estimation, we also address some of the considerations that need to be made when designing these national networks. One of the novel aspects of this work is that we use a hierarchical Bayesian inversion framework. This methodology, which has newly been applied to greenhouse gas emissions estimation, is designed to estimate temporally and spatially varying model-measurement uncertainties and correlation scales, in addition to fluxes. Through this analysis, we demonstrate the importance of characterizing these covariance parameters in order to properly use data from high-density monitoring networks. This UK case study highlights the ways in which this new inverse framework can be used to address some of the limitations of traditional Bayesian inverse methods.

  8. Imbalance aware lithography hotspot detection: a deep learning approach

    NASA Astrophysics Data System (ADS)

    Yang, Haoyu; Luo, Luyang; Su, Jing; Lin, Chenxi; Yu, Bei

    2017-03-01

    With the advancement of VLSI technology nodes, light diffraction caused lithographic hotspots have become a serious problem affecting manufacture yield. Lithography hotspot detection at the post-OPC stage is imperative to check potential circuit failures when transferring designed patterns onto silicon wafers. Although conventional lithography hotspot detection methods, such as machine learning, have gained satisfactory performance, with extreme scaling of transistor feature size and more and more complicated layout patterns, conventional methodologies may suffer from performance degradation. For example, manual or ad hoc feature extraction in a machine learning framework may lose important information when predicting potential errors in ultra-large-scale integrated circuit masks. In this paper, we present a deep convolutional neural network (CNN) targeting representative feature learning in lithography hotspot detection. We carefully analyze impact and effectiveness of different CNN hyper-parameters, through which a hotspot-detection-oriented neural network model is established. Because hotspot patterns are always minorities in VLSI mask design, the training data set is highly imbalanced. In this situation, a neural network is no longer reliable, because a trained model with high classification accuracy may still suffer from high false negative results (missing hotspots), which is fatal in hotspot detection problems. To address the imbalance problem, we further apply minority upsampling and random-mirror flipping before training the network. Experimental results show that our proposed neural network model achieves highly comparable or better performance on the ICCAD 2012 contest benchmark compared to state-of-the-art hotspot detectors based on deep or representative machine leaning.

  9. Software defined multi-OLT passive optical network for flexible traffic allocation

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Zhang, Jiawei; Li, Hui

    2016-10-01

    With the rapid growth of 4G mobile network and vehicular network services mobile terminal users have increasing demand on data sharing among different radio remote units (RRUs) and roadside units (RSUs). Meanwhile, commercial video-streaming, video/voice conference applications delivered through peer-to-peer (P2P) technology are still keep on stimulating the sharp increment of bandwidth demand in both business and residential subscribers. However, a significant issue is that, although wavelength division multiplexing (WDM) and orthogonal frequency division multiplexing (OFDM) technology have been proposed to fulfil the ever-increasing bandwidth demand in access network, the bandwidth of optical fiber is not unlimited due to the restriction of optical component properties and modulation/demodulation technology, and blindly increase the wavelength cannot meet the cost-sensitive characteristic of the access network. In this paper, we propose a software defined multi-OLT PON architecture to support efficient scheduling of access network traffic. By introducing software defined networking technology and wavelength selective switch into TWDM PON system in central office, multiple OLTs can be considered as a bandwidth resource pool and support flexible traffic allocation for optical network units (ONUs). Moreover, under the configuration of the control plane, ONUs have the capability of changing affiliation between different OLTs under different traffic situations, thus the inter-OLT traffic can be localized and the data exchange pressure of the core network can be released. Considering this architecture is designed to be maximum following the TWDM PON specification, the existing optical distribution network (ODN) investment can be saved and conventional EPON/GPON equipment can be compatible with the proposed architecture. What's more, based on this architecture, we propose a dynamic wavelength scheduling algorithm, which can be deployed as an application on control plane and achieve effective scheduling OLT wavelength resources between different OLTs based on various traffic situation. Simulation results show that, by using the scheduling algorithm, network traffic between different OLTs can be optimized effectively, and the wavelength utilization of the multi-OLT system can be improved due to the flexible wavelength scheduling.

  10. Systematical analysis of cutaneous squamous cell carcinoma network of microRNAs, transcription factors, and target and host genes.

    PubMed

    Wang, Ning; Xu, Zhi-Wen; Wang, Kun-Hao

    2014-01-01

    MicroRNAs (miRNAs) are small non-coding RNA molecules found in multicellular eukaryotes which are implicated in development of cancer, including cutaneous squamous cell carcinoma (cSCC). Expression is controlled by transcription factors (TFs) that bind to specific DNA sequences, thereby controlling the flow (or transcription) of genetic information from DNA to messenger RNA. Interactions result in biological signal control networks. Molecular components involved in cSCC were here assembled at abnormally expressed, related and global levels. Networks at these three levels were constructed with corresponding biological factors in term of interactions between miRNAs and target genes, TFs and miRNAs, and host genes and miRNAs. Up/down regulation or mutation of the factors were considered in the context of the regulation and significant patterns were extracted. Participants of the networks were evaluated based on their expression and regulation of other factors. Sub-networks with two core TFs, TP53 and EIF2C2, as the centers are identified. These share self-adapt feedback regulation in which a mutual restraint exists. Up or down regulation of certain genes and miRNAs are discussed. Some, for example the expression of MMP13, were in line with expectation while others, including FGFR3, need further investigation of their unexpected behavior. The present research suggests that dozens of components, miRNAs, TFs, target genes and host genes included, unite as networks through their regulation to function systematically in human cSCC. Networks built under the currently available sources provide critical signal controlling pathways and frequent patterns. Inappropriate controlling signal flow from abnormal expression of key TFs may push the system into an incontrollable situation and therefore contributes to cSCC development.

  11. Investigation of OSL signal of resistors from mobile phones for accidental dosimetry

    NASA Astrophysics Data System (ADS)

    Mrozik, A.; Marczewska, B.; Bilski, P.; Gieszczyk, W.

    2014-12-01

    Resistors from mobile phones, usually located near the human body, are considered as individual dosimeters of ionizing radiation in emergency situations. The resistors contain Al2O3, which is optically stimulated luminescence (OSL) material sensitive to ionizing radiation. This work is focused on determination of dose homogeneity within a mobile phones which was carried out by OSL measurements of resistors placed in different parts inside the mobile phone. Separate, commercially available resistors, similar in the shape and size to the resistors from circuit board of the studied mobile phone, were situated in different locations inside it. The irradiations were performed in uniform 60Co and 137Cs radiation fields, with the mobile phones connected and not connected to the cellular network. The dose decrease of 9% was measured for original resistors situated between layer of copper-clad laminate and battery, in comparison to the dose at the front of the phone. The resistors showed the lower signal when the mobile phone was connected to the cellular network, due to higher temperature inside the housing. The profile of fading was investigated within 3 month period for resistors irradiated with 1 Gy of gamma rays to estimate of the fading coefficient.

  12. Environmental projects. Volume 16: Waste minimization assessment

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The Goldstone Deep Space Communications Complex (GDSCC), located in the MoJave Desert, is part of the National Aeronautics and Space Administration's (NASA's) Deep Space Network (DSN), the world's largest and most sensitive scientific telecommunications and radio navigation network. The Goldstone Complex is operated for NASA by the Jet Propulsion Laboratory. At present, activities at the GDSCC support the operation of nine parabolic dish antennas situated at five separate locations known as 'sites.' Each of the five sites at the GDSCC has one or more antennas, called 'Deep Space Stations' (DSS's). In the course of operation of these DSS's, various hazardous and non-hazardous wastes are generated. In 1992, JPL retained Kleinfelder, Inc., San Diego, California, to quantify the various streams of hazardous and non-hazardous wastes generated at the GDSCC. In June 1992, Kleinfelder, Inc., submitted a report to JPL entitled 'Waste Minimization Assessment.' This present volume is a JPL-expanded version of the Kleinfelder, Inc. report. The 'Waste Minimization Assessment' report did not find any deficiencies in the various waste-management programs now practiced at the GDSCC, and it found that these programs are being carried out in accordance with environmental rules and regulations.

  13. Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar

    Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less

  14. Discrete event simulation for exploring strategies: an urban water management case.

    PubMed

    Huang, Dong-Bin; Scholz, Roland W; Gujer, Willi; Chitwood, Derek E; Loukopoulos, Peter; Schertenleib, Roland; Siegrist, Hansruedi

    2007-02-01

    This paper presents a model structure aimed at offering an overview of the various elements of a strategy and exploring their multidimensional effects through time in an efficient way. It treats a strategy as a set of discrete events planned to achieve a certain strategic goal and develops a new form of causal networks as an interfacing component between decision makers and environment models, e.g., life cycle inventory and material flow models. The causal network receives a strategic plan as input in a discrete manner and then outputs the updated parameter sets to the subsequent environmental models. Accordingly, the potential dynamic evolution of environmental systems caused by various strategies can be stepwise simulated. It enables a way to incorporate discontinuous change in models for environmental strategy analysis, and enhances the interpretability and extendibility of a complex model by its cellular constructs. It is exemplified using an urban water management case in Kunming, a major city in Southwest China. By utilizing the presented method, the case study modeled the cross-scale interdependencies of the urban drainage system and regional water balance systems, and evaluated the effectiveness of various strategies for improving the situation of Dianchi Lake.

  15. Collaborative human-machine analysis to disambiguate entities in unstructured text and structured datasets

    NASA Astrophysics Data System (ADS)

    Davenport, Jack H.

    2016-05-01

    Intelligence analysts demand rapid information fusion capabilities to develop and maintain accurate situational awareness and understanding of dynamic enemy threats in asymmetric military operations. The ability to extract relationships between people, groups, and locations from a variety of text datasets is critical to proactive decision making. The derived network of entities must be automatically created and presented to analysts to assist in decision making. DECISIVE ANALYTICS Corporation (DAC) provides capabilities to automatically extract entities, relationships between entities, semantic concepts about entities, and network models of entities from text and multi-source datasets. DAC's Natural Language Processing (NLP) Entity Analytics model entities as complex systems of attributes and interrelationships which are extracted from unstructured text via NLP algorithms. The extracted entities are automatically disambiguated via machine learning algorithms, and resolution recommendations are presented to the analyst for validation; the analyst's expertise is leveraged in this hybrid human/computer collaborative model. Military capability is enhanced by these NLP Entity Analytics because analysts can now create/update an entity profile with intelligence automatically extracted from unstructured text, thereby fusing entity knowledge from structured and unstructured data sources. Operational and sustainment costs are reduced since analysts do not have to manually tag and resolve entities.

  16. Flash floods warning technique based on wireless communication networks data

    NASA Astrophysics Data System (ADS)

    David, Noam; Alpert, Pinhas; Messer, Hagit

    2010-05-01

    Flash floods can occur throughout or subsequent to rainfall events, particularly in cases where the precipitation is of high-intensity. Unfortunately, each year these floods cause severe property damage and heavy casualties. At present, there are no sufficient real time flash flood warning facilities found to cope with this phenomenon. Here we show the tremendous potential of flash floods advanced warning based on precipitation measurements of commercial microwave links. As was recently shown, wireless communication networks supply high resolution precipitation measurements at ground level while often being situated in flood prone areas, covering large parts of these hazardous regions. We present the flash flood warning potential of the wireless communication system for two different cases when floods occurred at the Judean desert and at the northern Negev in Israel. In both cases, an advanced warning regarding the hazard could have been announced based on this system. • This research was supported by THE ISRAEL SCIENCE FOUNDATION (grant No. 173/08). This work was also supported by a grant from the Yeshaya Horowitz Association, Jerusalem. Additional support was given by the PROCEMA-BMBF project and by the GLOWA-JR BMBF project.

  17. Secure Networks for First Responders and Special Forces

    NASA Technical Reports Server (NTRS)

    2005-01-01

    When NASA needed help better securing its communications with orbiting satellites, the Agency called on Western DataCom Co., Inc., to help develop a prototype Internet Protocol (IP) router. Westlake, Ohio-based Western DataCom designs, develops, and manufactures hardware that secures voice, video, and data transmissions over any IP-based network. The technology that it jointly developed with NASA is now serving as a communications solution in military and first-response situations.

  18. Cyber Situational Awareness through Operational Streaming Analysis

    DTIC Science & Technology

    2011-04-07

    Our system makes use of two specific data sources from network traffic: raw packet data and NetFlow connection summary records (de- scribed below...implemented an operational prototype system using the following two data feeds. a) NetFlow Data: Our system processes the NetFlow records of all...Internet gateway traffic for a large enterprise network. It uses the standard Cisco NetFlow version 5 proto- col, which defines a flow as a

  19. Management and development of local area network upgrade prototype

    NASA Technical Reports Server (NTRS)

    Fouser, T. J.

    1981-01-01

    Given the situation of having management and development users accessing a central computing facility and given the fact that these same users have the need for local computation and storage, the utilization of a commercially available networking system such as CP/NET from Digital Research provides the building blocks for communicating intelligent microsystems to file and print services. The major problems to be overcome in the implementation of such a network are the dearth of intelligent communication front-ends for the microcomputers and the lack of a rich set of management and software development tools.

  20. A network thermodynamic method for numerical solution of the Nernst-Planck and Poisson equation system with application to ionic transport through membranes.

    PubMed

    Horno, J; González-Caballero, F; González-Fernández, C F

    1990-01-01

    Simple techniques of network thermodynamics are used to obtain the numerical solution of the Nernst-Planck and Poisson equation system. A network model for a particular physical situation, namely ionic transport through a thin membrane with simultaneous diffusion, convection and electric current, is proposed. Concentration and electric field profiles across the membrane, as well as diffusion potential, have been simulated using the electric circuit simulation program, SPICE. The method is quite general and extremely efficient, permitting treatments of multi-ion systems whatever the boundary and experimental conditions may be.

  1. Network security.

    PubMed

    Chang, Kyle

    2006-01-01

    As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world. Therefore, the best course of action is to do as much research as possible rather than falling into a situation of risk and vulnerability by implementing a system or network that does not work with your business. Remember, the technology is there to support your business; the business should not have to work around the technology.

  2. Practical application of game theory based production flow planning method in virtual manufacturing networks

    NASA Astrophysics Data System (ADS)

    Olender, M.; Krenczyk, D.

    2016-08-01

    Modern enterprises have to react quickly to dynamic changes in the market, due to changing customer requirements and expectations. One of the key area of production management, that must continuously evolve by searching for new methods and tools for increasing the efficiency of manufacturing systems is the area of production flow planning and control. These aspects are closely connected with the ability to implement the concept of Virtual Enterprises (VE) and Virtual Manufacturing Network (VMN) in which integrated infrastructure of flexible resources are created. In the proposed approach, the players role perform the objects associated with the objective functions, allowing to solve the multiobjective production flow planning problems based on the game theory, which is based on the theory of the strategic situation. For defined production system and production order models ways of solving the problem of production route planning in VMN on computational examples for different variants of production flow is presented. Possible decision strategy to use together with an analysis of calculation results is shown.

  3. The Olfactory System Revealed: Non-Invasive Mapping by using Constrained Spherical Deconvolution Tractography in Healthy Humans

    PubMed Central

    Milardi, Demetrio; Cacciola, Alberto; Calamuneri, Alessandro; Ghilardi, Maria F.; Caminiti, Fabrizia; Cascio, Filippo; Andronaco, Veronica; Anastasi, Giuseppe; Mormina, Enricomaria; Arrigo, Alessandro; Bruschetta, Daniele; Quartarone, Angelo

    2017-01-01

    Although the olfactory sense has always been considered with less interest than the visual, auditive or somatic senses, it does plays a major role in our ordinary life, with important implication in dangerous situations or in social and emotional behaviors. Traditional Diffusion Tensor signal model and related tractography have been used in the past years to reconstruct the cranial nerves, including the olfactory nerve (ON). However, no supplementary information with regard to the pathways of the olfactory network have been provided. Here, by using the more advanced Constrained Spherical Deconvolution (CSD) diffusion model, we show for the first time in vivo and non-invasively that, in healthy humans, the olfactory system has a widely distributed anatomical network to several cortical regions as well as to many subcortical structures. Although the present study focuses on an healthy sample size, a similar approach could be applied in the near future to gain important insights with regard to the early involvement of olfaction in several neurodegenerative disorders. PMID:28443000

  4. Filtering for networked control systems with single/multiple measurement packets subject to multiple-step measurement delays and multiple packet dropouts

    NASA Astrophysics Data System (ADS)

    Moayedi, Maryam; Foo, Yung Kuan; Chai Soh, Yeng

    2011-03-01

    The minimum-variance filtering problem in networked control systems, where both random measurement transmission delays and packet dropouts may occur, is investigated in this article. Instead of following the many existing results that solve the problem by using probabilistic approaches based on the probabilities of the uncertainties occurring between the sensor and the filter, we propose a non-probabilistic approach by time-stamping the measurement packets. Both single-measurement and multiple measurement packets are studied. We also consider the case of burst arrivals, where more than one packet may arrive between the receiver's previous and current sampling times; the scenario where the control input is non-zero and subject to delays and packet dropouts is examined as well. It is shown that, in such a situation, the optimal state estimate would generally be dependent on the possible control input. Simulations are presented to demonstrate the performance of the various proposed filters.

  5. Developing a Methodology for Eliciting Subjective Probability Estimates During Expert Evaluations of Safety Interventions: Application for Bayesian Belief Networks

    NASA Technical Reports Server (NTRS)

    Wiegmann, Douglas A.a

    2005-01-01

    The NASA Aviation Safety Program (AvSP) has defined several products that will potentially modify airline and/or ATC operations, enhance aircraft systems, and improve the identification of potential hazardous situations within the National Airspace System (NAS). Consequently, there is a need to develop methods for evaluating the potential safety benefit of each of these intervention products so that resources can be effectively invested to produce the judgments to develop Bayesian Belief Networks (BBN's) that model the potential impact that specific interventions may have. Specifically, the present report summarizes methodologies for improving the elicitation of probability estimates during expert evaluations of AvSP products for use in BBN's. The work involved joint efforts between Professor James Luxhoj from Rutgers University and researchers at the University of Illinois. The Rutgers' project to develop BBN's received funding by NASA entitled "Probabilistic Decision Support for Evaluating Technology Insertion and Assessing Aviation Safety System Risk." The proposed project was funded separately but supported the existing Rutgers' program.

  6. Negative and Positive Factors Associated With the Well-Being of Lesbian, Gay, Bisexual, Transgender, Queer, and Questioning (LGBTQ) Youth

    PubMed Central

    Higa, Darrel; Hoppe, Marilyn J.; Lindhorst, Taryn; Mincer, Shawn; Beadnell, Blair; Morrison, Diane M.; Wells, Elizabeth A.; Todd, Avry; Mountz, Sarah

    2015-01-01

    Factors associated with the well-being of lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) youth were qualitatively examined to better understand how these factors are experienced from the youths’ perspectives. Largely recruited from LGBTQ youth groups, 68 youth participated in focus groups (n = 63) or individual interviews (n = 5). The sample included 50% male, 47% female, and 3% transgender participants. Researchers used a consensual methods approach to identify negative and positive factors across 8 domains. Negative factors were associated with families, schools, religious institutions, and community or neighborhood; positive factors were associated with the youth's own identity development, peer networks, and involvement in the LGBTQ community. These findings suggest a pervasiveness of negative experiences in multiple contexts, and the importance of fostering a positive LGBTQ identity and supportive peer/community networks. Efforts should work towards reducing and eliminating the prejudicial sentiments often present in the institutions and situations that LGBTQ youth encounter. PMID:25722502

  7. Negative and Positive Factors Associated With the Well-Being of Lesbian, Gay, Bisexual, Transgender, Queer, and Questioning (LGBTQ) Youth.

    PubMed

    Higa, Darrel; Hoppe, Marilyn J; Lindhorst, Taryn; Mincer, Shawn; Beadnell, Blair; Morrison, Diane M; Wells, Elizabeth A; Todd, Avry; Mountz, Sarah

    2014-09-01

    Factors associated with the well-being of lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) youth were qualitatively examined to better understand how these factors are experienced from the youths' perspectives. Largely recruited from LGBTQ youth groups, 68 youth participated in focus groups ( n = 63) or individual interviews ( n = 5). The sample included 50% male, 47% female, and 3% transgender participants. Researchers used a consensual methods approach to identify negative and positive factors across 8 domains. Negative factors were associated with families, schools, religious institutions, and community or neighborhood; positive factors were associated with the youth's own identity development, peer networks, and involvement in the LGBTQ community. These findings suggest a pervasiveness of negative experiences in multiple contexts, and the importance of fostering a positive LGBTQ identity and supportive peer/community networks. Efforts should work towards reducing and eliminating the prejudicial sentiments often present in the institutions and situations that LGBTQ youth encounter.

  8. Evaluation of electromagnetic interference and exposure assessment from s-health solutions based on Wi-Fi devices.

    PubMed

    de Miguel-Bilbao, Silvia; Aguirre, Erik; Lopez Iturri, Peio; Azpilicueta, Leire; Roldán, José; Falcone, Francisco; Ramos, Victoria

    2015-01-01

    In the last decade the number of wireless devices operating at the frequency band of 2.4 GHz has increased in several settings, such as healthcare, occupational, and household. In this work, the emissions from Wi-Fi transceivers applicable to context aware scenarios are analyzed in terms of potential interference and assessment on exposure guideline compliance. Near field measurement results as well as deterministic simulation results on realistic indoor environments are presented, providing insight on the interaction between the Wi-Fi transceiver and implantable/body area network devices as well as other transceivers operating within an indoor environment, exhibiting topological and morphological complexity. By following approaches (near field estimation/deterministic estimation), colocated body situations as well as large indoor emissions can be determined. The results show in general compliance with exposure levels and the impact of overall network deployment, which can be optimized in order to reduce overall interference levels while maximizing system performance.

  9. Evaluation of Electromagnetic Interference and Exposure Assessment from s-Health Solutions Based on Wi-Fi Devices

    PubMed Central

    de Miguel-Bilbao, Silvia; Aguirre, Erik; Lopez Iturri, Peio; Azpilicueta, Leire; Roldán, José; Falcone, Francisco; Ramos, Victoria

    2015-01-01

    In the last decade the number of wireless devices operating at the frequency band of 2.4 GHz has increased in several settings, such as healthcare, occupational, and household. In this work, the emissions from Wi-Fi transceivers applicable to context aware scenarios are analyzed in terms of potential interference and assessment on exposure guideline compliance. Near field measurement results as well as deterministic simulation results on realistic indoor environments are presented, providing insight on the interaction between the Wi-Fi transceiver and implantable/body area network devices as well as other transceivers operating within an indoor environment, exhibiting topological and morphological complexity. By following approaches (near field estimation/deterministic estimation), colocated body situations as well as large indoor emissions can be determined. The results show in general compliance with exposure levels and the impact of overall network deployment, which can be optimized in order to reduce overall interference levels while maximizing system performance. PMID:25632400

  10. A Neural Network Approach for Building An Obstacle Detection Model by Fusion of Proximity Sensors Data

    PubMed Central

    Peralta, Emmanuel; Vargas, Héctor; Hermosilla, Gabriel

    2018-01-01

    Proximity sensors are broadly used in mobile robots for obstacle detection. The traditional calibration process of this kind of sensor could be a time-consuming task because it is usually done by identification in a manual and repetitive way. The resulting obstacles detection models are usually nonlinear functions that can be different for each proximity sensor attached to the robot. In addition, the model is highly dependent on the type of sensor (e.g., ultrasonic or infrared), on changes in light intensity, and on the properties of the obstacle such as shape, colour, and surface texture, among others. That is why in some situations it could be useful to gather all the measurements provided by different kinds of sensor in order to build a unique model that estimates the distances to the obstacles around the robot. This paper presents a novel approach to get an obstacles detection model based on the fusion of sensors data and automatic calibration by using artificial neural networks. PMID:29495338

  11. Control of autonomous robot using neural networks

    NASA Astrophysics Data System (ADS)

    Barton, Adam; Volna, Eva

    2017-07-01

    The aim of the article is to design a method of control of an autonomous robot using artificial neural networks. The introductory part describes control issues from the perspective of autonomous robot navigation and the current mobile robots controlled by neural networks. The core of the article is the design of the controlling neural network, and generation and filtration of the training set using ART1 (Adaptive Resonance Theory). The outcome of the practical part is an assembled Lego Mindstorms EV3 robot solving the problem of avoiding obstacles in space. To verify models of an autonomous robot behavior, a set of experiments was created as well as evaluation criteria. The speed of each motor was adjusted by the controlling neural network with respect to the situation in which the robot was found.

  12. Synaptic plasticity in a recurrent neural network for versatile and adaptive behaviors of a walking robot.

    PubMed

    Grinke, Eduard; Tetzlaff, Christian; Wörgötter, Florentin; Manoonpong, Poramate

    2015-01-01

    Walking animals, like insects, with little neural computing can effectively perform complex behaviors. For example, they can walk around their environment, escape from corners/deadlocks, and avoid or climb over obstacles. While performing all these behaviors, they can also adapt their movements to deal with an unknown situation. As a consequence, they successfully navigate through their complex environment. The versatile and adaptive abilities are the result of an integration of several ingredients embedded in their sensorimotor loop. Biological studies reveal that the ingredients include neural dynamics, plasticity, sensory feedback, and biomechanics. Generating such versatile and adaptive behaviors for a many degrees-of-freedom (DOFs) walking robot is a challenging task. Thus, in this study, we present a bio-inspired approach to solve this task. Specifically, the approach combines neural mechanisms with plasticity, exteroceptive sensory feedback, and biomechanics. The neural mechanisms consist of adaptive neural sensory processing and modular neural locomotion control. The sensory processing is based on a small recurrent neural network consisting of two fully connected neurons. Online correlation-based learning with synaptic scaling is applied to adequately change the connections of the network. By doing so, we can effectively exploit neural dynamics (i.e., hysteresis effects and single attractors) in the network to generate different turning angles with short-term memory for a walking robot. The turning information is transmitted as descending steering signals to the neural locomotion control which translates the signals into motor actions. As a result, the robot can walk around and adapt its turning angle for avoiding obstacles in different situations. The adaptation also enables the robot to effectively escape from sharp corners or deadlocks. Using backbone joint control embedded in the the locomotion control allows the robot to climb over small obstacles. Consequently, it can successfully explore and navigate in complex environments. We firstly tested our approach on a physical simulation environment and then applied it to our real biomechanical walking robot AMOSII with 19 DOFs to adaptively avoid obstacles and navigate in the real world.

  13. Synaptic plasticity in a recurrent neural network for versatile and adaptive behaviors of a walking robot

    PubMed Central

    Grinke, Eduard; Tetzlaff, Christian; Wörgötter, Florentin; Manoonpong, Poramate

    2015-01-01

    Walking animals, like insects, with little neural computing can effectively perform complex behaviors. For example, they can walk around their environment, escape from corners/deadlocks, and avoid or climb over obstacles. While performing all these behaviors, they can also adapt their movements to deal with an unknown situation. As a consequence, they successfully navigate through their complex environment. The versatile and adaptive abilities are the result of an integration of several ingredients embedded in their sensorimotor loop. Biological studies reveal that the ingredients include neural dynamics, plasticity, sensory feedback, and biomechanics. Generating such versatile and adaptive behaviors for a many degrees-of-freedom (DOFs) walking robot is a challenging task. Thus, in this study, we present a bio-inspired approach to solve this task. Specifically, the approach combines neural mechanisms with plasticity, exteroceptive sensory feedback, and biomechanics. The neural mechanisms consist of adaptive neural sensory processing and modular neural locomotion control. The sensory processing is based on a small recurrent neural network consisting of two fully connected neurons. Online correlation-based learning with synaptic scaling is applied to adequately change the connections of the network. By doing so, we can effectively exploit neural dynamics (i.e., hysteresis effects and single attractors) in the network to generate different turning angles with short-term memory for a walking robot. The turning information is transmitted as descending steering signals to the neural locomotion control which translates the signals into motor actions. As a result, the robot can walk around and adapt its turning angle for avoiding obstacles in different situations. The adaptation also enables the robot to effectively escape from sharp corners or deadlocks. Using backbone joint control embedded in the the locomotion control allows the robot to climb over small obstacles. Consequently, it can successfully explore and navigate in complex environments. We firstly tested our approach on a physical simulation environment and then applied it to our real biomechanical walking robot AMOSII with 19 DOFs to adaptively avoid obstacles and navigate in the real world. PMID:26528176

  14. Men are from Mars, women are from Venus? Examining gender differences in self-presentation on social networking sites.

    PubMed

    Haferkamp, Nina; Eimler, Sabrina C; Papadakis, Anna-Margarita; Kruck, Jana Vanessa

    2012-02-01

    Psychological research on gender differences in self-presentation has already revealed that women place higher priority on creating a positive self-presentation, while men are less concerned about the image they present in face-to-face (ftf) communication. Nowadays, with the extensive use of new media, self-presentation is no longer so closely tied to ftf situations, but can also take place in the online world. Specifically, social networking sites (SNS), such as Facebook or MySpace, offer various features such as profile pictures, groups, and virtual bulletin boards with which users can create elaborated online representations of themselves. What remains open is whether this virtual self-presentation on SNS is subject to gender differences. Based on studies emphasizing gender-related differences in Internet communication and behavior in general, it can be assumed that men and women have different motives regarding their SNS usage as well. A multimethodological study, combining results of an online survey and a content analysis of 106 user profiles, assessed users' diverse motives for participating in SNS in general, and their use of specific profile elements or self-presentation in particular. In this sample of StudiVZ users, women tend to be more likely to use SNS for comparing themselves with others and for searching for information. Men, on the other hand, are more likely to look at other people's profiles to find friends. Moreover, women tend to use group names for their self-presentation and prefer adding portrait photos to their profiles, while men choose full-body shots.

  15. Cognitive Coordination on the Network Centric Battlefield

    DTIC Science & Technology

    2009-03-06

    access in spoken language comprehension: Evaluating a linking hypothesis between fixations and linguistic processing. Journal of Psycholinguistic ...Research, Vol 29, 557-580 56 Trueswell, J. & Tanenhaus, M (eds.) (2004). World-situated language use: Psycholinguistic , linguistic, and computational

  16. Simulation of spread and control of lesions in brain.

    PubMed

    Thamattoor Raman, Krishna Mohan

    2012-01-01

    A simulation model for the spread and control of lesions in the brain is constructed using a planar network (graph) representation for the central nervous system (CNS). The model is inspired by the lesion structures observed in the case of multiple sclerosis (MS), a chronic disease of the CNS. The initial lesion site is at the center of a unit square and spreads outwards based on the success rate in damaging edges (axons) of the network. The damaged edges send out alarm signals which, at appropriate intensity levels, generate programmed cell death. Depending on the extent and timing of the programmed cell death, the lesion may get controlled or aggravated akin to the control of wild fires by burning of peripheral vegetation. The parameter phase space of the model shows smooth transition from uncontrolled situation to controlled situation. The simulations show that the model is capable of generating a wide variety of lesion growth and arrest scenarios.

  17. Using electronic health record alerts to provide public health situational awareness to clinicians.

    PubMed

    Lurio, Joseph; Morrison, Frances P; Pichardo, Michelle; Berg, Rachel; Buck, Michael D; Wu, Winfred; Kitson, Kwame; Mostashari, Farzad; Calman, Neil

    2010-01-01

    Alerting providers to public health situations requires timeliness and context-relevance, both lacking in current systems. Incorporating decision support tools into electronic health records may provide a way to deploy public health alerts to clinicians at the point of care. A timely process for responding to Health Alert Network messages sent by the New York City Department of Health and Mental Hygiene was developed by a network of community health centers. Alerts with order sets and recommended actions were created to notify primary care providers of local disease outbreaks. The process, effect, and lessons learned from alerts for Legionella, toxogenic E coli, and measles outbreaks are described. Electronic alerts have the potential to improve management of diseases during an outbreak, including appropriate laboratory testing, management guidance, and diagnostic assistance as well as to enhance bi-directional data exchange between clinical and public health organizations.

  18. Using electronic health record alerts to provide public health situational awareness to clinicians

    PubMed Central

    Lurio, Joseph; Pichardo, Michelle; Berg, Rachel; Buck, Michael D; Wu, Winfred; Kitson, Kwame; Mostashari, Farzad; Calman, Neil

    2010-01-01

    Alerting providers to public health situations requires timeliness and context-relevance, both lacking in current systems. Incorporating decision support tools into electronic health records may provide a way to deploy public health alerts to clinicians at the point of care. A timely process for responding to Health Alert Network messages sent by the New York City Department of Health and Mental Hygiene was developed by a network of community health centers. Alerts with order sets and recommended actions were created to notify primary care providers of local disease outbreaks. The process, effect, and lessons learned from alerts for Legionella, toxogenic E coli, and measles outbreaks are described. Electronic alerts have the potential to improve management of diseases during an outbreak, including appropriate laboratory testing, management guidance, and diagnostic assistance as well as to enhance bi-directional data exchange between clinical and public health organizations. PMID:20190067

  19. A ubiquitous and low-cost solution for movement monitoring and accident detection based on sensor fusion.

    PubMed

    Felisberto, Filipe; Fdez-Riverola, Florentino; Pereira, António

    2014-05-21

    The low average birth rate in developed countries and the increase in life expectancy have lead society to face for the first time an ageing situation. This situation associated with the World's economic crisis (which started in 2008) forces the need of equating better and more efficient ways of providing more quality of life for the elderly. In this context, the solution presented in this work proposes to tackle the problem of monitoring the elderly in a way that is not restrictive for the life of the monitored, avoiding the need for premature nursing home admissions. To this end, the system uses the fusion of sensory data provided by a network of wireless sensors placed on the periphery of the user. Our approach was also designed with a low-cost deployment in mind, so that the target group may be as wide as possible. Regarding the detection of long-term problems, the tests conducted showed that the precision of the system in identifying and discerning body postures and body movements allows for a valid monitorization and rehabilitation of the user. Moreover, concerning the detection of accidents, while the proposed solution presented a near 100% precision at detecting normal falls, the detection of more complex falls (i.e., hampered falls) will require further study.

  20. Optimal routing of hazardous substances in time-varying, stochastic transportation networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woods, A.L.; Miller-Hooks, E.; Mahmassani, H.S.

    This report is concerned with the selection of routes in a network along which to transport hazardous substances, taking into consideration several key factors pertaining to the cost of transport and the risk of population exposure in the event of an accident. Furthermore, the fact that travel time and the risk measures are not constant over time is explicitly recognized in the routing decisions. Existing approaches typically assume static conditions, possibly resulting in inefficient route selection and unnecessary risk exposure. The report described the application of recent advances in network analysis methodologies to the problem of routing hazardous substances. Severalmore » specific problem formulations are presented, reflecting different degrees of risk aversion on the part of the decision-maker, as well as different possible operational scenarios. All procedures explicitly consider travel times and travel costs (including risk measures) to be stochastic time-varying quantities. The procedures include both exact algorithms, which may require extensive computational effort in some situations, as well as more efficient heuristics that may not guarantee a Pareto-optimal solution. All procedures are systematically illustrated for an example application using the Texas highway network, for both normal and incident condition scenarios. The application illustrates the trade-offs between the information obtained in the solution and computational efficiency, and highlights the benefits of incorporating these procedures in a decision-support system for hazardous substance shipment routing decisions.« less

  1. Applications of artificial neural network in AIDS research and therapy.

    PubMed

    Sardari, S; Sardari, D

    2002-01-01

    In recent years considerable effort has been devoted to applying pattern recognition techniques to the complex task of data analysis in drug research. Artificial neural networks (ANN) methodology is a modeling method with great ability to adapt to a new situation, or control an unknown system, using data acquired in previous experiments. In this paper, a brief history of ANN and the basic concepts behind the computing, the mathematical and algorithmic formulation of each of the techniques, and their developmental background is presented. Based on the abilities of ANNs in pattern recognition and estimation of system outputs from the known inputs, the neural network can be considered as a tool for molecular data analysis and interpretation. Analysis by neural networks improves the classification accuracy, data quantification and reduces the number of analogues necessary for correct classification of biologically active compounds. Conformational analysis and quantifying the components in mixtures using NMR spectra, aqueous solubility prediction and structure-activity correlation are among the reported applications of ANN as a new modeling method. Ranging from drug design and discovery to structure and dosage form design, the potential pharmaceutical applications of the ANN methodology are significant. In the areas of clinical monitoring, utilization of molecular simulation and design of bioactive structures, ANN would make the study of the status of the health and disease possible and brings their predicted chemotherapeutic response closer to reality.

  2. Knowledge brokers in a knowledge network: the case of Seniors Health Research Transfer Network knowledge brokers.

    PubMed

    Conklin, James; Lusk, Elizabeth; Harris, Megan; Stolee, Paul

    2013-01-09

    The purpose of this paper is to describe and reflect on the role of knowledge brokers (KBs) in the Seniors Health Research Transfer Network (SHRTN). The paper reviews the relevant literature on knowledge brokering, and then describes the evolving role of knowledge brokering in this knowledge network. The description of knowledge brokering provided here is based on a developmental evaluation program and on the experiences of the authors. Data were gathered through qualitative and quantitative methods, analyzed by the evaluators, and interpreted by network members who participated in sensemaking forums. The results were fed back to the network each year in the form of formal written reports that were widely distributed to network members, as well as through presentations to the network's members. The SHRTN evaluation and our experiences as evaluators and KBs suggest that a SHRTN KB facilitates processes of learning whereby people are connected with tacit or explicit knowledge sources that will help them to resolve work-related challenges. To make this happen, KBs engage in a set of relational, technical, and analytical activities that help communities of practice (CoPs) to develop and operate, facilitate exchanges among people with similar concerns and interests, and help groups and individuals to create, explore, and apply knowledge in their practice. We also suggest that the role is difficult to define, emergent, abstract, episodic, and not fully understood. The KB role within this knowledge network has developed and matured over time. The KB adapts to the social and technical affordances of each situation, and fashions a unique and relevant process to create relationships and promote learning and change. The ability to work with teams and to develop relevant models and feasible approaches are critical KB skills. The KB is a leader who wields influence rather than power, and who is prepared to adopt whatever roles and approaches are needed to bring about a valuable result.

  3. An Intelligent Pinger Network for Solid Glacier Environments

    NASA Astrophysics Data System (ADS)

    Schönitz, S.; Reuter, S.; Henke, C.; Jeschke, S.; Ewert, D.; Eliseev, D.; Heinen, D.; Linder, P.; Scholz, F.; Weinstock, L.; Wickmann, S.; Wiebusch, C.; Zierke, S.

    2016-12-01

    This talk presents a novel approach for an intelligent, agent-based pinger network in an extraterrestrial glacier environment. Because of recent findings of the Cassini spacecraft, a mission to Saturn's moon Enceladus is planned in order search for extraterrestrial life within the ocean beneath Enceladus' ice crust. Therefore, a maneuverable melting probe, the EnEx probe, was developed to melt into Enceladus' ice and take liquid samples from water-filled crevasses. Hence, the probe collecting the samples has to be able to navigate in ice which is a hard problem, because neither visual nor gravitational methods can be used. To enhance the navigability of the probe, a network of autonomous pinger units (APU) is in development that is able to extract a map of the ice environment via ultrasonic soundwaves. A network of these APUs will be deployed on the surface of Enceladus, melt into the ice and form a network to help guide the probe safely to its destination. The APU network is able to form itself fully autonomously and to compensate system failures of individual APUs. The agents controlling the single APU are realized by rule-based expert systems implemented in CLIPS. The rule-based expert system evaluates available information of the environment, decides for actions to take to achieve the desired goal (e.g. a specific network topology), and executes and monitors such actions. In general, it encodes certain situations that are evaluated whenever an APU is currently idle, and then decides for a next action to take. It bases this decision on its internal world model that is shared with the other APUs. The optimal network topology that defines each agents position is iteratively determined by mixed-integer nonlinear programming. Extensive simulations studies show that the proposed agent design enables the APUs to form a robust network topology that is suited to create a reliable 3D map of the ice environment.

  4. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    NASA Astrophysics Data System (ADS)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  5. Impact of Network Activity Levels on the Performance of Passive Network Service Dependency Discovery

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Chikkagoudar, Satish; Arthur-Durett, Kristine M.

    Network services often do not operate alone, but instead, depend on other services distributed throughout a network to correctly function. If a service fails, is disrupted, or degraded, it is likely to impair other services. The web of dependencies can be surprisingly complex---especially within a large enterprise network---and evolve with time. Acquiring, maintaining, and understanding dependency knowledge is critical for many network management and cyber defense activities. While automation can improve situation awareness for network operators and cyber practitioners, poor detection accuracy reduces their confidence and can complicate their roles. In this paper we rigorously study the effects of networkmore » activity levels on the detection accuracy of passive network-based service dependency discovery methods. The accuracy of all except for one method was inversely proportional to network activity levels. Our proposed cross correlation method was particularly robust to the influence of network activity. The proposed experimental treatment will further advance a more scientific evaluation of methods and provide the ability to determine their operational boundaries.« less

  6. Undermining and Strengthening Social Networks through Network Modification

    PubMed Central

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-01-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention. PMID:27703198

  7. Undermining and Strengthening Social Networks through Network Modification.

    PubMed

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-05

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  8. Undermining and Strengthening Social Networks through Network Modification

    NASA Astrophysics Data System (ADS)

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  9. Do governance choices matter in health care networks?: an exploratory configuration study of health care networks.

    PubMed

    Willem, Annick; Gemmel, Paul

    2013-06-24

    Health care networks are widely used and accepted as an organizational form that enables integrated care as well as dealing with complex matters in health care. However, research on the governance of health care networks lags behind. The research aim of our study is to explore the type and importance of governance structure and governance mechanisms for network effectiveness. The study has a multiple case study design and covers 22 health care networks. Using a configuration view, combinations of network governance and other network characteristics were studied on the level of the network. Based on interview and questionnaire data, network characteristics were identified and patterns in the data looked for. Neither a dominant (or optimal) governance structure or mechanism nor a perfect fit among governance and other characteristics were revealed, but a number of characteristics that need further study might be related to effective networks such as the role of governmental agencies, legitimacy, and relational, hierarchical, and contractual governance mechanisms as complementary factors. Although the results emphasize the situational character of network governance and effectiveness, they give practitioners in the health care sector indications of which factors might be more or less crucial for network effectiveness.

  10. Kalman filter with a linear state model for PDR+WLAN positioning and its application to assisting a particle filter

    NASA Astrophysics Data System (ADS)

    Raitoharju, Matti; Nurminen, Henri; Piché, Robert

    2015-12-01

    Indoor positioning based on wireless local area network (WLAN) signals is often enhanced using pedestrian dead reckoning (PDR) based on an inertial measurement unit. The state evolution model in PDR is usually nonlinear. We present a new linear state evolution model for PDR. In simulated-data and real-data tests of tightly coupled WLAN-PDR positioning, the positioning accuracy with this linear model is better than with the traditional models when the initial heading is not known, which is a common situation. The proposed method is computationally light and is also suitable for smoothing. Furthermore, we present modifications to WLAN positioning based on Gaussian coverage areas and show how a Kalman filter using the proposed model can be used for integrity monitoring and (re)initialization of a particle filter.

  11. Identification Approach to Alleviate Effects of Unmeasured Heat Gains for MIMO Building Thermal Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cai, Jie; Kim, Donghun; Braun, James E.

    It is important to have practical methods for constructing a good mathematical model for a building's thermal system for energy audits, retrofit analysis and advanced building controls, e.g. model predictive control. Identification approaches based on semi-physical model structures are popular in building science for those purposes. However conventional gray box identification approaches applied to thermal networks would fail when significant unmeasured heat gains present in estimation data. Although this situation is very common and practical, there has been little research to tackle this issue in building science. This paper presents an overall identification approach to alleviate influences of unmeasured disturbances,more » and hence to obtain improved gray-box building models. The approach was applied to an existing open space building and the performance is demonstrated.« less

  12. Computation and Learning in Neural Networks With Binary Weights

    DTIC Science & Technology

    1992-11-28

    alternatively, the total number of component updates before convergence is 0(n 3 ). We follow this with an average case analysis, similar in flavour to...anecdotal evidence in support of it in ’Well, maybe an imp. I I situations where the network has a more "distributed" flavour with relatively dense...Within the hipocampus, there is a three stage sequence of processing consisting of granule cells (which 3 receive from the entorhinal cortex), the CA3

  13. Sensor Based Framework for Secure Multimedia Communication in VANET

    PubMed Central

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T.; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool. PMID:22163462

  14. EASY-SIM: A Visual Simulation System Software Architecture with an ADA 9X Application Framework

    DTIC Science & Technology

    1994-12-01

    devop -_ ment of software systems within a domain. Because an architecture promotes reuse at the design level, systems developers do not have to devote...physically separated actors into a battlefield situation, The interaction be- tween the various simulators is accomplished by means of network connec...realized that it would be more productive to make reusable components from scratch (Sny93,31-32]. Of notable exception were the network communications

  15. Managing ISR sharing policies at the network edge using Controlled English

    NASA Astrophysics Data System (ADS)

    Parizas, Christos; Pizzocaro, Diego; Preece, Alun; Zerfos, Petros

    2013-05-01

    In domains such as emergency response and military operations the sharing of Intelligence, Surveillance and Reconnaissance (ISR) assets among different coalition partners is regulated through policies. Traditionally, poli­ cies are created at the center of a coalitions network by high-level decision makers and expressed in low-level policy languages (e.g. Common Information Model SPL) by technical personnel, which makes them difficult to be understood by non-technical users at the edge of the network. Moreover, policies must often be modified by negotiation among coalition partners, typically in rapid response to the changing operational situation. Com­ monly, the users who must cope first with situational changes are those on the edge, so it would be very effective if they were able to create and negotiate policies themselves. We investigate the use of Controlled English (CE) as a means to define a policy representation that is both human-friendly and machine processable. We show how a CE model can capture a variety of policy types, including those based on a traditional asset ownership model, and those defining team-based asset sharing across a coalition. The use of CE is intended to benefit coalition networks by bridging the gap between technical and non-technical users in terms of policy creation and negoti­ ation, while at the same time being directly processable by a policy-checking system without transformation to any other technical representation.

  16. An Efficient Location Verification Scheme for Static Wireless Sensor Networks.

    PubMed

    Kim, In-Hwan; Kim, Bo-Sung; Song, JooSeok

    2017-01-24

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors.

  17. An Efficient Location Verification Scheme for Static Wireless Sensor Networks

    PubMed Central

    Kim, In-hwan; Kim, Bo-sung; Song, JooSeok

    2017-01-01

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors. PMID:28125007

  18. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    NASA Astrophysics Data System (ADS)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  19. Nuclear structure and decay data evaluation in Europe

    NASA Astrophysics Data System (ADS)

    Negret, Alexandru; Balabanski, Dimiter; Dimitriou, Paraskevi; Elekes, Zoltan; Mertzimekis, Theo J.; Pascu, Sorin; Timar, Janos

    2017-09-01

    Nuclear Structure and Decay Data (NSDD) activities in Europe include mass-chain and individual nuclei evaluations as well as horizontal evaluations and compilations, data dissemination and educational activities. As such they are essential for a large range of applications from energy, environmental, and medical to basic research in nuclear structure and reactions, all of which are intensively pursued in Europe. Although the NSDD evaluation groups in Europe form part of the international network of NSDD evaluators, which is coordinated by the International Atomic Energy Agency, they are faced with some very distinct challenges. We shortly present the NSDD Data Centre at IFIN-HH, Bucharest and discuss possible actions to improve the situation for the entire European NSDD evaluation effort.

  20. The Sao Paulo Lightning Mapping Array (SPLMA): Prospects to GOES-R GLM and CHUVA

    NASA Technical Reports Server (NTRS)

    Albrecht, Rachel I.; Carrey, Larry; Blakeslee, Richard J.; Bailey, Jeffrey C.; Goodman, Steven J.; Bruning, Eric C.; Koshak, William; Morales, Carlos A.; Machado, Luiz A. T.; Angelis, Carlos F.; hide

    2010-01-01

    This paper presents the characteristics and prospects of a Lightning Mapping Array to be deployed at the city of S o Paulo (SPLMA). This LMA network will provide CHUVA campaign with total lightning, lightning channel mapping and detailed information on the locations of cloud charge regions for the thunderstorms investigated during one of its IOP. The real-time availability of LMA observations will also contribute to and support improved weather situational awareness and mission execution. For GOES-R program it will form the basis of generating unique and valuable proxy data sets for both GLM and ABI sensors in support of several on-going research investigations

Top